CN102457509B - Cloud computing resources safety access method, Apparatus and system - Google Patents

Cloud computing resources safety access method, Apparatus and system Download PDF

Info

Publication number
CN102457509B
CN102457509B CN201010530222.6A CN201010530222A CN102457509B CN 102457509 B CN102457509 B CN 102457509B CN 201010530222 A CN201010530222 A CN 201010530222A CN 102457509 B CN102457509 B CN 102457509B
Authority
CN
China
Prior art keywords
resource
information
server
visited
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010530222.6A
Other languages
Chinese (zh)
Other versions
CN102457509A (en
Inventor
陈小华
周扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010530222.6A priority Critical patent/CN102457509B/en
Publication of CN102457509A publication Critical patent/CN102457509A/en
Application granted granted Critical
Publication of CN102457509B publication Critical patent/CN102457509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of cloud computing resources safety access method, comprising: resource information entrusts business server to provide the relevant information of resource for login user; After cloud computing service business server receives the resource access request of user's transmission, confirm the access credentials of whether carrying resource to be visited in resource access request, obtain the service provider's server info belonging to resource to be visited when not having, and send authentication request to the service provider's server belonging to resource to be visited; Carry the information such as identification information and resource information to be visited of user in authentication request, service provider's server carries out authentication and access control to user, issues the access control information of resource to be visited; The access control information that cloud computing service business server treats access resources carries out certification, and after certification is passed through, for user provides resource to be visited.The invention also discloses a kind of cloud computing resources secure access device.Invention increases user's access service resource access efficiency.

Description

Cloud computing resources safety access method, Apparatus and system
Technical field
The present invention relates to resource access techniques, particularly relate to a kind of cloud computing resources safety access method, Apparatus and system.
Background technology
Cloud computing is the technology that distributed treatment, parallel processing and grid computing etc. combine.The core concept of cloud computing, is by a large amount of computational resource unified management of connecting with network and scheduling, forms a computational resource pond to user's on-demand service.
By using cloud computing service, service provider can reduce enterprise operation cost, provides reliable resource access service to user.Increasing service provider has been had to select cloud computing service to provide related service service to user.
Service provider rents the service of cloud computing service business, then service resources is stored in cloud computing service business.Current, service provider utilizes cloud computing service to provide the major way of business to be that first user wants registering service provider website to user, and obtain service resources by service provider to cloud computing service business, then, business is sent to user by service provider.
This mode has many shortcomings.First, service provider provides commercial system from business to user is limited.All business of service provider all will provide through service provider.Secondly, require that service provider has larger service provision capacity.Service provider needs for numerous users provides the service being equivalent to a resource relay station, which increase the load pressure of service provider, and under cloud environment, service provider wishes to utilize cloud, simplified deployment, reduce costs, this just and requirement disagree, add the burden of service provider.Finally, the mode that user flexibility uses service provider's service resources is limited.User only has by registering service provider, could obtain the resource that corresponding service provider rents cloud computing service business.
But, along with the development of cloud computing service application, service provider wishes to utilize various ways to provide resource to user, and user wishes can access cloud computing service business flexibly anywhere or anytime, and then the business that acquisition service provider is provided by cloud computing service business.But as the user resources that the main business of service provider supports, service provider wishes to forbid that user directly accesses cloud computing service business certainly, thus protection user resources portion can not reveal to cloud computing service business.So, a mode that business is conveniently provided should be provided for service provider, for user provides the mode of a flexible access resources, protect the user resources of service provider again, need the safety approach that a better cloud computing service application is provided.
Therefore, at present in the urgent need to a kind of resources technology scheme, both for user provides the mode of a flexible access resources, the user resources of service provider's server can have been protected again.Regrettably, because cloud computing technology is still in talking stage, there is no relevant technical scheme at present can be for reference.
Summary of the invention
In view of this, main purpose of the present invention is to provide a kind of cloud computing resources safety access method, Apparatus and system, while facilitating user's access service resource, protects the user resources of service provider.
For achieving the above object, technical scheme of the present invention is achieved in that
A kind of cloud computing resources safety access method, comprising:
Resource information entrusts business server to provide the relevant information of service provider's resource for login user;
After cloud computing service business server receives the resource access request of user's transmission, confirm the access control voucher whether carrying resource to be visited in described resource access request, obtain the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request when not having, and send resources accessing control request to the service provider's server belonging to resource to be visited; Described service provider's server carries out authentication and access control according to the identification information of described user to described user, issues the access control information of resource to be visited; Wherein, the identification information of described user and resource information to be visited is carried in described resources accessing control request; Described resources accessing control information to be visited comprises the authorization message of resource to be visited;
The access control information of described cloud computing service business server to the resource to be visited receiving described user or the transmission of service provider's server carries out certification, and after certification is passed through, provides resource to be visited to described user; Or the access control information of described cloud computing service business server to the resource to be visited receiving described user or the transmission of service provider's server carries out certification, and after certification is passed through, provides the access authority information of resource to be visited to described user; After described cloud computing service business server receives the access authority information of the resource to be visited that described user sends, for described user provides resource to be visited.
Preferably, resource information entrusts that business server is service provider's server, cloud computing service business server or the independently server that arranges of enterprise, for providing the resource information of service provider to user.
Preferably, the access control information issuing resource to be visited described in is specially:
The access control information of resource to be visited is presented to described user or described cloud computing service business server; Wherein, when resources accessing control information is presented to described user, described user sends the access control information of described resource to be visited to described cloud computing service business server.
Preferably, described resource information entrusts business's server for before login user provides the relevant information of resource, and described method also comprises:
Described service provider's server receives the registration request of described user, and provides sign-on ID and access code for described user;
Described resource information entrusts business's server to provide the relevant information of resource to be specially for login user:
Described resource information trust business server represents service provider and represents resource information to user;
Described service provider's server entrusts business's server to share sign-on ID and the access code information of described user to described resource information, described resource information entrust the sign-on ID of user's input described in business's server authentication and access code information correct time, for described user provides the relevant information of resource.
Preferably, described method also comprises:
Described resource information entrust the sign-on ID of user's input described in business's server authentication and access code correct after, represent the resource information of service provider to user.
Preferably, the relevant information of described resource comprises described service provider's server is Customs Assigned Number information, resource number information, the described service provider's server identification information that user is arranged.
Preferably, the relevant information of described resource also comprises information effective time of described resource;
Described service provider's server identification information comprises the IP address information of described service provider's server, and, the name information of described service provider's server or communication port identification information or hardware identifier information are provided.
Preferably, described access authorization comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
A kind of cloud computing resources secure access device, comprises the first providing unit, the first receiving element, determining unit, the first authentication ' unit, the second authentication ' unit and the second providing unit, wherein,
First providing unit, for providing the relevant information of resource for login user;
First receiving element, for receiving the resource access request that user sends; Wherein, the identification information of described user and resource information to be visited is carried in described resource access request;
Determining unit, for confirming the access control voucher whether carrying resource to be visited in described resource access request, triggers the first authentication ' unit when not having;
First authentication ' unit, for obtaining the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request, and send access control request to the service provider's server belonging to resource to be visited; The identification information of described user and resource information to be visited is carried in described access control request; Described service provider's server carries out authentication and access control according to the identification information of described user to described user, issues the access control information of resource to be visited;
Second authentication ' unit, for carrying out certification to the access control information of the resource to be visited receiving described user or service provider's transmission;
Second providing unit, for after the second authentication ' unit certification completes, for described user provides resource to be visited; Or after the second authentication ' unit certification completes, provide the access authority information of resource to be visited to described user, and after the access authority information receiving the resource to be visited that described user sends, for described user provides resource to be visited.
Preferably, the access control information of described access authorization comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
A kind of cloud computing resources security access system, comprises resource information and entrusts business's server, service provider's server and cloud computing service business server; Wherein,
Resource information entrusts business's server, for providing the relevant information of resource for login user;
Cloud computing service business server, for receive user send resource access request after, confirm the access control voucher whether carrying resource to be visited in described resource access request, obtain the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request when not having, and send resources accessing control request to the service provider's server belonging to resource to be visited; The identification information of described user and resource information to be visited is carried in described authentication request; And, certification is carried out to the access control information of the resource to be visited receiving described user or service provider's transmission, and after certification is passed through, for described user provides resource to be visited; Or, for carrying out certification to the access control information of the resource to be visited receiving described user or the transmission of service provider's server, and after certification is passed through, provide the access authority information of resource to be visited to described user; And after the access authority information receiving the resource to be visited that described user sends, for described user provides resource to be visited;
Described service provider's server, carries out authentication and access control for the identification information according to described user to described user, issues the access control information of resource to be visited.
Preferably, described resource information entrusts business's server for before login user provides the relevant information of resource, and described service provider's server receives the registration request of described user, for described user provides sign-on ID and access code;
Described service provider's server entrusts business's server to share sign-on ID and the access code information of described user to described resource information, described resource information entrust the sign-on ID of user's input described in business's server authentication and access code correct time, for described user provides the relevant information of resource.
Preferably, described access authorization comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
In the present invention, first user entrusts business's server to carry out registration by resource information and logs in, obtain the relevant information of resource to be visited, and realize by cloud computing service business server the access treating access resources according to the relevant information of resource to be visited, in access process, by service provider's server, certification and access control are carried out to the identity of user, thus ensure that the fail safe of resource access.The present invention can provide simple resource access means to user, reduces the cost of Operation system setting, and the present invention is conducive to user flexibility access resources, improves the efficiency of resource access.
Accompanying drawing explanation
Fig. 1 is the composition structural representation of cloud computing resources security access system of the present invention;
Fig. 2 is the flow chart of cloud computing resources safety access method of the present invention;
Fig. 3 is the composition structural representation of cloud computing resources secure access device of the present invention.
Embodiment
Basic thought of the present invention is, resource information entrusts business server to provide the relevant information of resource for login user; After cloud computing service business server receives the resource access request of user's transmission, confirm whether carry resources accessing control voucher to be visited in resource access request, obtain the service provider's server info belonging to resource to be visited according to the relevant information of the resource to be visited of carrying in resource access request when not having, and send authentication request to the service provider's server belonging to resource to be visited; Carry the identification information of user and resource information to be visited in authentication request, service provider's server carries out authentication and access control according to the identification information of user to user, issues resources accessing control information to be visited.Cloud computing service business server carries out certification to the resources accessing control information to be visited receiving service provider's transmission, and after certification is passed through, for user provides resource to be visited.
Fig. 1 is the composition structural representation of cloud computing resources security access system of the present invention, and as shown in Figure 1, cloud computing resources security access system of the present invention comprises resource information and entrusts business's server, service provider's server and cloud computing service business server; Wherein,
Resource information entrusts business's server, for providing the relevant information of resource for login user;
Cloud computing service business server, for receive user send resource access request after, confirm the access control voucher whether carrying resource to be visited in described resource access request, obtain the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request when not having, and send resources accessing control request to the service provider's server belonging to resource to be visited; The identification information of described user and resource information to be visited is carried in described authentication request; And, certification is carried out to the access control information of the resource to be visited receiving described user or service provider's transmission, and after certification is passed through, for described user provides resource to be visited; Or, for carrying out certification to the access control information of the resource to be visited receiving described user or the transmission of service provider's server, and after certification is passed through, provide the access authority information of resource to be visited to described user; And after the access authority information receiving the resource to be visited that described user sends, for described user provides resource to be visited;
Described service provider's server, carries out authentication and access control for the identification information according to described user to described user, issues the access control information of resource to be visited.
In the present invention, the information platform of the resource that resource information entrusts business to provide for service provider, represents service provider and provides resource information to user.Here service provider oneself can entrust business as resource information.Certainly, cloud computing service business can entrust business as resource information, and resource information entrusts business also can be independently third company.The resource service provided and resource information can be told that resource information entrusts business's server by service provider's server, resource information entrusts business's server just can represent resource information to user, also on the basis of the resource information obtained, the combination of some resource informations can be developed, represents to user.Here, resource information both can be some basic Resource Units, also can be the combination of some Resource Units, here resource comprises other resources such as business element, computational resource that service provider provides, in business, as telecommunications company can provide some business, provide again some service package.
User can entrust business (or service provider) server to obtain some resource informations from resource information, then, to cloud computing service business server access resource, or after user's Gains resources information, as required, resource information is assembled, form a combination of resources, thus reach the demand of the service of acquisition, then just cloud computing service business server is issued in resource information combination.
Service provider's server is according to the requirement of cloud computing service business server, and authenticated user identity, according to some application behavior outcomes of user, issues access control information.
After cloud computing service business server initiates authentication request to service provider's server, access control information can be issued cloud computing service business server by service provider's server, cloud computing service business server, according to access control information, provides the resource service such as business to user.
Described resource information entrusts business's server for before login user provides the relevant information of resource, and described service provider's server receives the registration request of described user, for described user provides sign-on ID and access code;
Described service provider's server entrusts business's server to share sign-on ID and the access code information of described user to described resource information, described resource information entrust the sign-on ID of user's input described in business's server authentication and access code information correct time, for described user provides the relevant information of resource.
Described service provider's server is the access control information that described user issues access resources, and sends to described cloud computing service business.
Described access authority information comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
It is Customs Assigned Number information, resource number information, the described service provider's server identification information that user is arranged that the relevant information of described resource comprises described service provider's server.
The relevant information of described resource also comprises information effective time of described resource; Described service provider's server identification information comprises the IP address information of described service provider's server, and, the name information of described service provider's server or communication port identification information or hardware identifier information are provided.
In the present invention, cloud computing resources comprises cloud storage resources etc.
Below illustrate user of the present invention and how be positioned at resource on service provider's server by cloud computing service business server access service provider.
Fig. 2 is the flow chart of cloud computing resources safety access method of the present invention, and as shown in Figure 2, cloud computing resources safety access method of the present invention specifically comprises the following steps:
Step 201, user obtains the relevant information of resource to be visited.
Concrete, in step 201, first, user entrusts business's server log at client input username and password in resource information.After resource information entrusts business's server authentication user identity, send resource information list to user, user selects resource information to be visited, and resource information entrusts business's server to send respective resources information to user.
Client and resource information entrust communication process between business's server as follows:
User starts client-side program and inputs user name and user cipher.Client-side program is with SSL (SSL, Secure Sockets Layer) protocol entry certificate server, and initiation session, then issues resource information user name and corresponding password and entrust business's server.
Login password can, by user when being registered to service provider's server, utilize md5 encryption algorithm to be encrypted by client.In this case, the password of MD5 process can be issued resource information and entrust business's server by client.Entrust business's server to use MD5 coupling in resource information, can not user password be revealed.
The user name of preserving when user registers by service provider's server and the MD5 value of password share to resource information and entrust business's server.Now, resource information entrusts the MD5 value of this username and password of business's server matches, if do not mated, returns miscue.If coupling, then return the resource information list resourcelist of service provider's server.
User selects resource information to be visited from the Resources list, sends to resource information to entrust business's server, and resource information entrusts business's server that corresponding resource information ticket is returned to user.Resource information ticket can be encrypted by system key.System key K sfor resource information entrusts the shared key of business's server, service provider's server and cloud computing service business server.Resource information entrusts business's server also by cloud computing service business server ip c, send to user.
Resource information ticket comprises Customs Assigned Number N u, resource number N, service provider's server ID s, the IP of service provider's server s, and the time value time that user can use this bill access resources can be comprised.I.e. ticket={N u, N, ID s, IP s, time}K s.
Then, user receives resource information ticket, and is kept at local with the IP backing up access cloud computing service business server c, the conversation end between them.
Client and resource information entrust session flow process between business's server as follows:
Client entrusts business's server to send { username+ [password] MD5}SSL to resource information;
Resource information entrusts business's server to send { resourcelist}SSL to client;
Client entrusts business's server to send { N}SSL to resource information;
Resource information entrusts business's server to send { IP to client c, ticket}SSL; Wherein, ticket={N u, N, ID s, IP s, time}K s.
Above-mentioned username represents the login username of user, and password represents corresponding password, and [password] MD5 represents that this password is through MD5 process, and session is transmitted by ssl protocol.Resource number N can be a lot of resource information set.
Step 202, user obtains the mandate token of resource to be visited v.
In step 202., user, after the relevant information obtaining resource to be visited, still directly can not treat access resources by these information and conduct interviews, need the access token obtaining resource to be visited.Below describe the mandate token how user obtains resource to be visited in detail v.
User utilizes resource information to entrust the cloud computing service business server ip of business's server transmission cinitiate resource access request, and send resource access ticket to cloud computing service business server.
Cloud computing service business server by utilizing system key (K s) separate drawing of bill of exchange (ticket), obtain the ID of service provider's server sand IP s, and Customs Assigned Number N u.Cloud computing service business server is to the ID of service provider's server sand IP scarry out certification, find out the log-on message of service provider's server.If by certification, issue undelegated token, send to user.Undelegated token can by system key (K s) be encrypted.
Undelegated token ecomprise the ID of cloud computing service business server cand IP c, access resources numbering N, and comprise the time value time that can use this token.I.e. unauthorized token={ID c, IP c, N, time}K s.
Certainly, if user obtains authorize token vtime, cloud computing service business server will send to obtain to user authorizes token vrequest P t.Token is authorized to confirm whether user obtained before sending resource access request to cloud computing service business server v.If user's existing access token v, just can perform the flow process of last access resources.
Below still do not obtain with user and authorize token vprocessing procedure.
User is by unauthorized token esend to cloud computing service business server, acquisition request mandate token v.Cloud computing service business server sends request to service provider's server, requires that service provider's server provides the access control information of user access resources.Service provider's server lookup user access resources authority, issues cloud computing service business server by access resources authority credentials V.
Basic procedure between cloud computing service business server and service provider's server is as follows:
User is by unauthorized token eissue cloud computing service business server;
Cloud computing service business server is to the IP of service provider's server sinitiate access, send resource information N to be visited, resource access authority request P to service provider's server vwith Customs Assigned Number N u.This resource access rights request message can use system key (K s) encryption.
Service provider's server uses system key (K s) decoding resource access rights solicited message, obtain Customs Assigned Number N u, the IP of user is obtained according to numbering inquiry c, and to the IP of user cinitiate access, require that user provides resource access authority application information.
Customer service provider server provides resource access authority application.Concrete, in the present invention, service provider's server sends page jump action to subscription client i, user's registering service provider server website can be required.Now, client can jump to service provider's server site.User inputs user name username and password password, registering service server site.Service provider's server authentication user name username and password password, and contrast with the log-on message of database user, if unanimously, then allow user's access.Service provider's server sends page jump action to subscription client e, jump to the authorization page of resource N to be visited, user can select the authority request action such as paying v, requested service provider server allows its access resources N.
Service provider's server, according to application, issues access resources authority V, and authority credentials V is sent to cloud computing service business server.Process of transmitting system key (K s) encryption.
Cloud computing service business server uses system key (K s) deciphering Gains resources access right limit value V, and authority credentials V is encapsulated as mandate token v, and will token be authorized vsend to user.Send and authorize token vtime can pass through system key (K s) be encrypted.
Authorize token vservice provider's server ID can be comprised c, service provider's server ip c, resource number N, authority credentials V and this mandate token can be used vtime restriction time.Namely token is authorized v={ ID c, IP c, N, time, V, } K s.
Between cloud computing service business server, service provider's server, client, session flow process utilizes parameter to be expressed as follows:
User sends { ticket} by client to cloud computing service business server;
Cloud computing service business server sends { P to subscription client t, token e}
User sends { token by client to cloud computing service business server esSL;
Cloud computing service business server sends { { N, N to service provider's server u, P vk ssSL;
Service provider's service sends { action to device to subscription client isSL;
User sends { username, password}SSL by client to service provider's server;
Service provider's service sends { action to device to subscription client esSL;
User sends { { N, action by client to service provider's server vk csSL;
Service provider's server sends { { N, V}K to cloud computing service business server ssSL;
Service provider's server sends { token to subscription client vsSL;
token v={ID C,IP C,N,time,V}K S
Step 203, user's Gains resources access token a, access related resource to be visited.
In step 203, user utilizes access token vsend request to cloud computing service business server, cloud computing service business server authentication access token v, and send resource access token to user a, user receives resource access token aafter, just can use resource access token awhereabouts cloud computing service business server extracts resource.
Basic procedure between user and cloud computing service business server is as follows:
Client will access token vsend to cloud computing service business server, and to cloud computing service business server request resource access token a.Access token vcontent and above-mentioned token vcontent is identical.
Cloud computing service business server uses system key deciphering access token v, certification resource access authority information, certification is issued after passing through and is accessed token accordingly a, and send access token to user a.Access token athe identification information ID of service provider's server can be comprised c, resource number N, Resource Storage path D, resource access constraint L, and can the time restriction time of access resources.That is, access authorization token a={ ID c, N, D, L, time}Ks.
User receives access token a, use access token aresource access request is sent to cloud computing service business server.
Cloud computing service business server uses system key deciphering access token a, check resource access constraint information L, if passed through, according to L locating resource, cloud computing service business server provides resource to be visited to user, and resource resource corresponding for resource number is sent to user.
Between cloud computing service business server, client, session flow process utilizes parameter to be expressed as follows:
User sends { { token by client to cloud computing service business server vk ssSL;
Cloud computing service business server sends { token to subscription client user asSL;
User sends { token by client to cloud computing service business server asSL;
Cloud computing service business server sends { resource}SSL to subscription client; Wherein, token a={ ID c, N, D, L, time}Ks.
Fig. 3 is the composition structural representation of cloud computing resources secure access device of the present invention, as shown in Figure 3, cloud computing resources secure access device of the present invention comprises the first providing unit 30, first receiving element 31, determining unit 32, first authentication ' unit 33, second authentication ' unit 34 and the second providing unit 35, wherein
First providing unit 30, for providing the relevant information of resource for login user;
First receiving element 31, for receiving the resource access request that user sends; Wherein, the identification information of described user and resource information to be visited is carried in described resource access request;
Determining unit 32, for confirming the access control voucher whether carrying resource to be visited in described resource access request, triggers the first authentication ' unit when not having;
First authentication ' unit 33, for obtaining the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request, and send access control request to the service provider's server belonging to resource to be visited; The identification information of described user and resource information to be visited is carried in described access control request; Described service provider's server carries out authentication and access control according to the identification information of described user to described user, issues the access control information of resource to be visited;
Second authentication ' unit 34, for carrying out certification to receiving the access control information of resource to be visited that described user sends, and certification by after the access authority information of resource to be visited is provided to described user;
Second providing unit 35, for after the second authentication ' unit 34 certification completes, for described user provides resource to be visited; Or after the second authentication ' unit 34 certification completes, provide the access authority information of resource to be visited to described user, and after the access authority information receiving the resource to be visited that described user sends, for described user provides resource to be visited.
It is Customs Assigned Number information, resource number information, the described service provider's server identification information that user is arranged that the relevant information of described resource comprises described service provider's server.The relevant information of described resource also comprises information effective time of described resource;
Described service provider's server identification information comprises the IP address information of described service provider's server, and, the name information of described service provider's server or communication port identification information or hardware identifier information are provided.
Described access authorization comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
Those skilled in the art are to be understood that, cloud computing resources secure access device shown in Fig. 3 of the present invention designs for realizing aforesaid cloud computing resources safety access method, and the practical function of above-mentioned each processing unit can refer to the associated description of preceding method and understands.The function of each processing unit in figure realizes by the program run on processor, also realizes by concrete logical circuit.
The above, be only preferred embodiment of the present invention, be not intended to limit protection scope of the present invention.

Claims (13)

1. a cloud computing resources safety access method, is characterized in that, described method comprises:
Resource information entrusts business server to provide the relevant information of service provider's resource for login user;
After cloud computing service business server receives the resource access request of user's transmission, confirm the access control voucher whether carrying resource to be visited in described resource access request, obtain the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request when not having, and send resources accessing control request to the service provider's server belonging to resource to be visited; Described service provider's server carries out authentication and access control according to the identification information of described user to described user, issues the access control information of resource to be visited; Wherein, the identification information of described user and resource information to be visited is carried in described resources accessing control request; Described resources accessing control information to be visited comprises the authorization message of resource to be visited;
The access control information of described cloud computing service business server to the resource to be visited receiving described user or the transmission of service provider's server carries out certification, and after certification is passed through, provides resource to be visited to described user; Or the access control information of described cloud computing service business server to the resource to be visited receiving described user or the transmission of service provider's server carries out certification, and after certification is passed through, provides the access authority information of resource to be visited to described user; After described cloud computing service business server receives the access authority information of the resource to be visited that described user sends, for described user provides resource to be visited.
2. method according to claim 1, is characterized in that, resource information entrusts business server to be service provider's server or cloud computing service business server or independently third-party server, for providing the resource information of service provider to user.
3. method according to claim 1, is characterized in that, described in issue resource to be visited access control information be specially:
The access control information of resource to be visited is presented to described user or described cloud computing service business server; Wherein, when resources accessing control information is presented to described user, described user sends the access control information of described resource to be visited to described cloud computing service business server.
4. method according to claim 1, is characterized in that, described resource information entrusts business's server for before login user provides the relevant information of resource, and described method also comprises:
Described service provider's server receives the registration request of described user, and provides sign-on ID and access code for described user;
Described resource information entrusts business's server to provide the relevant information of resource to be specially for login user:
Described resource information trust business server represents service provider and represents resource information to user;
Described service provider's server entrusts business's server to share sign-on ID and the access code information of described user to described resource information, described resource information entrust the sign-on ID of user's input described in business's server authentication and access code information correct time, for described user provides the relevant information of resource.
5. method according to claim 4, is characterized in that, described method also comprises:
Described resource information entrust the sign-on ID of user's input described in business's server authentication and access code correct after, represent the resource information of service provider to user.
6. method according to claim 1, is characterized in that, it is Customs Assigned Number information, resource number information, the described service provider's server identification information that user is arranged that the relevant information of described resource comprises described service provider's server.
7. method according to claim 6, is characterized in that, the relevant information of described resource also comprises information effective time of described resource;
Described service provider's server identification information comprises the IP address information of described service provider's server, and, the name information of described service provider's server or communication port identification information or hardware identifier information are provided.
8. method according to claim 1, is characterized in that, described access authority information comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
9. a cloud computing resources secure access device, is characterized in that, described device comprises the first providing unit, the first receiving element, determining unit, the first authentication ' unit, the second authentication ' unit and the second providing unit, wherein,
First providing unit, for providing the relevant information of resource for login user;
First receiving element, for receiving the resource access request that user sends; Wherein, the identification information of described user and resource information to be visited is carried in described resource access request;
Determining unit, for confirming the access control voucher whether carrying resource to be visited in described resource access request, triggers the first authentication ' unit when not having;
First authentication ' unit, for obtaining the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request, and send access control request to the service provider's server belonging to resource to be visited; The identification information of described user and resource information to be visited is carried in described access control request; Described service provider's server carries out authentication and access control according to the identification information of described user to described user, issues the access control information of resource to be visited;
Second authentication ' unit, for carrying out certification to the access control information of the resource to be visited receiving described user or service provider's transmission;
Second providing unit, for after the second authentication ' unit certification completes, for described user provides resource to be visited; Or after the second authentication ' unit certification completes, provide the access authority information of resource to be visited to described user, and after the access authority information receiving the resource to be visited that described user sends, for described user provides resource to be visited.
10. device according to claim 9, is characterized in that, described access authority information comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
11. 1 kinds of cloud computing resources security access systems, is characterized in that, described system comprises resource information and entrusts business's server, service provider's server and cloud computing service business server; Wherein,
Resource information entrusts business's server, for providing the relevant information of resource for login user;
Cloud computing service business server, for receive user send resource access request after, confirm the access control voucher whether carrying resource to be visited in described resource access request, obtain the service provider's server info belonging to resource to be visited according to the relevant information of the resource described to be visited of carrying in described resource access request when not having, and send resources accessing control request to the service provider's server belonging to resource to be visited; The identification information of described user and resource information to be visited is carried in described resources accessing control request; And, certification is carried out to the access control information of the resource to be visited receiving described user or service provider's transmission, and after certification is passed through, for described user provides resource to be visited; Or, for carrying out certification to the access control information of the resource to be visited receiving described user or the transmission of service provider's server, and after certification is passed through, provide the access authority information of resource to be visited to described user; And after the access authority information receiving the resource to be visited that described user sends, for described user provides resource to be visited;
Described service provider's server, carries out authentication and access control for the identification information according to described user to described user, issues the access control information of resource to be visited.
12. systems according to claim 11, it is characterized in that, described resource information entrusts business's server for before login user provides the relevant information of resource, and described service provider's server receives the registration request of described user, for described user provides sign-on ID and access code;
Described service provider's server entrusts business's server to share sign-on ID and the access code information of described user to described resource information, described resource information entrust the sign-on ID of user's input described in business's server authentication and access code correct time, for described user provides the relevant information of resource.
13. systems according to claim 11, is characterized in that, described access authority information comprises: service provider's server identification information, resource number, Resource Storage path, resource access constraint and the time restriction of access resources.
CN201010530222.6A 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system Active CN102457509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010530222.6A CN102457509B (en) 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010530222.6A CN102457509B (en) 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system

Publications (2)

Publication Number Publication Date
CN102457509A CN102457509A (en) 2012-05-16
CN102457509B true CN102457509B (en) 2015-09-16

Family

ID=46040171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010530222.6A Active CN102457509B (en) 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system

Country Status (1)

Country Link
CN (1) CN102457509B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750472B (en) * 2012-05-31 2015-09-09 华为软件技术有限公司 A kind of method for authenticating, Apparatus and system
CN102891856B (en) * 2012-10-18 2015-03-11 中国科学院信息工程研究所 Safe access method between plural entity and plural entity identity relaying party
CN103780580B (en) * 2012-10-23 2017-05-10 中国电信股份有限公司 Method, server and system for providing capability access strategy
CN103795690B (en) * 2012-10-31 2017-08-11 华为技术有限公司 A kind of method, proxy server and the system of cloud access control
CN103107985B (en) * 2012-12-04 2016-01-20 百度在线网络技术(北京)有限公司 A kind of cloud terminal authentication, system and device
CN103152425B (en) * 2013-03-15 2016-03-23 苏州九光信息科技有限公司 Based on the safety management system of the mobile device of cloud
CN104954330B (en) * 2014-03-27 2018-03-16 华为软件技术有限公司 A kind of methods, devices and systems to be conducted interviews to data resource
CN105099690A (en) * 2014-05-19 2015-11-25 江苏博智软件科技有限公司 OTP and user behavior-based certification and authorization method in mobile cloud computing environment
US9774682B2 (en) * 2015-01-08 2017-09-26 International Business Machines Corporation Parallel data streaming between cloud-based applications and massively parallel systems
CN105025041B (en) * 2015-08-25 2019-03-12 北京百度网讯科技有限公司 The methods, devices and systems that file uploads
CN106330899A (en) * 2016-08-22 2017-01-11 深圳市先河系统技术有限公司 Private cloud device account management method and system, electronic device and server
US10990642B2 (en) * 2016-12-21 2021-04-27 Aon Global Operations Se, Singapore Branch Methods and systems for securely embedding dashboards into a content management system
CN113553600B (en) * 2020-04-23 2024-06-14 花瓣云科技有限公司 Resource acquisition method, system, server and storage medium
CN112035810A (en) * 2020-08-19 2020-12-04 绿盟科技集团股份有限公司 Access control method, device, medium and equipment
CN112632508B (en) * 2020-12-28 2023-10-20 中金数据(武汉)超算技术有限公司 Identity recognition method and device based on cloud computing
CN114650183A (en) * 2022-04-11 2022-06-21 远景智能国际私人投资有限公司 Resource management method, device, server and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350710A (en) * 2007-07-16 2009-01-21 华为技术有限公司 Network system, authority issuing server, authority issuing and executing method
WO2010117587A2 (en) * 2009-04-09 2010-10-14 Alcatel-Lucent Usa Inc. Identity management services provided by network operator

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8984505B2 (en) * 2008-11-26 2015-03-17 Red Hat, Inc. Providing access control to user-controlled resources in a cloud computing environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350710A (en) * 2007-07-16 2009-01-21 华为技术有限公司 Network system, authority issuing server, authority issuing and executing method
WO2010117587A2 (en) * 2009-04-09 2010-10-14 Alcatel-Lucent Usa Inc. Identity management services provided by network operator

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
云计算安全关键技术分析;张云勇 等;《电信科学》;20100930(第9期);第64-69页 *

Also Published As

Publication number Publication date
CN102457509A (en) 2012-05-16

Similar Documents

Publication Publication Date Title
CN102457509B (en) Cloud computing resources safety access method, Apparatus and system
CN102457507B (en) Cloud computing resources secure sharing method, Apparatus and system
EP2842258B1 (en) Multi-factor certificate authority
CN102479304B (en) Method, client and system for software access control
CN101647254B (en) Method and system for the provision of services for terminal devices
US8843415B2 (en) Secure software service systems and methods
US9699167B1 (en) Distributed authentication
CN104767731B (en) A kind of Restful move transactions system identity certification means of defence
US9203621B2 (en) Policy-based data management
CN103780580B (en) Method, server and system for providing capability access strategy
CN108833507B (en) Authorization authentication system and method for shared product
EP2973166A1 (en) Systems and methods for identifying a secure application when connecting to a network
US20110283106A1 (en) Method for realizing authentication center and authentication system
CN100365974C (en) Device and method for controlling computer access
US11811739B2 (en) Web encryption for web messages and application programming interfaces
CN114008968A (en) System, method and storage medium for license authorization in a computing environment
JP5452192B2 (en) Access control system, access control method and program
EP3062254B1 (en) License management for device management system
KR101824562B1 (en) Gateway and method for authentication
WO2014124782A1 (en) Method of privacy-preserving proof of reliability between three communicating parties
Chae et al. A study on secure user authentication and authorization in OAuth protocol
KR102058283B1 (en) Secure Interoperability Framework between diverse IoT Service Platforms and Apparatus
KR20120067105A (en) Social verification login system being possible to verify user and providing method thereof
Tiwari et al. Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
Fugkeaw et al. Multi-Application Authentication based on Multi-Agent System.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant