CN102546672A - Out-of-band authorization safety reinforcement method for cloud computing platform - Google Patents

Out-of-band authorization safety reinforcement method for cloud computing platform Download PDF

Info

Publication number
CN102546672A
CN102546672A CN2012100607922A CN201210060792A CN102546672A CN 102546672 A CN102546672 A CN 102546672A CN 2012100607922 A CN2012100607922 A CN 2012100607922A CN 201210060792 A CN201210060792 A CN 201210060792A CN 102546672 A CN102546672 A CN 102546672A
Authority
CN
China
Prior art keywords
warrant
program
ssr
password
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100607922A
Other languages
Chinese (zh)
Inventor
苗再良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Communication Information System Co Ltd
Original Assignee
Inspur Communication Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Communication Information System Co Ltd filed Critical Inspur Communication Information System Co Ltd
Priority to CN2012100607922A priority Critical patent/CN102546672A/en
Publication of CN102546672A publication Critical patent/CN102546672A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a safety reinforcement method for a cloud computing platform. The method is characterized in that: programs on the cloud computing platform are subjected to out-of-band encryption authorization by adopting an active defense technology based on server system reinforcement (SSR) and the out-of-band encryption authorization, and the legitimacy of running a cloud computing program and the security of related data access are ensured under the support of the SSR by dynamic cross authorization between a cloud platform operation monitoring and management system and an external security management center. Therefore, a program running right is prevented from being illegally stolen and controlled by a super hacker Trojan, critical data is prevented from being illegally accessed, and the security of the cloud platform program running and the critical data can be greatly improved.

Description

The outer authorizing secure reinforcement means of a kind of cloud computing platform band
Technical field
The present invention relates to a kind of cloud computing security fields that the invention belongs to, the outer authorizing secure reinforcement means of specifically a kind of cloud computing platform band.
Background technology
Cloud security has become the No.1 challenge that cloud computing is used, the main worry when safety problem has become most of customer selecting cloud computing service, and seriously hindered the development of cloud computing.Because virtual, the intensification of cloud computing, mobilism, many tenants characteristics make the security threat factor roll up, the key subjects that how to ensure information safety, security of operation are cloud computing.
The safety problem of cloud computing relates to many aspects such as cloud computing platform safety, application program security of operation, customer information safety, interface and network security; Wherein network security, platform host and storage system safety industry have had ripe solution, but program running and client's sensitive information safety problem are never solved well.
Existing solution is mainly taked measures such as access registrar, fire compartment wall, IDS, viral wooden horse killing, data encryption; In case yet assailant's (super hacker, wooden horse etc.) sees through the outposts of the tax office such as authentication, fire compartment wall through deception or the counterfeit means that make a variation; Just may have access to inner core data; Even the operation control of the program of acquisition, thereby cause serious consequence.
Summary of the invention
The purpose of this invention is to provide the outer authorizing secure reinforcement means of a kind of cloud computing platform band.
The objective of the invention is to realize by following mode; Employing is based on the outer active defense technique of encrypting mandate and security hardening server S SR of band; Be with outer the encryption to authorize to the program on the cloud computing platform; And under the support of SSR; Through the dynamic cross-certification of cloud platform operation monitoring management system and external security administrative center, can prevent the possibility of super hacker, the illegal snooper operation of wooden horse power effectively, thereby improve the legitimacy of cloud platform program operation and the fail safe of critical data greatly;
Following based on outer mandate of the band of SSR and dynamic encryption verification process:
1) authorizes outward based on the band of SSR
Be with outer the encryption to authorize for the cloud computing program; Before program loading operation; Authorize this program running warrant and password by external management person, and the warrant password of authorizing be saved among the SSR, simultaneously with the warrant cryptogram copy to cloud platform program operation management system and external security center;
In a single day warrant and password store among the SSR, do not have the advanced authorization at SSR and external security center just can't change, thereby guarantee not distorting by hacker, wooden horse of warrant and password;
2) legitimacy, the fail safe that move through the cross-certification monitoring program
After the cloud computing program obtains the warrant password; Just can on the cloud platform, activate operation; In program operation process; The intersection safety certification of various strategies will be implemented in SSR and external security center, and the operation power and the password of inspection check program guarantee the legitimacy and the fail safe of program running on the cloud computing platform;
3) utilize dynamic encryption to ensure the fail safe of program running warrant
For preventing that further warrant password victim from cracking, stealing; SSR can implement the secondary dynamic encryption based on original licencing key; With encrypting dynamic warrant and the password that generates; Be distributed to external security center and cloud platform program operation management system in real time, utilize the key of making an appointment to discern use then.The opportunity that generates dynamic warrant and password through superencipher be at random, regular, or select at random constantly regularly, destroy old encryption warrant in the time of the distribution in real time of each dynamic encryption warrant.
Excellent effect of the present invention; Employing has formed high-intensity security protection system based on measures such as the outer mandate of the band of security hardening server, dynamic encryption, cross-certification; Caused great difficulty for assailant in the various bands (it is movable in the band that the behavior of hacker, wooden horse all belongs to); Thereby can realize high-intensity protection to the legitimacy of program running, the access security of critical data; Method of the present invention can not only defend hacker, wooden horse to attack effectively, also can defend effectively the cloud computing centralized administrator to the unauthorized access of sensitive data, peep, thereby intactly guarantee critical data, the high security of sensitive information.
Description of drawings
Fig. 1 is based on the outer dynamic encryption authentication model structural representation of authorizing of SSR band;
Fig. 2Topological structure sketch map based on outer mandate of the band of SSR and dynamic encryption authentication method.
Embodiment
With reference to Figure of description to explanation at length below the work of the present invention.
The outer authorizing secure reinforcement means of a kind of cloud computing platform band of the present invention; Be by generally comprising security hardening server S SR, band outer authorized component (or system), cloud computing platform program running monitor component, external security administrative center four parts based on complete application system of the present invention, the detailed operation process is referring to Fig. 2.
If there is not external security administrative center, also can become the very high safety system of intensity by other case parts, only the grade of safeguard protection (or reliability) decreases.
Employing is based on the outer active defense technique of encrypting mandate and security hardening server S SR of band; Be with outer the encryption to authorize to the program on the cloud computing platform; And under the support of SSR; Through the dynamic cross-certification of cloud platform operation monitoring management system and external security administrative center, can prevent the possibility of super hacker, the illegal snooper operation of wooden horse power effectively, thereby improve the legitimacy of cloud platform program operation and the fail safe of critical data greatly.Concrete principle and innovative point are following.
Basic principle model of the present invention is referring to figure below, and wherein outer mandates of band, security hardening server S SR, dynamic encryption cross-certification three parts constitute safety system, its object of protection to liking cloud program and cloud data.
Following based on outer mandate of the band of SSR and dynamic encryption verification process:
1) authorizes outward based on the band of SSR
The present invention is with outer the encryption to authorize for the cloud computing program; Before program loading operation; Authorize this program running warrant and password by external management person; And the warrant password of authorizing is saved among the SSR, simultaneously with the warrant cryptogram copy to cloud platform program operation management system and external security center;
In a single day warrant and password store among the SSR, if there is not the advanced authorization at SSR and external security center just can't change, thereby assurance warrant and password are not distorted by hacker, wooden horse etc.;
2) legitimacy, the fail safe that move through the cross-certification monitoring program
The cloud computing program just can activate operation after obtaining the warrant password on the cloud platform.In program operation process, the intersection safety certification of various strategies will be implemented in SSR and external security center, and the operation power and the password of inspection check program guarantee the legitimacy and the fail safe of program running on the cloud computing platform;
3) utilize dynamic encryption to ensure the fail safe of program running warrant
For preventing that further warrant password victim from cracking, stealing; SSR can implement the secondary dynamic encryption based on original licencing key; With encrypting dynamic warrant and the password that generates; Be distributed to external security center and cloud platform program operation management system in real time, utilize the key of making an appointment to discern use then.The opportunity that generates dynamic warrant and password through superencipher can be at random, regular, or select at random constantly regularly, destroy old encryption warrant in the time of the distribution in real time of each dynamic encryption warrant.
Adopt the novelty measure of above three aspects, can solve the legal operation and the data security problem of cloud computing platform program more completely.
Except that the described technical characterictic of specification, be the known technology of those skilled in the art.

Claims (1)

1. the outer authorizing secure reinforcement means of a cloud computing platform band; It is characterized in that adopting based on the outer active defense technique of encrypting mandate and security hardening server S SR of band; Be with outer the encryption to authorize to the program on the cloud computing platform; And under the support of SSR; Through the dynamic cross-certification of cloud platform operation monitoring management system and external security administrative center, can prevent the possibility of super hacker, the illegal snooper operation of wooden horse power effectively, thereby improve the legitimacy of cloud platform program operation and the fail safe of critical data greatly;
Following based on outer mandate of the band of SSR and dynamic encryption verification process:
1) authorizes outward based on the band of SSR
Be with outer the encryption to authorize for the cloud computing program; Before program loading operation; Authorize this program running warrant and password by external management person, and the warrant password of authorizing be saved among the SSR, simultaneously with the warrant cryptogram copy to cloud platform program operation management system and external security center;
In a single day warrant and password store among the SSR, do not have the advanced authorization at SSR and external security center just can't change, thereby guarantee not distorting by hacker, wooden horse of warrant and password;
2) legitimacy, the fail safe that move through the cross-certification monitoring program
After the cloud computing program obtains the warrant password; Just can on the cloud platform, activate operation; In program operation process; The intersection safety certification of various strategies will be implemented in SSR and external security center, and the operation power and the password of inspection check program guarantee the legitimacy and the fail safe of program running on the cloud computing platform;
3) utilize dynamic encryption to ensure the fail safe of program running warrant
For preventing that further warrant password victim from cracking, stealing; SSR can implement the secondary dynamic encryption based on original licencing key; With encrypting dynamic warrant and the password that generates; Be distributed to external security center and cloud platform program operation management system in real time, utilize the key make an appointment to discern use then, the opportunity that generates dynamic warrant and password through superencipher be at random, regular; Or select at random constantly regularly, destroy old encryption warrant in the time of the distribution in real time of each dynamic encryption warrant.
CN2012100607922A 2012-03-09 2012-03-09 Out-of-band authorization safety reinforcement method for cloud computing platform Pending CN102546672A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100607922A CN102546672A (en) 2012-03-09 2012-03-09 Out-of-band authorization safety reinforcement method for cloud computing platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100607922A CN102546672A (en) 2012-03-09 2012-03-09 Out-of-band authorization safety reinforcement method for cloud computing platform

Publications (1)

Publication Number Publication Date
CN102546672A true CN102546672A (en) 2012-07-04

Family

ID=46352630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100607922A Pending CN102546672A (en) 2012-03-09 2012-03-09 Out-of-band authorization safety reinforcement method for cloud computing platform

Country Status (1)

Country Link
CN (1) CN102546672A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457780A (en) * 2013-09-18 2013-12-18 浪潮电子信息产业股份有限公司 Method for managing server host reinforcing product in non-application-proxy mode
CN105718790A (en) * 2016-01-26 2016-06-29 浪潮电子信息产业股份有限公司 Program execution control method based on user under UNIX system
CN105718789A (en) * 2016-01-25 2016-06-29 浪潮电子信息产业股份有限公司 Program execution control method based on user under AIX system
CN105740696A (en) * 2016-01-26 2016-07-06 浪潮电子信息产业股份有限公司 User-based program execution control method under Solaris system
CN105740702A (en) * 2016-01-25 2016-07-06 浪潮电子信息产业股份有限公司 User-based program execution control method under LINUX system
CN106845168A (en) * 2016-12-20 2017-06-13 西安电子科技大学 A kind of obfuscating control flow method towards remote computation
CN107566329A (en) * 2017-05-11 2018-01-09 新华三云计算技术有限公司 A kind of access control method and device
CN108206741A (en) * 2016-12-16 2018-06-26 北京国双科技有限公司 Verification method, the apparatus and system of service
CN109145586A (en) * 2018-08-14 2019-01-04 郑州云海信息技术有限公司 A kind of SSR centralized management platform identity dynamic authorization method
US10251061B2 (en) 2015-12-17 2019-04-02 Tadhg Kelly Cellular out of band management as a cloud service

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286839A (en) * 2006-12-27 2008-10-15 英特尔公司 A method for exchanging strong encryption keys between devices using alternative input methods in wireless personal area networks (WPAN)
EP2395446A1 (en) * 2010-06-14 2011-12-14 Gemalto SA Method for pairing a first device with a second device
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286839A (en) * 2006-12-27 2008-10-15 英特尔公司 A method for exchanging strong encryption keys between devices using alternative input methods in wireless personal area networks (WPAN)
EP2395446A1 (en) * 2010-06-14 2011-12-14 Gemalto SA Method for pairing a first device with a second device
CN102281314A (en) * 2011-01-30 2011-12-14 程旭 Realization method and apparatus for high-efficient and safe data cloud storage system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曹人盛: "《"云计算"对广电国标地面数字电视无线传输应用的影响》", 《有线电视技术》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457780A (en) * 2013-09-18 2013-12-18 浪潮电子信息产业股份有限公司 Method for managing server host reinforcing product in non-application-proxy mode
US10251061B2 (en) 2015-12-17 2019-04-02 Tadhg Kelly Cellular out of band management as a cloud service
CN105718789A (en) * 2016-01-25 2016-06-29 浪潮电子信息产业股份有限公司 Program execution control method based on user under AIX system
CN105740702A (en) * 2016-01-25 2016-07-06 浪潮电子信息产业股份有限公司 User-based program execution control method under LINUX system
CN105718790A (en) * 2016-01-26 2016-06-29 浪潮电子信息产业股份有限公司 Program execution control method based on user under UNIX system
CN105740696A (en) * 2016-01-26 2016-07-06 浪潮电子信息产业股份有限公司 User-based program execution control method under Solaris system
CN108206741A (en) * 2016-12-16 2018-06-26 北京国双科技有限公司 Verification method, the apparatus and system of service
CN106845168A (en) * 2016-12-20 2017-06-13 西安电子科技大学 A kind of obfuscating control flow method towards remote computation
CN106845168B (en) * 2016-12-20 2019-05-03 西安电子科技大学 A kind of obfuscating control flow method towards remote computation
CN107566329A (en) * 2017-05-11 2018-01-09 新华三云计算技术有限公司 A kind of access control method and device
CN109145586A (en) * 2018-08-14 2019-01-04 郑州云海信息技术有限公司 A kind of SSR centralized management platform identity dynamic authorization method

Similar Documents

Publication Publication Date Title
CN102546672A (en) Out-of-band authorization safety reinforcement method for cloud computing platform
CN103310161B (en) A kind of means of defence for Database Systems and system
CN102724215B (en) Method for storing user key safely and improving data security of cloud platform based on user login password
CN105491062B (en) A kind of client software guard method, device and client
CN103455763B (en) A kind of internet log record system and method protecting individual subscriber privacy
CN102006306B (en) Security authentication method for WEB service
CN110233817B (en) Container safety system based on cloud computing
CN104038478A (en) Embedded platform identity authentication trusted network connection method and system
CN104767745A (en) Cloud data security protection method
CN105740725A (en) File protection method and system
CN104573549A (en) Credible method and system for protecting confidentiality of database
CN102760213A (en) Credible Agent based MT (Mobile Terminal) credible state monitoring method
CN103970540B (en) Key Functions secure calling method and device
CN103780584A (en) Cloud computing-based identity authentication fusion method
CN108200073B (en) Sensitive data safety protection system
CN102340500A (en) Security management system and method of dependable computing platform
CN106850232B (en) The authorization management method and system that state is kept
CN110290125A (en) Data security system and data safety processing method based on block chain
CN102983969B (en) Security login system and security login method for operating system
CN105933117A (en) Data encryption and decryption device and method based on TPM (Trusted Platform Module) key security storage
CN103607378A (en) Access control method
CN117390608A (en) Security authentication method and system for file management
CN102098313A (en) Waterproof wall system and authentication method thereof
Hieb et al. Security enhancements for distributed control systems
CN105912945A (en) Safety reinforcing device and operation method of operating system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120704

WD01 Invention patent application deemed withdrawn after publication