CN102932453A - Method for achieving data center security system based on cloud computation - Google Patents

Method for achieving data center security system based on cloud computation Download PDF

Info

Publication number
CN102932453A
CN102932453A CN2012104313453A CN201210431345A CN102932453A CN 102932453 A CN102932453 A CN 102932453A CN 2012104313453 A CN2012104313453 A CN 2012104313453A CN 201210431345 A CN201210431345 A CN 201210431345A CN 102932453 A CN102932453 A CN 102932453A
Authority
CN
China
Prior art keywords
cloud
security
data center
cloud security
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012104313453A
Other languages
Chinese (zh)
Inventor
傅涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Original Assignee
JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd filed Critical JIANGSU BOZHI SOFTWARE TECHNOLOGY Co Ltd
Priority to CN2012104313453A priority Critical patent/CN102932453A/en
Publication of CN102932453A publication Critical patent/CN102932453A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for achieving a data center security system based on cloud computation. According to requirements of the cloud computation, the architecture of a data center security protection system architected by 'cloud security' includes that data of an enterprise can be distributed at different cloud data central terminals, each cloud data center is architected with a 'cloud security' submodule, an enterprise cloud computation data center is provided with a 'cloud security' control center which is responsible for monitoring real-time dynamics of each cloud data center, when potential safety hazard accidents occur, measures are immediately taken to perform remote stopping, the 'cloud security' control center is further responsible for formulating safety regulations and standards and sending the safety regulations and standards to the 'cloud security' submodule of each cloud data center, the 'cloud security' control center and the 'cloud security' submodules commonly maintain the safety of the enterprise computation data center, the safety of the data center is controlled through a visual interface, accordingly the safety of the data center is guaranteed, and the foundation of the development of data center safety system in the future is established.

Description

A kind of data center's security system implementation method based on cloud computing
Technical field
The invention belongs to cloud computing data center security fields, on the basis of conventional data centers safety precaution system, in conjunction with the theory of cloud computing and " cloud security " under the new situation data center's security system is conducted in-depth research, design has provided data center's safety precaution system of " cloud security " framework, and use correlation technique in laboratory environment, to carry out the Realization of Simulation, " cloud security " control centre can control the fail safe at data center by interface intuitively, and with " cloud security " submodule common guarantee and the safety at service data center of cooperating with each other.
Background technology
With reference to OSI information security system framework and national information efficient public security system, data center's safety precaution architecture is made of technical system, organizational framework and management system.Ensure data center's safety, except the organization and management system that will guarantee the safety precaution system, the more important thing is technically its fail safe is ensured.
Cloud computing be by integrate, management, allotment be distributed in network computational resource everywhere, and provides safe and reliable data storage, conveniently Internet service and powerful computing capability to a large number of users simultaneously with unified interface.The storage of cloud computing and computing will no longer operate in local computer or the server, but operate on a large amount of computers that are distributed on the internet, the user only needs accessing Internet, just can namely serve by infrastructure, platform is namely served and software is namely served 3 kinds of forms, by terminal equipments such as computer, mobile phones, conveniently usage data and service in any place.Enterprise has deposit data in the data center of architecture cloud computing platform in enterprises, must ensure that data center is perfectly safe, and namely must ensure the fail safe of " high in the clouds " data center data.This computation model of cloud computing is applied to information security field, is called " cloud security " thereby produced a kind of brand-new information security theory.It upgrades to the active safety protection mode with passivating safe mode in the past, to ensure the safety of network and PC.
Windows communication infrastructure (WCF) is the application development interface by one group of data communication of Microsoft's development, core is to allow to realize communication by message between the teleprogram, be used for making up application program distributed, can be mutual, it adopts the architecture of SOA, inherit and developed the advantage of Web service, performance to distributed treatment is optimized, and is seamless integrated with Visual studio2005/2008, efficiently development DDB application.WCF follows service-oriented principle, in the WCF framework, all functions all are packaged into externally issue of service, service operation is among a certain host (service end), as external communication interface, end points is described with address (Address), binding (Binding) and contract (Contract) with end points.
Security status for the current data center, data center is the information exchange hinge that the multinomial network services such as Internet resources, server resource, the specialized trustship of main frame and broadband access are provided to the user, that information system resources is the most intensive, exchanges data is the most local, also be the multiple area of security incident, the careless omission in any protection will cause irreparable damage; In addition, day by day in-depth along with internet, applications, the data center's running environment just central server from legacy clients/server to network connection makes the transition, the relation of application program and hardware, network and operating system becomes and becomes increasingly complex, and these also introduce safely many uncertain factors for data center.The defensive measure of data center, Information Security Mechanism and security service all are faced with huge challenge.
Summary of the invention
The present invention seeks to: propose on the basis of conventional data centers safety precaution system in conjunction with the theory of cloud computing and " cloud security " under the new situation data center's security system to be conducted in-depth research, design has provided data center's safety precaution system of " cloud security " framework, and use correlation technique in laboratory environment, to carry out the Realization of Simulation, " cloud security " control centre can control the fail safe at data center by interface intuitively, and with " cloud security " submodule common guarantee and the safety at service data center of cooperating with each other.The object of the invention also is: propose a cover safety, take conventional data centers safety precaution system as framework, according to requirement and the characteristics of cloud computing, the framework that adopts " cloud security " is that the security system of data center has proposed a kind of new solution.
Technical scheme of the present invention is as follows: a kind of (enterprise) data center security system implementation method based on cloud computing, and the concrete steps of this method comprise:
Take the information security technology framework as the basis, requirement according to cloud computing, data center's safety precaution architectural framework of " cloud security " framework is: the data of an enterprise can be distributed in different cloud data center ends, each cloud data center framework " cloud security " submodule, and cloud computing data center of enterprise is provided with " cloud security " control centre; Implementation step is:
Step 1, " cloud security " control centre are responsible for monitoring the dynamic in real time of each cloud data center, and long-range prevention takes immediate steps when having the potential safety hazard event to occur;
Step 2, " cloud security " control centre also will formulate safety regulation and standard and be issued in " cloud security " submodule of each cloud data center;
The cooperate with each other safety at common maintaining enterprise calculated data center of step 3, " cloud security " control centre and " cloud security " submodule:
Enterprise data center's safety precaution architectural framework of " cloud security " framework, the design of " cloud security " control centre comprises that Control on Communication, Long-distance Control, telemonitoring, management arrange four module; Wherein communication control module comprises instant messaging and regulation management; Remote control module comprises host lock, terminal interface control and the control of host switch machine; Remote monitor module comprises the screenshotss demonstration of distance host and checks host information; Management arranges module and comprises user management and parameter setting; " cloud security " control centre utilizes the measures such as remote monitoring, can monitor fully cloud computing data center end main frame dynamically, when monitoring described main frame violation operation, " cloud security " control centre sends control command and in time locks main frame or memory interface is carried out Long-distance Control; Strengthened the safety of cloud data center.
" cloud security " submodule is based on hierarchical model; Main consideration comprises that link and network security, application safety, physical environment reach safely computer system security 4 parts, and wherein, link and network security comprise the isolation of intrusion prevention design and network; Application safety comprises isolation, encryption and the contents such as protection and grading control of user's Authentication and authorization, data; Physical environment comprises safely device security and the standby management of calamity; Computer system security comprises operating system security and database security; " cloud security " submodule can not only cooperate to come with " cloud security " control centre the safety at service data center, and the design feature of himself has also further improved the fail safe of whole data center.
Specializing of step 1:
1) realize " cloud security " control centre monitor each cloud data center in real time dynamically: be subjected to program that is used for listening port and receive data bag of each cloud data center operation of prosecutor, and controlling party " cloud security " control centre sends packet for controlled square end mouth by self port; Ought to make up two systems according to former, one is controlling party " (cloud security " control centre), and another is to be subjected to prosecutor " (cloud security " submodule), be subjected to prosecutor to wait for that controlling party sends instruction and carries out corresponding operation;
2) the Windows communication infrastructure is that the process that WCF communication realizes is: at first client Client calls client requests Service Request from client Client to server end Service, server end Service begins executable operations, after operation is finished, Service shows at the Client end to feedback request Callback Request of Client transmission and with the result, Client can send a feedback request response Callback Response to the Service end after finishing Callback Request operation, Service receives and carries out follow-up operation after the Callback Response, and all operations rear Service that is finished can send server response Service Response to client Client.
3) the remotely monitor and control implementation procedure is: " cloud security " control centre and " cloud security " submodule have formed the remote monitoring module of native system, and " cloud security " control centre is controlling party, and " cloud security " submodule is to be subjected to prosecutor.Controlling party sends order, is subjected to the prosecutor fill order and the result is fed back to controlling party.
4) research " cloud security " submodule, " cloud security " submodule considers mainly that based on hierarchical model link and network security, application safety, physical environment reach safely computer system security 4 parts.
Beneficial effect of the present invention is as follows:
1. " cloud security " control centre utilizes the measures such as remote monitoring, can monitor the dynamic of cloud data center end main frame fully, when monitoring violation operation, " cloud security " control centre sends control command and in time locks main frame or memory interface is carried out Long-distance Control, has strengthened the safety of cloud data center.
2. " cloud security " submodule can not only cooperate to come with " cloud security " control centre the safety at service data center, and the design feature of himself has also further improved the fail safe of whole data center.
3, a cover safety that proposes, take conventional data centers safety precaution system as framework, requirement and characteristics according to cloud computing, the framework that adopts " cloud security " is that the security system of data center has proposed a kind of new solution, and use some key technologies that correlation module has been carried out the contrast under the laboratory environment according to the design of scheme and realize, can control the fail safe at data center by interface intuitively, ensured the safety of data center with this, and laid a good foundation for the from now on development of data center's security system.
Security status for the current data center, data center is the information exchange hinge that the multinomial network services such as Internet resources, server resource, the specialized trustship of main frame and broadband access are provided to the user, that information system resources is the most intensive, exchanges data is the most local, also be the multiple area of security incident, the careless omission in any protection will cause irreparable damage; In addition, day by day in-depth along with internet, applications, the data center's running environment just central server from legacy clients/server to network connection makes the transition, the relation of application program and hardware, network and operating system becomes and becomes increasingly complex, and these also introduce safely many uncertain factors for data center.The defensive measure of data center, Information Security Mechanism and security service all are faced with huge challenge.Therefore, the present invention proposes a cover safety, take conventional data centers safety precaution system as framework, requirement and characteristics according to cloud computing, the framework that adopts " cloud security " is that the security system of data center has proposed a kind of new solution, and use some key technologies that correlation module has been carried out the contrast under the laboratory environment according to the design of scheme and realize, can control the fail safe at data center by interface intuitively, ensured the safety of data center with this, and laid a good foundation for the from now on development of data center's security system.
Description of drawings
Fig. 1 is " cloud security " control centre framework.
Fig. 2 is " cloud security " submodule framework.
Embodiment:
Realization of the present invention mainly may further comprise the steps:
Step 1: realize " cloud security " control centre: be subjected to program that is used for listening port and receive data bag of prosecutor operation, and controlling party sends packet for controlled square end mouth by self port.Ought to make up two systems according to former, one is controlling party " (cloud security " control centre), and another is to be subjected to prosecutor " (cloud security " submodule), be subjected to prosecutor to wait for that controlling party sends instruction and carries out corresponding operation.
Step 2: realize WCF communication, at first Client calls Service Request from Client to Service, Service begins executable operations, after operation is finished, Service shows at the Client end to Callback Request of Client transmission and with the result, Client can send a Callback Response to the Service end after finishing Callback Request operation, Service receives and carries out follow-up operation after the Callback Response, and all operations rear Service that is finished can send Service Response to Client.
Step 3: the remotely monitor and control implementation procedure is: " cloud security " control centre and " cloud security " submodule have formed the remote monitoring module of native system, and " cloud security " control centre is controlling party, and " cloud security " submodule is to be subjected to prosecutor.Controlling party sends order, is subjected to the prosecutor fill order and the result is fed back to controlling party.
Step 4: consider that link and network security, application safety, physical environment reach safely computer system security, realize " cloud security " submodule.Wherein, link and network security comprise the isolation of intrusion prevention design and network; Application safety comprises isolation, encryption and the contents such as protection and grading control of user's Authentication and authorization, data; Physical environment comprises safely device security and the standby management of calamity; Computer system security comprises operating system security and database security.

Claims (2)

1. data center's security system implementation method based on cloud computing, it is characterized in that the requirement according to cloud computing, data center's safety precaution architectural framework of " cloud security " framework is: the data of an enterprise can be distributed in different cloud data center ends, each cloud data center framework " cloud security " submodule, and cloud computing data center of enterprise is provided with " cloud security " control centre; Implementation step is:
Step 1, " cloud security " control centre are responsible for monitoring the dynamic in real time of each cloud data center, and long-range prevention takes immediate steps when having the potential safety hazard event to occur;
Step 2, " cloud security " control centre also will formulate safety regulation and standard and be issued in " cloud security " submodule of each cloud data center;
The safety at step 3, " cloud security " control centre and the common maintaining enterprise calculated data of " cloud security " submodule center:
Enterprise data center's safety precaution architectural framework of " cloud security " framework, the design of " cloud security " control centre comprises that Control on Communication, Long-distance Control, telemonitoring, management arrange four module; Wherein communication control module comprises instant messaging and regulation management; Remote control module comprises host lock, terminal interface control and the control of host switch machine; Remote monitor module comprises the screenshotss demonstration of distance host and checks host information; Management arranges module and comprises user management and parameter setting; " cloud security " control centre utilizes the remote monitoring measure, monitor fully cloud computing data center end main frame dynamically, when monitoring described main frame violation operation, " cloud security " control centre sends control command and in time locks main frame or memory interface is carried out Long-distance Control; Strengthened the safety of cloud data center;
" cloud security " submodule is based on hierarchical model; Consider to comprise that link and network security, application safety, physical environment reach safely computer system security 4 parts; Wherein, link and network security comprise the isolation of intrusion prevention design and network; Application safety comprises isolation, encryption and the contents such as protection and grading control of user's Authentication and authorization, data; Physical environment comprises safely device security and the standby management of calamity; Computer system security comprises operating system security and database security; " cloud security " submodule can not only cooperate to come with " cloud security " control centre the safety at service data center, and the design feature of himself has also further improved the fail safe of whole data center.
2. the data center's security system implementation method based on cloud computing according to claim 1 is characterized in that specializing of step 1:
1) realize " cloud security " control centre monitor each cloud data center in real time dynamically: be subjected to program that is used for listening port and receive data bag of each cloud data center operation of prosecutor, and controlling party " cloud security " control centre sends packet for controlled square end mouth by self port; Ought to make up two systems according to former, one is controlling party " cloud security " control centre, and another is to be subjected to prosecutor " cloud security " submodule, is subjected to prosecutor to wait for that controlling party sends instruction and carries out corresponding operation;
2) the Windows communication infrastructure is that the process that WCF communication realizes is: at first client Client calls client requests Service Request from client Client to server end Service, server end Service begins executable operations, after operation is finished, Service shows at the Client end to feedback request Callback Request of Client transmission and with the result, Client can send a feedback request response Callback Response to the Service end after finishing Callback Request operation, Service receives and carries out follow-up operation after the Callback Response, and all operations rear Service that is finished can send server response Service Response to client Client;
3) the remotely monitor and control implementation procedure is: " cloud security " control centre and " cloud security " submodule have formed the remote monitoring module of native system, and " cloud security " control centre is controlling party, and " cloud security " submodule is to be subjected to prosecutor; Controlling party sends order, is subjected to the prosecutor fill order and the result is fed back to controlling party.
CN2012104313453A 2012-10-31 2012-10-31 Method for achieving data center security system based on cloud computation Pending CN102932453A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012104313453A CN102932453A (en) 2012-10-31 2012-10-31 Method for achieving data center security system based on cloud computation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012104313453A CN102932453A (en) 2012-10-31 2012-10-31 Method for achieving data center security system based on cloud computation

Publications (1)

Publication Number Publication Date
CN102932453A true CN102932453A (en) 2013-02-13

Family

ID=47647150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012104313453A Pending CN102932453A (en) 2012-10-31 2012-10-31 Method for achieving data center security system based on cloud computation

Country Status (1)

Country Link
CN (1) CN102932453A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152362A (en) * 2013-03-28 2013-06-12 胡祥义 Cloud-computing-based encrypted transmission method for large data files
CN104216902A (en) * 2013-05-31 2014-12-17 西门子公司 Paging data loading method, device and system based on server paging
CN105162641A (en) * 2014-05-28 2015-12-16 中兴通讯股份有限公司 Monitoring method and device for cloud desktop
CN105871876A (en) * 2016-05-05 2016-08-17 云神科技投资股份有限公司 Smart city cloud security architecture building method
CN106713356A (en) * 2017-01-24 2017-05-24 网宿科技股份有限公司 Multi-data center management method and system
CN107317827A (en) * 2017-08-23 2017-11-03 合肥中盈信息工程有限公司 A kind of big data cloud booth data safety takes precautions against supervisory systems
CN108449352A (en) * 2018-03-28 2018-08-24 江苏财会职业学院 A method of the protection computer system security based on cloud computing
CN110022371A (en) * 2019-04-16 2019-07-16 山东超越数控电子股份有限公司 One kind managing platform and its working method towards the cloud security of " side Yun Xietong " Yun Zhongxin
US11882155B1 (en) 2021-06-09 2024-01-23 State Farm Mutual Automobile Insurance Company Systems and methods for cybersecurity analysis and control of cloud-based systems

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065122A (en) * 2010-11-11 2011-05-18 上海海事大学 Ship network construction method based on radio frequency identification and cloud computing
CN202004790U (en) * 2011-03-18 2011-10-05 蓝盾信息安全技术股份有限公司 Network security detection and monitoring auditing system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065122A (en) * 2010-11-11 2011-05-18 上海海事大学 Ship network construction method based on radio frequency identification and cloud computing
CN202004790U (en) * 2011-03-18 2011-10-05 蓝盾信息安全技术股份有限公司 Network security detection and monitoring auditing system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张水平等: "基于云计算的数据中心安全体系研究与实现", 《计算机工程与设计》, vol. 32, no. 12, 31 December 2011 (2011-12-31) *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152362A (en) * 2013-03-28 2013-06-12 胡祥义 Cloud-computing-based encrypted transmission method for large data files
CN103152362B (en) * 2013-03-28 2015-09-16 胡祥义 Based on the large data files encrypted transmission method of cloud computing
CN104216902A (en) * 2013-05-31 2014-12-17 西门子公司 Paging data loading method, device and system based on server paging
CN104216902B (en) * 2013-05-31 2018-10-02 西门子公司 A kind of paged data stowage, device and system based on server paging
CN105162641A (en) * 2014-05-28 2015-12-16 中兴通讯股份有限公司 Monitoring method and device for cloud desktop
CN105871876A (en) * 2016-05-05 2016-08-17 云神科技投资股份有限公司 Smart city cloud security architecture building method
CN106713356A (en) * 2017-01-24 2017-05-24 网宿科技股份有限公司 Multi-data center management method and system
CN106713356B (en) * 2017-01-24 2020-03-31 网宿科技股份有限公司 Multi-data center management method and system
CN107317827A (en) * 2017-08-23 2017-11-03 合肥中盈信息工程有限公司 A kind of big data cloud booth data safety takes precautions against supervisory systems
CN108449352A (en) * 2018-03-28 2018-08-24 江苏财会职业学院 A method of the protection computer system security based on cloud computing
CN110022371A (en) * 2019-04-16 2019-07-16 山东超越数控电子股份有限公司 One kind managing platform and its working method towards the cloud security of " side Yun Xietong " Yun Zhongxin
US11882155B1 (en) 2021-06-09 2024-01-23 State Farm Mutual Automobile Insurance Company Systems and methods for cybersecurity analysis and control of cloud-based systems

Similar Documents

Publication Publication Date Title
CN102932453A (en) Method for achieving data center security system based on cloud computation
Tran et al. SCADA as a service approach for interoperability of micro-grid platforms
CN204350029U (en) Data interaction system
KR20220160549A (en) Cluster access method, apparatus, electronic equipment and media
CN109690491A (en) Execute remote command
CN102196027A (en) System and method for implementing mobile cloud service
CN105577677A (en) Remote login method and system based on J2EE
CN116011590A (en) Federal learning method, device and system
CN113674455A (en) Intelligent door lock remote control method, device, system, equipment and storage medium
CN101854359A (en) Access control method based on virtualized calculation
CN108170510A (en) A kind of managing computing resources system based on virtualization technology
US11947640B2 (en) Adaptive, multi-channel, embedded application programming interface (API)
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN112448909A (en) Electronic lock management method, device, system and storage medium
CN115296866B (en) Access method and device for edge node
CN103581202B (en) The trade company of identity-based authentication platform makes board cross-certification method
CN116095671A (en) Resource sharing method based on meta universe and related equipment thereof
Xu et al. Security interaction of web services in heterogeneous platforms
CN110266477B (en) Dynamic encryption method for UDP communication
CN115222392A (en) Service access method, device, medium and electronic equipment based on block chain
CN113434904A (en) Data processing method and device, computer equipment and storage medium
CN112367297A (en) Service control method and device
US12028315B2 (en) Methods, devices, and computer program products for authenticating peripheral device
CN115297019B (en) Management method of Internet of things application platform, internet of things system, equipment and medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130213