CN105376345B - A kind of cloud platform security processing, controller and cloud computing system - Google Patents

A kind of cloud platform security processing, controller and cloud computing system Download PDF

Info

Publication number
CN105376345B
CN105376345B CN201510849738.XA CN201510849738A CN105376345B CN 105376345 B CN105376345 B CN 105376345B CN 201510849738 A CN201510849738 A CN 201510849738A CN 105376345 B CN105376345 B CN 105376345B
Authority
CN
China
Prior art keywords
request
cluster
virtual
information
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510849738.XA
Other languages
Chinese (zh)
Other versions
CN105376345A (en
Inventor
赵伟
惠润海
郭庆
宋怀明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dawning Information Industry Beijing Co Ltd
Dawning Information Industry Co Ltd
Original Assignee
Dawning Information Industry Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dawning Information Industry Beijing Co Ltd filed Critical Dawning Information Industry Beijing Co Ltd
Priority to CN201510849738.XA priority Critical patent/CN105376345B/en
Publication of CN105376345A publication Critical patent/CN105376345A/en
Application granted granted Critical
Publication of CN105376345B publication Critical patent/CN105376345B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

This application provides a kind of cloud platform security processing, controller and cloud computing systems, to ensure the safety of host, this method comprises: controller receives arp request;Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information that the request carries;According to judging result using Virtual Cluster or the control strategy of physical cluster.By the operation of controller, the removing of virtual platform and physical cluster is realized, so that the system operation of entire cloud platform does not interfere with the operation of physical cluster, true physical machine or controller will not be made under attack because of the query-attack of virtual platform.

Description

A kind of cloud platform security processing, controller and cloud computing system
Technical field
This application involves field of cloud computer technology more particularly to a kind of cloud platform security processings, controller and cloud meter Calculation system.
Background technique
It turns to cloud computing (cloud computing), is the great change that industry will face.Various cloud platforms The appearance of (cloud platforms) is one of most important link of the transformation.And the maximum several features of cloud platform are exactly:
A) ultra-large
B) it virtualizes
C) high reliability
D) versatility
E) high scalability
F) cheap
In these features, enterprise or personal most pay close attention to should be exactly high reliability.Either platform is highly reliable, Or data is highly reliable.Although cloud computing provides powerful calculating and storage capacity for user, cloud service provider is difficult to know Whether the purpose of other user behavior, the required cloud computing service that user cannot be distinguished are legal.So some users' is illegal Potential risk caused by request just securely and reliably produces huge impact to cloud platform.
Cracker community is locked in target of attack in the abundant cloud data center of interests, with " Guest OS (client behaviour Make system) mirror image distorts ", " virtual machine sprawling " and " (Application Programming Interface, is answered api interface With Program Interfaces) abuse " etc. start to occur extensively for the novel threat of representative.With block based on killing it is passive passively Safeguard procedures, impossible to guard against in face of new Situation on Information Security, traditional network security, terminal security, security boundary solve Scheme can not adapt to the demand for security of cloud data center.
Existing cloud platform Host Security scheme is exactly, using dedicated security server, dedicated secure virtual machine set Part, dedicated secure operating system, dedicated safety container external member and special safety management platform, five in this way are big Component part forms the cloud platform of a safety.
It is had the following problems using existing cloud platform Host Security scheme:
A) dependence is high.
What existing technology used is all dedicated server and dedicated service parts, this has resulted in Build Security The dependence of cloud platform environment.
B) complexity is high.
The safe and reliable of host may be implemented really using existing technology, but need from inside to outside, from server Carry out security protection certification all to system image to realize.Higher demand undoubtedly can be proposed to hardware in this way, while can also be made Building for entire platform is more complicated.
Summary of the invention
The embodiment of the present application proposes a kind of cloud platform security processing, controller and cloud computing system, does not need to make With dedicated security server, dedicated secure virtual machine external member, dedicated secure operating system, dedicated safety container external member And special safety management platform, five in this way big component part form the cloud platform of a safety, and ensure master The safety of machine.
In one aspect, the embodiment of the present application provides a kind of cloud platform security processing, comprising:
Controller receives arp request;
Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information that the request carries;
According to judging result using Virtual Cluster or the control strategy of physical cluster.
On the other hand, the embodiment of the present application provides a kind of controller, comprising:
Receiving module, for receiving arp request;
Judgment module, the information for being carried according to the request judge that the request is request or the physics of Virtual Cluster The request of cluster;
Control module, for using the control strategy of Virtual Cluster or physical cluster according to judging result.
In addition, the embodiment of the present application also provides a kind of cloud computing system, including above controller.
It has the beneficial effect that:
In embodiments of the present invention, controller receives arp request;The information judgement carried according to the request The request is the request of Virtual Cluster or the request of physical cluster;And according to judging result using Virtual Cluster or physical cluster Control strategy.By the operation of controller, the removing of virtual platform and physical cluster is realized, so that the system of entire cloud platform Operation does not interfere with the operation of physical cluster, will not make true physical machine or control because of the query-attack of virtual platform Device processed is under attack.
Detailed description of the invention
The specific embodiment of the application is described below with reference to accompanying drawings, in which:
Fig. 1 shows the flow diagram of the cloud platform security processing in the embodiment of the present application;
Fig. 2 shows the flow diagrams of the cloud platform security processing of embodiment one in the embodiment of the present application;
Fig. 3 shows the message format schematic diagram of ARP protocol;
Fig. 4 shows the flow diagram of the cloud platform security processing of embodiment two in the embodiment of the present application;
Fig. 5 shows the structural schematic diagram of controller in the embodiment of the present application.
Specific embodiment
In order to which technical solution and the advantage of the application is more clearly understood, below in conjunction with attached drawing to the exemplary of the application Embodiment is described in more detail, it is clear that and described embodiment is only a part of the embodiment of the application, rather than The exhaustion of all embodiments.And in the absence of conflict, the feature in the embodiment and embodiment in this specification can be with It is combined with each other.
Inventor is during invention note that existing cloud platform Host Security scheme, uses dedicated security service Device, dedicated secure virtual machine external member, dedicated secure operating system, dedicated safety container external member and special bursting tube Platform, the big component part of five in this way form the cloud platform of a safety.And existing cloud platform host is used to pacify Full scheme has that dependence is high, complexity is high.Inventor wishes that the technology increased income completely is used to carry out cloud computing platform Build.
Fig. 1 shows the cloud platform security processing in the embodiment of the present application, as shown in the figure, comprising:
Step 101, controller receives ARP (Address Resolution Protocol, address resolution protocol) request;
Step 102, judge that the ARP request is request or the physics collection of Virtual Cluster according to the information that the ARP request carries The request of group;
Step 103, according to judging result using Virtual Cluster or the control strategy of physical cluster.
Further, control implement body how according to the ARP request carry information judge that the ARP request is Virtual Cluster Request or physical cluster request, mode one and mode two can be divided into.
In mode one, controller monitors the request received;
The above-mentioned information carried according to the ARP request judges that the ARP request is request or the physical cluster of Virtual Cluster Request are as follows: judge that the ARP request is request or the physics collection of Virtual Cluster according to the information of sender entrained by the ARP request The request of group.
It can store the network interface information of each dummy node in Virtual Cluster to be judged, in controller;
Judge that the ARP request is the request of Virtual Cluster or the request of physical cluster according to the information that the ARP request carries Are as follows: judge that the information of the sender whether there is in controller local, if so, it is judged as the request of Virtual Cluster, otherwise, judgement For the request of physical cluster.
In specific implementation, it is not limited to store the network interface information of each dummy node in Virtual Cluster in the controller, such as Also it can store the relevant information of each node in whole physical clusters.
The information of the sender may include sender's hardware address and/or sender's IP address.
In mode two, controller is not monitored the request received, but virtual collection monitors the virtual net of itself Mouthful, the default mark is stamped in the request that each is issued.The above-mentioned information carried according to the ARP request judges that the ARP is asked The request of Seeking Truth Virtual Cluster or the request of physical cluster are as follows: with the presence or absence of pre- bidding in the information carried according to the ARP request Knowledge judges that the ARP request is the request of Virtual Cluster or the request of physical cluster.It specifically, there are the default mark is empty The request of quasi- cluster, is otherwise the request of physical cluster.
For the ease of the implementation of the application, it is illustrated below with embodiment.
Embodiment one:
In embodiment one, building for cloud computing platform is carried out using the technology increased income completely.
The management platform of virtual machine: CloudStack management software
Server: SDN (Software Defined Network, software defined network) server
Director demon: Flowlight
Control node: high-performance computer
Storage cluster: storage cluster
SDN cloud platform is divided into three layers, and first layer is application layer (i.e. client), and the second layer is control layer (i.e. controller Software), third layer is server layer (i.e. SDN server cluster).In this simple cloud platform, user from external API into Enter after virtual desktop if carrying out aggressive operation, this will affect the information security of entire platform.
How data safety and Host Security are realized in this set system?
The safety of data still leans on data separating, and data are carried out separate storage, are placed on an individual storage cluster, User carries out safe digital certificate will being called to authenticate when data acquisition.The data of user we will do it separate storage Only it can just be called by way of safety when in use.
Host lean on safely be cluster virtual machine and physical machine cluster removing so that the system operation of entire cloud platform The operation of physical cluster is not interfered with, it in this way would not be because of the attack of virtual platform when doing the experiment of cloud security platform Request is so that true physical machine or controller are under attack.
And when realizing that these are safe, the removing of virtual platform and physical cluster is a ring of most critical, how real Now remove?
Due to we be using SDN server, so the request of either Virtual Cluster or asking for physical cluster It asks, can all carry out sending on primary controller, just will form the routing table of a SDN mode in this way.By controlling this routing We can carry out separating treatment to Virtual Cluster and physical cluster with table, and still, problem is come, and how to carry out cluster information Distinguish?
How the differentiation of cluster information is carried out, we would have to study breath of above delivering letters, in the information above sent, There are some positions can not to be the cover of practical significance in the head of ARP packet, so we can be made an issue of with this, is sent upper We some special discrimination strings are added in information.How these special discrimination strings are added again at problem, this is dependent on me Controller, our controller be using the flowlight of open source realize that we just need inside plus one A monitoring unit, and this monitoring unit will be set as highest level monitoring, while we will add node where controller One database carries out the network interface information for storing our all dummy nodes.It delivers letters on each and is detected in breath, such as There is database with us in the former IP address of breath of delivering letters on fruit and former MAC Address (i.e. the IP address and hardware address of sender) In, mean that breath of delivering letters on this is breath of delivering letters on Virtual Cluster.In this way we can be realized as Virtual Cluster and The single control of physical cluster on a control level.
As shown in Fig. 2, the implementation process of embodiment one is as follows:
Step 201, controller receives ARP request;
Step 202, the IP address and hardware address of the sender of ARP request carrying are obtained;
The message format of ARP is as shown in figure 3, sender's IP address and sender's hardware address can be obtained therefrom.
Step 203, it is each virtual in local virtual cluster to judge whether the IP address of the sender and hardware address are stored in In the network interface information database of node, if so, judging that the ARP request is the request of Virtual Cluster, step 204 is carried out, otherwise, Judge that the ARP request is the request of physical cluster, carries out step 205;
Step 204, using Virtual Cluster control strategy;
Step 205, using the control strategy of physical cluster.
Embodiment two:
In example 2, controller is not monitored the request received, but virtual collection monitors the virtual of itself Network interface stamps the default mark in the request that each is issued.Specifically, it can use ARP request message packet header most 8 covers preset mark to carry this afterwards.
The implementation process of embodiment two is as follows:
Step 401, controller receives ARP request;
Step 402, judge whether the ARP request carries default mark, if so, carrying out step 403, otherwise carry out step 404;
Step 403, using Virtual Cluster control strategy;
Step 404, using the control strategy of physical cluster.
Based on the same inventive concept, a kind of controller and cloud computing system are additionally provided in the embodiment of the present application, due to this The principle that a little equipment, system solve the problems, such as is similar to a kind of cloud platform security processing, therefore the implementation of these equipment can be with Referring to the implementation of method, overlaps will not be repeated.
As shown in figure 5, the controller of the embodiment of the present application, comprising:
Receiving module, for receiving ARP request;
Judgment module, the information for being carried according to the ARP request judge that the ARP request is request or the object of Virtual Cluster Manage the request of cluster;
Control module, for using the control strategy of Virtual Cluster or physical cluster according to judging result.
The controller may include monitoring module, for monitoring the request received;
When having monitoring module, the information of controller sender according to entrained by the ARP request judges the request It is the request of Virtual Cluster or the request of physical cluster.
To judge the ARP request, controller can also include memory module, for storing each void in Virtual Cluster The network interface information of quasi- node;
The above-mentioned information carried according to the ARP request judges that the ARP request is request or the physical cluster of Virtual Cluster Request are as follows: it is local in the controller to judge that the information of the sender whether there is, if so, being judged as asking for Virtual Cluster It asks, otherwise, is judged as the request of physical cluster.
Wherein the information of sender includes sender's hardware address and/or sender's IP address.
Controller, which can also not have, monitors module, but virtual collection monitors the virtual network port of itself, in each sending Request in stamp default mark, the above-mentioned information carried according to the ARP request judges that the ARP request is the request of Virtual Cluster Or the request of physical cluster are as follows: judge that the ARP request is empty with the presence or absence of default mark in the information carried according to the ARP request The request of quasi- cluster or the request of physical cluster.
The embodiment of the invention also includes a kind of cloud computing systems, including above controller.
In addition, the cloud computing system further includes virtually collecting, which monitors the virtual network port of itself, in each sending Request in stamp default mark.
The invention proposes virtual, physics, store the thought that three parts are independently removed.After the present invention, it is directed to big Learn the network analog safety experiment platform of exploitation, it will be able to which ensure its safety is various hacker's network attacks behaviour using this platform As while do not interfere with our physical cluster.
After this technology, so that it may guarantee our recovery capabilities to data to greatest extent, because we Separate storage when data.It ensure that the safe and reliable storage of data under certain limit simultaneously.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.

Claims (11)

1. a kind of cloud platform security processing characterized by comprising
Controller receives arp request;
Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information that the request carries;
According to judging result using Virtual Cluster or the control strategy of physical cluster;
The controller monitors the request received;
The information carried according to the request judges that the request is the request of Virtual Cluster or the request of physical cluster are as follows: Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information of sender entrained by the request.
2. the method as described in claim 1, which is characterized in that the net of each dummy node in the controller storage Virtual Cluster Message breath;
The information of the sender according to entrained by the request judges that the request is request or the physics collection of Virtual Cluster The request of group are as follows: it is local in the controller to judge that the information of the sender whether there is, if so, being judged as Virtual Cluster Request, otherwise, is judged as the request of physical cluster.
3. method according to claim 2, which is characterized in that the information of the sender include sender's hardware address and/ Or sender's IP address.
4. the method as described in claim 1, which is characterized in that the information carried according to the request judges the request It is the request of Virtual Cluster or the request of physical cluster are as follows: sentence in the information carried according to the request with the presence or absence of default mark The request of breaking is the request of Virtual Cluster or the request of physical cluster.
5. method as claimed in claim 4, which is characterized in that virtual collection monitors the virtual network port of itself, in each sending Request in stamp the default mark.
6. a kind of controller characterized by comprising
Receiving module, for receiving arp request;
Judgment module, the information for being carried according to the request judge that the request is request or the physical cluster of Virtual Cluster Request;
Control module, for using the control strategy of Virtual Cluster or physical cluster according to judging result;
Module is monitored, for monitoring the request received;
The information carried according to the request judges that the request is the request of Virtual Cluster or the request of physical cluster are as follows: Judge that the request is the request of Virtual Cluster or the request of physical cluster according to the information of sender entrained by the request.
7. controller as claimed in claim 6, which is characterized in that including memory module, for storing each void in Virtual Cluster The network interface information of quasi- node;
The information of the sender according to entrained by the request judges that the request is request or the physics collection of Virtual Cluster The request of group are as follows: it is local in the controller to judge that the information of the sender whether there is, if so, being judged as Virtual Cluster Request, otherwise, is judged as the request of physical cluster.
8. any controller as claimed in claims 6 or 7, which is characterized in that the information of the sender includes that sender is hard Part address and/or sender's IP address.
9. controller as claimed in claim 6, which is characterized in that asked described in the information judgement carried according to the request The request of Seeking Truth Virtual Cluster or the request of physical cluster are as follows: with the presence or absence of default mark in the information carried according to the request Judge that the request is the request of Virtual Cluster or the request of physical cluster.
10. a kind of cloud computing system, which is characterized in that including any controller in such as claim 6-9.
11. cloud computing system as claimed in claim 10, which is characterized in that including virtually collecting, the virtual collection monitors itself Virtual network port, each issue request in stamp default mark.
CN201510849738.XA 2015-11-27 2015-11-27 A kind of cloud platform security processing, controller and cloud computing system Active CN105376345B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510849738.XA CN105376345B (en) 2015-11-27 2015-11-27 A kind of cloud platform security processing, controller and cloud computing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510849738.XA CN105376345B (en) 2015-11-27 2015-11-27 A kind of cloud platform security processing, controller and cloud computing system

Publications (2)

Publication Number Publication Date
CN105376345A CN105376345A (en) 2016-03-02
CN105376345B true CN105376345B (en) 2019-01-25

Family

ID=55378139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510849738.XA Active CN105376345B (en) 2015-11-27 2015-11-27 A kind of cloud platform security processing, controller and cloud computing system

Country Status (1)

Country Link
CN (1) CN105376345B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106130776A (en) * 2016-07-14 2016-11-16 深圳市永达电子信息股份有限公司 A kind of method utilizing SDN technology to carry out virtual machine and physical server mixing management and control based on CloudStack cloud platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924707A (en) * 2010-09-27 2010-12-22 杭州华三通信技术有限公司 Method and equipment for processing message of address resolution protocol (ARP)
CN102255903A (en) * 2011-07-07 2011-11-23 广州杰赛科技股份有限公司 Safety isolation method for virtual network and physical network of cloud computing
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050050179A1 (en) * 2003-08-28 2005-03-03 International Business Machines Corporation Method, apparatus and computer program product for implementing enhanced proxy ARP for virtual IP addresses

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924707A (en) * 2010-09-27 2010-12-22 杭州华三通信技术有限公司 Method and equipment for processing message of address resolution protocol (ARP)
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
CN102255903A (en) * 2011-07-07 2011-11-23 广州杰赛科技股份有限公司 Safety isolation method for virtual network and physical network of cloud computing

Also Published As

Publication number Publication date
CN105376345A (en) 2016-03-02

Similar Documents

Publication Publication Date Title
JP6952849B2 (en) Session security partition and application profiler
US9661013B2 (en) Manipulating API requests to indicate source computer application trustworthiness
KR101811758B1 (en) Methods and apparatus to securely share data
US10880306B2 (en) Verification information update
CN104601568B (en) Virtualization security isolation method and device
CN105656864B (en) Key management system and management method based on TCM
JP2017532649A (en) Confidential information processing method, apparatus, server, and security determination system
US9462011B2 (en) Determining trustworthiness of API requests based on source computer applications' responses to attack messages
CN108156175A (en) To the access method of shared storage information under cloud computing platform
CN114268508A (en) Internet of things equipment secure access method, device, equipment and medium
CN103885725B (en) A kind of virtual machine access control system and its control method based on cloud computing environment
JP6392985B2 (en) Detection system, detection device, detection method, and detection program
CN105376345B (en) A kind of cloud platform security processing, controller and cloud computing system
CN110536118A (en) A kind of data capture method, device and computer storage medium
CN106130968B (en) A kind of identity identifying method and system
JP6674443B2 (en) Method and apparatus for using exhaustible network resources
EP3718284A1 (en) Extending encrypted traffic analytics with traffic flow data
CN111585813B (en) Management method and system of network nodes in Internet of things environment
CN108600149A (en) Cloud computing high availability cluster method for managing resource
Hasan et al. Efficient and secured data partitioning in the multi cloud environment.
CN109525553B (en) Transmission protection method, intermediate device, server and system for URL (Uniform resource locator) request
Barati et al. Intrusion detection system in secure shell traffic in cloud environment
CN102223382B (en) Cloud safety method and system with data distribution characteristics as password
CN108833449A (en) Web communication encrypted transmission method, apparatus and system based on RAS algorithm
CN108270865A (en) The job scheduling method of high-performance cloud computing platform

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220729

Address after: 100089 building 36, courtyard 8, Dongbeiwang West Road, Haidian District, Beijing

Patentee after: Dawning Information Industry (Beijing) Co.,Ltd.

Patentee after: DAWNING INFORMATION INDUSTRY Co.,Ltd.

Address before: 100193 building 36, Zhongguancun Software Park, 8 North East West Road, Haidian District, Beijing.

Patentee before: Dawning Information Industry (Beijing) Co.,Ltd.