CN110012016A - Mix the method and system of resources accessing control in cloud environment - Google Patents

Mix the method and system of resources accessing control in cloud environment Download PDF

Info

Publication number
CN110012016A
CN110012016A CN201910286462.7A CN201910286462A CN110012016A CN 110012016 A CN110012016 A CN 110012016A CN 201910286462 A CN201910286462 A CN 201910286462A CN 110012016 A CN110012016 A CN 110012016A
Authority
CN
China
Prior art keywords
user
information
operation system
policy list
network packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910286462.7A
Other languages
Chinese (zh)
Other versions
CN110012016B (en
Inventor
高寿柏
仲茜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Shichuang Yun Service Co Ltd
Original Assignee
Shandong Shichuang Yun Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Shichuang Yun Service Co Ltd filed Critical Shandong Shichuang Yun Service Co Ltd
Priority to CN201910286462.7A priority Critical patent/CN110012016B/en
Publication of CN110012016A publication Critical patent/CN110012016A/en
Application granted granted Critical
Publication of CN110012016B publication Critical patent/CN110012016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The present disclosure proposes the method and system of resources accessing control in mixing cloud environment, receive the instruction of the operation system of user's access, in effective identity information of the source injection user of network packet;Network packet is intercepted and captured in the destination of network packet and analyzes user identity, by user defined in Policy List and the incidence relation for accessing application, determines to let pass still to refuse this network packet.Disclosed technique scheme realizes access control from network driver layer, strengthens the security protection to enterprise operation system.

Description

Mix the method and system of resources accessing control in cloud environment
Technical field
This disclosure relates to information data processing technology field, more particularly to the side of resources accessing control in mixing cloud environment Method and system.
Background technique
With the increasingly mature of cloud computing technology and be widely applied, expense, performance, reliability, in terms of Advantage it is increasingly prominent, its operation system is gradually moved to mixing cloud environment by traditional data center by public institution and enterprise In.Mixed cloud overcomes public cloud, the intrinsic deficiency of private clound, is cloud computing by using public cloud and private clound fusion Main Patterns and developing direction.In mixing cloud environment, information resources are mostly in the form of hardware facility, software systems, data etc. It is supplied to user, the elements such as safety, expense, performance is comprehensively considered, core system and data is usually deployed to private clound, His system and data are deployed in public cloud.To ensure that only legitimate user is able to access that authorization resources, mixed cloud information money is improved Source access safety and manageability, it is necessary to in private clound and public cloud authentication and resource access carry out unification Control, it further includes application system that control object, which had not only included the hardware resources such as physical host, but also the virtual resources such as including fictitious host computer, Equal software resources.
In mixing cloud environment, the operator of cloud is usually the cloud service mechanism of profession, and public institution, enterprise are cloud The user of resource, they obtain the hardware resource in mixed cloud by modes such as rental, trustships, and by their system and data It is deployed to cloud.The These characteristics of mixed cloud feel it in use pattern with traditional private data in resource management In very big difference, the manager (cloud service mechanism) of resource and user's (hardware/virtual resource rent in cloud environment are mixed The deployer of user, software systems and data) usually it is different entity, and the manager of conventional data centers resource and make User is usually identical.It corresponds, mix resources accessing control in cloud environment also has biggish area with conventional data centers Not, under conventional data centers mode, the access control of resource is independently implemented by Resource Manager, and provides in mixing cloud environment Manager and user common implementing of the access control in source by resource, wherein the former is responsible for deployment and O&M safety certification is flat Platform, configuration simultaneously safeguard overall safety certification and access control policy, and the latter is responsible for configuring and safeguarding mechanism related resource safety Certification and access control policy.
It mixes and manages the diversity of resource and the complexity of resources mode in cloud environment, determine access control scheme not only Only just for the network parameter of data packet (such as: IP address, port), also needs for the resource specifically accessed and access the resource User, text in the former be referred to as network level access control, the latter is known as user level access control, it is clear that the latter is higher level Access control scheme.The critical issue for realizing user level access is user belonging to identification data packet, and an intuitive idea is By the IP address used when user's debarkation authentication system, but actually due to the limitation of IPV4 number of addresses, it is impossible to be every One terminal device all distributes a globally unique address IPV4 on internet.Shortage of ip address is solved to generally use The method of mapping network addresses (NAT), it is (usual in local area network internal address and public network address of the network exit to data packet It is the address Internet) it is converted, the data packet for same local area network in this way, no matter whether its internal address is identical, Only one address of public network is corresponding, therefore can not be only identified to user by IP address.
Inventor has found in actual operation, technically, realizes that the resources accessing control of data center is led at present It to include two class technical solutions, one kind uses network firewall and VPN (Virtual Private Network, virtual private Net) etc. traditional network security technology, it is another kind of be known as IAM (Identity and Access Management, identification Managed with access) system, for the system for being exclusively used in authentication and access control.Wherein, network firewall operates mainly in net Network layers, can only handle network level access control, not be able to satisfy user level access control;There is VPN technologies certain user class to visit Ask control ability, but data need to encrypt in transmission process, and all data packets be required to vpn server carry out encryption and decryption, Owning user identification, unpack recombination and the implementation of access control policy, Yi Chengwei performance bottleneck influence user experience;IAM system The system that system is specific to user authentication and user level access control exploitation has single-sign-on, authentication management, user's authorization With the functions such as security audit.But existing IAM system, usually just for the private data center of single enterprise, using intrusion Formula mode carries out deployment implementation, need to modify to user's existing system, and the user authentication of existing system is uniformly transferred to IAM system System server process, deployment maintenance difficulty is big, at high cost, flexibility is poor, is only applicable to the private data of traditional large enterprise Center, it is difficult to be applied to mixing cloud environment.
By being described above as it can be seen that mixing the main problem that resources accessing control in cloud environment is faced has:
(1) how data packet owning user is identified in intranet environment or effectively in public network environment.
(2) permission when user access resources how is tracked.
(3) such as how non-intruding mode carries out safe adaptation to resource.
Summary of the invention
The first purpose of this specification embodiment is to provide the method for resources accessing control in mixing cloud environment, Ke Yi Macroscopically access of the control user to operation system, strengthens the security protection to enterprise operation system.
This specification embodiment provides the method for resources accessing control in mixing cloud environment, real by the following technical programs It is existing:
Include:
The instruction for receiving the operation system of user's access, in effective identity letter of the source injection user of network packet Breath;
Network packet is intercepted and captured in the destination of network packet and analyzes user identity, by defined in Policy List User with access application incidence relation, judgement clearance still refuses this network packet.
As further embodiment, the instruction of the operation system of user's access is received, and in the source of network packet The operation system that the driving layer at end accesses user judges: whether the information accessed is defined in the first Policy List The operation system application where server information, if it is access legal defined in the first Policy List And user is currently at logging state, then in the effective information of the driving layer injection user identity of source.
Further, source driving layer injection user identity effective information after, identical user identity it is effective Synchronizing information is updated into the second Policy List;
Further, the driving layer of the destination of network packet judge accessed operation system information whether Defined in second Policy List and the legitimacy of user identity is judged, according to the control information recorded in the second Policy List It lets pass or forbids current network data packet.
The system that the second purpose of this specification embodiment is to provide resources accessing control in mixing cloud environment, Ke Yi Macroscopically access of the control user to operation system, strengthens the security protection to enterprise operation system.
Another embodiment of this specification provides the system of resources accessing control in mixing cloud environment, passes through following technical side Case is realized:
Include:
Network egress module, is configured as: the instruction of the operation system of user's access is received, in the source of network packet Inject effective identity information of user;
Web portal module, is configured as: intercepting and capturing network packet in the destination of network packet and analyzes user's body Part, by user defined in Policy List and the incidence relation for accessing application, determine to let pass still to refuse this network Data packet.
As the further technical solution of the disclosure, the network egress module receives the operation system of user's access Instruction, and judge in the operation system that the driving layer of the source of network packet accesses user: the information accessed is No is the information of the server where the application of the operation system defined in the first Policy List, if it is the first strategy Legal access and user defined in list are currently at logging state, then inject user identity in the driving layer of source Effective information;
Further, further includes: the effective information synchronization module of user identity is configured as: being infused in the driving layer of source After the effective information of access customer identity, the effective information synchronized update of identical user identity is into the second Policy List;
Further, Web portal module is configured as: being accessed in the driving layer judgement of the destination of network packet The information of operation system whether defined in the second Policy List and judge the legitimacy of user identity, according to the second plan It omits the control information clearance recorded in list or forbids current network data packet.
The third purpose of this specification embodiment is to provide IAM system, using can macroscopically control user to industry The access of business system strengthens the security protection to enterprise operation system.
The another embodiment of this specification provides IAM system, is achieved through the following technical solutions:
The system comprises IAM system server, information input unit and display units, are used for using information input unit The instruction that user accesses operation system is inputted, treated that relevant information is shown by IAM system server using display unit Show;
Wherein, the IAM system server is configured as executing following procedure:
The instruction of the operation system of user's access is received, and user is accessed in the driving layer of the source of network packet Operation system is judged: the information accessed whether be the operation system defined in the first Policy List application institute Server information, if it is access legal defined in the first Policy List and user is currently at login shape State, then in the effective information of the driving layer injection user identity of source;
After the effective information of the driving layer injection user identity of source, the effective information of identical user identity is synchronous more Newly into the second Policy List;
Judge the information of accessed operation system whether in the second strategy in the driving layer of the destination of network packet Defined in list and judge the legitimacy of user identity, is let pass or prohibited according to the control information recorded in the second Policy List Only current network data packet.Different from traditional IAM system, the above process is non-intrusion type to custom system, without to Family system carries out any modification.
The fourth purpose of this specification embodiment is to provide a kind of computer equipment, using can macroscopically control use Access of the family to operation system, strengthens the security protection to enterprise operation system.
This specification embodiment provides a kind of computer equipment, including memory, processor and storage are on a memory And the computer program that can be run on a processor, which is characterized in that the processor realizes mixed cloud when executing described program In environment the step of the method for resources accessing control.
The fifth purpose of this specification embodiment is to provide a kind of computer readable storage medium, using can be in macroscopic view Access of the upper control user to operation system, strengthens the security protection to enterprise operation system.
This specification embodiment provides a kind of computer readable storage medium, is stored thereon with computer program, special The step of sign is, the method for resources accessing control in mixing cloud environment is realized when which is executed by processor.
Disclosed technique scheme does not need the complicated nurturing of network environment, and is transparent for the operation system of enterprise , it does not need to increase safe interface in the operation system of enterprise.Disclosed technique scheme is suitable for mixing the fortune cloud environment Battalion's management, can be in macroscopically access of the control user to operation system.It is with the implementation method that disclosed technique scheme describes Basis, operation audit that the investigation and evidence collection that can be attacked for operation system, user access operation system, user are to business The preference of system such as likes to provide technical support at the analysis mining of data.
Compared with prior art, the beneficial effect of the disclosure is:
Disclosed technique scheme tracks having for user by way of injecting identity identification information in network packet Identity is imitated, the effective rights that user accesses application are tracked by way of in network driver layer analysis strategy list, pass through end The mode of mouth protection is that resource carries out safe adaptation.
The corresponding method of disclosed technique scheme does not need the construction of complex network environment, and does not need intrusive change The business interface of more enterprise.
Disclosed technique scheme realizes access control from network driver layer, strengthens anti-to the safety of enterprise operation system Shield, invader must first capture network driver layer and be able to access that operation system, could be further to operation system itself Security mechanism is invaded.This method is equivalent on the basis of the safety lock of former operation system increases a lock again.
The behaviour that investigation and evidence collection that disclosed technique scheme can be attacked for operation system, user access operation system It audits, user the analysis mining of data such as likes to provide technical support the preference of operation system.
Detailed description of the invention
The Figure of description for constituting a part of this disclosure is used to provide further understanding of the disclosure, and the disclosure is shown Meaning property embodiment and its explanation do not constitute the improper restriction to the disclosure for explaining the disclosure.
Fig. 1 is the Structure and Process schematic diagram of disclosure one or more examples of implementation;
Fig. 2 is the network egress module workflow schematic diagram of disclosure one or more examples of implementation;
Fig. 3 is the Web portal module workflow schematic diagram of disclosure one or more examples of implementation.
Specific embodiment
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the disclosure.Unless another It indicates, all technical and scientific terms used herein has usual with disclosure person of an ordinary skill in the technical field The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root According to the illustrative embodiments of the disclosure.As used herein, unless the context clearly indicates otherwise, otherwise singular Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
Examples of implementation one
Disclosed technique scheme is disposed using distributed way, including is managed end system, acted on behalf of end system and user terminal system Unite three parts, wherein management end system deployment in private server, for realizing user management, safety certification tactical management, Agent side management etc.;Agent side system deployment in the server for possessing locked resource, for data packet owning user into Row identification, according to safety certification strategy implement access control;User terminal system logs in for realizing user, accesses locked resource When inject user identification information.Above-mentioned distributed deployment mode is transparent, disclosed technique for the application of enterprise Scheme tracks effective identity of user, disclosed technique side by way of injecting identity identification information in network packet Case tracks the effective rights that user accesses application, disclosed technique side by way of in network driver layer analysis strategy list Case carries out safe adaptation by way of port protection for resource.
The examples of implementation disclose its overall technology of the method for resources accessing control design in mixing cloud environment: Yong Hufang When asking operation system, in effective identity information of source (user terminal system) the injection user of network packet, in network data The destination of packet intercepts and captures network packet and analyzes user identity, by defined user in the second Policy List and accesses application Incidence relation, determine let pass still refuses this network packet.
In a specific examples of implementation, the method for resources accessing control in mixing cloud environment is disclosed, comprising:
Step (1): when user accesses operation system, accessed purpose is judged in the driving layer of the source of network packet Address and application port whether be server where resource defined in the first Policy List address and port, if It is access legal defined in the first Policy List and user is currently at logging state, then injects user in driving layer The effective information of identity.
Step (2): it when user accesses operation system, in the driving layer judgement of the destination of network packet, is accessed Whether the port of operation system defined in the second Policy List and judges the legitimacy of user identity, according to the second strategy The access level of the current status information of the access authority of the user recorded in list, user, operation system lets pass or forbids working as Preceding network packet.
In specific embodiment, network packet refers to, user accesses generated based on TCP/IP association when operation system The data packet of view.
In specific embodiment, the access authority of user refers to, the port of user information and the operation system that can be accessed Incidence relation, access authority is recorded in the first Policy List.
In specific embodiment, the status information of user refers to, the state that user logs in or nullifies, and number 0, which represents, nullifies State, number 1 represent logging state, and only when user is in logging state, the driving layer of the source of network packet just has The effective information of user identity may be injected.Status information is recorded in the first Policy List.
In specific embodiment, the access level of operation system refers to, the access authority of fine-grained control user, to answer The generation of anxious special event, for example it is temporarily switched off access of all users to certain operation system.Access level is divided into three-level: 0 grade Indicate Policy List failure, all users can access operation system;1 grade of expression Policy List comes into force, and user is strategically The permission of middle configuration accesses operation system;2 grades of expression Policy List failures, all users cannot access operation system.Here It is stressed again that access operation system and registering service the system access control that be two different, the former is that the embodiment of the present disclosure is sub Content, the latter is the authority setting of operation system itself.The access level of operation system is recorded in the second Policy List.
In specific embodiment, the first Policy List saves user information and institute usually in a manner of list of data structures The incidence relation of the port for the operation system that can be accessed saves the state that user logs in or nullifies.
In specific embodiment, the second Policy List saves user information and institute usually in a manner of list of data structures The incidence relation of the port for the operation system that can be accessed saves user's login or the state nullified, the access for saving operation system Rank.
First Policy List must keep user's effective information consistent with the second Policy List, when generation exists in step (1) When driving the event of the effective information of layer injection user identity, the necessary synchronized update of the effective information of identical user identity to step Suddenly in the Policy List in (2).
In specific embodiment, the effective information of user identity refers to the number of 4 byte lengths, and the number is according to certain Temporal regularity dynamically change.
In specific embodiment, layer is driven, is the driving layer for referring to intercept and capture raw network data packet, for Windows System intercepting network data package generally by the way of NDIS networks filter driver, generally uses network to drive for linux system The mode intercepting network data package of dynamic expansion module.
In specific embodiment, the effective information of driving layer injection user identity refers in driving layer to based on TCP/IP The data packet of agreement injects the letter of 8 byte lengths in the option option of Transmission Control Protocol according to the data structure format of standard Breath, first character section is that represent type be experimental data to number 253 in the data structure, and it is total that the latter byte represents data structure Length, using fixed number 8, latter two byte represents magic data, and it is effective to generally use customized data for identification The number of property, such as 0xEFEF, the data of last four bytes represent the effective information of user identity.When in network packet When the driving layer of destination parses TCP data packet, if TCP be surrounded by option type be 253 data, and magic data It is 0xEFEF, then represents in this network packet comprising user identity effective information.
Referring to shown in attached drawing 2, in specific embodiment, processing of the driving layer to network packet in step (1), including with Lower step:
(1-1) judges whether current network packet is the TCP packet based on IPV4, if it is turn to step (1-2), Otherwise step (1-8) is turned to.
(1-2) parses the destination IP of TCP packet, destination port.
(1-3) judges current destination IP and destination port whether in the first Policy List, if it is steering step (1- 4), otherwise step (1-8) is turned to.
(1-4) judges the state of the active user recorded in the first Policy List, turns to step (1- if it is logging state 5), otherwise step (1-8) is turned to.
(1-5) injects the effective information of user identity in the option of TCP.
(1-6) recalculates the check value of TCP and IP.
(1-7) sends the network packet after injection user identity effective information, then returnes to (1-1) and continues to execute.
(1-8) sends primitive network packet, then returnes to (1-1) and continues to execute.
Referring to shown in attached drawing 3, in specific embodiment, processing of the driving layer to network packet in step (2), including with Lower step:
(2-1) judges whether current network packet is the TCP packet based on IPV4, if it is turn to step (2-2), Otherwise step (2-10) is turned to.
The destination port of (2-2) parsing TCP packet.
(2-3) judge current destination port whether in the second Policy List, if it is turn to step (2-4), otherwise It turns to step (2-10).
(2-4) judges the access level of the operation system recorded in the second Policy List, turns to step (2- if it is 0 10) step (2-5), is turned to if it is 1, turns to step (2-11) if it is 2.
The state of the active user recorded in (2-5) determination strategy list turns to step (2-6) if it is logging state, Otherwise step (2-11) is turned to.
(2-6) judge in the option of TCP whether include user identity effective information, such as option data structure In whether include magic number 0xEFEF, if it is turn to step (2-7), otherwise turn to step (2-11).
(2-7) parses the effective information of user identity.
The effective information of the user identity of the effective information and step (1) injection for the user identity that (2-8) judgement parses It is whether consistent, if it is step (2-9) is turned to, otherwise turn to step (2-11).
(2-9) judges whether active user has permission to access destination port according to the second Policy List, walks if it is turning to Suddenly (2-10) otherwise turns to step (2-11).
(2-10) lets pass the data packet, then returnes to (2-1) and continue to execute.
(2-11) prevents the data packet, then returnes to (2-1) and continues to execute.
Disclosed technique scheme is related to carrying out the injection of information in the option option of Transmission Control Protocol, it requires user The operation system accessed is based on Transmission Control Protocol.
Examples of implementation two
The system that this specification embodiment is to provide resources accessing control in mixing cloud environment, can macroscopically control Access of the user to operation system, strengthens the security protection to enterprise operation system.
Another embodiment of this specification provides the system of resources accessing control in mixing cloud environment, passes through following technical side Case is realized:
Include:
Network egress module, is configured as: the instruction of the operation system of user's access is received, in the source of network packet Inject effective identity information of user;
Web portal module, is configured as: intercepting and capturing network packet in the destination of network packet and analyzes user's body Part, by user defined in Policy List and the incidence relation for accessing application, determine to let pass still to refuse this network Data packet.
As the further technical solution of the disclosure, the network egress module receives the operation system of user's access Instruction, and judge in the operation system that the driving layer of the source of network packet accesses user: the information accessed is No is the information of the server where the application of the operation system defined in the first Policy List, if it is the first strategy Legal access and user defined in list are currently at logging state, then inject user identity in the driving layer of source Effective information;
Further include: the effective information synchronization module of user identity is configured as: injecting user identity in the driving layer of source Effective information after, the effective information synchronized update of identical user identity is into the second Policy List;
Web portal module, is configured as: judging accessed business system in the driving layer of the destination of network packet Whether the information of system defined in the second Policy List and judges the legitimacy of user identity, according in the second Policy List Current network data packet is forbidden in the control information clearance of record.
It should be noted that although being referred to several modules or submodule of equipment in the detailed description above, it is this Division is only exemplary rather than enforceable.In fact, in accordance with an embodiment of the present disclosure, two or more above-described moulds The feature and function of block can embody in a module.Conversely, the feature and function of an above-described module can be with Further division is to be embodied by multiple modules.
In the examples of implementation, the specific implementation of the module of the system of resources accessing control in cloud environment is mixed referring to implementation Example one, is not described in detail herein.
Examples of implementation three
This specification embodiment provides IAM system, using can in macroscopically access of the control user to operation system, Strengthen the security protection to enterprise operation system.
The another embodiment of this specification provides IAM system, is achieved through the following technical solutions:
The system comprises IAM system server, information input unit and display units, are used for using information input unit The instruction that user accesses operation system is inputted, treated that relevant information is shown by IAM system server using display unit Show;
Wherein, the IAM system server is configured as executing following procedure:
The instruction of the operation system of user's access is received, and user is accessed in the driving layer of the source of network packet Operation system is judged: the information accessed whether be the operation system defined in the first Policy List application institute Server information, if it is access legal defined in the first Policy List and user is currently at login shape State, then in the effective information of the driving layer injection user identity of source;
After the effective information of the driving layer injection user identity of source, the effective information of identical user identity is synchronous more Newly into the second Policy List;
Judge the information of accessed operation system whether in the second strategy in the driving layer of the destination of network packet Defined in list and judge the legitimacy of user identity, is let pass or prohibited according to the control information recorded in the second Policy List Only current network data packet.
Examples of implementation four
The fourth purpose of this specification embodiment is to provide a kind of computer equipment, using can macroscopically control use Access of the family to operation system, strengthens the security protection to enterprise operation system.
This specification embodiment provides a kind of computer equipment, including memory, processor and storage are on a memory And the computer program that can be run on a processor, which is characterized in that the processor realizes mixed cloud when executing described program In environment the step of the method for resources accessing control.
In the examples of implementation, the step of mixing the method for resources accessing control in cloud environment referring to examples of implementation one, this Place is not described in detail.
Examples of implementation five
The fifth purpose of this specification embodiment is to provide a kind of computer readable storage medium, using can be in macroscopic view Access of the upper control user to operation system, strengthens the security protection to enterprise operation system.
This specification embodiment provides a kind of computer readable storage medium, is stored thereon with computer program, special The step of sign is, the method for resources accessing control in mixing cloud environment is realized when which is executed by processor.
In the examples of implementation, the step of mixing the method for resources accessing control in cloud environment referring to examples of implementation one, this Place is not described in detail.
In the present embodiment, computer program product may include computer readable storage medium, containing for holding The computer-readable program instructions of row various aspects of the disclosure.Computer readable storage medium, which can be, can keep and store By the tangible device for the instruction that instruction execution equipment uses.Computer readable storage medium for example can be-- but it is unlimited In-- storage device electric, magnetic storage apparatus, light storage device, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned Any appropriate combination.
It is understood that in the description of this specification, reference term " embodiment ", " another embodiment ", " other The description of embodiment " or " first embodiment~N embodiment " etc. means specific spy described in conjunction with this embodiment or example Sign, structure, material or feature are included at least one embodiment or example of the invention.In the present specification, to above-mentioned The schematic representation of term may not refer to the same embodiment or example.Moreover, the specific features of description, structure, material Person's feature can be combined in any suitable manner in any one or more of the embodiments or examples.
The foregoing is merely preferred embodiment of the present disclosure, are not limited to the disclosure, for the skill of this field For art personnel, the disclosure can have various modifications and variations.It is all within the spirit and principle of the disclosure, it is made any to repair Change, equivalent replacement, improvement etc., should be included within the protection scope of the disclosure.

Claims (10)

1. the method for mixing resources accessing control in cloud environment, characterized in that include:
The instruction for receiving the operation system of user's access, in effective identity information of the source injection user of network packet;
Network packet is intercepted and captured in the destination of network packet and analyzes user identity, passes through use defined in Policy List Family and the incidence relation for accessing application determine to let pass still to refuse this network packet.
2. mixing the method for resources accessing control in cloud environment as described in claim 1, characterized in that receive user's access The instruction of operation system, and judge in the operation system that the driving layer of the source of network packet accesses user: it is visited The information asked whether be server where the application of the operation system defined in the first Policy List information, if It is access legal defined in the first Policy List and user is currently at logging state, then is infused in the driving layer of source The effective information of access customer identity.
3. mixing the method for resources accessing control in cloud environment as claimed in claim 2, characterized in that in the driving layer of source After injecting the effective information of user identity, the effective information synchronized update of identical user identity is into the second Policy List;
Judge the information of accessed operation system whether in the second Policy List in the driving layer of the destination of network packet Defined in and judge the legitimacy of user identity, let pass according to the control information recorded in the second Policy List or forbid working as Preceding network packet.
4. mixing the method for resources accessing control in cloud environment as described in claim 1, characterized in that the driving layer of source is sentenced When disconnected, the information judged is: application defined in the destination address and application port and the first Policy List accessed Whether the address and port of the server at place are consistent.
5. mixing the method for resources accessing control in cloud environment as claimed in claim 3, characterized in that the driving layer of source is sentenced When disconnected, the access level of the status information and operation system that have the access authority of user, user current is recorded in the second Policy List Not.
6. the system for mixing resources accessing control in cloud environment, characterized in that include:
Network egress module, is configured as: receiving the instruction of the operation system of user's access, injects in the source of network packet Effective identity information of user;
Web portal module, is configured as: intercepting and capturing network packet in the destination of network packet and analyzes user identity, leads to Defined user and the incidence relation for accessing application in Policy List are crossed, determines to let pass and still refuses this network data Packet.
7. mixing the system of resources accessing control in cloud environment as claimed in claim 6, characterized in that the network egress mould Block receives the instruction of the operation system of user's access, and the business accessed in the driving layer of the source of network packet user System is judged: where whether the information accessed is the application of the operation system defined in the first Policy List The information of server, if it is access legal defined in the first Policy List and user is currently at logging state, Then in the effective information of the driving layer injection user identity of source;
Further, the system also includes: the effective information synchronization module of user identity is configured as: in the driving of source After the effective information of layer injection user identity, the effective information synchronized update of identical user identity is into the second Policy List;
Further, Web portal module is configured as: judging accessed industry in the driving layer of the destination of network packet Whether the information of business system defined in the second Policy List and judges the legitimacy of user identity, is arranged according to the second strategy The control information that records in table lets pass or forbids current network data packet.
8.IAM system, characterized in that the system comprises IAM system server, information input unit and display units, utilize Information input unit is used to input the instruction that user accesses operation system, will be after the processing of IAM system server using display unit Relevant information shown;
Wherein, the IAM system server is configured as executing following procedure:
Receive the instruction of the operation system of user's access, and the business accessed in the driving layer of the source of network packet user System is judged: where whether the information accessed is the application of the operation system defined in the first Policy List The information of server, if it is access legal defined in the first Policy List and user is currently at logging state, Then in the effective information of the driving layer injection user identity of source;
After the effective information of the driving layer injection user identity of source, the effective information synchronized update of identical user identity is arrived In second Policy List;
Judge the information of accessed operation system whether in the second Policy List in the driving layer of the destination of network packet Defined in and judge the legitimacy of user identity, let pass according to the control information recorded in the second Policy List or forbid working as Preceding network packet.The above process is non-intrusion type to custom system, without carrying out any modification to custom system.
9. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes claim 1-5 any mixed cloud ring when executing described program In border the step of the method for resources accessing control.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step of method of resources accessing control in any mixing cloud environment of claim 1-5 is realized when execution.
CN201910286462.7A 2019-04-10 2019-04-10 Method and system for controlling resource access in hybrid cloud environment Active CN110012016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910286462.7A CN110012016B (en) 2019-04-10 2019-04-10 Method and system for controlling resource access in hybrid cloud environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910286462.7A CN110012016B (en) 2019-04-10 2019-04-10 Method and system for controlling resource access in hybrid cloud environment

Publications (2)

Publication Number Publication Date
CN110012016A true CN110012016A (en) 2019-07-12
CN110012016B CN110012016B (en) 2021-04-27

Family

ID=67170889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910286462.7A Active CN110012016B (en) 2019-04-10 2019-04-10 Method and system for controlling resource access in hybrid cloud environment

Country Status (1)

Country Link
CN (1) CN110012016B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300124A (en) * 2019-02-02 2019-10-01 奇安信科技集团股份有限公司 A kind of access control method, system, electronic equipment and readable medium
CN111193698A (en) * 2019-08-22 2020-05-22 腾讯科技(深圳)有限公司 Data processing method, device, terminal and storage medium
CN114143048A (en) * 2021-11-18 2022-03-04 绿盟科技集团股份有限公司 Method, device and storage medium for managing security resources
CN114363078A (en) * 2022-01-10 2022-04-15 中宇联云计算服务(上海)有限公司 Network system based on cloud network fusion technology and network optimization method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330495A (en) * 2007-06-19 2008-12-24 瑞达信息安全产业股份有限公司 Control method and control system for implementing non-equity access in a computer network
CN102457507A (en) * 2010-10-29 2012-05-16 中兴通讯股份有限公司 Secure sharing method, device and system for cloud computing resources
US20130291121A1 (en) * 2012-04-26 2013-10-31 Vlad Mircea Iovanov Cloud Abstraction
CN106603513A (en) * 2016-11-30 2017-04-26 中国人民解放军理工大学 Host identifier-based resource access control method and system
CN106790194A (en) * 2016-12-30 2017-05-31 中国银联股份有限公司 A kind of access control method and device based on ssl protocol
US20170329957A1 (en) * 2016-05-11 2017-11-16 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
CN107818268A (en) * 2017-11-15 2018-03-20 中国联合网络通信集团有限公司 The access control method and server of big data platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330495A (en) * 2007-06-19 2008-12-24 瑞达信息安全产业股份有限公司 Control method and control system for implementing non-equity access in a computer network
CN102457507A (en) * 2010-10-29 2012-05-16 中兴通讯股份有限公司 Secure sharing method, device and system for cloud computing resources
US20130291121A1 (en) * 2012-04-26 2013-10-31 Vlad Mircea Iovanov Cloud Abstraction
US20170329957A1 (en) * 2016-05-11 2017-11-16 Oracle International Corporation Identity cloud service authorization model with dynamic roles and scopes
CN106603513A (en) * 2016-11-30 2017-04-26 中国人民解放军理工大学 Host identifier-based resource access control method and system
CN106790194A (en) * 2016-12-30 2017-05-31 中国银联股份有限公司 A kind of access control method and device based on ssl protocol
CN107818268A (en) * 2017-11-15 2018-03-20 中国联合网络通信集团有限公司 The access control method and server of big data platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
雷瑶等: "一种基于XACML 的混合云跨域资源访问控制方案", 《计算机应用与软件》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300124A (en) * 2019-02-02 2019-10-01 奇安信科技集团股份有限公司 A kind of access control method, system, electronic equipment and readable medium
CN111193698A (en) * 2019-08-22 2020-05-22 腾讯科技(深圳)有限公司 Data processing method, device, terminal and storage medium
CN111193698B (en) * 2019-08-22 2021-09-28 腾讯科技(深圳)有限公司 Data processing method, device, terminal and storage medium
CN114143048A (en) * 2021-11-18 2022-03-04 绿盟科技集团股份有限公司 Method, device and storage medium for managing security resources
CN114143048B (en) * 2021-11-18 2023-09-26 绿盟科技集团股份有限公司 Method, device and storage medium for managing safety resources
CN114363078A (en) * 2022-01-10 2022-04-15 中宇联云计算服务(上海)有限公司 Network system based on cloud network fusion technology and network optimization method

Also Published As

Publication number Publication date
CN110012016B (en) 2021-04-27

Similar Documents

Publication Publication Date Title
US10986133B1 (en) Cloud over IP session layer network
Pattaranantakul et al. NFV security survey: From use case driven threat analysis to state-of-the-art countermeasures
CN110012016A (en) Mix the method and system of resources accessing control in cloud environment
US8843998B2 (en) Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures
US7428754B2 (en) System for secure computing using defense-in-depth architecture
US20180234459A1 (en) Automated Enforcement of Security Policies in Cloud and Hybrid Infrastructure Environments
CN100596361C (en) Safety protection system of information system or equipment and its working method
Ertaul et al. Security Challenges in Cloud Computing.
D'Silva et al. Building a zero trust architecture using kubernetes
CN105184147B (en) User safety management method in cloud computing platform
US20160156594A9 (en) Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks
ES2768049T3 (en) Procedures and systems to secure and protect repositories and directories
CN105184164B (en) A kind of data processing method
CN103404103A (en) System and method for combining an access control system with a traffic management system
KR20050026624A (en) Integration security system and method of pc using secure policy network
KR101219662B1 (en) Security system of cloud service and method thereof
CN111083088B (en) Cloud platform hierarchical management method and device based on multiple security domains
Reinhardt An architectural overview of UNIX network security
CN2891503Y (en) Security protection system for information system or equipment
CN113407941A (en) Edge cloud node and terminal user security management method
Ma et al. Security modeling and analysis of mobile agent systems
Baranova Multi-Tenant Isolation in a Service Mesh
US11962622B2 (en) Automated enforcement of security policies in cloud and hybrid infrastructure environments
KR102110821B1 (en) A rights converting system for user accounts using rights of the super account
CN111683053B (en) Cloud platform security network architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant