CN111522638A - Cloud computing resource pool management method and device - Google Patents

Cloud computing resource pool management method and device Download PDF

Info

Publication number
CN111522638A
CN111522638A CN202010291213.XA CN202010291213A CN111522638A CN 111522638 A CN111522638 A CN 111522638A CN 202010291213 A CN202010291213 A CN 202010291213A CN 111522638 A CN111522638 A CN 111522638A
Authority
CN
China
Prior art keywords
identity
cloud
cloud computing
resource pool
computing resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010291213.XA
Other languages
Chinese (zh)
Other versions
CN111522638B (en
Inventor
高明飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010291213.XA priority Critical patent/CN111522638B/en
Publication of CN111522638A publication Critical patent/CN111522638A/en
Application granted granted Critical
Publication of CN111522638B publication Critical patent/CN111522638B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing

Abstract

The invention provides a cloud computing resource pool management method and device, and relates to the field of cloud computing resource pools. The cloud computing resource pool management method comprises the following steps: a user sends a generation request which is packed by the cloud host identity and the personal identity through the cloud host; setting security levels of all different algorithms in a cloud computing resource pool, and setting the security levels according to the identity of a cloud host and the identity of an individual; receiving the generation request to acquire a cloud host identity and a personal identity so as to respectively identify the security level of the cloud host identity and the security level of the personal identity; and acquiring a corresponding algorithm in the cloud computing resource pool according to the security level of the cloud host identity, and calculating a data result of the request generation through the algorithm. The invention solves the problems of low safety and opaque use charge in the use of the existing cloud computing technology.

Description

Cloud computing resource pool management method and device
Technical Field
The invention relates to the field of cloud computing resource pools, in particular to a cloud computing resource pool management method and device.
Background
With the rapid development of virtual network environments, cloud computing technology gradually becomes a novel solution for network security teaching and research in colleges and universities or research institutions. The scheme adopts a virtual network technology, overcomes the defects of high hardware acquisition and maintenance cost, risk of network loopholes and the like of a real network environment, and has very obvious advantages in a network scene with large scale and complex structure, such as network security laboratory teaching of colleges and universities. The cloud computing technology virtualizes one physical host into a plurality of virtual machine hosts through a virtualization technology. The virtual machines are independent of each other and can run different operating systems.
Because the existing cloud computing technology cannot set the use authority of different users to different services in the cloud computing resource pool, the problems of low security and opaque tariff occur. Therefore, there is a need for a cloud computing resource pool management method and apparatus that can solve the above problems.
Disclosure of Invention
The application aims to provide a cloud computing resource pool management method which can use different algorithms according to the authority of a user, improves the safety of a cloud computing technology, and is convenient for calculating the use charge according to the use of each cloud host.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
the embodiment of the application provides a cloud computing resource pool management method, which comprises the following steps: a user sends a generation request which is packed by the cloud host identity and the personal identity through the cloud host; setting security levels of all different algorithms in a cloud computing resource pool, and setting the security levels according to the identity of a cloud host and the identity of an individual; receiving the generation request to acquire a cloud host identity and a personal identity so as to respectively identify the security level of the cloud host identity and the security level of the personal identity; acquiring a corresponding algorithm in a cloud computing resource pool according to the security level of the cloud host identity, and calculating a data result of the request generation through the algorithm; marking the data results which are/is not in accordance with the security level of the personal identity, and displaying the data results which are in accordance with the personal identity through the cloud host for a user to view.
Compared with the prior art, the cloud computing resource pool management method provided by the embodiment of the application generates the request by packaging the personal identity of the user, so that the use permission is set according to different security levels of the users, and the security of the cloud computing technology is improved; all algorithms of the cloud computing resource pool are respectively marked through the security levels, and the security levels of different cloud host identities and individual identities are set, so that the use permission of different algorithms in the cloud computing resource pool is distinguished according to the security levels of different host identities, and the charge of the use permission is convenient to settle according to different cloud hosts; the cloud computing resource pool algorithm is called through the cloud host identity, so that a data result of a request is calculated according to the algorithm and is sent to a user through the cloud host, and the user can conveniently use the cloud host through different personal identities; by marking the content of the security level which accords with/does not accord with the personal identity in the data result, the cloud host can conveniently display the data result which accords with the personal identity for the user to check, and the security of different users when using the cloud computing technology is improved.
Another object of the present application is to provide a cloud computing resource pool management apparatus, which can use different algorithms according to user permissions, improve security of a cloud computing technology, and facilitate calculation of usage charges for the different algorithms through use of respective cloud hosts.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
a cloud computing resource pool management device comprises a plurality of cloud hosts and a cloud computing platform; the cloud computing platform is arranged on each cloud host to acquire the identity of the cloud host; the cloud computing platform is provided with a login module, a grade identification module, a resource allocation module and a cloud computing resource pool; the login module is used for inputting personal information by a user to log in and sending a generation request packaged by the cloud host identity and the personal identity; the level identification module is connected with the login module so as to identify the security level according to the identity of each cloud host and the personal identity respectively; the resource allocation module is respectively connected with the level identification module and the cloud computing resource pool, so as to call an algorithm in the cloud computing resource pool according to the security level of the cloud host identity to calculate the data result of the generation request, and display the data result which is in accordance with the security level of the personal identity in all the data results for a user to view.
Compared with the prior art, according to the cloud computing resource pool management device provided by the embodiment of the application, when a user uses a cloud computing platform through a cloud host, the personal identities of different users are distinguished through the login module, and a generation request packaged by the cloud host identity and the personal identity is conveniently sent out to manage different users; the security levels of the cloud host identity and the personal identity in the generated request are identified through the level identification module, so that different algorithms of the cloud computing resource pool are called according to different security levels, a user can use the cloud computing resource pool conveniently through different personal identities, and the security of the cloud computing technology is improved; the data result of the request is calculated through the algorithm that the cloud host has the security authority through the resource allocation module, and the use authority of the user to the data result is marked according to the personal identity of the user, so that the use authorities of different users can be distinguished conveniently.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and it will be apparent to those skilled in the art that other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic flowchart of a cloud computing resource pool management method provided in embodiment 1 of the present application;
fig. 2 is a schematic diagram of a cloud computing resource pool management apparatus according to embodiment 1 of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, in this document, the term "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion, so that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but also other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In the description of the present application, it is noted that the terms "upper", "lower", "inner", and the like, indicate orientations and other relationships only for convenience in describing the present application and simplifying the description, but do not indicate or imply that the referred devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be construed as limiting the present application.
In the description of the present application, it is also to be noted that, unless otherwise explicitly specified or limited, the terms "disposed" and "connected" are to be interpreted broadly, e.g., as being either fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a method for managing a cloud computing resource pool according to embodiment 1 of the present application, including the following steps: a user sends a generation request which is packed by the cloud host identity and the personal identity through the cloud host; respectively marking the security levels of all algorithms in the cloud computing resource pool, and setting the security levels of the cloud host identity and the personal identity; receiving a generation request to acquire a cloud host identity and a personal identity, so as to respectively identify the security level of the cloud host identity and the security level of the personal identity; acquiring a corresponding algorithm in the cloud computing resource pool according to the security level of the cloud host identity, and calculating a data result of the request through the algorithm; and marking the data result which accords with/does not accord with the security level of the personal identity, so that the data result which accords with the personal identity is displayed through the cloud host for a user to check.
In detail, the cloud hosts are virtualization hosts, and a user can use the respective cloud hosts through one host entity. The user sends a generation request through the cloud host, and the personal identity is packaged into the generation request, so that the personal identity of the user is obtained by receiving the generation request. Setting security levels of all different algorithms in the cloud computing resource pool, and setting corresponding security levels according to the cloud host identity and the personal identity respectively, so that different cloud hosts and different personal identities have the use rights of the algorithms with different security levels. And when the calling of the corresponding algorithm is completed through the generation request, respectively identifying the security levels of the cloud host and the user according to the identity of the cloud host and the personal identity. Different security levels can be set according to different protection degrees by the algorithms, so that the cloud hosts paying different fees or the users of the cloud hosts are matched for use, and the users paying different fees or the use permission of the cloud hosts is more reasonable. And acquiring one or more corresponding algorithms in the cloud computing resource pool according to the security level of the cloud host identity, and respectively calculating data results of the request generation by using the algorithms, so that the data results are sent to the cloud host and displayed through different personal identities of the cloud host. Optionally, the user may modify or export the data result through the cloud host. Optionally, different individual identities have different usage rights for the data result of the cloud host. Optionally, the cloud host includes a plurality of cloud hosts. When the user sends the packed generation request through different cloud hosts, different security levels are set through the identities of the cloud hosts, and therefore the security levels of the cloud hosts are identified according to the identities of the different cloud hosts.
As one of the preferred embodiments of the present invention, the personal identities of the users are multiple; the user switches different personal identities through the cloud host platform; and the cloud host platform displays the content conforming to the personal identity according to different personal identities of the user.
In detail, the user can switch different personal identities for use, so that the data results can be verified through different use rights, the data results can be directly used by switching the personal identities when the user does not have the use rights, and the situations that the user bears various different responsibilities or rights can be conveniently distinguished through a plurality of personal identities.
As one of the preferred embodiments of the present invention, the cloud host identity includes an IP address, a host name, a cloud host login account, and a cloud host login password. The identity of the cloud host is distinguished through multiple items of information, and different use authorities can be conveniently set through the security level.
As one of the preferred embodiments of the present invention, the personal identity includes a number, a name, a personal login account number, and a personal login password. The personal identity of the user is distinguished through a plurality of items of information, and different use authorities are conveniently set through the security level.
As one of the preferred embodiments of the present invention, a cloud host platform is connected to a network device to implement data transmission; the cloud host identity comprises a network identity of the network equipment; different security levels are set according to the network identity.
In particular, whether a local area network, a metropolitan area network, or a wide area network is physically comprised of network connection devices such as network cards, hubs, switches, routers, network lines, RJ45 connectors, and transmission media. Optionally, the network device further includes a repeater, a bridge, a router, a gateway, a firewall, a switch, and the like. Different cloud hosts are distinguished through network equipment, and the safety of using the cloud computing resource pool is improved. Optionally, the network identity includes an IP address, a device name, a network login account, and a network login password. Optionally, the data transmission content includes an algorithm and a calculated data result of the cloud computing resource pool obtained by the cloud host platform through the network device, and information such as host identity and personal identity is uploaded through the network device to perform operations such as security level identification and data result calculation.
As one of the preferred embodiments of the present invention, the different security levels are classified according to the algorithm types of the algorithms in the cloud computing resource pool.
In detail, the algorithm types are classified, so that the use permission and the use charge of different algorithm types are conveniently divided. Optionally, the algorithm types include one or more of distributed computing, utility computing, load balancing, parallel computing, network storage, hot backup redundancy, and virtualization. And different algorithm types are directly called according to a generation request initiated by a user, so that the accuracy of a data result is improved conveniently.
In summary, embodiments of the present invention provide a cloud computing resource pool management method, which packages and generates a request according to a cloud host identity and a personal identity of a cloud host user, so as to conveniently set different usage rights according to the generated request; all algorithms of the cloud computing resource pool are respectively marked by different security levels, so that the use permission of different users and different cloud hosts to each algorithm can be conveniently set, and the use permission can be conveniently divided according to the charges of different algorithms; algorithms which accord with corresponding security levels are called through different cloud host identities, so that different algorithms can be conveniently used by each person of the cloud host, and the use permission is distinguished according to the person identities so as to improve the use security of the cloud computing technology.
It is to be understood that the flow chart shown in fig. 1 is merely illustrative, and the cloud computing resource pool management method may further include more or fewer steps than those shown in fig. 1, or have different steps than those shown in fig. 1.
Referring to fig. 2, fig. 2 is a diagram illustrating a cloud computing resource pool management apparatus according to embodiment 2 of the present application, including a plurality of cloud hosts and a cloud computing platform; the cloud computing platform is arranged on each cloud host; the cloud computing platform is provided with a login module, a grade identification module, a resource allocation module and a cloud computing resource pool.
In detail, the cloud computing platform acquires the cloud host identities of different cloud hosts through installation of the cloud hosts. The login module is used for logging in the cloud computing platform by inputting the personal identity of a user and sending a generation request packaged by the cloud host identity and the personal identity. Wherein the preferred embodiment of the personal identity is the same principle as in embodiment 1. The level identification module is connected with the login module to acquire the cloud host identity and the personal identity in the generated request, and respectively identifies the security levels of the cloud host and the user according to the cloud host identity and the personal identity. The preferred embodiment of the security level is, among other things, the same principle as in embodiment 1. The resource allocation module is connected with the level identification module to respectively acquire the security level of the cloud host identity and the personal identity and the generation request of the user. The resource allocation module is connected with the cloud computing resource pool to call an algorithm in the cloud computing resource pool according to the security level of the cloud host identity to calculate and generate a requested data result, and the data result which meets the security level of the personal identity in all the data results is displayed for a user to check. Optionally, the resource allocation module is connected to the display interface of the cloud host to display the data result through the cloud host. Optionally, the principle of the cloud host is the same as that in embodiment 1, and the cloud host may display the data result through a display screen of the entity host.
As one of the preferred embodiments of the present invention, the apparatus further comprises a server; the cloud computing platform is arranged on the server side.
In detail, the cloud computing platform is installed on the server side, so that the server side and each cloud host realize data transmission through the cloud computing platform. Specifically, the process of the server implementing data transmission is the same as the principle of the network device in embodiment 1. Optionally, the user sets the security levels of different algorithms in the cloud computing resource pool through the level identification module.
In summary, the cloud computing resource pool management device provided in the embodiment of the present application distinguishes the personal identity of the user who does not use or wants to use through the login module, is convenient for switching different usage rights or usage ranges, and improves the security of the cloud computing platform. The request is generated by packaging the cloud host identity and the personal identity, so that data results when various types of algorithms of the cloud computing resource pool are used on various cloud hosts or different personal identities are distinguished according to the cloud host identity and the personal identity, and the safety and the accuracy of the cloud computing platform are improved. By distinguishing the use authority of different algorithms, the charge calculation of the cloud host and the personal identity is facilitated.
It is to be understood that the block diagram shown in fig. 2 is merely illustrative, and the cloud computing resource pool management device may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 2 may be implemented in hardware, software, or a combination thereof.
In the embodiments 1-2 provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other manners. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, each functional module in embodiments 1 to 2 of the present application may be integrated together to form an independent part, or each module may exist alone, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and containing instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium comprises: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A cloud computing resource pool management method is characterized by comprising the following steps: a user sends a generation request which is packed by the cloud host identity and the personal identity through the cloud host; setting security levels of all different algorithms in a cloud computing resource pool, and setting the security levels according to the identity of a cloud host and the identity of an individual; receiving the generation request to acquire a cloud host identity and a personal identity so as to respectively identify the security level of the cloud host identity and the security level of the personal identity; acquiring a corresponding algorithm in a cloud computing resource pool according to the security level of the cloud host identity, and calculating a data result of the request generation through the algorithm; marking the data results which are/is not in accordance with the security level of the personal identity, and displaying the data results which are in accordance with the personal identity through the cloud host for a user to view.
2. The cloud computing resource pool management method according to claim 1, wherein the personal identities of users are plural; the user switches different personal identities through the cloud host platform; and the cloud host platform displays content conforming to the personal identity according to different personal identities of the user.
3. The method of claim 1, wherein the cloud host identity comprises an IP address, a host name, a cloud host login account number, and a cloud host login password.
4. The cloud computing resource pool management method of claim 1, wherein the personal identity comprises a number, a name, a personal login account number, and a personal login password.
5. The cloud computing resource pool management method according to claim 1, wherein the cloud host platform is connected with a network device to realize data transmission; the cloud host identity comprises a network identity of the network equipment; different security levels are set according to the network identity.
6. The method of claim 5, wherein the network identity comprises an IP address, a device name, a network login account number, and a network login password.
7. The method according to claim 1, wherein the different security levels are classified according to algorithm types of algorithms in the cloud computing resource pool.
8. The cloud computing resource pool management method of claim 1, wherein the algorithm types comprise one or more of distributed computing, utility computing, load balancing, parallel computing, network storage, hot backup redundancy, and virtualization.
9. The cloud computing resource pool management device is characterized by comprising a plurality of cloud hosts and a cloud computing platform; the cloud computing platform is arranged on each cloud host to acquire the identity of the cloud host; the cloud computing platform is provided with a login module, a grade identification module, a resource allocation module and a cloud computing resource pool; the login module is used for inputting personal information by a user to log in and sending a generation request packaged by the cloud host identity and the personal identity; the level identification module is connected with the login module so as to identify the security level according to the identity of each cloud host and the personal identity respectively; the resource allocation module is respectively connected with the level identification module and the cloud computing resource pool, so as to call an algorithm in the cloud computing resource pool according to the security level of the cloud host identity to calculate the data result of the generation request, and display the data result which is in accordance with the security level of the personal identity in all the data results for a user to view.
10. The cloud computing resource pool management device according to claim 9, further comprising a server; the cloud computing platform is arranged on the server side so that a user can set the security levels of different algorithms in the cloud computing resource pool through the level identification module.
CN202010291213.XA 2020-04-14 2020-04-14 Cloud computing resource pool management method and device Active CN111522638B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010291213.XA CN111522638B (en) 2020-04-14 2020-04-14 Cloud computing resource pool management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010291213.XA CN111522638B (en) 2020-04-14 2020-04-14 Cloud computing resource pool management method and device

Publications (2)

Publication Number Publication Date
CN111522638A true CN111522638A (en) 2020-08-11
CN111522638B CN111522638B (en) 2023-09-19

Family

ID=71902560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010291213.XA Active CN111522638B (en) 2020-04-14 2020-04-14 Cloud computing resource pool management method and device

Country Status (1)

Country Link
CN (1) CN111522638B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640485A (en) * 2020-12-01 2022-06-17 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101441688A (en) * 2007-11-20 2009-05-27 阿里巴巴集团控股有限公司 User authority allocation method and user authority control method
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
US20160142408A1 (en) * 2014-11-14 2016-05-19 Martin Raepple Secure identity propagation in a cloud-based computing environment
CN105991734A (en) * 2015-02-16 2016-10-05 广东亿迅科技有限公司 Cloud platform management method and system
CN106487774A (en) * 2015-09-01 2017-03-08 阿里巴巴集团控股有限公司 A kind of cloud host services authority control method, device and system
CN110601895A (en) * 2019-09-19 2019-12-20 国家电网有限公司 Data control method and device for power communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101441688A (en) * 2007-11-20 2009-05-27 阿里巴巴集团控股有限公司 User authority allocation method and user authority control method
CN102571698A (en) * 2010-12-17 2012-07-11 中国移动通信集团公司 Access authority control method, system and device for virtual machine
US20160142408A1 (en) * 2014-11-14 2016-05-19 Martin Raepple Secure identity propagation in a cloud-based computing environment
CN105991734A (en) * 2015-02-16 2016-10-05 广东亿迅科技有限公司 Cloud platform management method and system
CN106487774A (en) * 2015-09-01 2017-03-08 阿里巴巴集团控股有限公司 A kind of cloud host services authority control method, device and system
CN110601895A (en) * 2019-09-19 2019-12-20 国家电网有限公司 Data control method and device for power communication system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640485A (en) * 2020-12-01 2022-06-17 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data
CN114640485B (en) * 2020-12-01 2024-04-09 中移(苏州)软件技术有限公司 Centralized access method, device, equipment and storage medium for service data

Also Published As

Publication number Publication date
CN111522638B (en) 2023-09-19

Similar Documents

Publication Publication Date Title
US10666670B2 (en) Managing security breaches in a networked computing environment
AU2019204090B2 (en) Networking flow logs for multi-tenant environments
Abdalla et al. Advantages to disadvantages of cloud computing for small-sized business
US10482265B2 (en) Data-centric monitoring of compliance of distributed applications
CN108200022A (en) A kind of cloud platform cut-in method, device and cloudy platform management system
US11165776B2 (en) Methods and systems for managing access to computing system resources
CN105989275B (en) Method and system for certification
US20130254840A1 (en) Providing multiple authentications to authenticate users with respect to a system and file systems offerred through the system
US9749346B2 (en) Security with respect to managing a shared pool of configurable computing resources
CN109889517A (en) Data processing method, permissions data collection creation method, device and electronic equipment
Singh et al. Survey paper on cloud computing
TWI737172B (en) Computer system, computer program product and computer implement method for incremental decryption and integrity verification of a secure operating system image
CN105516160A (en) Domain management object mapping apparatus and unified identity authentication system
CN109726041A (en) Restore method, equipment and the computer-readable medium of the file in magnetic disk of virtual machine
CN111522638B (en) Cloud computing resource pool management method and device
Keshavarzi et al. Research challenges and prospective business impacts of cloud computing: A survey
CN108683729B (en) A kind of environmental monitoring data safe storage system and method towards credible cloud
CN111263931A (en) Policy-based optimization of cloud resources on tiered storage operations
US9824113B2 (en) Selective content storage with device synchronization
Prabavathy et al. A load balancing algorithm for private cloud storage
Koushik et al. Open security system for cloud architecture
US20220188168A1 (en) Adjunct processor command-type filtering
US20220188125A1 (en) Command-type filtering based on per-command filtering indicator
Chaitanya et al. RAID technology for secured grid computing environments
Li et al. Xenon Enterprise Scale Separation VMM Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant