Nothing Special   »   [go: up one dir, main page]

CN102457509B - Cloud computing resources safety access method, Apparatus and system - Google Patents

Cloud computing resources safety access method, Apparatus and system Download PDF

Info

Publication number
CN102457509B
CN102457509B CN201010530222.6A CN201010530222A CN102457509B CN 102457509 B CN102457509 B CN 102457509B CN 201010530222 A CN201010530222 A CN 201010530222A CN 102457509 B CN102457509 B CN 102457509B
Authority
CN
China
Prior art keywords
resource
information
user
service provider
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010530222.6A
Other languages
Chinese (zh)
Other versions
CN102457509A (en
Inventor
陈小华
周扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010530222.6A priority Critical patent/CN102457509B/en
Publication of CN102457509A publication Critical patent/CN102457509A/en
Application granted granted Critical
Publication of CN102457509B publication Critical patent/CN102457509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of cloud computing resources safety access method, comprising: resource information entrusts business server to provide the relevant information of resource for login user; After cloud computing service business server receives the resource access request of user's transmission, confirm the access credentials of whether carrying resource to be visited in resource access request, obtain the service provider's server info belonging to resource to be visited when not having, and send authentication request to the service provider's server belonging to resource to be visited; Carry the information such as identification information and resource information to be visited of user in authentication request, service provider's server carries out authentication and access control to user, issues the access control information of resource to be visited; The access control information that cloud computing service business server treats access resources carries out certification, and after certification is passed through, for user provides resource to be visited.The invention also discloses a kind of cloud computing resources secure access device.Invention increases user's access service resource access efficiency.

Description

Cloud computing resource security access method, device and system
Technical Field
The invention relates to a resource access technology, in particular to a method, a device and a system for safely accessing cloud computing resources.
Background
Cloud computing is a technology combining distributed processing, parallel processing, grid computing and the like. The core idea of cloud computing is to uniformly manage and schedule a large number of computing resources connected by a network to form a computing resource pool for users to serve as required.
By using the cloud computing service, the service provider can reduce the operation cost of enterprises and provide reliable resource access service for users. More and more business providers have chosen cloud computing services to provide relevant business services to users.
The service provider rents the service of the cloud computing service provider, and then stores the service resources in the cloud computing service provider. Currently, a main way for a service provider to provide services to a user by using a cloud computing service is that the user firstly logs in a service provider website, obtains service resources from the cloud computing provider through the service provider, and then the service provider sends the services to the user.
This approach has a number of disadvantages. First, the business manner in which service providers provide services to subscribers is limited. All services of the service provider are provided via the service provider. Second, service providers are required to have greater service providing capabilities. The service provider needs to provide a service equivalent to one resource relay station for many users, which increases the load pressure of the service provider, and in a cloud environment, the service provider wants to utilize the cloud, simply deploy and reduce the cost, which is contrary to the requirement and increases the burden of the service provider. Finally, the way in which users can flexibly use service-providing business resources is limited. The user can obtain the resources rented by the corresponding service provider at the cloud computing service provider only by logging in the service provider.
However, with the development of cloud computing service applications, service providers desire to provide resources to users in various ways, and users desire to flexibly access the cloud computing service providers anytime and anywhere, so as to obtain services provided by the service providers through the cloud computing service providers. However, as a user resource which is a main service support of the service provider, the service provider certainly wants to prohibit the user from directly accessing the cloud computing service provider, so that the user resource portion is protected from being leaked to the cloud computing service provider. Therefore, a better security scheme for cloud computing service application needs to be provided for not only providing a service provider with a convenient service providing manner and providing a user with a flexible resource accessing manner, but also protecting the user resources of the service provider.
Therefore, a resource technical scheme is urgently needed at present, which not only provides a flexible resource access way for users, but also can protect user resources of a service provider server. Unfortunately, as the cloud computing technology is still in the discussion stage, no relevant technical solution is available at present.
Disclosure of Invention
In view of this, the main objective of the present invention is to provide a method, an apparatus, and a system for secure access to cloud computing resources, which are convenient for users to access service resources and protect user resources of service providers.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
a secure access method for cloud computing resources comprises the following steps:
the resource information consignor server provides the relevant information of the service provider resource for the login user;
after receiving a resource access request sent by a user, a cloud computing service provider server confirms whether the resource access request carries an access control voucher of a resource to be accessed, if not, the cloud computing service provider server acquires service provider server information to which the resource to be accessed belongs according to related information of the resource to be accessed carried in the resource access request, and sends the resource access control request to a service provider server to which the resource to be accessed belongs; the service provider server performs identity authentication and access control on the user according to the identification information of the user and issues access control information of resources to be accessed; the resource access control request carries identification information of the user and information of resources to be accessed; the resource access control information to be accessed comprises authorization information of the resource to be accessed;
the cloud computing service provider server authenticates the access control information of the resources to be accessed, which is received and sent by the user or the service provider server, and provides the resources to be accessed to the user after the authentication is passed; or the cloud computing service provider server authenticates the received access control information of the resource to be accessed, which is sent by the user or the service provider server, and provides the access authority information of the resource to be accessed for the user after the authentication is passed; and after receiving the access authority information of the resource to be accessed, which is sent by the user, the cloud computing service provider server provides the resource to be accessed for the user.
Preferably, the resource information consignor server is a service provider server, a cloud computing service provider server or an independent enterprise server, and is used for providing the resource information of the service provider for the user.
Preferably, the access control information for issuing the resource to be accessed is specifically:
issuing access control information of resources to be accessed to the user or the cloud computing service provider server; and when the resource access control information is issued to the user, the user sends the access control information of the resource to be accessed to the cloud computing service provider server.
Preferably, before the resource information consignor server provides the relevant information of the resource for the login user, the method further includes:
the service provider server receives a registration request of the user and provides a registration identifier and an access password for the user;
the resource information consignor server provides the relevant information of the resource for the login user specifically as follows:
the resource information consignor server represents a service provider to display resource information to a user;
and the service provider server shares the registration identification and the access password information of the user with the resource information consignor server, and the resource information consignor server provides the relevant information of the resource for the user when verifying that the registration identification and the access password information input by the user are correct.
Preferably, the method further comprises:
and after verifying that the registration identification and the access password input by the user are correct, the resource information consignor server displays the resource information of the service provider to the user.
Preferably, the related information of the resource includes user number information, resource number information, and service provider server identification information set for the user by the service provider server.
Preferably, the related information of the resource further includes valid time information of the resource;
the service provider server identification information includes the IP address information of the service provider server, and name information of the service provider server, or provides communication port identification information, or hardware identification information.
Preferably, the access authorization comprises: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
A cloud computing resource security access device comprises a first providing unit, a first receiving unit, a determining unit, a first authentication unit, a second authentication unit and a second providing unit, wherein,
the first providing unit is used for providing related information of resources for the login user;
the first receiving unit is used for receiving a resource access request sent by a user; the resource access request carries identification information of the user and information of resources to be accessed;
the determining unit is used for determining whether the resource access request carries an access control certificate of the resource to be accessed or not, and triggering the first authentication unit if the resource access request does not carry the access control certificate of the resource to be accessed;
the first authentication unit is used for acquiring the information of the service provider server to which the resource to be accessed belongs according to the relevant information of the resource to be accessed carried in the resource access request, and sending an access control request to the service provider server to which the resource to be accessed belongs; the access control request carries identification information of the user and information of resources to be accessed; the service provider server performs identity authentication and access control on the user according to the identification information of the user and issues access control information of resources to be accessed;
the second authentication unit is used for authenticating the received access control information of the resource to be accessed, which is sent by the user or the service provider;
the second providing unit is used for providing the resource to be accessed for the user after the authentication of the second authentication unit is completed; or after the second authentication unit finishes authentication, providing the access authority information of the resource to be accessed for the user, and after receiving the access authority information of the resource to be accessed sent by the user, providing the resource to be accessed for the user.
Preferably, the access control information of the access authorization includes: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
A cloud computing resource safety access system comprises a resource information consignor server, a service provider server and a cloud computing service provider server; wherein,
the resource information consignor server is used for providing related information of resources for the login user;
the cloud computing service provider server is used for confirming whether the resource access request carries an access control certificate of the resource to be accessed or not after receiving the resource access request sent by the user, acquiring the service provider server information of the resource to be accessed according to the relevant information of the resource to be accessed carried in the resource access request if not, and sending the resource access control request to the service provider server of the resource to be accessed; the authentication request carries identification information of the user and information of resources to be accessed; and authenticating the received access control information of the resource to be accessed, which is sent by the user or the service provider, and providing the resource to be accessed for the user after the authentication is passed; or, the access control module is configured to authenticate the access control information of the resource to be accessed, which is received from the user or the service provider server, and provide the access authority information of the resource to be accessed to the user after the authentication is passed; after receiving the access authority information of the resource to be accessed, which is sent by the user, providing the resource to be accessed for the user;
and the service provider server is used for carrying out identity authentication and access control on the user according to the identification information of the user and issuing access control information of resources to be accessed.
Preferably, before the resource information consignor server provides the relevant information of the resource for the login user, the service provider server receives the registration request of the user and provides the registration identifier and the access password for the user;
and the service provider server shares the registration identification and the access password information of the user with the resource information consignor server, and the resource information consignor server provides the relevant information of the resource for the user when verifying that the registration identification and the access password input by the user are correct.
Preferably, the access authorization comprises: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
In the invention, a user firstly performs registration login through the resource information consignor server to obtain the relevant information of the resource to be accessed, and accesses the resource to be accessed through the cloud computing server according to the relevant information of the resource to be accessed. The invention can provide a simple and easy resource access means for the user, reduces the cost of system setting, is beneficial to the user to flexibly access resources, and improves the efficiency of resource access.
Drawings
FIG. 1 is a schematic diagram of a configuration of a cloud computing resource security access system according to the present invention;
FIG. 2 is a flowchart of a secure access method for cloud computing resources according to the present invention;
fig. 3 is a schematic structural diagram of the cloud computing resource security access apparatus according to the present invention.
Detailed Description
The basic idea of the invention is that the resource information consignor server provides the relevant information of the resource for the login user; after receiving a resource access request sent by a user, the cloud computing service provider server confirms whether the resource access request carries a resource access control certificate to be accessed, and if not, the cloud computing service provider server acquires service provider server information to which the resource to be accessed belongs according to related information of the resource to be accessed carried in the resource access request, and sends an authentication request to the service provider server to which the resource to be accessed belongs; the authentication request carries identification information of the user and resource information to be accessed, and the service provider server performs identity authentication and access control on the user according to the identification information of the user and issues resource access control information to be accessed. And the cloud computing service provider server authenticates the received to-be-accessed resource access control information sent by the service provider, and provides the to-be-accessed resource for the user after the authentication is passed.
Fig. 1 is a schematic diagram illustrating a configuration of a cloud computing resource security access system according to the present invention, and as shown in fig. 1, the cloud computing resource security access system according to the present invention includes a resource information consignor server, a service provider server, and a cloud computing provider server; wherein,
the resource information consignor server is used for providing related information of resources for the login user;
the cloud computing service provider server is used for confirming whether the resource access request carries an access control certificate of the resource to be accessed or not after receiving the resource access request sent by the user, acquiring the service provider server information of the resource to be accessed according to the relevant information of the resource to be accessed carried in the resource access request if not, and sending the resource access control request to the service provider server of the resource to be accessed; the authentication request carries identification information of the user and information of resources to be accessed; and authenticating the received access control information of the resource to be accessed, which is sent by the user or the service provider, and providing the resource to be accessed for the user after the authentication is passed; or, the access control module is configured to authenticate the access control information of the resource to be accessed, which is received from the user or the service provider server, and provide the access authority information of the resource to be accessed to the user after the authentication is passed; after receiving the access authority information of the resource to be accessed, which is sent by the user, providing the resource to be accessed for the user;
and the service provider server is used for carrying out identity authentication and access control on the user according to the identification information of the user and issuing access control information of resources to be accessed.
In the invention, the resource information consignor provides resource information for users on behalf of the service provider for the information platform of the resources provided by the service provider. The service provider itself may act as a resource information consignor here. Of course, the cloud computing service provider may serve as a resource information consignor, and the resource information consignor may also be an independent third-party company. The service provider server can tell the resource information consignor server about the provided resource service and resource information, and the resource information consignor server can show the resource information to the user, and can also develop some resource information combinations on the basis of the obtained resource information to show the resource information to the user. Here, the resource information may be some basic resource units or a combination of some resource units, where the resource includes service elements, computing resources and other resources provided by a service provider, and in terms of services, for example, a telecommunications company can provide some services and some service packages.
The user can obtain some resource information from the resource information consignor (or service provider) server, then accesses the resource to the cloud computing service provider server, or after obtaining the resource information, the user assembles the resource information according to the requirement to form a resource combination, thereby achieving the requirement of obtaining the service, and then sends the resource information combination to the cloud computing service provider server.
And the service provider server authenticates the identity of the user according to the requirements of the cloud computing provider server, and issues access control information according to some application behavior results of the user.
After the cloud computing service provider server initiates an authentication request to the service provider server, the service provider server sends access control information to the cloud computing service provider server, and the cloud computing service provider server provides resource services such as services and the like for the user according to the access control information.
Before the resource information consignor server provides relevant information of resources for a login user, the service provider server receives a registration request of the user and provides a registration identifier and an access password for the user;
and the service provider server shares the registration identification and the access password information of the user with the resource information consignor server, and the resource information consignor server provides the relevant information of the resource for the user when verifying that the registration identification and the access password information input by the user are correct.
And the service provider server issues access control information for accessing resources for the user and sends the access control information to the cloud computing service provider.
The access right information includes: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
The related information of the resources comprises user number information, resource number information and service provider server identification information which are set for the user by the service provider server.
The related information of the resource also comprises effective time information of the resource; the service provider server identification information includes the IP address information of the service provider server, and name information of the service provider server, or provides communication port identification information, or hardware identification information.
In the invention, the cloud computing resources comprise cloud storage resources and the like.
The following describes in detail how the user of the present invention accesses the resources of the service provider located on the service provider server through the cloud computing provider server.
Fig. 2 is a flowchart of the secure access method for cloud computing resources according to the present invention, and as shown in fig. 2, the secure access method for cloud computing resources according to the present invention specifically includes the following steps:
in step 201, a user obtains related information of a resource to be accessed.
Specifically, in step 201, first, a user inputs a user name and a password at a client to log in at a resource information client server. And after the resource information consignor server authenticates the identity of the user, a resource information list is sent to the user, the user selects the resource information to be accessed, and the resource information consignor server sends corresponding resource information to the user.
The communication flow between the client and the resource information client server is as follows:
the user starts the client program to input the user name and the user password. The client program logs in the authentication server by a Secure Socket Layer (SSL) protocol, initiates a session, and then sends a user name and a corresponding password to the resource information consignor server.
The login password may be encrypted by the customer using the MD5 encryption algorithm when the user registers with the service provider server. In this case, the client sends the password processed by MD5 to the resource information client server. The user password is not leaked by using MD5 matching at the resource information client server.
And the service provider server shares the user name and the MD5 value of the password which are saved when the user registers to the resource information consignor server. At this time, the resource information consignor server matches the MD5 values of the user name and password, and if not, returns an error prompt. And if the data is matched with the data, returning to a resource information list resourcelist of the service provider server.
And the user selects resource information to be accessed from the resource list and sends the resource information to the resource information consignor server, and the resource information consignor server returns the corresponding resource information ticket to the user. The resource information ticket may be encrypted by the system key. System key KSAnd the shared key is a shared key of the resource information consignor server, the service provider server and the cloud computing service provider server. The resource information consignor server also carries out IP (Internet protocol) on the cloud computing service provider serverCAnd sending the data to the user.
The resource information ticket contains a user number NUResource number N, service provider server IDSIP of service provider serverSAnd may also include the time value of the resource that the user may use the ticket to access. I.e., ticket ═ NU,N,IDS,IPS,time}KS
Then, the user receives the resource information ticket and stores the ticket locally for backup access to the cloud computing service providerIP of serverCAnd the session between them ends.
The conversation process between the client and the resource information client server is as follows:
the client sends { username + [ password ] MD5} SSL to the resource information consignor server;
the resource information client server sends { resourcelist } SSL to the client;
the client sends { N } SSL to the resource information consignor server;
resource information consignor server sends IP to clientCTicket } SSL; wherein ticket is { N ═ NU,N,IDS,IPS,time}KS
The username mentioned above represents the login username of the user, password represents the corresponding password, and [ password ] MD5 represents the password processed by MD5, and the session is transmitted by SSL protocol. The resource number N may be a large set of resource information.
Step 202, the user obtains an authorization token of the resource to be accessedV
In step 202, after obtaining the relevant information of the resource to be accessed, the user still cannot access the resource to be accessed directly through the information, and needs to obtain an access token of the resource to be accessed. The following details how a user obtains an authorization token for a resource to be accessedV
Cloud computing service provider server IP sent by user through resource information consignor serverCAnd initiating a resource access request, and sending a resource access ticket to the cloud computing service provider server.
Cloud computing server utilizing system key (K)S) Unpack the ticket (ticket) and obtain the ID of the service provider serverSAnd IPSAnd a user number NU. ID of cloud computing service provider server to service provider serverSAnd IPSAnd authenticating and finding out the registration information of the service provider server. And if the authentication is passed, an unauthorized token is issued and sent to the user. Unauthorized tokens can be represented by a system key (K)S) Encryption is performed.
Unauthorized tokeneIncluding ID of cloud computing serverCAnd IPCThe resource number N is accessed and also includes the time value time that the token can be used. I.e. unauthorized token ═ { ID }C,IPC,N,time}KS
Of course, if the user obtains an authorized tokenvThen, the cloud computing service provider server sends the authorization token to the uservRequest PT. To confirm whether the user has obtained an authorized token before sending the resource access request to the cloud computing serverv. If the user already has access to the tokenvThe last flow to access the resource may be performed.
Following unauthorized token acquisition by the uservThe process of (1).
The user will not authorize the tokeneSending the request to a cloud computing service provider server to request to acquire an authorization tokenV. The cloud computing service provider server sends a request to the service provider server to request the service provider server to provide access control information for the user to access the resource. And the service provider server inquires the resource access authority of the user and sends the resource access authority value V to the cloud computing provider server.
The basic flow between the cloud computing service provider server and the service provider server is as follows:
the user will not authorize the tokeneSending the data to a cloud computing service provider server;
IP from cloud computing service provider server to service provider serverSInitiating access, and sending resource information N to be accessed and resource access authority request P to service provider serverVAnd a user number NU. The resource access right request information may be a system key (K)S) And (4) encrypting.
Service provider server application system key (K)S) Decrypting the resource access authority request information and obtaining the user number NUInquiring to obtain the IP of the user according to the numberCAnd IP to the userCAnd initiating access, and requiring the user to provide resource access authority application information.
The user service provider server provides resource access authority application. Specifically, in the invention, the service provider server sends the page jump action to the user clientiThe user may be required to log on to the service provider server website. At this point, the client may jump to the service provider server website. And the user inputs a user name username and a password to log in the service server website. The service provider server verifies the username and password and compares them with the database user's registration information, and if they are consistent, the user is allowed access. Service provider server sends page jump action to user clienteSkipping to the authorization page of the resource N to be accessed, and the user can select the right request action such as paymentvRequesting the service provider server to allow it to access resource N.
And the service provider server issues the resource access authority V according to the application, and sends the authority value V to the cloud computing provider server. System key (K) for transmission processS) And (4) encrypting.
Cloud computing service provider server application system key (K)S) Decrypting to obtain a resource access authority value V, and packaging the authority value V into an authorization tokenvAnd will authorize tokenvAnd sending the data to the user. Sending authorization tokenvMay pass through the system key (K)S) Encryption is performed.
Authorization tokenvMay include a service provider server IDCService provider server IPCResource number N, authority value V and the authorization token can be usedvTime limit time. Instant authorization tokenv={IDC,IPC,N,time,V,}KS
The session flow utilization parameters between the cloud computing service provider server, the service provider server and the client can be expressed as follows:
the user sends { ticket } to a cloud computing service provider server through a client;
cloud computing service provider server sends { P } to user clientT,tokene}
User sends { token to cloud computing service provider server through cliente}SSL;
The cloud computing service provider server sends { { N, N to the service provider serverU,PV}KS}SSL;
Service provider service sends { action to user client endi}SSL;
The user sends { username, password } SSL to the service provider server through the client;
service provider service sends { action to user client ende}SSL;
User sends { { N, action to service provider server through clientv}KC}SSL;
The service provider server sends { { N, V } K to the cloud computing service provider serverS}SSL;
Service provider server sends { token to user clientV}SSL;
tokenv={IDC,IPC,N,time,V}KS
Step 203, the user obtains a resource access tokenaAnd accessing the related resource to be accessed.
In step 203, the user utilizes an access tokenvSending a request to a cloud computing server, the cloud computing server authenticating an access tokenvAnd sends a resource access token to the useraThe user receives the resource access tokenaThereafter, the token can be accessed with the resourceaAnd extracting the resource from the cloud computing service provider server.
The basic flow between the user and the cloud computing service provider server is as follows:
the client will access the tokenvSending the request to a cloud computing server and requesting a resource access token from the cloud computing servera. Access tokenvAnd the tokenvThe contents are the same.
Cloud computing service provider server application system key decryption access tokenvAuthenticating resource access authority information, and issuing corresponding access token after authentication is passedaAnd sends an access token to the usera. Access tokenaMay include identification information ID of the service provider serverCResource number N, resource storage path D, resource access constraint L, and time limit at which the resource can be accessed. I.e. access authorization tokena={IDC,N,D,L,time}Ks。
User receives access tokenaUsing access tokensaAnd sending a resource access request to a cloud computing service provider server.
Cloud computing service provider server application system key decryption access tokenaAnd checking the resource access constraint information L, if the resource access constraint information L passes the resource locating, positioning the resource according to the L, providing the resource to be accessed to the user by the cloud computing service provider server, and sending the resource corresponding to the resource number to the user.
The session flow utilization parameters between the cloud computing service provider server and the client can be expressed as follows:
sending a { (ready) to a cloud computing service provider server by a user through a clienttokenv}KS}SSL;
Cloud computing service provider server sends { token to user client usera}SSL;
User sends { token to cloud computing service provider server through clienta}SSL;
The cloud computing service provider server sends { resource } SSL to the user client; wherein, tokena={IDC,N,D,L,time}Ks。
Fig. 3 is a schematic diagram of a composition structure of the cloud computing resource security access apparatus of the present invention, and as shown in fig. 3, the cloud computing resource security access apparatus of the present invention includes a first providing unit 30, a first receiving unit 31, a determining unit 32, a first authenticating unit 33, a second authenticating unit 34, and a second providing unit 35, wherein,
a first providing unit 30, configured to provide relevant information of resources for a login user;
a first receiving unit 31, configured to receive a resource access request sent by a user; the resource access request carries identification information of the user and information of resources to be accessed;
a determining unit 32, configured to determine whether the resource access request carries an access control credential of a resource to be accessed, and trigger the first authentication unit if the resource access request does not carry the access control credential of the resource to be accessed;
the first authentication unit 33 is configured to obtain, according to the relevant information of the resource to be accessed, carried in the resource access request, information of a service provider server to which the resource to be accessed belongs, and send an access control request to the service provider server to which the resource to be accessed belongs; the access control request carries identification information of the user and information of resources to be accessed; the service provider server performs identity authentication and access control on the user according to the identification information of the user and issues access control information of resources to be accessed;
a second authentication unit 34, configured to authenticate access control information of the resource to be accessed, which is sent by the user, and provide access right information of the resource to be accessed to the user after the authentication is passed;
a second providing unit 35, configured to provide the resource to be accessed for the user after the authentication of the second authentication unit 34 is completed; or after the second authentication unit 34 completes authentication, the access right information of the resource to be accessed is provided to the user, and after the access right information of the resource to be accessed sent by the user is received, the resource to be accessed is provided to the user.
The related information of the resources comprises user number information, resource number information and service provider server identification information which are set for the user by the service provider server. The related information of the resource also comprises effective time information of the resource;
the service provider server identification information includes the IP address information of the service provider server, and name information of the service provider server, or provides communication port identification information, or hardware identification information.
The access authorization includes: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
It should be understood by those skilled in the art that the cloud computing resource security access apparatus shown in fig. 3 of the present invention is designed to implement the foregoing cloud computing resource security access method, and the implementation functions of the foregoing processing units may be understood by referring to the description related to the foregoing method. The functions of the processing units in the figures may be implemented by a program running on a processor, or may be implemented by specific logic circuits.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (13)

1. A cloud computing resource security access method, the method comprising:
the resource information consignor server provides the relevant information of the service provider resource for the login user;
after receiving a resource access request sent by a user, a cloud computing service provider server confirms whether the resource access request carries an access control voucher of a resource to be accessed, if not, the cloud computing service provider server acquires service provider server information to which the resource to be accessed belongs according to related information of the resource to be accessed carried in the resource access request, and sends the resource access control request to a service provider server to which the resource to be accessed belongs; the service provider server performs identity authentication and access control on the user according to the identification information of the user and issues access control information of resources to be accessed; the resource access control request carries identification information of the user and information of resources to be accessed; the resource access control information to be accessed comprises authorization information of the resource to be accessed;
the cloud computing service provider server authenticates the access control information of the resources to be accessed, which is received and sent by the user or the service provider server, and provides the resources to be accessed to the user after the authentication is passed; or the cloud computing service provider server authenticates the received access control information of the resource to be accessed, which is sent by the user or the service provider server, and provides the access authority information of the resource to be accessed for the user after the authentication is passed; and after receiving the access authority information of the resource to be accessed, which is sent by the user, the cloud computing service provider server provides the resource to be accessed for the user.
2. The method of claim 1, wherein the resource information consignor server is a service provider server or a cloud computing server or an independent third party server for providing the resource information of the service provider to the user.
3. The method according to claim 1, wherein the access control information for issuing the resource to be accessed is specifically:
issuing access control information of resources to be accessed to the user or the cloud computing service provider server; and when the resource access control information is issued to the user, the user sends the access control information of the resource to be accessed to the cloud computing service provider server.
4. The method of claim 1, wherein before the resource information consignor server provides the information about the resource to the logged-on user, the method further comprises:
the service provider server receives a registration request of the user and provides a registration identifier and an access password for the user;
the resource information consignor server provides the relevant information of the resource for the login user specifically as follows:
the resource information consignor server represents a service provider to display resource information to a user;
and the service provider server shares the registration identification and the access password information of the user with the resource information consignor server, and the resource information consignor server provides the relevant information of the resource for the user when verifying that the registration identification and the access password information input by the user are correct.
5. The method of claim 4, further comprising:
and after verifying that the registration identification and the access password input by the user are correct, the resource information consignor server displays the resource information of the service provider to the user.
6. The method according to claim 1, wherein the information related to the resource comprises user number information, resource number information, and service provider server identification information set for the user by the service provider server.
7. The method of claim 6, wherein the information related to the resource further comprises valid time information of the resource;
the service provider server identification information includes the IP address information of the service provider server, and name information of the service provider server, or provides communication port identification information, or hardware identification information.
8. The method of claim 1, wherein the access rights information comprises: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
9. A cloud computing resource security access apparatus, comprising a first providing unit, a first receiving unit, a determining unit, a first authenticating unit, a second authenticating unit, and a second providing unit, wherein,
the first providing unit is used for providing related information of resources for the login user;
the first receiving unit is used for receiving a resource access request sent by a user; the resource access request carries identification information of the user and information of resources to be accessed;
the determining unit is used for determining whether the resource access request carries an access control certificate of the resource to be accessed or not, and triggering the first authentication unit if the resource access request does not carry the access control certificate of the resource to be accessed;
the first authentication unit is used for acquiring the information of the service provider server to which the resource to be accessed belongs according to the relevant information of the resource to be accessed carried in the resource access request, and sending an access control request to the service provider server to which the resource to be accessed belongs; the access control request carries identification information of the user and information of resources to be accessed; the service provider server performs identity authentication and access control on the user according to the identification information of the user and issues access control information of resources to be accessed;
the second authentication unit is used for authenticating the received access control information of the resource to be accessed, which is sent by the user or the service provider;
the second providing unit is used for providing the resource to be accessed for the user after the authentication of the second authentication unit is completed; or after the second authentication unit finishes authentication, providing the access authority information of the resource to be accessed for the user, and after receiving the access authority information of the resource to be accessed sent by the user, providing the resource to be accessed for the user.
10. The apparatus of claim 9, wherein the access rights information comprises: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
11. A cloud computing resource security access system is characterized by comprising a resource information consignor server, a service provider server and a cloud computing provider server; wherein,
the resource information consignor server is used for providing related information of resources for the login user;
the cloud computing service provider server is used for confirming whether the resource access request carries an access control certificate of the resource to be accessed or not after receiving the resource access request sent by the user, acquiring the service provider server information of the resource to be accessed according to the relevant information of the resource to be accessed carried in the resource access request if not, and sending the resource access control request to the service provider server of the resource to be accessed; the resource access control request carries identification information of the user and information of resources to be accessed; and authenticating the received access control information of the resource to be accessed, which is sent by the user or the service provider, and providing the resource to be accessed for the user after the authentication is passed; or, the access control module is configured to authenticate the access control information of the resource to be accessed, which is received from the user or the service provider server, and provide the access authority information of the resource to be accessed to the user after the authentication is passed; after receiving the access authority information of the resource to be accessed, which is sent by the user, providing the resource to be accessed for the user;
and the service provider server is used for carrying out identity authentication and access control on the user according to the identification information of the user and issuing access control information of resources to be accessed.
12. The system of claim 11, wherein before the resource information consignor server provides the relevant information of the resource for the logged-in user, the service provider server receives the registration request of the user, and provides the user with the registration identifier and the access password;
and the service provider server shares the registration identification and the access password information of the user with the resource information consignor server, and the resource information consignor server provides the relevant information of the resource for the user when verifying that the registration identification and the access password input by the user are correct.
13. The system of claim 11, wherein the access rights information comprises: service provider server identification information, resource number, resource storage path, resource access constraints, and time limits for accessing the resource.
CN201010530222.6A 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system Active CN102457509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010530222.6A CN102457509B (en) 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010530222.6A CN102457509B (en) 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system

Publications (2)

Publication Number Publication Date
CN102457509A CN102457509A (en) 2012-05-16
CN102457509B true CN102457509B (en) 2015-09-16

Family

ID=46040171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010530222.6A Active CN102457509B (en) 2010-11-02 2010-11-02 Cloud computing resources safety access method, Apparatus and system

Country Status (1)

Country Link
CN (1) CN102457509B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750472B (en) * 2012-05-31 2015-09-09 华为软件技术有限公司 A kind of method for authenticating, Apparatus and system
CN102891856B (en) * 2012-10-18 2015-03-11 中国科学院信息工程研究所 Safe access method between plural entity and plural entity identity relaying party
CN103780580B (en) * 2012-10-23 2017-05-10 中国电信股份有限公司 Method, server and system for providing capability access strategy
CN103795690B (en) * 2012-10-31 2017-08-11 华为技术有限公司 A kind of method, proxy server and the system of cloud access control
CN103107985B (en) * 2012-12-04 2016-01-20 百度在线网络技术(北京)有限公司 A kind of cloud terminal authentication, system and device
CN103152425B (en) * 2013-03-15 2016-03-23 苏州九光信息科技有限公司 Based on the safety management system of the mobile device of cloud
CN104954330B (en) * 2014-03-27 2018-03-16 华为软件技术有限公司 A kind of methods, devices and systems to be conducted interviews to data resource
CN105099690A (en) * 2014-05-19 2015-11-25 江苏博智软件科技有限公司 OTP and user behavior-based certification and authorization method in mobile cloud computing environment
US9774682B2 (en) * 2015-01-08 2017-09-26 International Business Machines Corporation Parallel data streaming between cloud-based applications and massively parallel systems
CN105025041B (en) * 2015-08-25 2019-03-12 北京百度网讯科技有限公司 The methods, devices and systems that file uploads
CN106330899A (en) * 2016-08-22 2017-01-11 深圳市先河系统技术有限公司 Private cloud device account management method and system, electronic device and server
US10990642B2 (en) * 2016-12-21 2021-04-27 Aon Global Operations Se, Singapore Branch Methods and systems for securely embedding dashboards into a content management system
CN113553600B (en) * 2020-04-23 2024-06-14 花瓣云科技有限公司 Resource acquisition method, system, server and storage medium
CN112035810A (en) * 2020-08-19 2020-12-04 绿盟科技集团股份有限公司 Access control method, device, medium and equipment
CN112632508B (en) * 2020-12-28 2023-10-20 中金数据(武汉)超算技术有限公司 Identity recognition method and device based on cloud computing
CN114650183B (en) * 2022-04-11 2024-07-19 远景智能国际私人投资有限公司 Resource management method, device, server and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350710A (en) * 2007-07-16 2009-01-21 华为技术有限公司 Network system, authority issuing server, authority issuing and executing method
WO2010117587A2 (en) * 2009-04-09 2010-10-14 Alcatel-Lucent Usa Inc. Identity management services provided by network operator

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8984505B2 (en) * 2008-11-26 2015-03-17 Red Hat, Inc. Providing access control to user-controlled resources in a cloud computing environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350710A (en) * 2007-07-16 2009-01-21 华为技术有限公司 Network system, authority issuing server, authority issuing and executing method
WO2010117587A2 (en) * 2009-04-09 2010-10-14 Alcatel-Lucent Usa Inc. Identity management services provided by network operator

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
云计算安全关键技术分析;张云勇 等;《电信科学》;20100930(第9期);第64-69页 *

Also Published As

Publication number Publication date
CN102457509A (en) 2012-05-16

Similar Documents

Publication Publication Date Title
CN102457509B (en) Cloud computing resources safety access method, Apparatus and system
CN109787988B (en) Identity strengthening authentication and authorization method and device
CN102457507B (en) Cloud computing resources secure sharing method, Apparatus and system
US8302163B2 (en) System and method for secure communication
CN105187362B (en) Method and device for connection authentication between desktop cloud client and server
EP2696557B1 (en) System and method for accessing third-party applications based on cloud platform
CN101202753B (en) Method and device for accessing plug-in connector applied system by client terminal
CN111615105B (en) Information providing and acquiring method, device and terminal
US20160365983A1 (en) Code signing system with machine to machine interaction
JP5626816B2 (en) Method and apparatus for partial encryption of digital content
US8918641B2 (en) Dynamic platform reconfiguration by multi-tenant service providers
US20140189799A1 (en) Multi-factor authorization for authorizing a third-party application to use a resource
CN105991614B (en) It is a kind of it is open authorization, resource access method and device, server
CN107347068A (en) Single-point logging method and system, electronic equipment
CN114788226A (en) Unmanaged tool for building decentralized computer applications
CN103685282A (en) Identity authentication method based on single sign on
KR101210260B1 (en) OTP certification device
KR101690989B1 (en) Method of electric signature using fido authentication module
CN106161348B (en) Single sign-on method, system and terminal
CN100365974C (en) Device and method for controlling computer access
CN106161475B (en) Method and device for realizing user authentication
JP5452192B2 (en) Access control system, access control method and program
CN107040501B (en) Authentication method and device based on platform as a service
WO2012176506A1 (en) Single sign-on system, single sign-on method, and authentication server linking program
CN101924634A (en) Verification portal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant