Abstract:
Embodiments of the present invention provide a method, a device, and a system for realizing disaster tolerance backup. The method includes the following steps: a device with an active-standby function determines a current state of the device with the active-standby function, after it is determined that the current state is an active state, the device with the active-standby function issues reachable route information to a connected routing device, where the device with the active-standby function and a device of which a current state is a standby state have a same IP address, the reachable route information includes route information relevant to the IP address, so that the IP address is reachable, and the device with the active-standby function and the device of which the current state is the standby state are backup devices for each other. The present invention can realize remote disaster tolerance backup and avoid service interruption.
Abstract:
A security control platform receives a virtual machine starting request message that is from user equipment and forwarded by a management platform, where the virtual machine starting request message includes an identifier of a virtual machine that needs to be enabled and user information; invokes a third-party trusted platform to determine that the virtual machine starting request message is initiated by the user equipment according to an instruction of an authorized user; and performs authentication on the user information, and based on successful authentication, invokes the third-party trusted platform to decapsulate the virtual machine that needs to be enabled. It is ensured that other user equipment (including the management platform) cannot obtain a key of the third-party trusted platform, which enhances security of management control on the virtual machine, and thereby enhances security of a cloud computing platform.
Abstract:
A cloud system data management method for alleviate a data leakage problem occurring when a user accessed by another user when a virtual data volume of the user is mounted to a virtual machine of another user includes creating a first virtual machine for a user and allocating a virtual data volume to the first virtual machine, setting an identifier of the virtual data volume as an identifier corresponding to a home identifier of the first virtual machine, determining, according to the identifier of the virtual data volume and a home identifier of a second virtual machine, whether the virtual data volume and the second virtual machine belong to a same user when the virtual data volume needs to be mounted to the second virtual machine, forbidding the virtual data volume to be mounted to the second virtual machine when they do not belong to the same user.
Abstract:
Embodiments of the present invention provide a method, a device, and a system for realizing disaster tolerance backup. The method includes the following steps: a device with an active-standby function determines a current state of the device with the active-standby function, after it is determined that the current state is an active state, the device with the active-standby function issues reachable route information to a connected routing device, where the device with the active-standby function and a device of which a current state is a standby state have a same IP address, the reachable route information includes route information relevant to the IP address, so that the IP address is reachable, and the device with the active-standby function and the device of which the current state is the standby state are backup devices for each other. The present invention can realize remote disaster tolerance backup and avoid service interruption.
Abstract:
A cloud system data management method for alleviate a data leakage problem occurring when a user accessed by another user when a virtual data volume of the user is mounted to a virtual machine of another user includes creating a first virtual machine for a user and allocating a virtual data volume to the first virtual machine, setting an identifier of the virtual data volume as an identifier corresponding to a home identifier of the first virtual machine, determining, according to the identifier of the virtual data volume and a home identifier of a second virtual machine, whether the virtual data volume and the second virtual machine belong to a same user when the virtual data volume needs to be mounted to the second virtual machine, forbidding the virtual data volume to be mounted to the second virtual machine when they do not belong to the same user.
Abstract:
A method for implementing a session border controller (SBC) pool and a SBC device are provided. In the present invention, an SBC pool is formed by at least two SBCs, the at least two SBCs are mutually backed up for disaster recovery and use a same Internet Protocol (IP) address for a terminal device, and whether the terminal device is registered in the SBC pool is determined; and if the terminal device has been registered in the SBC pool, a service message is forwarded to an SBC with which the terminal device is registered. In this way, it is avoided that SBC device disaster recovery places a special requirement for the terminal device, and the terminal device does not need to be configured with two IP addresses. Furthermore, all devices in the SBC pool can process the service message of the terminal device, thereby increasing a resource utilization rate.
Abstract:
A method for trusted measurement of a cloud computing platform includes: generating, by a third-party management and audit system, an audit report based on a current running indicator, signed by using a digital certificate, of a software and a running security indicator of the software, where the audit report indicates trustworthiness of a cloud computing platform. In this way, a process of trusted measurement of the cloud computing platform is open and transparent, so that authenticity of trusted measurement of the cloud computing platform is improved, thereby increasing a user's trust in the cloud computing platform.
Abstract:
A method for implementing a session border controller (SBC) pool and a SBC device are provided. In the present invention, an SBC pool is formed by at least two SBCs, the at least two SBCs are mutually backed up for disaster recovery and use a same Internet Protocol (IP) address for a terminal device, and whether the terminal device is registered in the SBC pool is determined; and if the terminal device has been registered in the SBC pool, a service message is forwarded to an SBC with which the terminal device is registered. In this way, it is avoided that SBC device disaster recovery places a special requirement for the terminal device, and the terminal device does not need to be configured with two IP addresses. Furthermore, all devices in the SBC pool can process the service message of the terminal device, thereby increasing a resource utilization rate.
Abstract:
A security control platform receives a virtual machine starting request message that is from user equipment and forwarded by a management platform, where the virtual machine starting request message includes an identifier of a virtual machine that needs to be enabled and user information; invokes a third-party trusted platform to determine that the virtual machine starting request message is initiated by the user equipment according to an instruction of an authorized user; and performs authentication on the user information, and based on successful authentication, invokes the third-party trusted platform to decapsulate the virtual machine that needs to be enabled. It is ensured that other user equipment (including the management platform) cannot obtain a key of the third-party trusted platform, which enhances security of management control on the virtual machine, and thereby enhances security of a cloud computing platform.
Abstract:
A method, a server, a host, and a system for protecting data security. A server generates a cloud feature value that uniquely corresponds to the server, binds a data encryption key required by the host to generate data encryption key ciphertext, and then transmits the data encryption key ciphertext and the cloud feature value to the host; and the host decrypts the ciphertext using the cloud feature value to obtain a data encryption key to be allocated to a user, so that security protection on user data is performed based on the cloud feature value, thereby improving data security.