METHOD FOR SECURING DATA AND/OR APPLICATIONS IN A CLOUD COMPUTING ARCHITECTURE
First Claim
1. A method for securing data and/or applications within a cloud computing architecture, which comprises:
- a set of virtual servers identified by server identifiers, each virtual server being associated with one or more virtual memory disks, each virtual memory disk being materialized in the form of one or more memory spaces in one or more physical memory disks,an interface for allowing a remote user to access, via an Internet-type network, one or more virtual servers which are dedicated to said user in the set of virtual servers by means of an access key which is specific to the user and/or each virtual server, and to administer said dedicated virtual servers,interface components for creating and managing the set of virtual servers,comprising the following steps;
a security module is provided, said security module being administered by the user of the virtual server(s) which is/are dedicated to said user;
said security module is provided with one or more security policies to be applied to the data and/or applications managed by the virtual servers dedicated to said user;
said security module is provided with said access key which is specific to the user and/or each dedicated virtual server, for accessing the user'"'"'s dedicated virtual servers;
the security module accesses said dedicated virtual servers of the user by means of said provided access key; and
the dedicated virtual servers apply the security policies, which have been provided to said security module, to the data and/or applications they manage.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for securing data and/or applications within a cloud computing architecture is provided. According to the invention, a security module is provided, the security module being administered by the user of said virtual server(s) which is/are dedicated to said user; said security module is provided with one or more security policies to be applied to the data managed by the virtual servers dedicated to said user; said security module is provided with identifiers as well as keys to access the user'"'"'s dedicated virtual servers; the security module accesses the user'"'"'s dedicated virtual server; the security module exports the security policies, which have been provided to it, to the dedicated virtual servers; and the dedicated virtual servers apply the security policies, which have been provided to them by the security module, to the data they manage.
64 Citations
14 Claims
-
1. A method for securing data and/or applications within a cloud computing architecture, which comprises:
-
a set of virtual servers identified by server identifiers, each virtual server being associated with one or more virtual memory disks, each virtual memory disk being materialized in the form of one or more memory spaces in one or more physical memory disks, an interface for allowing a remote user to access, via an Internet-type network, one or more virtual servers which are dedicated to said user in the set of virtual servers by means of an access key which is specific to the user and/or each virtual server, and to administer said dedicated virtual servers, interface components for creating and managing the set of virtual servers, comprising the following steps; a security module is provided, said security module being administered by the user of the virtual server(s) which is/are dedicated to said user; said security module is provided with one or more security policies to be applied to the data and/or applications managed by the virtual servers dedicated to said user; said security module is provided with said access key which is specific to the user and/or each dedicated virtual server, for accessing the user'"'"'s dedicated virtual servers; the security module accesses said dedicated virtual servers of the user by means of said provided access key; and the dedicated virtual servers apply the security policies, which have been provided to said security module, to the data and/or applications they manage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification