PROXY SYSTEM FOR SECURELY PROVISIONING COMPUTING RESOURCES IN CLOUD COMPUTING ENVIRONMENT
First Claim
1. A computer process for interacting with a cloud computing system having one or more computing resources available for provisioning to one or more client machines to increase data security, the computer process comprising:
- obtaining cloud credential data for accessing one or more cloud accounts of a cloud computing system having one or more computing resources available for provisioning to one or more client machines;
establishing at least one proxy account associated with the one or more cloud accounts of the cloud computing system, the at least one proxy account including at least proxy credential data and access to at least one provisioning policy, the at least one provisioning policy including one or more provisioning constraints with respect to provisioning the one or more computing resources which one or more provisioning constraints are not present in the one or more cloud accounts; and
applying the one or more provisioning constraints of the at least one provisioning policy with respect to all provisioning requests of the one or more client machines that originate via the at least one proxy account to limit provisioning of the one or more computing resources that would otherwise be available from the cloud computing system via the one or more cloud accounts.
0 Assignments
0 Petitions
Accused Products
Abstract
A computer process includes, but is not limited to, obtaining cloud credential data for accessing one or more cloud accounts of a cloud computing system having one or more computing resources available for provisioning to one or more client machines; establishing at least one proxy account associated with the one or more cloud accounts of the cloud computing system, the at least one proxy account including at least proxy credential data and access to at least one provisioning policy, the at least one provisioning policy including one or more provisioning constraints with respect to provisioning the one or more computing resources which one or more provisioning constraints are not present in the one or more cloud accounts; and applying the one or more provisioning constraints of the at least one provisioning policy with respect to all provisioning requests of the one or more client machines that originate via the at least one proxy account to limit provisioning of the one or more computing resources that would otherwise be available from the cloud computing system via the one or more cloud accounts.
-
Citations
30 Claims
-
1. A computer process for interacting with a cloud computing system having one or more computing resources available for provisioning to one or more client machines to increase data security, the computer process comprising:
-
obtaining cloud credential data for accessing one or more cloud accounts of a cloud computing system having one or more computing resources available for provisioning to one or more client machines; establishing at least one proxy account associated with the one or more cloud accounts of the cloud computing system, the at least one proxy account including at least proxy credential data and access to at least one provisioning policy, the at least one provisioning policy including one or more provisioning constraints with respect to provisioning the one or more computing resources which one or more provisioning constraints are not present in the one or more cloud accounts; and applying the one or more provisioning constraints of the at least one provisioning policy with respect to all provisioning requests of the one or more client machines that originate via the at least one proxy account to limit provisioning of the one or more computing resources that would otherwise be available from the cloud computing system via the one or more cloud accounts. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer process for interacting with a cloud computing system having one or more computing resources available for provisioning to one or more client machines to increase data security, the computer process comprising:
-
receiving at least one request via at least one proxy account to provision one or more computing resources of a cloud computing system; determining whether provisioning of the one or more computing resources of the cloud computing system is permitted by at least one provisioning policy associated with the at least one proxy account, the provisioning policy including one or more provisioning constraints with respect to provisioning the one or more computing resources which one or more provisioning constraints are not imposed by the cloud computing system; and denying the at least one request to provision the one or more computing resources of the one or more cloud accounts in response to a determination that the at least one provisioning policy associated with the at least one proxy account does not permit provisioning of the one or more computing resources.
-
-
30. A system that increases security of data in a cloud computing environment, the system comprising:
-
a cloud computing system having one or more computing resources available for provisioning to one or more client machines via one or more cloud accounts; and a proxy computing system that is communicably linked to the cloud computing system, the proxy computing system including memory bearing one or more computer executable instructions; and at least one processing device operably coupled to the memory and configured to implement the one or more computer executable instructions to perform operations comprising; establishing at least one proxy account associated with the one or more cloud accounts of the cloud computing system, the at least one proxy account including at least proxy credential data and access to at least one provisioning policy, the at least one provisioning policy including one or more provisioning constraints with respect to provisioning the one or more computing resources which one or more provisioning constraints are not present in the one or more cloud accounts; and applying the one or more provisioning constraints of the at least one provisioning policy with respect to all provisioning requests of the one or more client machines that originate via the at least one proxy account to limit provisioning of the one or more computing resources of the one or more cloud accounts that would otherwise be available from the cloud computing system.
-
Specification