Providing context-based visibility of cloud resources in a multi-tenant environment

A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data struct...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: IYER SREEKANTH RAMAKRISHNA, MUPPIDI SRIDHAR R, KUMAR ARCHANA, NAGARATNAM NATARAJ, BIRD WILLIAM ALEXANDER
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator IYER SREEKANTH RAMAKRISHNA
MUPPIDI SRIDHAR R
KUMAR ARCHANA
NAGARATNAM NATARAJ
BIRD WILLIAM ALEXANDER
description A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2015200958A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2015200958A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2015200958A13</originalsourceid><addsrcrecordid>eNqNyrEKwjAQANAuDqL-w4FzIK0UdBRRHIXqXNL0Wg7Su5Jciv69ix_g9Ja3LppHlIV64hG8sOJbTecS9rBQoo4C6QdkAB8k9xAxSY4eExCDgykHJaPIjhWQF4rCE7Jui9XgQsLdz02xv12fl7vBWVpMs_PIqO2rqWxZV9ae6uO5PPy3vpUSOg8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Providing context-based visibility of cloud resources in a multi-tenant environment</title><source>esp@cenet</source><creator>IYER SREEKANTH RAMAKRISHNA ; MUPPIDI SRIDHAR R ; KUMAR ARCHANA ; NAGARATNAM NATARAJ ; BIRD WILLIAM ALEXANDER</creator><creatorcontrib>IYER SREEKANTH RAMAKRISHNA ; MUPPIDI SRIDHAR R ; KUMAR ARCHANA ; NAGARATNAM NATARAJ ; BIRD WILLIAM ALEXANDER</creatorcontrib><description>A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.</description><language>eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150716&amp;DB=EPODOC&amp;CC=US&amp;NR=2015200958A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20150716&amp;DB=EPODOC&amp;CC=US&amp;NR=2015200958A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>IYER SREEKANTH RAMAKRISHNA</creatorcontrib><creatorcontrib>MUPPIDI SRIDHAR R</creatorcontrib><creatorcontrib>KUMAR ARCHANA</creatorcontrib><creatorcontrib>NAGARATNAM NATARAJ</creatorcontrib><creatorcontrib>BIRD WILLIAM ALEXANDER</creatorcontrib><title>Providing context-based visibility of cloud resources in a multi-tenant environment</title><description>A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyrEKwjAQANAuDqL-w4FzIK0UdBRRHIXqXNL0Wg7Su5Jciv69ix_g9Ja3LppHlIV64hG8sOJbTecS9rBQoo4C6QdkAB8k9xAxSY4eExCDgykHJaPIjhWQF4rCE7Jui9XgQsLdz02xv12fl7vBWVpMs_PIqO2rqWxZV9ae6uO5PPy3vpUSOg8</recordid><startdate>20150716</startdate><enddate>20150716</enddate><creator>IYER SREEKANTH RAMAKRISHNA</creator><creator>MUPPIDI SRIDHAR R</creator><creator>KUMAR ARCHANA</creator><creator>NAGARATNAM NATARAJ</creator><creator>BIRD WILLIAM ALEXANDER</creator><scope>EVB</scope></search><sort><creationdate>20150716</creationdate><title>Providing context-based visibility of cloud resources in a multi-tenant environment</title><author>IYER SREEKANTH RAMAKRISHNA ; MUPPIDI SRIDHAR R ; KUMAR ARCHANA ; NAGARATNAM NATARAJ ; BIRD WILLIAM ALEXANDER</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2015200958A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>IYER SREEKANTH RAMAKRISHNA</creatorcontrib><creatorcontrib>MUPPIDI SRIDHAR R</creatorcontrib><creatorcontrib>KUMAR ARCHANA</creatorcontrib><creatorcontrib>NAGARATNAM NATARAJ</creatorcontrib><creatorcontrib>BIRD WILLIAM ALEXANDER</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>IYER SREEKANTH RAMAKRISHNA</au><au>MUPPIDI SRIDHAR R</au><au>KUMAR ARCHANA</au><au>NAGARATNAM NATARAJ</au><au>BIRD WILLIAM ALEXANDER</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Providing context-based visibility of cloud resources in a multi-tenant environment</title><date>2015-07-16</date><risdate>2015</risdate><abstract>A secure tag generation service is associated with a cloud infrastructure. This service establishes a security context for a particular cloud tenant based on a tenant's security requirements, one or more cloud resource attributes, and the like. The security content is encoded into a data structure, such as a tag that uniquely identifies that security context. The tag is then encrypted. The encrypted tag is then propagated to one or more cloud management services, such as a logging service. When one or more cloud resources are then used, such use is associated with the encrypted security context tag. In this manner, the encrypted tag is used to monitor activities that are required to meet the security context. When it comes time to perform a security or compliance management task, any cloud system logs that reference the encrypted security context tag are correlated to generate a report for the security context.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2015200958A1
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Providing context-based visibility of cloud resources in a multi-tenant environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-28T12%3A16%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=IYER%20SREEKANTH%20RAMAKRISHNA&rft.date=2015-07-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2015200958A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true