Hybrid cloud security scheduling method and hybrid cloud security scheduling system

A scheduling method and technology of a scheduling system, applied in the field of cloud computing, can solve problems such as not considering hidden dangers of task security and lack of data security, and achieve the effect of optimizing use efficiency

Active Publication Date: 2020-01-24
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although the current research results related to hybrid cloud task scheduling have optimized task execution performance and hybrid resource utilization efficiency to a certain extent, there are still some problems, especially security issues, which do not consider the security risks of tasks executed on public clouds. The problem makes the data lack of security in the execution process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hybrid cloud security scheduling method and hybrid cloud security scheduling system
  • Hybrid cloud security scheduling method and hybrid cloud security scheduling system
  • Hybrid cloud security scheduling method and hybrid cloud security scheduling system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0018] The following combination Figure 1 to Figure 3 The technical scheme of the present invention is described further:

[0019] Such as figure 1 As shown, the hybrid cloud security scheduling method includes the following steps:

[0020] Step S102, after the request information of the task sent by the user is obtained, based on the request information of the task, it is determined to allocate the task to the target private cloud server or the target public cloud virtual machine.

[0021] Step S104, when it is determined to assign the task to the target ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hybrid cloud security scheduling method, which comprises the following steps of: when request information of a task sent by a user is obtained, judging whether to distribute the task to a target private cloud server or a target public cloud virtual machine based on the request information of the task; when it is determined that the task is allocated to the target public cloud virtual machine, performing identity verification on the task executed by the target public cloud virtual machine; after the identity verification of the task is passed, performing encryption processing on input data requested by the task, and transmitting the encrypted data to the task; and receiving the output data transmitted by the task, performing integrity verification on the output datatransmitted by the task, and feeding back the output data to the user when the integrity verification is passed. Through the technical scheme of the invention, on the premise of meeting the task execution security, the use efficiency of the hybrid cloud resources can be optimized.

Description

technical field [0001] The present invention relates to the technical field of cloud computing, in particular to a hybrid cloud security scheduling method and a hybrid cloud security scheduling system. Background technique [0002] Hybrid cloud can flexibly expand the service capability of private cloud by renting or releasing resources from public cloud, and is favored by more and more small and medium-sized enterprises. For hybrid cloud, how to efficiently use hybrid cloud resources is a very important issue, and task scheduling is one of the key technologies to solve this problem. Task scheduling achieves the purpose of reducing the completion time of tasks, reducing the cost of suppliers, improving resource utilization or reducing the number of breaches of service level agreements through reasonable mapping of computing resources and tasks. [0003] Although the current research results related to hybrid cloud task scheduling have optimized task execution performance an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0428H04L63/08H04L63/123H04L67/1008H04L67/101H04L67/1023
Inventor 王博张王卫刘永文王昌海
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products