Cloud computing SLA management framework based on resource credibility evaluation
A cloud computing and credibility technology, applied in the field of distributed computing, can solve problems such as disrupting the operation of cloud systems, affecting applications, fraud, etc., and achieve the effect of enhancing trust
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.
[0022] 1. Basic hierarchical structure and functional module division of the system
[0023] The technical scheme of the present invention is divided into four layers, user layer, trust perception and SLA management layer, service layer, and resource layer.
[0024] The user layer is mainly composed of customers of various cloud services, including individual customers and enterprise customers.
[0025] The trust perception and SLA management layer mainly includes several main functional components of the SLA manager, trusted resource pool, trusted attribute monitoring module, trusted evidence standardization module, and trusted computing module. The SLA manager mainly completes the main functions such as registration, negotiation and scheduling. The ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



