Scheduling method for virtual machine migration and system

A technology of virtual machine migration and scheduling method, applied in the field of virtual machine migration of cloud computing, can solve problems such as hidden dangers of security performance, hidden dangers, and reduction of security level of virtual machines, so as to avoid hidden dangers, ensure security strength, and ensure optimal operation. and load balancing

Active Publication Date: 2014-11-19
CEC CYBERSPACE GREAT WALL
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, computing resources such as CPU occupancy rate and memory usage rate are used as reference conditions for migration. Therefore, as the number of computing nodes increases, the load of the migration scheduler will increase exponentially. At this time, the performance requirements for the migration scheduler It will also be very high, prone to performance bottlenecks
[0005] 2. When the migration scheduler schedules virtual machines to hosts or host computing nodes, it does not consider the security level differences and mutual exclusion between computing nodes, which will bring security risks and easily lead to virtual machine failures. The security level is lowered, which poses a security threat to user data in the virtual machine and brings hidden dangers in security performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheduling method for virtual machine migration and system
  • Scheduling method for virtual machine migration and system
  • Scheduling method for virtual machine migration and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to enable those skilled in the art to better understand the technical solution of the present invention, the scheduling method and system for virtual machine migration of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0039] The technical idea of ​​the present invention is: divide the system into several different security domains according to business or security requirements; define different security levels for each security domain; set domain scheduler and domain security policy library in each security domain to Migration scheduling of virtual machines within a security domain is performed; while migration scheduling of virtual machines across security domains is performed by the central scheduler and central security policy library. During the migration scheduling process, virtual machines can be migrated between security domains of the same level, or migr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a scheduling method for virtual machine migration. The scheduling method includes the flowing steps that S1, a cross-domain migration request of a virtual machine is obtained; S2, whether the virtual machine can be migrated out or not is judged according to safety information of the virtual machine and the domain safety strategy of a source safety domain where the virtual machine is located; S3, if yes, the safety information of the virtual machine is parsed, and the target safety domain to which the virtual machine can be migrated is determined according to the central safety strategy; S4, the cross-domain migration request of the virtual machine is transferred to the target safety domain; S5, whether the target safety domain allows the virtual machine to be migrated to the target safety domain or not is judged according to the safety information of the virtual machine and the domain safety strategy of the target safety domain; S6, if yes, the target safety domain receives the cross-domain migration request of the virtual machine, and the virtual machine is migrated to the target safety domain from the source safety domain. By means of the scheduling method and system for virtual machine migration, potential safety hazards caused by migration of the virtual machine can be avoided, optimizing operation of system overall performance and load balance are guaranteed, and service safety and performance of the system are taken into consideration as well.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a virtual machine migration-oriented scheduling method and a system thereof, and is particularly suitable for cloud computing virtual machine migration. Background technique [0002] Cloud computing is an Internet-oriented distributed computing service, which can obtain the required resources (such as network, server, storage, application and service, etc.) Resources can be provisioned and released quickly with minimal administrative cost or service provider intervention. [0003] The dynamic migration of virtual machines is one of the characteristics of cloud computing. Usually, the scheduling strategy of virtual machine migration in cloud computing environments is based on the method of real-time monitoring of physical host performance to achieve load balancing. This aspect often brings a lot of computing consumption. , and cannot effectively solve the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F9/50G06F9/455
Inventor 张雅哲陈幼雷
Owner CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products