Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for dispatching safety sensitive workflow based on task replication in cloud computing

A technology of task replication and scheduling method, applied in the field of cloud computing, can solve problems such as insufficient consideration of intermediate data security requirements, achieve the effect of minimizing completion time and operating cost, and improving use efficiency

Inactive Publication Date: 2016-11-09
NAT UNIV OF DEFENSE TECH
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, little research has been done on copying tasks to these free slots to improve workflow completion time and running cost.
Furthermore, the security requirements of the intermediate data produced by the execution of the workflow are not fully considered

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for dispatching safety sensitive workflow based on task replication in cloud computing
  • Method for dispatching safety sensitive workflow based on task replication in cloud computing
  • Method for dispatching safety sensitive workflow based on task replication in cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] 3. Model and problem description

[0082]In this part, the present invention sequentially presents IaaS cloud computing, workflow, and data security models. On the basis of the above models, describe the scheduling model of the workflow, and consider the security requirements of the application.

[0083] 3.1 Model

[0084] 3.1.1 IaaS cloud computing platform

[0085] Similar to literature [16,17,22], the present invention focuses on Infrastructure as a Service (IaaS) cloud platforms, such as figure 1 shown. Throughout the architecture, the scheduler associates users with the IaaS platform. The top layer is the user, which dynamically submits the workflow to the scheduler, and the bottom layer is the IaaS platform, which provides virtual machines (VMs) for users on demand. The scheduler is a key component in the IaaS platform, responsible for scheduling workflow tasks and selecting encrypted instances for intermediate data. The invention studies the relevant rules ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for dispatching a safety sensitive workflow based on task replication in cloud computing. The method is named as an SOLID and includes two important stages that 1, task dispatching based on selective task duplication is performed; 2, the task relaxation time is utilized to encrypt workflow intermediate data. The safety demand problem of the intermediate data in the workflow operating process is always not considered in an existing workflow dispatching method at present is solved. In addition, the resource free timeslot caused by data dependence relation of workflow tasks is not fully utilized. The method overcomes the shortcomings, finally randomly produced workflows are used for a simulation experiment, and an experiment result indicates that the dispatching method is better than existing algorithms.

Description

technical field [0001] The invention relates to a cloud computing method, in particular to a scheduling method for a security-sensitive workflow based on task duplication in cloud computing. Background technique [0002] 1. Background [0003] Cloud computing has become the new style of distributed computing. In this model, cloud providers provide users with services (eg, applications, platforms, and computing resources) on-demand in a pay-as-you-go manner [1]. In particular, the infrastructure-as-a-service (IaaS) model, or platform, has become the most commonly used service model. In this mode, cloud service providers manage large-scale heterogeneous virtual machines (VMs) to process user applications. In addition, the available virtual machines in the IaaS platform can be dynamically increased and decreased. Due to the advantages of cloud computing in terms of price and rapid scaling [1,2], cloud computing has been applied to more and more fields, such as banking, e-co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/50
CPCG06F9/5077G06F2209/5017
Inventor 朱晓敏陈黄科邱涤珊
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products