Multi-tenant-based safe configuration method of virtual machine in cloud data center

A cloud data center and security configuration technology, applied in the field of computer networks, can solve problems such as insufficient multi-tenancy, system resource fragmentation cloud, etc., and achieve the effect of satisfying security allocation and improving service quality

Inactive Publication Date: 2017-07-28
NANJING UNIV OF SCI & TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the same point or rack resource may not be sufficient for multi-tenancy
In addition, tenants reduce some resources or the work of the cloud system is completed, resulting in a large amount of system resource fragmentation in the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-tenant-based safe configuration method of virtual machine in cloud data center
  • Multi-tenant-based safe configuration method of virtual machine in cloud data center
  • Multi-tenant-based safe configuration method of virtual machine in cloud data center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] combine figure 1 , the present invention is based on the multi-tenant virtual machine security configuration method in the cloud data center, comprising the following steps:

[0034] Step 1, the intelligent centralized controller collects the idle resources of the cloud data center, and the resources are virtual machines in the cloud system that can be applied for by users;

[0035] combine figure 2 , step 2, the intelligent centralized controller collects the resource usage application of the user equipment;

[0036] Further, the resource usage application mentioned in step 2 includes the time ratio required by the user equipment, the number of resources required by the user equipment, and the minimum rate required by the user equipment.

[0037] combine image 3 , step 3, the intelligent centralized controller uses the artificial fish swarm algorithm to securely allocate the virtual machine resources requested by all users, and the specific process is as follows: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-tenant-based safe configuration method of a virtual machine in a cloud data center. The method comprises the following steps: collecting idle resource in the cloud data center; collecting recourse usage requests of user equipment; safely allocating the virtual machine resources which all users apply for by employing an artificial fish swarm algorithm; initializing parameters of the artificial fish swarm algorithm; calculating the optimal fish position and the optimal value and recording the same in a bulletin board; for each artificial fish, choosing and executing the optimal behavior among a swarming behavior, a following behavior and a preying behavior; calculating the new position and fitness function value of each artificial fish, and then updating the bulletin board; judging whether the algorithm termination condition is met or not, if not, returning to the second step, and if so, then entering the next step; taking the obtained optimal fitness function value as the optimal artificial fish position; and repeating the second to sixth steps for Ng times to obtain the optimal safe allocation result of the virtual machine resources. The invention can significantly improve the quality of service of users and reduces the resource waste of the cloud data center.

Description

technical field [0001] The invention belongs to the technical field of computer networks, in particular to a method for safely configuring a multi-tenant-based virtual machine in a cloud data center. Background technique [0002] Cloud computing uses Internet data centers as the basic infrastructure to provide various applications to residents. A large Internet data center may include more than one hundred virtual machine racks, and each rack usually includes about 20 physical machines. These physical machines are interconnected by a dedicated high-speed data center network, and user requests for cloud system resources may arrive at any time. . Virtual machine provisioning has always been a fundamental problem in infrastructure-as-a-service cloud computing systems. Generally speaking, before the tenant deploys the application in the cloud computing system, the virtual machine in the cloud data center needs to meet the requirements of the application. Then, the resource m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 徐雷周迅钊杨余旺黄常亮涂亮
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products