Intrusion-tolerant cloud workflow implementation method and system

An intrusion tolerance and implementation method technology, applied in the field of network security, can solve problems such as random system disturbance, workflow execution failure, loss, etc., and achieve the effect of pure state, improved intrusion tolerance, and enhanced intrusion tolerance

Inactive Publication Date: 2019-08-09
ZHUHAI GAOLING INFORMATION TECH COLTD +1
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, scientific computing usually has very high requirements on the accuracy of results, and result errors caused by random system distu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion-tolerant cloud workflow implementation method and system
  • Intrusion-tolerant cloud workflow implementation method and system
  • Intrusion-tolerant cloud workflow implementation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049]In the field of cloud workflow systems, if a task execution body with a single architecture is used, there is only a single layer of protection for attackers, and the preparation time before cracking is short, which exposes the cloud system to high intrusion risks. In view of this, the present invention proposes an intrusion tolerance cloud workflow implementation method, the detailed steps are as follows:

[0050] Step S101: Deploy the pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the cloud workflow implementation method with intrusion tolerance, the executive programs corresponding to the tasks in the workflow are deployed in the containers respectively, and thenthe containers are transplanted to the virtual machines with the different operating systems, so that the cloud system intrusion tolerance capability can be effectively improved. Furthermore, the subtask results executed by the plurality of virtual machines are judged; calculating the confidence coefficient of the sub-task result generated within the preset time; therefore, the reliability and credibility of the execution of the current subtask are determined, whether the selection result is submitted to the next subtask or the execution subtask of the virtual machine is reset is determined, the reliability and credibility of the output result are ensured through the mutual judgment and verification of the generation results of the plurality of virtual machines, and the invasion toleranceof the cloud system can be truly improved. In addition, the invention provides a system applying the cloud workflow implementation method with intrusion tolerance, and the purpose and the effect of the implementation method are achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an intrusion-tolerant cloud workflow implementation method and system. Background technique [0002] Cloud computing is a supercomputing model based on virtualization technology, using the network as the carrier, providing services such as infrastructure, platform, and software applications, and integrating large-scale and scalable distributed computing resources for collaborative work. In the cloud computing model, users no longer need to purchase hardware, but only need to pay a certain fee, and can easily obtain the required computing and storage resources through the network. Due to the low cost and simple operation of cloud services, more and more large-scale scientific computing tasks are delivered to cloud computing platforms for completion. Large-scale scientific computing tasks usually consist of hundreds or thousands of steps. In order to arrange, execute and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/53G06F9/455G06F11/14
CPCG06F9/45558G06F11/1484G06F21/53G06F2009/45562G06F2009/4557G06F2009/45595
Inventor 郭义伟鲍尚策张建军于天李浩杨树村邵文超
Owner ZHUHAI GAOLING INFORMATION TECH COLTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products