Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A computing migration method considering privacy protection in wireless metropolitan area network environment

A wireless metropolitan area network and privacy protection technology, applied in the field of privacy protection and mobile network edge computing task planning, can solve problems such as cloud load balancing that has not taken into account user privacy protection, to reduce the risk of privacy leakage, improve load balancing, Optimum service performance

Active Publication Date: 2022-03-04
NANJING SHENYE INTELLIGENT SYST ENG
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as far as research on the application of Duoyun in wireless metropolitan area network is concerned, user privacy protection and load balancing of Duoyun have not been taken into account.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computing migration method considering privacy protection in wireless metropolitan area network environment
  • A computing migration method considering privacy protection in wireless metropolitan area network environment
  • A computing migration method considering privacy protection in wireless metropolitan area network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0112] This embodiment simulates the dynamic scheduling of computing tasks in a wireless metropolitan area network.

[0113] Such as figure 2 As shown, in the experiment, we consider the situation of 6 computing tasks, 3 clouds, and 9 access points, that is, CL={cl 1 ,cl 2 ,cl 3}, AP={ap 1 ,ap 2 ,...,ap 9},T={t 1 ,t 2 ,...,t 6}. Among them, the number of virtual machines in each cloud is 10. The information of each computing task is shown in Table 1.

[0114] Table 1 Computing task information

[0115]

[0116] It can be seen from Table 1 that t 1 and t 2 There is a data conflict between t 3 and t 5 There is a data conflict between t 4 and t 5 Execution required more resources than cl 2 Therefore, in order to ensure the smooth execution of tasks and protect the privacy of users, the initial task scheduling strategy needs to be modified.

[0117] if t 2 still in cl 1 on the implementation, then t 1 Needs to be rescheduled, can migrate to cl 2 or cl 3...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computing migration method taking into account privacy protection in a wireless metropolitan area network environment. The method includes: 1. Obtaining cloud resource requirements and supply conditions and equipment deployment information in a wireless metropolitan area network; 2. Obtaining the information of computing tasks Conflict status and privacy leakage status; 3. According to the characteristics of computing tasks, formulate a dynamic scheduling method for computing tasks; 4. According to the scheduling strategy, calculate the average resource usage deviation of Dooyun and the transmission delay of computing tasks; 5. For various The objective function value under the scheduling strategy is evaluated, and the optimal strategy for managing the cloud computing task of the wireless metropolitan area network enhanced service function is selected. According to the resource information, the present invention provides a scheduling strategy in real time, which not only protects user privacy, but also optimizes cloud load balance, thereby reducing computing migration time and improving service performance.

Description

technical field [0001] The invention relates to the fields of privacy protection and mobile network edge computing task planning, in particular to a computing migration method that takes into account privacy protection in a wireless metropolitan area network environment. Background technique [0002] In recent years, with the development of mobile technology and the popularization of wireless networks, mobile applications have developed rapidly. In mobile applications, especially in an IoT (Internet of Things, Internet of Things) environment, mobile terminals need to perform a large number of data calculations to meet users' requirements for service quality. However, mobile terminals have problems such as insufficient storage space, limited computing resources, poor computing power, sensitive delay or large data calculation volume, etc., and it is difficult to achieve the desired effect of users, thereby reducing the service performance of mobile computing (Mobile Computing)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/1001H04L9/40H04W28/08
CPCH04L63/0407H04W28/08H04L67/1001
Inventor 刘庆祥许小龙崔萌萌顾仁昊
Owner NANJING SHENYE INTELLIGENT SYST ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products