Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Server security scheduling method in multi-access edge computing based on heterogeneous redundancy

A server security and edge computing technology, which is applied in secure communication devices, digital transmission systems, electrical components, etc., can solve the problem that there is no specific method for heterogeneous server scheduling, and achieve the effect of improving security.

Active Publication Date: 2022-05-27
震泽玄金信息科技(扬州)有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But there is no specific method for heterogeneity evaluation and server scheduling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Server security scheduling method in multi-access edge computing based on heterogeneous redundancy
  • Server security scheduling method in multi-access edge computing based on heterogeneous redundancy
  • Server security scheduling method in multi-access edge computing based on heterogeneous redundancy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Below in conjunction with the accompanying drawings and specific embodiments, the present invention will be further clarified. It should be understood that these examples are only used to illustrate the present invention and not to limit the scope of the present invention. Modifications in the form of valence all fall within the scope defined by the appended claims of the present application.

[0034] like figure 1As shown, a method for server security scheduling in multi-access edge computing based on heterogeneous redundancy includes the following steps:

[0035] Step 1: n MEC server sets M={m 1 ,m 2 ,m 3 ,...,m n }, the data and tasks are sent to the MEC server set M through the sending proxy sp for corresponding task processing, and the processed result set A is handed over to the receiving proxy rp.

[0036] Step 2: The arbiter arb in the receiving agent rp performs adjudication processing on the result set A, and selects the item a with the most occurrences i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a server security scheduling method in multi-access edge computing based on heterogeneous redundancy, which introduces heterogeneous redundancy into the edge computing server, and the edge computing server performs corresponding task processing, and records the credibility of the server through adjudication processing When the reliability of a certain server is too low, the random scheduling algorithm is used to select and replace it from the heterogeneous pool server set to ensure that the difference between the substitute and the original server cannot be too low, and the replaced server set remains constant. degree of heterogeneity. The invention not only can maintain the heterogeneity of the server set, but also has high security of the system.

Description

technical field [0001] The invention relates to a server security scheduling method in edge computing, and belongs to the field of edge computing security. Background technique [0002] Edge computing refers to a distributed open platform that integrates network, computing and storage at the edge of the network close to end users or data sources. As a supplement to cloud computing and mobile edge computing, the European Telecommunications Standards Institute (ETSI) proposed multi-access edge computing (MEC) in 2018. MEC expands the definition and application of edge computing, provides various types of IT services at network edge nodes, provides edge computing services for fixed users and mobile users at the same time, and migrates some data and computing tasks to MEC nodes for processing. Substantially reduce the bandwidth consumption of backhaul to the remote data center. At the same time, because the communication path is shortened, the end-to-end delay and security pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1031H04L67/1008
CPCH04L63/0218H04L63/1466H04L67/1031H04L67/1008
Inventor 付雄岳阳阳邓松王俊昌程春玲
Owner 震泽玄金信息科技(扬州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products