Trusted cloud-based large-scale computing service configuration method and system

A technology for computing services and configuration methods, applied in computing, program control design, program control devices, etc., can solve the problem of high cost of trusted computing resources, and achieve the effect of improving utilization and realizing trusted computing services.

Active Publication Date: 2021-04-02
MASSCLOUDS +2
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, trusted computing has become one of the requirements for information system planning and construction, and the cost of building or transforming trusted computing resources based on existing trusted computing solutions is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted cloud-based large-scale computing service configuration method and system
  • Trusted cloud-based large-scale computing service configuration method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] The purpose of this embodiment is to provide a large-scale computing service configuration method based on trusted cloud.

[0035] Such as figure 2 As shown, a large-scale computing service configuration method based on trusted cloud, including:

[0036] A computing service network is defined in advance, the computing service network includes several computing nodes, and a trusted computing node is set in the computing nodes as a source node of computing services;

[0037] The source node queries idle computing nodes and transmits computing containers to them;

[0038] After the idle computing node receives the computing container, it starts the computing container through the virtual root of trust; the source node and all the computing containers that have been started form a flexibly scalable trusted cloud;

[0039] Based on the parallel computing working framework, the source node decomposes the computing task into several subtasks, assigns the subtasks to the com...

Embodiment 2

[0047] The purpose of this embodiment is to provide a large-scale computing service system based on a trusted cloud.

[0048] A trusted cloud-based large-scale computing service configuration system, including:

[0049] The computing service network determination module is configured to predefine a computing service network, the computing service network includes several computing nodes, and a trusted computing node is set in the computing nodes as a source node of computing services;

[0050] The trusted cloud building module is configured such that the source node queries an idle computing node and transmits a computing container to it; after receiving the computing container, the idle computing node starts the computing container through a virtual trusted root; the source node and All started-up computing containers form a flexible and scalable trusted cloud;

[0051] The task computing module is configured such that the source node decomposes the computing task into sever...

Embodiment 3

[0053] The purpose of this embodiment is to provide an electronic device.

[0054] An electronic device, including a memory, a processor, and a computer program stored and run on the memory, when the processor executes the program, the method for configuring a trusted cloud-based large-scale computing service is implemented, including:

[0055] A computing service network is defined in advance, the computing service network includes several computing nodes, and a trusted computing node is set in the computing nodes as a source node of computing services;

[0056] The source node queries idle computing nodes and transmits computing containers to them;

[0057] After the idle computing node receives the computing container, it starts the computing container through the virtual root of trust; the source node and all the computing containers that have been started form a flexibly scalable trusted cloud;

[0058] Based on the parallel computing working framework, the source node d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a trusted cloud-based large-scale computing service configuration method and a system. The method comprises the steps: a computing service network is defined in advance, the computing service network is enabled to comprise a plurality of computing nodes, and one trusted computing node is enabled to be arranged in each computing node and serve as a source node of a computingservice; the source node queries an idle computing node and transmits a computing container to the idle computing node; after the idle computing node receives the computing container, the computing container is started through the virtual trusted root, wherein the source node and all started computing containers form a credible cloud which can be flexibly expanded; and the source node decomposes acomputing task into a plurality of sub-tasks based on a parallel computing work framework, allocates the sub-tasks to a computing container in the computing service network, and completes the computing task. By utilizing a large number of idle computing nodes which do not realize trusted computing in the network, large-scale trusted computing service is realized, and the utilization rate of computing resources in the network is effectively improved.

Description

technical field [0001] The present disclosure relates to the technical field of information security trusted computing, and in particular to a trusted cloud-based large-scale computing service configuration method and system. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] At present, trusted computing has become one of the requirements for information system planning and construction, and the cost of building or transforming trusted computing resources based on existing trusted computing solutions is relatively high. [0004] The inventors found that in the actual network, there are a large number of computing nodes that have not yet implemented trusted computing. These nodes are not always in the working state, and at some point a large number of nodes are in the idle state, resulting in a waste of a large amount of computing resources;...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F9/455
CPCG06F21/57G06F9/45558
Inventor 吴瑞王进张辉刘春李峰郎铁山
Owner MASSCLOUDS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products