Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cloud security computing method and device based on cloud fault-tolerant technology, and storage medium

A fault-tolerant technology and computing method technology, applied in the field of cloud security computing method and device, storage medium, to achieve the effect of rapid restart, easy migration and deployment

Active Publication Date: 2022-07-29
BEIJING JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a secure computing method, device and storage medium based on cloud fault-tolerant technology, so as to overcome the technical problems faced by the existing cloud computing platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security computing method and device based on cloud fault-tolerant technology, and storage medium
  • Cloud security computing method and device based on cloud fault-tolerant technology, and storage medium
  • Cloud security computing method and device based on cloud fault-tolerant technology, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] like figure 1 As shown, the implementation of the present invention provides a cloud security computing method based on cloud fault tolerance, comprising the following steps:

[0044] Step S1, the management node adopts a master-multi-slave fault-tolerant architecture, and uses KeepAlived and Haproxy to implement self-checking of management node survival and load balancing of user requests;

[0045] In step S2, the business node adopts a dynamic redundant fault-tolerant security design to maintain the life cycle of the application microservice, and the business node feeds back survival information to the management node in real time through the heartbeat;

[0046] Among them, the application microservices report the life cycle to the management node based on the probe mechanism, and the application microservices exchange input and output information through redundant voting.

[0047] The computing method of this embodiment can optimize the traditional cloud computing m...

Embodiment 2

[0078] The present invention also provides a cloud security computing device based on cloud fault-tolerant technology, including:

[0079] Management fault-tolerant module, which is used for management nodes to adopt a master-multi-slave fault-tolerant architecture, and uses KeepAlived and Haproxy to achieve self-check of management node survival and load balancing of user requests;

[0080] The application fault-tolerant module is used for business nodes to adopt dynamic redundant fault-tolerant security design to maintain the life cycle of application microservices, and business nodes feed back survival information to management nodes in real time through heartbeat;

[0081] Among them, the application microservice reports the life cycle to the management node based on the probe mechanism, and the application microservice exchanges input and output information through redundant voting.

Embodiment 3

[0083] The present invention also provides a storage medium, where the storage medium stores machine-executable instructions, and when the machine-executable instructions are invoked and executed by a processor, the machine-executable instructions cause the processor to implement cloud-based fault tolerance Technology's cloud security meter approach.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cloud security computing method and device based on a cloud fault-tolerant technology, and a storage medium, and the method comprises the steps: S1, enabling a management node to employ a master multi-slave fault-tolerant architecture, and achieving the survival self-inspection of the management node and the load balance of a user request through the KeepAlived and the HaProxy; s2, the service node adopts a dynamic redundant fault-tolerant security design to maintain an application micro-service life cycle, and the service node feeds back survival information to the management node in real time through heartbeat; wherein the application micro-services report life cycles to the management node based on a probe mechanism, and input and output information is exchanged among the application micro-services through redundancy voting. By adopting the technical scheme of the invention, the availability and reliability of a traditional cloud computing platform or a cloud computing-based service are effectively improved, and the reliability and stability of each cloud computing-based industrial control system can be further improved.

Description

technical field [0001] The invention belongs to the field of electrified transportation, and particularly relates to a cloud security computing method and device and a storage medium based on cloud fault-tolerant technology. Background technique [0002] As an innovative service mode of information technology, cloud computing is a mode of delivery and use of IT infrastructure, because it can provide corresponding infrastructure resources according to user needs, and users "pay on demand" to use corresponding resources and widely used Applied in all walks of life. Cloud computing has the characteristics of ultra-large scale, virtualization, high availability, versatility, high scalability, and on-demand services, which can greatly improve the utilization efficiency of existing resources. With the advantages of unified deployment of business applications and centralized data management, cloud computing undertakes core management and application services in many industrial con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L67/10H04L67/1001H04L67/1095H04L67/1097H04L67/51H04L43/10H04L41/0663H04L41/06H04L9/40G06F9/455
CPCH04L67/10H04L63/20H04L67/1095H04L67/1097H04L41/06H04L43/10H04L41/0663G06F9/45558G06F2009/4557G06F2009/45591G06F11/181G06F11/182G06F11/203G06F2201/815G06F11/3006G06F11/1484G06F9/45545G06F2009/45587
Inventor 朱力李松唐涛王悉王洪伟文韬
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products