期刊文献+

基于滚动优化的密码云实时任务阈值调度方法 被引量:5

Real-time task threshold scheduling method for cryptography cloud based on rolling optimization
下载PDF
导出
摘要 针对当前云任务调度算法在密码云环境中无法实现任务实时处理的问题,提出一种基于滚动优化窗口的实时阈值调度方法。首先,将密钥调用环节融入密码任务流程中,提出一种密码云服务架构;其次,为实现任务的实时调度,构建基于滚动窗口的密码任务调度器模型和吞吐量分析模型,用于获得实时的吞吐量数据;最后,为满足云租户对高速密码服务的客观需求,提出吞吐量阈值调度算法,从而根据实时吞吐量相对于吞吐量阈值的变化情况实时迁移虚拟密码机。仿真结果表明,该方法与未采用滚动优化窗口或虚拟机迁移技术的方法相比,具有任务完成时间短、CPU占用率低的特点,且实时吞吐量能够持续保持在网络带宽的70%~85%,从而验证了其在密码云环境中的有效性和实时性。 Since the current cloud task scheduling algorithm in the cryptography cloud environment cannot achieve the target that tasks are processed in real-time, a real-time threshold scheduling method based on rolling optimization window was proposed. Firstly, a cryptography cloud service architecture was given by integrating the link of key calling into the process of cryptographic task; secondly, to realize real-time scheduling, a eryptographic task scheduler model based on the rolling window and a throughput analysis model which was used to obtain the real-time throughput data were established; finally, to meet the objective needs of high-speed cryptographic service for cloud tenants, a throughput threshold scheduling algorithm was proposed, which migrates virtual cipher machine in real-time according to the changes of real-time throughput relative to throughput threshold. The simulation results show that compared with the method without the roiling optimization window or virtual machine migration technology, the proposed method has characteristics of shorter task completion time and lower CPU utility, meanwhile the real-time throughput of it can be continuously kept in 70% - 85% of the network bandwidth, thus verifying its effectiveness and real-time performance in the cryptography cloud environment.
机构地区 信息工程大学
出处 《计算机应用》 CSCD 北大核心 2017年第10期2780-2786,共7页 journal of Computer Applications
基金 国家重点研发计划项目(2016YFB0501900)~~
关键词 密码云 任务调度 滚动优化 吞吐量 阈值 cryptography cloud task scheduling rolling optimization throughput threshold
  • 相关文献

参考文献5

二级参考文献53

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2Amzon, Amazon elastic compute cloud [EB/OL]. [2011-04-15]. http://aws. amazon. com/ec2/. 被引量:1
  • 3IBM. IBM blue cloud solution [EB/OL]. [2011-05-20]. http:// www-900.ibm. com/ibm/ideasfromibm/cn/cloud/solutions/index. shtml. 被引量:1
  • 4SUN. Cloud architecture introduction white paper [EB/OL].[2011-05-13]. http://developers. sun. com. cn/blog/functionalca/ resource/sun_353 cloudcomputing_chinese. pdf. 被引量:1
  • 5LEMON S. Cloud computing not secure enough [EB/OL]. [2011- 05-10]. http//www. Cio. com/article/. 被引量:1
  • 6HEISER J, NICOLETT M. Assessing the security risks of cloud computing [ EB/OL]. [2011-03-25]. http://www. gartner.com/DisplayDocument? id = 685308. 被引量:1
  • 7SANTOS N, GUMMADI K P, RODRIGUES R. Towards trusted cloud computing [C]//HotCloud'09: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing. Berkeley: USENIX Association, 2009:1-5. 被引量:1
  • 8CALHEIROS R N, RANJAN R, de ROSE C A F, et al. CloudSim: A novel framework for modeling and simulation of cloud computing infrastructures and services [R]. Melbourne: University of Melbourne, 2009. 被引量:1
  • 9Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems, 2009,57(3):599-616. [doi: 10.1016/j.future.2008.12. 001]. 被引量:1
  • 10Dastjerdi AV, Tabatabaei SGH, Buyya R. A dependency-aware ontology-based approach for deploying service level agreement monitoring services in cloud. Software-Practice and Experience, 2012,42(4):501-518. [doi: 10.1002/spe.l 104]. 被引量:1

共引文献30

同被引文献30

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部