CN104683394A - Cloud computing platform database benchmark test system for new technology and method thereof - Google Patents

Cloud computing platform database benchmark test system for new technology and method thereof Download PDF

Info

Publication number
CN104683394A
CN104683394A CN201310617082.XA CN201310617082A CN104683394A CN 104683394 A CN104683394 A CN 104683394A CN 201310617082 A CN201310617082 A CN 201310617082A CN 104683394 A CN104683394 A CN 104683394A
Authority
CN
China
Prior art keywords
service
cloud
cloud computing
manufacturing
technology
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310617082.XA
Other languages
Chinese (zh)
Inventor
徐幼娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mo Yu Electronic Science And Technology Co Ltd
Original Assignee
Shanghai Mo Yu Electronic Science And Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mo Yu Electronic Science And Technology Co Ltd filed Critical Shanghai Mo Yu Electronic Science And Technology Co Ltd
Priority to CN201310617082.XA priority Critical patent/CN104683394A/en
Publication of CN104683394A publication Critical patent/CN104683394A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/024Standardisation; Integration using relational databases for representation of network management data, e.g. managing via structured query language [SQL]

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a cloud computing platform database benchmark test system for a new technology and a method thereof. Abstraction and mapping from physical resources to application services are realized by means of resource virtualization; the static attributes, dynamic attributes, behavior attributes and deployment configuration information of the physical resources are described; and a virtual resource encapsulation assembly having a general interface is constructed. In a resource virtualization process, the problems of how to describing, how to encapsulating, how to deploying, how to managing, how to perform communication and the like of different types of manufacturing resources need to be solved.

Description

The cloud computing platform database Benchmark test system of new technology and method thereof
the cloud computing platform database Benchmark test system of new technology of the present invention and method thereof belong to telecommunications field.
Cloud security " (CloudSecurity) Core Feature of planning.Automatic detection the Newman extracted in computer takes Rising by the hand
Suspicious wooden horse sample, and upload to Rising's " wooden horse/Malware automatic analysis system " (RsAutomatedMalwareAnalyzer, be called for short RsAMA), RsAMA will feed back to user analysis result subsequently, checking and killing Trojan virus, and by " Rising's security document storehouse " (RisingSecurityDatabase is called for short RsSD), be shared with other all " Rising's card card 6.0 " users.
Strengthen function vulnerability scanning
The vulnerability scanning engine of the brand-new exploitation of application, Intelligent Measurement Windows system vulnerability, third-party application software vulnerability and associated safety are arranged, and help user to repair.User also according to setting, can realize the automatic reparation of above-mentioned leak, simplifies the operation of user, helps user to make up potential safety hazard in the very first time more timely simultaneously.
Powerful reparation
For the Operation system setting be destroyed by the virus, as IE browser homepage is changed, often jumps to the phenomenons such as advertiser website, card card assistant can repair registration table, Operation system setting and host file, makes computer recover normal.
Enter to open management
Help user effectively to manage the driving in computer, start shooting self-starting software, browser plug-in etc., effectively can improve the operational efficiency of user computer.
Upgrade kit collection
For skilled computer user, card card Internet security aid 6.0 provides comprehensive utility function: cleaning garbage files, the management of system startup item, Service Management, networking program management, LSP reparation, file are pulverized and special anti-virus tool.
Seven monitor greatly
Card card Internet security aid 6.0, has automatic on-line diagnosis, USB flash disk virus immunity, automatically repair system leak, wooden horse behavior judges protect with interception, objectionable website, the anti-pierced wall of IE and wooden horse download interception 7 monitoring system greatly.Comprehensive unlatching protection user computer safety.
Example of security ESET NOD32
Come from the ESET NOD32 of Slovakia as far back as 2006, just in its high-level heuristics engine, have employed this technology, be referred to as ThreatSense early warning system, and applied for patent.Subscriber computer is as the node of in ESET cloud, and ESET can understand by ThreatSense early warning system the situation that user installation uses software.When antivirus engine finds that certain software is very suspicious, but when being not enough to assert that it is virus, ThreatSense will collect the relevant information of software, and with central server swap date, central server just can make feedback rapidly accurately by all data collected.
Jinshan anti-virus software
Jinshan anti-virus software " cloud security " is the Security Architecture of the whole network defence of the new technology that the security situation in order to solve the Internet sternness after wooden horse commercialization is arisen at the historic moment.It comprises intelligent client, concentrating type service end and open platform three levels." cloud security " is strengthening on existing antivirus techniques basis and supplement, and the user Internet era that final purpose being to allow can obtain sooner, more fully safeguard protection.
First the SmartClient of stability and high efficiency; it can be independently safety product; also can as the security component integrated with other products, such as Jinshan anti-virus software 2012 and security centre of Baidu etc., it is that whole cloud security system provides sample collection and threatens the basic function processed; The Jinshan anti-virus software 2011 that Kingsoft was released in 2010, software volume too fat to move before changing, greatly reduces resource occupation, and Consumer's Experience is leaped.
Secondly the support of service end, it comprises distributed mass data storage center, the safety analysis service of specialty and the intellectual analysis digging technology of Security Trend, simultaneously it and client cooperation, for user provides cloud security service;
Finally, cloud security is based on an open safety service platform, and it is that third party's security cooperation partner provides the platform support with virus countermeasure.Jinshan anti-virus software cloud security both provided security service for third party's security cooperation buddy subscriber, again by setting up the whole network defense system with third party's security cooperation partners cooperation.Make each user participate in the whole network defense system, run into virus and also will no longer fight a lone battle.
1. can support the mercury platform that Massive Sample stores and calculates
2. the Internet authentic authentication service
3. crawler system
Trend Micro
The large trump card of Trend Micro SecureCloud cloud security 6:
1.Web reputation service
By one of territory credit database that the whole world is maximum, the change of the Website page that the Web reputation service of Trend Micro finds according to Malware behavioural analysis, historical position and suspicious activity sign etc. are because usually specifying prestige mark, thus the confidence level of tracking webpage.Then will continue scans web sites by this technology and prevent user from accessing infected website.In order to improve accuracy, reduce rate of false alarm, Trend Micro Web reputation service is that the particular webpage of website or link specify reputation score, instead of whole website classified or tackles because usually legitimate site only some is under attack, and prestige can change in time and constantly.
By the comparison of reputation score, some websites potential risks rank just can be known.When user's access has the website of potential risk, just can obtain system alert or prevention in time, thus help user to confirm the fail safe of targeted website rapidly.By Web reputation service, can preventing malice program source.Because the strick precaution of attacking zero day is credibility based on website instead of real content, therefore can the initial download of effective preventing malicious software, user enters that network is front just can obtain protective capacities.
2. Email reputation service
The credit database that the Email reputation service of Trend Micro is originated according to known spam checks IP address, utilizes simultaneously and can the dynamic Service of real-time assessment Email senders prestige verify IP address.Prestige scoring is in addition refinement by constantly analyzing " behavior ", " scope of activities " of IP address and former history.According to the IP address of sender, namely malicious e-mail is blocked in cloud, thus prevents the web such as corpse or Botnet from threatening the computer arriving network or user.
3. file reputation service
Present Trend Micro's cloud security will comprise file reputation service technology, and it can check the prestige of each file being positioned at end points, server or gateway.The foundation checked comprises known optimum lists of documents and known pernicious lists of documents, i.e. present so-called anti-virus condition code.It is minimum that high performance content distributing network and locally buffered server will guarantee in checking process, to be dropped to time of delay.Because fallacious message is stored in cloud, all users in network therefore can be arrived immediately.And, compare with the traditional anti-virus condition code file download taking end points space, this method reduces end points internal memory and system consumption.
4. behavior related analysis technology
Trend Micro's cloud security utilizes " correlation technique " of behavioural analysis that threat activity is comprehensively connected, and determines whether it belongs to malicious act.The single activity that Web threatens seems do not have what harm, but if carry out multinomial activity simultaneously, so just may cause malice result.Therefore to need according to heuristic viewpoint to judge whether that physical presence threatens, the correlation between the different assembly of potential threat can be checked.By the different piece threatened is associated and constantly updates its threat data storehouse, make Trend Micro obtain outstanding advantage, namely can make response in real time, threaten to provide for Email and Web and protect in time, automatically.
5. automatic feedback mechanism
Another significant components of Trend Micro's cloud security is exactly automatic feedback mechanism, realizes uninterrupted communication in two-way renewal stream mode at the product of Trend Micro and between the round-the-clock threat study center of company and technology.By checking that the route prestige of single client determines various novel threat; " neighbourhood's supervision " mode that the function of Trend Micro's global automatic feedback mechanism widely adopts the spitting image of present a lot of communities; realize real-time detection and " jointly intelligence " protection timely, will contribute to establishing comprehensive latest threat index.Often kind of new threat that the conventional prestige inspection of single client finds all can upgrade all threat data storehouses that Trend Micro is positioned at all parts of the world automatically, prevents later client from running into the threat had been found that.
6. threat information gathers
From the research of the U.S., Philippine, Japan, France, Germany and the ground researcher such as Chinese by the feedback of supplementary Trend Micro with submit content to.At Trend Micro's anti-virus research and development and technical support centre TrendLabs, the employee of various language will provide real-time response, the round-the-clock threat monitoring of 24/7 and attack defending, to detect, to prevent and to remove attack.
The various technology of Trend Micro's integrated application and Data Collection mode---comprise " honey jar ", new Web Crawler, client and the submission of affiliate's content, feedback loop and TrendLabs threat study---, and Trend Micro can obtain the various information about latest threat.By the malware data storehouse in Trend Micro's cloud security and TrendLabs research, service and support center analyzes threat data.
This base of kappa
The global function security protection of this base of kappa is intended to for internet information builds a seamless transparent security system:
1., for the information security threats that type in internet environment is various, Card Buskie laboratory for core, based on Integration ofTechnology, achieves the function hardware and software platform of information security software with anti-malware engine.The Core Features such as system safety, safety on line, information filtering and anti-malware can realize unified, orderly and three-dimensional Prevention-Security on the platform of global function fail-safe software, instead of hash that the is dissimilar and product of function;
2. under the support of powerful backstage technical Analysis ability and online transparent interaction pattern, this base global function fail-safe software 2009 of kappa can be collected online when user " knows the inside story and agrees to (Awareness & Approval) ", analyze the rogue program sample such as suspicious virus and wooden horse in (OnlineRealtimeCollecting & Analysing) subscriber computer, and carries out user's distribution (InstantSolutionDistribution) by the global anti-virus database of average renewal per hour 1 time.Thus " this base secure network of kappa " that the online collection of the rogue programs such as realization virus and wooden horse, instant analysis and solution are distributed online, i.e. " cloud security " technology.This base global function fail-safe software 2009 of kappa is by " this base secure network of kappa ", " cloud security " technology is applied to numerous computer users pellucidly, this base of kappa user in the whole world is made to constitute the Prevention-Security net that has superelevation intelligence, immunity can be produced in the very first time to new threat, stop the infringement of security threat." this base secure network of kappa " have passed through the long-term research and development of Card Buskie laboratory and test, has high stability and maturity.Therefore, can take the lead in the product of the formal version of global function fail-safe software 2009 directly for user provides service.
3. realize user by the service system of flattening to dock with the zero distance on technology backstage.This base of kappa has world-leading rogue program sample center and rogue program analysis platform, and the anti-virus database of renewal per hour can ensure that the Prevention-Security ability of subscriber computer is docked with the zero distance on technology backstage.In the defense system of the global function safety of this base of kappa, all users are the active participate person of internet security and the instant beneficiary of safe practice innovation.
Cloud security scanner
Singular point scanner
The comprehensive vulnerability detection system of singular point cloud security is first degree of depth safety estimation system based on APT intrusion detection pattern of the whole world, be devoted to the application safety test under web2.0 and the comprehensive scanning analysis of network station leakage, the security sweep strategy of its efficiently and accurately, user can be allowed easily to find, and leak threatens, for safety manager also provides the vulnerability scanning form of specialty in detail.The comprehensive Hole Detection service of web server covers nearly all vulnerability of application program of the internal authority WSO such as CVE, packetstorm, OWASP, WebAppSec and domestic and international safe community definition, goes for external server Hole Detection.
Find WEB application server security leak;
Find network station leakage;
Overseas VPN intrusion detection server can be supported, can solve external or shield the problem that cannot scan website;
Support conventional detection vulnerability model and intelligent Liquid penetrant testing model
Support simple mode (single domain name) batch mode (multiple domain name), rapid scanning, depth scan 4 kinds of patterns;
Specialty, clear, visual form accurately;
Support is more than 500 kinds of inspection policies, and tens of kinds of logics infiltration invasion detect lines are, can the leak that exists of accurate scanning website.
Support intelligent Liquid penetrant testing model, comprise 0day and upgrade detection, leak combines, the Hole Detection such as Google hacking reptile
Superpower leak analysis ability
The two-channel intelligent detection model of original creation, not only supports the detection of conventional leak, and has intelligent Liquid penetrant testing model.
First is separately for the professional detection model of domestic and international common mailing system, forum, blog, web editing machine.
Support that cookies Entered state gos deep into measuring ability
Be integrated with JavaScript intelligently parsing engine, to malicious code, the cross site scripting leak of DOM type and the redirect Hole Detection of any page more accurate.
Shirtsleeve operation step, specialty can be customized scaling option, high-quality invasion safety detection can be completed easily
McAfee
Famous security firm McAfee announces, will release the safety system Artemis based on cloud computing.This system can protection calculation machine from the infringement of virus, wooden horse or other security threats.
Under McAfee, the researcher of AvertLabs represents, this system can shorten the time of collection, detection of malicious software, and configures the time of whole solution.
Along with the development of safety system, this time reduces to a few hours from several days in the past, drops to again " several milliseconds " at present.
AvertLabs security study and communication supervisor DaveMarcus represent: " Artemis system management window, all activities of enterprise customer are all carried out in this window, and this window will continual analysis with or without Malware.The object of Artemis is to make time minimum used."
Conventional security system uses threat signature database to manage malware information, and as a cloud computing service, Artemis just can react to threat before signature file is not yet issued.
Marcus represents, the every weekly assembly of AvertLabs researcher finds up to ten thousand new signature files.If user computer is equipped with Artemis system, so once computer is detected there is apocrypha, so can at once with McAfee server contact, to determine that whether apocrypha is malice.By this mode, McAfee can also utilize collected data to provide the security solution of customization for enterprise.
Expert represents, Artemis can provide real-time safeguard protection.And in traditional safety system based on signature, find security threat and take often life period delay between safeguard measure.
IDC safety product head of research CharlesKolodgy represents: " traditional malware detection mode Shortcomings based on signature.Along with the change of user behavior, security threat is also in change, and malware detection techniques does not keep synchronized development in general.”
Rising's white paper
" cloud security " (CloudSecurity) plans: user be closely connected by the Internet with Rising technology platform, form a huge wooden horse/Malware monitoring, killing network, each " Rising's card card 6.0 " user does one's bit for " cloud security " (CloudSecurity) plan, shares the security effort of other all users simultaneously.
" automatic on-line diagnosis " module of " Rising's card card 6.0 ", it is one of " cloud security " (CloudSecurity) core of planning, whenever user starts computer, this module all automatically can detect and extract the suspicious wooden horse sample in computer, and upload to Rising's " wooden horse/Malware automatic analysis system " (RsAutomatedMalwareAnalyzer, be called for short RsAMA), whole process only needs a few second.RsAMA will feed back to user analysis result subsequently, checking and killing Trojan virus, and by " Rising's security document storehouse " (RisingSecurityDatabase is called for short RsSD), be shared with other all " Rising's card card 6.0 " users.
Because this process is all by the Internet and through procedure auto-control, user can be improved to the full extent to wooden horse and viral prevention ability.Ideally, from a Trojan for stealing numbers from attack certain computer, to whole " cloud security " (CloudSecurity) network, immunity, killing ability are had to it, only need the time of several seconds.
Although the trojan horse sample collected every day has 8 ~ 100,000, but the automatic analysis system of Rising can be classified automatically according to the mutation group of trojan horse, and " variant virus family Feature Extraction Technology " is utilized the feature of each mutation group to be extracted respectively.Like this, after carrying out Automatic analysis to tens thousand of new trojan horses, the real new trojan horse sample of real manual analysis that needs only has hundreds of.
Jiangmin Sci and Tech
The extensive feature database built in cloud mode is not sufficient to tackle increasing rapidly of security threat; domestic and international virus killing manufacturer also needs in the core antivirus technique foot time up and down; the such as unknown virus precautionary technology such as virtual machine, heuristic, sandbox, intelligent Initiative Defense all needs to strengthen and development, and the self-protection ability of most antivirus software itself also needs reinforcement.It is fast again that virus increases, the just change of amount, and in the middle of reality, bring about great losses, and but only a few applies the malignant virus of new virus technology often.
Power just can be showed in the basis that " cloud security " must be based upon core technologies such as " kernel level self-protection " " sandbox " " virtual machines "; there is no these core technologies; the embarrassment that antivirus software just may occur in face of virus " having a heart but no strength "; many antivirus software scanning discoveries virus in reality; unable removing, even instead be can be found everywhere by the phenomenon that virus is closed.This is also why Jiang Min is when releasing KV2009, and first it is emphasised that core technologies such as " sandbox " " kernel level self-protections " " intelligent Initiative Defense " " virtual machine ", and " cloud security " toxicological operation protective system comes reason below.Killing virus the same with other industry, is first that basis is enough powerful, and basis is unsturdy, and it is high more also not firm that building is built.
" sandbox " is the system kernel level technology of the more deep layer of new technology, all be not quite similar in know-why or in the form of expression with " virtual machine ", " sandbox " can take over the behavior of viral calling interface or function, and rollback mechanism can be carried out after confirming as virus behavior, allow system reset, and " virtual machine " does not have rollback recovery mechanisms, after challenge virus, virtual machine can be judged as YES a certain viroid according to the behavioural characteristic of virus, and call engine this virus is removed, be essentially different between the two.In fact, when tackling new virus invasion, the KV2009 applying " sandbox " has started to have played powerful effect.There is user in the various real-time monitoring of closedown river people KV2009 antivirus software, only open " Initiative Defense of band Sandboxing " pattern, after result runs " mopping up ripple " new virus, all behaviors of virus are blocked and erase, and have no chance to leave any vestige in systems in which.
The main problem that current anti-virus faces is the technological challenge of driving virus to antivirus software.Therefore, current anti-microbial top priority promotes anti-virus core technology further, under the prerequisite guaranteeing antivirus techniques, fully by the fast fast response mechanism of " cloud security " toxicological operation protective system, make the dual safety security system that " cloud security " adds " sandbox ".
The problem high in the clouds problem of cloud security
Cloud computing safe seven crimes cloud security alliance and Hewlett-Packard list the seven crimes of cloud computing jointly, mainly based on to the investigation result of 29 enterprises, technology suppliers and consulting firm and the conclusion drawn. 
1. loss of data/leakage: be not very good to the security control dynamics of data in cloud computing, API Access Permissions control and secret generating, store and management aspect deficiency all may cause data leak, and necessary data destroying policy may be lacked. 
2. technology of sharing leak: in cloud computing, simple error configurations all may cause and have a strong impact on, because a lot of virtual servers in cloud computing environment share identical configuration, be therefore necessary for network and server configuration performs service level agreement (SLA) to guarantee to install in time repair procedure and to implement best practice. 
3. hidden traitor: cloud computing service supplier may be different with the control dynamics of business data access rights to the background check dynamics of staff, a lot of supplier does well in this respect, but and not, enterprise needs to assess supplier and proposes how to screen the scheme of employee. 
4. account, service and communication hijack: a lot of data, application program and resource all concentrate in cloud computing, if and the Authentication mechanism of cloud computing is very weak, invader just easily can obtain user account number and log in the virtual machine of client, therefore this threat is initiatively monitored in suggestion, and adopts dual factors Authentication mechanism. 
5. unsafe application programming interfaces: in developing application, as new platform must be regarded cloud computing by enterprise, instead of outsourcing.In the life cycle of application program, must dispose strict review process, developer can use some criterion to process authentication, access privilege control and encryption.6. correctly do not use cloud computing: in application technology, hacker may be more progressive than technical staff faster, and hacker usually can dispose rapidly new attack technology and freely walk in cloud computing. 
7. the risk of the unknown: clarity issues annoyings cloud service supplier always, and account user only uses front-end interface, they do not know that their supplier uses which kind of platform or reparation level.
Client-side issue
For the customer, cloud security has the worry of network facet.Have some anti-viral softwares after suspension, performance declines greatly.And be also no lack of such situation in the middle of practical application.Due to viral subversive, the factors such as network environment, once go wrong on network, cloud has just become burden on the contrary, has helped to fall.
Settling mode
Recent " mixed cloud " technology having occurred new technology, combines publicly-owned cloud with privately owned cloud, has both played the advantage that publicly-owned cloud customer volume is large, remains again local data capability, combines tradition and the advantage of new technology, solves many application problems. 
Cloud computing---at least as the extension of virtualized new technology, coverage is increasing.But current cloud computing can't support complicated corporate environment.Therefore cloud computing framework is ready to appear, and experience shows, before cloud computing moves to maturity, we more should the details of attention location system cloud computing framework.Based on to the analysis of more existing cloud computing products and some experiences of individual, sum up a set of cloud computing framework, cloud computing framework mainly can be divided into four layers.The framework layer display layer of cloud computing
This layer of most data centers cloud computing framework is mainly used for representing content needed for user and service experience in the mode of close friend, and can use the many services that middleware layer below provides, and mainly contains five kinds of technology:
HTML: the Web page technology of standard, now main based on HTML4, but the HTML5 that will release can promote the development of Web page in a lot, the such as aspect such as video [1] and this locality storage.
JavaScript: the dynamic language for Web page of new technology, by JavaScript, greatly can enrich the function of Web page, and creates the dynamic page having more interactivity in order to the AJAX based on JavaScript.
CSS: be mainly used in the outward appearance controlling Web page, and can make to be separated grazioso between the content of the page with its form of expression.
Flash [2]: RIA (the Rich Internet Applications) technology that industry is the most frequently used, the richness application of the sing on web that can the technology such as HTML be provided to provide in present stage, and in Consumer's Experience [3], very well.
Silverlight: from the RIA technology of industry giant Microsoft [4], although its present occupation rate of market is slightly poorer than Flash, because it can use C# [5] to programme, so very friendly to developer.
Intermediate layer
This layer is formed a connecting link, its infrastructure layer below provide on the basis of resource and provide many services, such as buffer service and REST service etc., and namely these services can be used for supporting display layer, also can directly allow user call, and mainly contain five kinds of technology:
REST: by REST technology, can be supplied to caller by the partial service that middleware layer supports very convenient and grazioso.
Many tenants: an independent application example can be allowed exactly to be multiple organization service, and keep good isolation and fail safe, and by this technology, effectively can reduce purchasing and maintenance cost of application.
Parallel processing: in order to process the data of magnanimity, need to utilize huge X86 cluster to carry out huge parallel processing, the MapReduce of Google is the work of the representative of this respect.
Application server: for optimization has to a certain degree been done in cloud computing on the basis of original application server, such as the Jetty application server of Google App Engine.
Distributed caching: by distributed caching technology, effectively can not only reduce the pressure to background server, and can also accelerate corresponding reaction speed, and foremost distributed caching example is no more than Memcached.
Infrastructure layer
This layer of effect is for preparing the resources such as calculating needed for it and storage to middleware layer above or user, mainly contains four kinds of technology:
Virtual: " the many tenants " that be also appreciated that facility layer based on it, because pass through Intel Virtualization Technology, multiple virtual machine can be generated on a physical server, and comprehensively isolation can be realized between these virtual machines, the acquisition cost of server can not only be lowered like this, and the O&M cost of server can also be reduced, the ESX that ripe X86 Intel Virtualization Technology has VMware and the Xen increased income simultaneously.
Distributed storage: in order to carry the data of magnanimity, also will ensure the manageability of these data, so need a whole set of distributed storage system simultaneously.
Relevant database: be done the optimization in expansion and management etc. on the basis of original relevant database substantially, make it adapt at Yun Zhonggeng.
NoSQL: in order to meet the target that some relational databases cannot meet, such as support the data etc. of magnanimity, it is not database based on relational model that some companies specially design a collection of.
Management level
This layer is for three layers of transverse direction service, and gives these three layers to provide the multiple technology aspect such as administering and maintaining, and mainly contains these six aspects below:
Account Administration: by good Account Administration technology, can log in facilitating user under secure conditions, and facilitates keeper to the management of account number.
SLA monitors: to the virtual machine of operation at all levels, and the monitoring of aspect of performance is carried out in service and application etc., can run to make them when meeting SLA (Service Level Agreement) preset.
Accounting management: namely add up the resource etc. that each user consumes, asks for expense to user exactly.
Safety management: to data, application and IT [6] resource such as account number are taked to protect all sidedly, make it from the infringement of offender and rogue program.
Load balancing: deal with emergency case by traffic distribution being given the Multi-instance of an application or service.
Operation management: mainly make O&M operate specialty and automation as much as possible, thus reduce the O&M cost of cloud computing center.
Cloud computing framework wherein has three layers to be horizontal, display layer, middleware layer and infrastructure layer respectively, very abundant cloud computing ability and friendly user interface can be provided by this three-layer technology, cloud computing framework also has one deck to be longitudinal, being called management level, is to administer and maintain horizontal three layers and exist better.[1]
Cloud computing defines
The computation schema of new technology: IT resource, data, application are supplied to user (IBM) as service by network
The architecture management method opinion of new technology: virtualized for a large amount of height resource management is got up, forms a large resource pool, and being used for unifiedly provides service (IBM)
By disclosed standard and service based on, centered by the Internet, provide safety, fast, easily data store and network calculations service (Google)
The technology that cloud computing uses
The cloud computing platform of Google and application
Distributed file system (Google File System)
MapReduce programming mode
Distributed lock mechanism Chubby
Distributed data base BigTable
The blue cloud computing platform of IBM
The use of virtual machine
Storage organization
Along with the adjustment of China's economic structure and the transformation of Economic Development Mode, manufacturing industry is faced with unprecedented opportunities and challenge, in the urgent need to improving the core competitiveness of manufacturing enterprise.The service manufactured, Knowledge based engineering innovation ability, and to the polymerization of all kinds of manufacturing recourses and cooperative ability, friendly to environment, become the trend of key element and the manufacturing informatization development forming enterprise competitiveness.
 
Namely cloud manufacture is under this trend, used for reference existing information technology, manufacturing technology being merged mutually with the emerging technology such as cloud computing, Internet of Things of new technology that cloud computing thought grows up, unified intelligent management and operation are carried out to all kinds of manufacturing recourses, for all kinds of manufacturing activities manufactured in lifecycle process provide can obtain at any time, use as required, the net instrument new model of service that is safe and reliable, high-quality cheapness.
 
For the medium-sized and small enterprises accounting for enterprise's sum 99%, cloud manufacture is by vitalizing social manufacturing recourses storage, distributing rationally, and in order to solve, its machinery equipment generally faced is old, the level of production is not high, technical capability is not enough, the low inferior problem of management level proposes new thinking.
 
The service that 1 cloud manufactures
The type of 1.1 Service Sources
What cloud computing was shared is computational resource, and software, platform and infrastructure are 3 kinds of exemplary service resources of cloud computing.Cloud manufacture is then share all kinds of manufacturing recourses (software, hardware, manpower).
 
(1) the hard manufacturing recourses that provides in the form of hardware of hardware resource, comprises all kinds of instrument and equipments such as the process equipment such as lathe, machining center, test detecting equipment, emulator, computing equipment;
(2) the soft manufacturing recourses that provides with forms such as software, database, model library, information bank, knowledge bases of software resource, both comprise all kinds of softwares used in manufacture process, comprise again Various types of data, model, information and the knowledge etc. that manufacture in lifecycle process;
(3) human resources participate in the virtualized manufacturing recourses that provides of form of serving with skilled addressee, demonstration, design, processing, operation, management etc. are movable all be unable to do without into participation.
 
1.2 service content
" manufacturing and namely serve " is the core concept that cloud manufactures, and namely provides the service manufactured required for each link of Life cycle.Manufacture day-to-day operations management and activity in production that Life cycle covers manufacturing enterprise, comprise production link and the enterprise operation and management activities such as demonstration, design, emulation, processing, detection.
 
(1) service colligate of Appraisal Link uses various decision-assistant software, model library, database and relevant human resources, proves, analyze its feasibility and Expected Results to the business such as strategical planning, marketing strategy, product programming of enterprise;
(2) service that provides for product design link of the service of design link, comprises the demand to Autocad, to the demand of the high-capability computing device that complex analyses calculates, the demand of serving the design of complex product;
(3) service emulating link provides the software and hardware artificial resources such as simulation software, simulation model and emulator required for product simulation link;
(4) processing link of the service product of processing link often needs the cooperation of various hardware resource, software resource and human resources.For Small and Medium Manufacturing Enterprises, both lacked high-end precise machining equipment, technological level is relatively low again, lacks professional again.Cloud manufacturing service can solve the problem in the medium-sized and small enterprises course of processing well;
(5) service of detection provides the use service of various checkout equipment and related software;
(6) service of management link had both comprised the software support of all operations management activity to enterprise, as financial software, CRM software, ERP software etc., also comprised the service of relevant human resources.
 
2 medium-sized and small enterprises cloud manufacturing service platform architectures
Society's manufacturing recourses exists with the form of dispersion, strange land, isomery often.Towards medium-sized and small enterprises cloud manufacturing service platform, unified encapsulation and scheduling are carried out to social manufacturing recourses, for medium-sized and small enterprises provide service instant, as required.
 
2.1 Web Service technology
Web Service and Web service are the service-oriented new architectures of the new technology be based upon on the standard Web protocol basis such as HTML, XML, SOAP, UDDI.This framework comprises ISP, service requester and service register center 3 kinds of roles, performs issue, discovery and binding 3 actions, sees 1 of new technology.
 
The 1Web Service role relation of new technology
(1) service provider services supplier designs and Implements Web service, and registers in service register center.For the function that other services and user provide oneself to have.In cloud manufacturing service, the owner of software resource, hardware resource and human resources is obviously the provider of service.But the work these resources being become unified Web service should have been come by cloud manufacturing service platform;
(2) service requester service requester is exactly the user of Web service function, and it utilizes soap message to send request to obtain service to ISP.In general, medium-sized and small enterprises are main bodys of service request, the service needed for being obtained by service request terminal;
(3) service register center.Service request together with corresponding service linkage, is served as gerentocratic role by service register center.
 
The platform architecture of 2.2 sing on web Service
The feature such as popularity and interoperability of the generality had in view of Web Service technology, simplification, standard, support, adopt the framework of Web Service technique construction medium-sized and small enterprises cloud manufacturing service platform, have succinctly, efficiently, be easy to the advantages such as realization.
 
Framework is made up of resource layer, cloud manufacturing service platform and client layer.From the angle of Web Service, framework also can be divided into service requester, service register center and ISP.Resource layer provides software manufacturing recourses, hardware manufacturing resource and human resources, is the source material of ISP.The manufacturing recourses of cloud manufacturing service platform to resource layer encapsulates, and is unified into the form of application service assembly, becomes the final form of ISP.Web Application Server is the service register center of cloud manufacturing service platform, carries out registration and the search of application service assembly.Door Portal is the use interface that cloud manufacturing service platform is supplied to user.Needing platform to provide the medium-sized and small enterprises of service by Internet access platform, find the application service being applicable to oneself, is the requestor of service, 3 Platform Key Technologies
3.1 resource virtualizing technique
Resource virtualizing realizes abstract from physical resource to application service and maps, and is described, builds the virtual resource package assembling with general-purpose interface to the static attribute of physical resource, dynamic attribute, behavior property and deployment configuration information.In the process of resource virtualizing, must solve how dissimilar manufacturing recourses describes, how to encapsulate, how to dispose, how to manage, how the problem such as communicate.
 
3.2 safety assurance technology
Guaranteeing data security is the prerequisite that medium-sized and small enterprises cloud manufacturing service platform stable is run.Because cloud manufacturing mode is based on Internet, but there is a lot of unsafe factors in present stage Internet, a lot of user being suspected to carrying out business activity by Internet, constraining the development of cloud manufacturing mode.Therefore problem of data safety is that each cloud manufacturing service platform should top-priority problem.
 
3.3 charging mode
Having that existing charging mode is conventional is following several:
(1) hardware registration system is according to client, processor, number of users charge;
(2) time system and flat rate system.Service time according to user carries out charging;
(3) software rentals mode is according to chronomere's charging of user's renting software.
 
How reasonably charging to the service that cloud manufacturing service platform provides, thus improve the participation enthusiasm of medium-sized and small enterprises, is the important leverage that platform stable is run.
 
Medium-sized and small enterprises cloud manufacturing service platform is that medium-sized and small enterprises share social manufacturing recourses, improves the important channel of core competitiveness, has vast potential for future development.The development of medium-sized and small enterprises cloud manufacturing service platform is a long-term progressive process, at the early-stage at home, also belongs to study frontier in the world.Simple, efficient, the framework that is easy to the medium-sized and small enterprises cloud manufacturing service platform realized of sing on web Service technique construction new technology, set forth key issues such as resource virtualizing, safety assurance, charging modes.

Claims (7)

1. loss of data/leakage: be not very good to the security control dynamics of data in cloud computing, API Access Permissions control and secret generating, store and management aspect deficiency all may cause data leak, and necessary data destroying policy may be lacked;
Technology of sharing leak: in cloud computing, simple error configurations all may cause and have a strong impact on, because a lot of virtual servers in cloud computing environment share identical configuration, be therefore necessary for network and server configuration performs service level agreement (SLA) to guarantee to install in time repair procedure and to implement best practice;
Cloud computing service supplier may be different with the control dynamics of business data access rights to the background check dynamics of staff, a lot of supplier does well in this respect, but and not, enterprise needs to assess supplier and proposes how to screen the scheme of employee;
Account, service and communication hijack: a lot of data, application program and resource all concentrate in cloud computing, if and the Authentication mechanism of cloud computing is very weak, invader just easily can obtain user account number and log in the virtual machine of client, therefore this threat is initiatively monitored in suggestion, and adopts dual factors Authentication mechanism;
Unsafe application programming interfaces: in developing application, as new platform must be regarded cloud computing by enterprise, instead of outsourcing;
In the life cycle of application program, must dispose strict review process, developer can use some criterion to process authentication, access privilege control and encryption;
Correctly do not use cloud computing: in application technology, hacker may be more progressive than technical staff faster, and hacker usually can dispose rapidly new attack technology and freely walk in cloud computing;
Unknown risk: clarity issues annoyings cloud service supplier always, and account user only uses front-end interface, and they do not know that their supplier uses which kind of platform or reparation level;
Client-side issue
For the customer, cloud security has the worry of network facet;
Have some anti-viral softwares after suspension, performance declines greatly;
And in the middle of practical application, be also no lack of such situation;
Due to viral subversive, the factors such as network environment, once go wrong on network, cloud has just become burden on the contrary, has helped to fall;
Settling mode
Recently, there is a kind of " mixed cloud " technology, publicly-owned cloud is combined with privately owned cloud, both played the advantage that publicly-owned cloud customer volume is large, remain again local data capability, combine the advantage of tradition and new technology, solve many application problems.
2. cloud computing---at least extend as virtualized one, coverage is increasing;
But current cloud computing can't support complicated corporate environment;
Therefore cloud computing framework is ready to appear, and experience shows, before cloud computing moves to maturity, we more should the details of attention location system cloud computing framework;
Based on to the analysis of more existing cloud computing products and some experiences of individual, sum up a set of cloud computing framework, cloud computing framework mainly can be divided into four layers;
The framework layer display layer of cloud computing
This layer of most data centers cloud computing framework is mainly used for representing content needed for user and service experience in the mode of close friend, and can use the many services that middleware layer below provides, and mainly contains five kinds of technology:
HTML: the Web page technology of standard, now main based on HTML4, but the HTML5 that will release can promote the development of Web page in a lot, the such as aspect such as video [1] and this locality storage;
JavaScript: a kind of dynamic language for Web page, by JavaScript, greatly can enrich the function of Web page, and creates the dynamic page having more interactivity in order to the AJAX based on JavaScript;
CSS: be mainly used in the outward appearance controlling Web page, and can make to be separated grazioso between the content of the page with its form of expression;
RIA (the Rich Internet Applications) technology that industry is the most frequently used, the richness application of the sing on web that can the technology such as HTML be provided to provide in present stage, although and be slightly poorer than Flash in its present occupation rate of market of Consumer's Experience, but because it can use C# [5] to programme, so very friendly to developer;
This layer is formed a connecting link, its infrastructure layer below provide on the basis of resource and provide many services, such as buffer service and REST service etc., and namely these services can be used for supporting display layer, also can user be directly allowed to call, and mainly contain five kinds of technology: REST: by REST technology, very convenient and grazioso the partial service that middleware layer supports can be supplied to caller;
Many tenants: an independent application example can be allowed exactly to be multiple organization service, and keep good isolation and fail safe, and by this technology, effectively can reduce purchasing and maintenance cost of application;
Parallel processing: in order to process the data of magnanimity, need to utilize huge X86 cluster to carry out huge parallel processing, the MapReduce of Google is the work of the representative of this respect;
Application server: for optimization has to a certain degree been done in cloud computing on the basis of original application server, such as the Jetty application server of Google App Engine;
Distributed caching: by distributed caching technology, effectively can not only reduce the pressure to background server, and can also accelerate corresponding reaction speed, and foremost distributed caching example is no more than Memcached;
Infrastructure layer
This layer of effect is for preparing the resources such as calculating needed for it and storage to middleware layer above or user, mainly contains four kinds of technology:
Virtual: " the many tenants " that be also appreciated that facility layer based on it, because pass through Intel Virtualization Technology, multiple virtual machine can be generated on a physical server, and comprehensively isolation can be realized between these virtual machines, the acquisition cost of server can not only be lowered like this, and the O&M cost of server can also be reduced, the ESX that ripe X86 Intel Virtualization Technology has VMware and the Xen increased income simultaneously;
Distributed storage: in order to carry the data of magnanimity, also will ensure the manageability of these data, so need a whole set of distributed storage system simultaneously;
Relevant database: be done the optimization in expansion and management etc. on the basis of original relevant database substantially, make it adapt at Yun Zhonggeng;
NoSQL: in order to meet the target that some relational databases cannot meet, such as support the data etc. of magnanimity, it is not database based on relational model that some companies specially design a collection of;
Management level
This layer is for three layers of transverse direction service, and gives these three layers to provide the multiple technology aspect such as administering and maintaining, and mainly contains these six aspects below:
Account Administration: by good Account Administration technology, can log in facilitating user under secure conditions, and facilitates keeper to the management of account number;
SLA monitors: to the virtual machine of operation at all levels, and the monitoring of aspect of performance is carried out in service and application etc., can run to make them when meeting SLA (Service Level Agreement) preset;
Accounting management: namely add up the resource etc. that each user consumes, asks for expense to user exactly;
Safety management: to data, application and IT [6] resource such as account number are taked to protect all sidedly, make it from the infringement of offender and rogue program;
Load balancing: deal with emergency case by traffic distribution being given the Multi-instance of an application or service;
Operation management: mainly make O&M operate specialty and automation as much as possible, thus reduce the O&M cost of cloud computing center;
Cloud computing framework wherein has three layers to be horizontal, display layer, middleware layer and infrastructure layer respectively, very abundant cloud computing ability and friendly user interface can be provided by this three-layer technology, cloud computing framework also has one deck to be longitudinal, being called management level, is to administer and maintain horizontal three layers and exist better;
A kind of computation schema: IT resource, data, application are supplied to user (IBM) as service by network
A kind of architecture management method opinion: virtualized for a large amount of height resource management is got up, form a large resource pool, is used for unifying to provide service (IBM)
By disclosed standard and service based on, centered by the Internet, provide safety, fast, easily data store and network calculations service (Google)
The technology that cloud computing uses
The cloud computing platform of Google and application
Distributed file system (Google File System)
MapReduce programming mode
Distributed lock mechanism Chubby
Distributed data base BigTable
The blue cloud computing platform of IBM
The use of virtual machine
Storage organization
Along with the adjustment of China's economic structure and the transformation of Economic Development Mode, manufacturing industry is faced with unprecedented opportunities and challenge, in the urgent need to improving the core competitiveness of manufacturing enterprise;
The service manufactured, Knowledge based engineering innovation ability, and to the polymerization of all kinds of manufacturing recourses and cooperative ability, friendly to environment, become the trend of key element and the manufacturing informatization development forming enterprise competitiveness;
Namely cloud manufacture is under this trend, used for reference the one that cloud computing thought grows up existing information technology, manufacturing technology are merged mutually with the emerging technology such as cloud computing, Internet of Things, unified intelligent management and operation are carried out to all kinds of manufacturing recourses, for all kinds of manufacturing activities manufactured in lifecycle process provide can obtain at any time, use as required, the net instrument new model of service that is safe and reliable, high-quality cheapness;
For the medium-sized and small enterprises accounting for enterprise's sum 99%, cloud manufacture is by vitalizing social manufacturing recourses storage, distributing rationally, and in order to solve, its machinery equipment generally faced is old, the level of production is not high, technical capability is not enough, the low inferior problem of management level proposes new thinking;
What cloud computing was shared is computational resource, and software, platform and infrastructure are 3 kinds of exemplary service resources of cloud computing.
3. cloud manufacture is then share all kinds of manufacturing recourses (software, hardware, manpower);
The hard manufacturing recourses that hardware resource provides in the form of hardware, comprises all kinds of instrument and equipments such as the process equipment such as lathe, machining center, test detecting equipment, emulator, computing equipment; The soft manufacturing recourses that software resource provides with forms such as software, database, model library, information bank, knowledge bases, both comprise all kinds of softwares used in manufacture process, comprise again Various types of data, model, information and the knowledge etc. that manufacture in lifecycle process; Human resources participate in the virtualized manufacturing recourses that provides of form of serving with skilled addressee, demonstration, design, processing, operation, management etc. are movable all be unable to do without into participation;
Be the core concept that cloud manufactures, namely the service manufactured required for each link of Life cycle is provided.
4. manufacture day-to-day operations management and activity in production that Life cycle covers manufacturing enterprise, comprise production link and the enterprise operation and management activities such as demonstration, design, emulation, processing, detection;
(1) service colligate of Appraisal Link uses various decision-assistant software, model library, database and relevant human resources, proves, analyze its feasibility and Expected Results to the business such as strategical planning, marketing strategy, product programming of enterprise;
(2) service that provides for product design link of the service of design link, comprises the demand to Autocad, to the demand of the high-capability computing device that complex analyses calculates, the demand of serving the design of complex product;
(3) service emulating link provides the software and hardware artificial resources such as simulation software, simulation model and emulator required for product simulation link;
(4) processing link of the service product of processing link often needs the cooperation of various hardware resource, software resource and human resources;
For Small and Medium Manufacturing Enterprises, both lacked high-end precise machining equipment, technological level is relatively low again, lacks professional again;
Cloud manufacturing service can solve the problem in the medium-sized and small enterprises course of processing well;
(5) service of detection provides the use service of various checkout equipment and related software;
(6) service of management link had both comprised the software support of all operations management activity to enterprise, as financial software, CRM software, ERP software etc., also comprised the service of relevant human resources;
Society's manufacturing recourses exists with the form of dispersion, strange land, isomery often;
Towards medium-sized and small enterprises cloud manufacturing service platform, unified encapsulation and scheduling are carried out to social manufacturing recourses, for medium-sized and small enterprises provide service instant, as required;
Web Service and Web service are a kind of service-oriented new architectures be based upon on the standard Web protocol basis such as HTML, XML, SOAP, UDDI;
This framework comprises ISP, service requester and service register center 3 kinds of roles, performs issue, discovery and binding 3 actions;
Service provider services supplier designs and Implements Web service, and registers in service register center;
For the function that other services and user provide oneself to have;
In cloud manufacturing service, the owner of software resource, hardware resource and human resources is obviously the provider of service;
But the work these resources being become unified Web service should have been come by cloud manufacturing service platform;
Service requester service requester is exactly the user of Web service function, and it utilizes soap message to send request to obtain service to ISP;
In general, medium-sized and small enterprises are main bodys of service request, the service needed for being obtained by service request terminal;
Service register center;
Service request together with corresponding service linkage, is served as gerentocratic role by service register center;
The platform architecture of sing on web Service
The feature such as popularity and interoperability of the generality had in view of Web Service technology, simplification, standard, support, adopt the framework of Web Service technique construction medium-sized and small enterprises cloud manufacturing service platform, have succinct, efficient, be easy to the excellent frameworks such as realization and be made up of resource layer, cloud manufacturing service platform and client layer;
From the angle of Web Service, framework also can be divided into service requester, service register center and ISP;
Resource layer provides software manufacturing recourses, hardware manufacturing resource and human resources, is the source material of ISP;
The manufacturing recourses of cloud manufacturing service platform to resource layer encapsulates, and is unified into the form of application service assembly, becomes the final form of ISP;
Web Application Server is the service register center of cloud manufacturing service platform, carries out registration and the search of application service assembly;
Door Portal is the use interface that cloud manufacturing service platform is supplied to user;
Platform is needed to provide the medium-sized and small enterprises of service by Internet access platform, find the application service being applicable to oneself, the requestor of service, resource virtualizing realizes the abstract and mapping from physical resource to application service, the static attribute of physical resource, dynamic attribute, behavior property and deployment configuration information are described, build the virtual resource package assembling with general-purpose interface;
In the process of resource virtualizing, must solve how dissimilar manufacturing recourses describes, how to encapsulate, how to dispose, how to manage, how the problem such as communicate;
Guaranteeing data security is the prerequisite that medium-sized and small enterprises cloud manufacturing service platform stable is run;
Because cloud manufacturing mode is based on Internet, but there is a lot of unsafe factors in present stage Internet, a lot of user being suspected to carrying out business activity by Internet, constraining the development of cloud manufacturing mode.
5. therefore problem of data safety is that top-priority problem answered by each cloud manufacturing service platform;
Charging mode
Having that some charging modes are conventional is following several:
Time system and flat rate system.
6. according to carrying out charging the service time of user;
Software rentals mode is according to chronomere's charging of user's renting software.
7. how reasonably charging to the service that cloud manufacturing service platform provides, thus improve the participation enthusiasm of medium-sized and small enterprises, is the important leverage that platform stable is run.
CN201310617082.XA 2013-11-27 2013-11-27 Cloud computing platform database benchmark test system for new technology and method thereof Pending CN104683394A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310617082.XA CN104683394A (en) 2013-11-27 2013-11-27 Cloud computing platform database benchmark test system for new technology and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310617082.XA CN104683394A (en) 2013-11-27 2013-11-27 Cloud computing platform database benchmark test system for new technology and method thereof

Publications (1)

Publication Number Publication Date
CN104683394A true CN104683394A (en) 2015-06-03

Family

ID=53317984

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310617082.XA Pending CN104683394A (en) 2013-11-27 2013-11-27 Cloud computing platform database benchmark test system for new technology and method thereof

Country Status (1)

Country Link
CN (1) CN104683394A (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282178A (en) * 2015-11-29 2016-01-27 国网江西省电力公司信息通信分公司 Cloud computing security technology platform
CN105306460A (en) * 2015-10-13 2016-02-03 国家电网公司 Unified vulnerability patch management system
CN106020158A (en) * 2016-07-20 2016-10-12 上海交通大学 Processing technology big-data support system for project-type products
CN106100894A (en) * 2016-07-11 2016-11-09 华南理工大学 A kind of highly reliable cluster operation management method
CN106412094A (en) * 2016-11-02 2017-02-15 深圳前海生生科技有限公司 A method for organizing and managing scattered resources in a public cloud mode
CN106991053A (en) * 2017-04-06 2017-07-28 上海航天测控通信研究所 Implementation method based on satellite borne equipment ground test general-purpose platform software
CN107679720A (en) * 2017-09-20 2018-02-09 北京安怀信科技股份有限公司 A kind of virtual prototype construction method based on pyramid pattern
CN107924501A (en) * 2016-04-18 2018-04-17 欧洲阿菲尼帝科技有限责任公司 For carrying out the technology of benchmaring to the pairing strategy in contact centring system
CN110191179A (en) * 2019-05-29 2019-08-30 吉林省中云数讯科技股份有限公司 Medium cloud cloud computing management platform system
CN111600890A (en) * 2020-05-18 2020-08-28 广东电网有限责任公司惠州供电局 Network security perception system based on big data
CN111858332A (en) * 2020-07-17 2020-10-30 苏州浪潮智能科技有限公司 Computing resource elasticity test method and device for distributed system
CN111984232A (en) * 2020-07-31 2020-11-24 中国航空工业集团公司济南特种结构研究所 Radar cover testing software design method based on signal flow
CN112766696A (en) * 2021-01-12 2021-05-07 深圳市中博科创信息技术有限公司 Facility demand analysis method, system and computer equipment
US11425248B2 (en) 2008-01-28 2022-08-23 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system
US11509768B2 (en) 2008-01-28 2022-11-22 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11509768B2 (en) 2008-01-28 2022-11-22 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system
US11425248B2 (en) 2008-01-28 2022-08-23 Afiniti, Ltd. Techniques for hybrid behavioral pairing in a contact center system
CN105306460A (en) * 2015-10-13 2016-02-03 国家电网公司 Unified vulnerability patch management system
CN105282178A (en) * 2015-11-29 2016-01-27 国网江西省电力公司信息通信分公司 Cloud computing security technology platform
CN107924501B (en) * 2016-04-18 2022-04-12 阿菲尼帝有限公司 Techniques for benchmarking pairing strategies in contact center systems
CN107924501A (en) * 2016-04-18 2018-04-17 欧洲阿菲尼帝科技有限责任公司 For carrying out the technology of benchmaring to the pairing strategy in contact centring system
CN108681803A (en) * 2016-04-18 2018-10-19 欧洲阿菲尼帝科技有限责任公司 Technology for carrying out benchmaring to the pairing strategy in contact centring system
CN106100894A (en) * 2016-07-11 2016-11-09 华南理工大学 A kind of highly reliable cluster operation management method
CN106100894B (en) * 2016-07-11 2019-04-09 华南理工大学 A kind of highly reliable cluster operation management method
CN106020158A (en) * 2016-07-20 2016-10-12 上海交通大学 Processing technology big-data support system for project-type products
CN106412094A (en) * 2016-11-02 2017-02-15 深圳前海生生科技有限公司 A method for organizing and managing scattered resources in a public cloud mode
CN106991053A (en) * 2017-04-06 2017-07-28 上海航天测控通信研究所 Implementation method based on satellite borne equipment ground test general-purpose platform software
CN107679720A (en) * 2017-09-20 2018-02-09 北京安怀信科技股份有限公司 A kind of virtual prototype construction method based on pyramid pattern
CN110191179B (en) * 2019-05-29 2022-05-10 吉林省中云数讯科技股份有限公司 Cloud computing management platform system
CN110191179A (en) * 2019-05-29 2019-08-30 吉林省中云数讯科技股份有限公司 Medium cloud cloud computing management platform system
CN111600890A (en) * 2020-05-18 2020-08-28 广东电网有限责任公司惠州供电局 Network security perception system based on big data
CN111600890B (en) * 2020-05-18 2022-10-18 广东电网有限责任公司惠州供电局 Network security perception system based on big data
CN111858332A (en) * 2020-07-17 2020-10-30 苏州浪潮智能科技有限公司 Computing resource elasticity test method and device for distributed system
CN111858332B (en) * 2020-07-17 2022-08-05 苏州浪潮智能科技有限公司 Computing resource elasticity test method and device for distributed system
CN111984232A (en) * 2020-07-31 2020-11-24 中国航空工业集团公司济南特种结构研究所 Radar cover testing software design method based on signal flow
CN112766696A (en) * 2021-01-12 2021-05-07 深圳市中博科创信息技术有限公司 Facility demand analysis method, system and computer equipment

Similar Documents

Publication Publication Date Title
CN104683394A (en) Cloud computing platform database benchmark test system for new technology and method thereof
Moustafa et al. Federated TON_IoT Windows datasets for evaluating AI-based security applications
Zimba et al. Crypto mining attacks in information systems: An emerging threat to cyber security
Kumar et al. Practical machine learning for cloud intrusion detection: Challenges and the way forward
CN107409126A (en) System and method for protecting enterprise computing environment safety
Tien et al. KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
CN111209269A (en) Big data management system of wisdom city
CN104683382A (en) Benchmark testing system for cloud computing platform database of novel innovative algorithm
Saleem et al. Sok: Anatomy of data breaches
CN103118036A (en) Cloud end based intelligent security protection system and method
CN104683376A (en) Novel cloud computing distributed data encryption method and system
Juncai et al. Based on Cloud Computing E-commerce Models and ItsSecurity
KR20140035146A (en) Apparatus and method for information security
CN104683378A (en) Computing and debugging system for novel cloud computing service platform adopting new technology
Toumi et al. Cooperative trust framework for cloud computing based on mobile agents
CN112837194A (en) Intelligent system
Alwaheidi et al. Data-driven threat analysis for ensuring security in cloud enabled systems
Smiliotopoulos et al. Revisiting the detection of lateral movement through Sysmon
CN104683379A (en) A new system for computing and debugging facing enterprise service platform with new technique of novel cloud computing
Stoddart Gaining access: attack and defense methods and legacy systems
CN104683393A (en) Cloud computing distributed commutative encryption method
Amin Azad et al. Role Models: Role-based Debloating for Web Applications
Xiao Exploration of network information security technology and prevention in the digital age
Normurodov et al. Cyber security challenges of big data applications in cloud computing: A state of the art
Sekhar et al. Cyber-security in society 5.0

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20150603