CN110113330B - Cloud computing based network resource management method - Google Patents

Cloud computing based network resource management method Download PDF

Info

Publication number
CN110113330B
CN110113330B CN201910357725.9A CN201910357725A CN110113330B CN 110113330 B CN110113330 B CN 110113330B CN 201910357725 A CN201910357725 A CN 201910357725A CN 110113330 B CN110113330 B CN 110113330B
Authority
CN
China
Prior art keywords
information
terminal
user
data
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910357725.9A
Other languages
Chinese (zh)
Other versions
CN110113330A (en
Inventor
张雅洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wailianfa Business Consulting Co ltd
Original Assignee
Wenzhou Polytechnic
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenzhou Polytechnic filed Critical Wenzhou Polytechnic
Priority to CN201910357725.9A priority Critical patent/CN110113330B/en
Publication of CN110113330A publication Critical patent/CN110113330A/en
Application granted granted Critical
Publication of CN110113330B publication Critical patent/CN110113330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention discloses a cloud computing network-based resource management method, which comprises the following steps: the user end is connected with the interface end of the network terminal through a wireless signal, a virtual transmission channel is established after the user end is successfully connected with the terminal, data can be downloaded from the resource library of the terminal and transmitted to the resource library of the terminal, when the user downloads the data from the resource library, the terminal sends prompt information to the user end and collects the data of the user, statistics on the information downloading condition in the resource library by a background is facilitated, when the user uploads the data to the resource library, the database receives the uploaded data and automatically generates a corresponding storage library to store the uploaded resources, and in the storing process, marking information is automatically added, the received information is processed by a resource manager, a plurality of databases are established according to the data types received by the resource library, and the information is stored in a classified mode.

Description

Cloud computing based network resource management method
Technical Field
The invention relates to the technical field of cloud computing, in particular to a resource management method based on a cloud computing network.
Background
With the rapid development of the Chinese communication service, the scale of the communication network resources is continuously enlarged, the maintenance and management tasks of the network resources are more and more difficult, and the requirements of the maintenance and management work are higher and higher; according to survey statistical data, more than 80% of data have geographic attributes, and data related to line resources, equipment resources, information resources and the like forming communication network resources have close relationship with geographic position and graphic information.
The characteristics of simplicity, rapidness, sharing and the like of an IP network bring prosperity of a broadband network, but a large amount of services cause network resource shortage, the transmission speed of the services cannot be ensured, the quality of services needing high-speed transmission, such as video services, instant services and the like, cannot be ensured, user experience is influenced, new network applications no longer seek high-bandwidth requirements, and new network applications provide more severe requirements for new indexes, such as network delay, jitter or packet loss rate and the like. The network fragmentation technology is to divide a physical network into a plurality of virtual networks, each virtual network is called a network fragmentation, each network fragmentation comprises a network device, an access network, a transmission network and a core network, and each network fragmentation is proprietary to a specific service so as to meet the service quality requirements of different services.
The existing network resource management causes the information stored in the database to be disordered, and the information is mutually staggered in the information searching process.
Disclosure of Invention
The invention provides a cloud computing network-based resource management method, which aims to solve the problems in the background technology.
The invention provides a cloud computing network-based resource management method, which comprises the following steps:
s1: the user end is connected with the interface end of the network terminal through a wireless signal, establishes a virtual transmission channel after being successfully connected with the terminal, and can download data from the resource library of the terminal and transmit the data to the resource library of the terminal;
s2: when a user downloads data from the resource library, the terminal sends prompt information to the user side and collects the data of the user, so that the background can conveniently count the information downloading condition in the resource library;
s3: when a user uploads data to a resource library, a terminal can safely scan the uploaded data to ensure that no dangerous documents exist in the information, protect the resource library, after the data is confirmed to be safe, the database receives the uploaded data and automatically generates a corresponding storage library to store the uploaded resources, and marking information is automatically added in the storage process;
s4: the resource manager processes the received information, and the information processing process comprises the following steps:
A. confirming the authenticity of the information, comparing the retrieved file with a related file by a manager to judge the authenticity of the information, deleting the information when the judged information is not authentic, and storing the information in a specific memory and marking when the authenticity of the information cannot be confirmed;
B. removing repeated information, searching whether the received information is the information already existing in the resource library, and deleting the same information when the information already exists;
C. the information after the duplication is removed is examined to ensure the integrity of the information, and when the information is incomplete, a manager can perfect the information according to the known information so that the information is complete;
D. classifying the processed information, and editing the same information into the same folder;
s5: establishing a plurality of databases according to the data types received by the resource library;
s6: the information is classified and stored according to the type of the information, and the watching authority is set for some specific information.
Preferably, in S1, the virtual transmission path is established by sending connection information to the network terminal by the user terminal, where the connection information has a key, the key is matched with the key in the interface terminal in the terminal network, and when the connection information is successfully matched with the interface terminal in the terminal network, the user terminal establishes a virtual path with the network terminal, and the user terminal can download and upload data from a resource management library on the terminal through the virtual path, and when the matching fails, needs to send a connection request again until successfully matched with the network resource management library.
Preferably, the connection information includes a user IP, a connection parameter, and an interface port number.
Preferably, in S1, the cloud network interface ends are multiple, each interface end is independent and dependent, a single connection key is provided in each interface end, and each interface end can be connected to multiple clients to connect the clients in a distributed manner, so that resource downloading and uploading are not smooth due to congestion, and a transmission channel is not crashed.
Preferably, in S2, the collecting of the user information includes the name of the user and the contact information of the user, so that the user who downloaded the information is notified after the information is changed, and the user information is collected to know the resource usage.
Preferably, in S3, the security scanning process includes importing a file into a scanning system, scanning the uploaded file information by the scanning system to obtain feature data in the file information, matching the obtained feature data with feature information in a storage library in the terminal, determining whether the file information has information features that are the same as the feature information in the storage library, marking the file as a dangerous file if the file information has information features that are the same as the feature information in the storage library, and performing danger rating on the file according to the amount of dangerous feature information contained in the file.
Preferably, in S5, the databases exist independently from each other, each database is provided with a search code, the search code is a core content of the file information, and when a file is searched, the desired file resource can be quickly found by inputting the search code into the search frame, so as to speed up the file search.
Preferably, in S6, the authority needs to be read and downloaded after authorized by the administrator, when the user needs to download the data with authority, the user needs to apply for the administrator, and after obtaining the password, the data in the authority can be downloaded.
The cloud computing network-based resource management method provided by the invention has the beneficial effects that:
1. through carrying out duplication removal and classification arrangement on data, the same information is placed in the same database, and the search code is arranged on the database, so that the required data can be quickly inquired in the searching process.
2. The databases are independent and dependent, and will not interfere with each other, so that the query of the data is faster.
Detailed Description
The invention is further illustrated by the following examples.
The invention provides a cloud computing network-based resource management method, which comprises the following steps:
s1: the user end is connected with the interface end of the network terminal through a wireless signal, a virtual transmission channel is established after the user end is successfully connected with the terminal, data can be downloaded from the resource library of the terminal and can be transmitted into the resource library of the terminal, the virtual transmission channel is established in the process that the user end sends connection information to the network terminal, the connection information comprises a user IP, connection parameters and an interface end number, a secret key is contained in the connection information, the secret key is matched with the secret key in the interface end in the terminal network, when the connection information is successfully matched with the interface end in the terminal network, the user end establishes a virtual channel with the network terminal, the user end can download data and upload the data from the resource management library on the terminal through the virtual channel, when the matching fails, a connection request needs to be sent again until the data is successfully matched with the network resource management library, a plurality of cloud network interface ends are arranged, and each interface end is independently dependent, each interface end is internally provided with a single connection key and can be connected with a plurality of clients to dispersedly connect the clients, so that the unsmooth resource downloading and uploading caused by congestion is avoided, and the phenomenon of transmission channel collapse is avoided;
s2: when a user downloads data from the resource library, the terminal sends prompt information to the user side to prompt the user that the user successfully downloads the data and collects the data of the user, so that a background can conveniently count the information downloading condition in the resource library, the collection of the user information comprises the name of the user and the contact way of the user, the user who downloads the information is notified after the information is changed conveniently, and the user information is collected to know the resource using condition;
s3: when a user uploads data to a resource library, a terminal can safely scan the uploaded data to ensure that no dangerous documents exist in the information and protect the resource library, after the security of the data is confirmed, the database receives the uploaded data and automatically generates a corresponding storage library to store the uploaded resources, marking information is automatically added in the storage process to facilitate quick search and processing of the uploaded documents by workers, the security scanning process is to introduce the documents into a scanning system, the scanning system scans the data to ensure the security of the data, the scanning system scans the uploaded document information to obtain feature data in the document information, the obtained feature data is matched with the feature information in the storage library in the terminal to judge whether information features same as the feature information in the storage library exist in the document information, and if the information features same as the feature information in the feature information library exist, marking the file as a dangerous file, and carrying out danger rating on the file according to the amount of the dangerous characteristic information;
s4: resource management personnel handle the information that receives for it is simple clear, be convenient for watch, information processing process is:
A. confirming the authenticity of the information, comparing the retrieved file with a related file by a manager to judge the authenticity of the information, deleting the information when the judged information is not authentic, and storing the information in a specific memory and marking when the authenticity of the information cannot be confirmed;
B. removing repeated information, searching whether the received information is the information already existing in the resource library, and deleting the same information when the information already exists so as to avoid occupying an internal memory;
C. the information after the duplication is removed is examined to ensure the integrity of the information, and when the information is incomplete, a manager can perfect the information according to the known information so that the information is complete, and the information is complete so that the application range of the information is expanded;
D. the processed information is classified, and the same information is edited into the same folder.
S5: the method comprises the steps that a plurality of databases are established according to data types received by a resource library, the databases exist independently, each database is provided with a search code, the search codes can facilitate a user to search a folder for storing data, the search codes are core contents of file information, when a file is searched, only the search codes are input into a search frame, the required file resource can be quickly found, and the file searching speed is accelerated;
s6: the information is classified and stored according to the type of the information, the watching authority is set for some specific information, the authority can be read and downloaded only after being authorized by a manager, when a user needs to download the data with the authority, the application needs to be sent to the manager, and the data in the authority can be downloaded after the password is obtained.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (7)

1. A resource management method based on a cloud computing network is characterized by comprising the following steps:
s1: the user end is connected with the interface end of the network terminal through a wireless signal, establishes a virtual transmission channel after being successfully connected with the terminal, and can download data from the resource library of the terminal and transmit the data to the resource library of the terminal;
s2: when a user downloads data from the resource library, the terminal sends prompt information to the user side and collects the data of the user, so that the background can conveniently count the information downloading condition in the resource library;
s3: when a user uploads data to a resource library, a terminal can safely scan the uploaded data to ensure that no dangerous documents exist in the information, protect the resource library, after the data is confirmed to be safe, the database receives the uploaded data and automatically generates a corresponding storage library to store the uploaded resources, and marking information is automatically added in the storage process;
s4: the resource manager processes the received information, and the information processing process comprises the following steps:
A. confirming the authenticity of the information, comparing the retrieved file with a related file by a manager to judge the authenticity of the information, deleting the information when the judged information is not authentic, and storing the information in a specific memory and marking when the authenticity of the information cannot be confirmed;
B. removing repeated information, searching whether the received information is the information already existing in the resource library, and deleting the same information when the information already exists;
C. the information after the duplication is removed is examined to ensure the integrity of the information, and when the information is incomplete, a manager can perfect the information according to the known information so that the information is complete;
D. classifying the processed information, and editing the same information into the same folder;
s5: establishing a plurality of databases according to the data types received by the resource library;
s6: the information is classified and stored according to the type of the information, and the watching authority is set for some specific information.
2. The method according to claim 1, wherein in S1, the virtual transmission channel is established by sending connection information to the network terminal by the user terminal, the connection information includes a key, the key matches with the key in the interface terminal in the terminal network, when the connection information matches with the interface terminal in the terminal network successfully, the user terminal establishes a virtual channel with the network terminal, the user terminal can download and upload data from the resource management library on the terminal through the virtual channel, and when the matching fails, the connection request needs to be sent again until the connection request successfully matches with the network resource management library.
3. The cloud computing network resource management method according to claim 2, wherein the connection information includes a user IP, a connection parameter, and an interface port number.
4. The cloud-computing-based network resource management method of claim 1, wherein in S2, the collection of the user information includes a name of the user and a contact information of the user, so that the user who downloaded the information is notified after the information is changed, and the user information is collected to know the resource usage.
5. The cloud-computing-based network resource management method according to claim 1, wherein in S3, the security scanning process includes importing a file into a scanning system, scanning the uploaded file information by the scanning system to obtain feature data in the file information, matching the obtained feature data with feature information in a repository in the terminal, determining whether the file information has information features that are the same as the feature information in the repository, marking the file as a dangerous file if the file information has the information features that are the same as the feature information in the feature information repository, and performing danger rating on the file according to the amount of the dangerous feature information.
6. The cloud-computing-based network resource management method of claim 1, wherein in S5, the databases exist independently of each other, each database is provided with a search code, the search code is a core content of the file information, and when a file is searched, a desired file resource can be quickly found by inputting the search code into the search box, so as to speed up the file search.
7. The method for managing resources based on a cloud computing network of claim 1, wherein in S6, the authority needs to be read and downloaded after being authorized by a manager, when a user needs to download data with authority, the user needs to send an application to the manager, and after obtaining a password, the data in the authority can be downloaded.
CN201910357725.9A 2019-04-30 2019-04-30 Cloud computing based network resource management method Active CN110113330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910357725.9A CN110113330B (en) 2019-04-30 2019-04-30 Cloud computing based network resource management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910357725.9A CN110113330B (en) 2019-04-30 2019-04-30 Cloud computing based network resource management method

Publications (2)

Publication Number Publication Date
CN110113330A CN110113330A (en) 2019-08-09
CN110113330B true CN110113330B (en) 2021-08-03

Family

ID=67487526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910357725.9A Active CN110113330B (en) 2019-04-30 2019-04-30 Cloud computing based network resource management method

Country Status (1)

Country Link
CN (1) CN110113330B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112214646A (en) * 2020-10-10 2021-01-12 河南工业职业技术学院 Group leader management system based on cloud network

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571798A (en) * 2012-01-16 2012-07-11 合众思壮北斗导航有限公司 Public security network system
CN106407407A (en) * 2016-09-22 2017-02-15 江苏通付盾科技有限公司 A file tagging system and method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9954875B2 (en) * 2009-06-26 2018-04-24 International Business Machines Corporation Protecting from unintentional malware download

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571798A (en) * 2012-01-16 2012-07-11 合众思壮北斗导航有限公司 Public security network system
CN106407407A (en) * 2016-09-22 2017-02-15 江苏通付盾科技有限公司 A file tagging system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于混沌技术的网络教育资源库安全保护研究;陈宇环 等;《井冈山大学学报(自然科学版)》;20111130;第32卷(第6期);全文 *

Also Published As

Publication number Publication date
CN110113330A (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN106815112B (en) Massive data monitoring system and method based on deep packet inspection
CN111277570A (en) Data security monitoring method and device, electronic equipment and readable medium
US7761569B2 (en) Method for monitoring and providing information over a peer to peer network
CN105591973B (en) Application identification method and device
CN109040252A (en) Document transmission method, system, computer equipment and storage medium
CN106878265A (en) A kind of data processing method and device
CN108733821A (en) A kind of distribution of monitor video sectional drawing and methods of exhibiting and system
CN112019449B (en) Traffic identification packet capturing method and device
CN115174255B (en) Industrial Internet platform data transmission safety protection system
CN110830496B (en) Using method and operation method of system for preventing scanning authority file
US11743195B2 (en) System and method for monitoring and managing video stream content
Manzoor et al. How HTTP/2 is changing web traffic and how to detect it
CN110113330B (en) Cloud computing based network resource management method
CN104618410B (en) Resource supplying method and apparatus
CA3122975A1 (en) Network device identification
US20120047248A1 (en) Method and System for Monitoring Flows in Network Traffic
CN116489166A (en) Secure data exchange method and system based on blockchain technology
CN112822289A (en) Data uploading and reading method, system, equipment and storage medium
CN116527692B (en) Contract file cloud synchronization method based on Internet
CN109032683B (en) Configuration data processing method and device
CN111106980B (en) Bandwidth binding detection method and device
CN114138715A (en) Family client-oriented cloud storage method and system
CN111368294B (en) Virus file identification method and device, storage medium and electronic device
CN111625807A (en) Equipment type identification method and device
CN109412898A (en) Characteristic library generating method and device and corresponding flow method for sorting and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230202

Address after: Room 227-6, Floor 2, Building 1, Incubator, Wenzhou National University Science Park, No. 50, Dongfang South Road, Ouhai Economic Development Zone, Wenzhou City, Zhejiang Province, 325000

Patentee after: Wenzhou Zhongtong Enterprise Management Co.,Ltd.

Address before: 325000 Wenzhou City National University Science Park incubator, No. 38 Dongfang South Road, Ouhai District, Wenzhou, Zhejiang

Patentee before: WENZHOU VOCATIONAL & TECHNICAL College

Effective date of registration: 20230202

Address after: 510000, No. 106, Fengze East Road, Nansha District, Guangzhou City, Guangdong Province (self-compiled building 1) X1301-E011212 (cluster registration) (JM)

Patentee after: Guangzhou Specialized Enterprise Information Technology Co.,Ltd.

Address before: Room 227-6, Floor 2, Building 1, Incubator, Wenzhou National University Science Park, No. 50, Dongfang South Road, Ouhai Economic Development Zone, Wenzhou City, Zhejiang Province, 325000

Patentee before: Wenzhou Zhongtong Enterprise Management Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230529

Address after: 200120 Floor 15, No. 6, Keelung Road, China (Shanghai) Pilot Free Trade Zone, Pudong New Area, Shanghai

Patentee after: Shanghai Wailianfa Business Consulting Co.,Ltd.

Address before: 510000, No. 106, Fengze East Road, Nansha District, Guangzhou City, Guangdong Province (self-compiled building 1) X1301-E011212 (cluster registration) (JM)

Patentee before: Guangzhou Specialized Enterprise Information Technology Co.,Ltd.