CN116471327A - Cloud resource processing method, device, equipment and storage medium - Google Patents

Cloud resource processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN116471327A
CN116471327A CN202310714491.5A CN202310714491A CN116471327A CN 116471327 A CN116471327 A CN 116471327A CN 202310714491 A CN202310714491 A CN 202310714491A CN 116471327 A CN116471327 A CN 116471327A
Authority
CN
China
Prior art keywords
cloud resource
random code
cloud
provider
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310714491.5A
Other languages
Chinese (zh)
Other versions
CN116471327B (en
Inventor
陈海锋
李朝霞
邢建兵
肖征荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Unicom Cloud Data Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd, Unicom Cloud Data Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310714491.5A priority Critical patent/CN116471327B/en
Publication of CN116471327A publication Critical patent/CN116471327A/en
Application granted granted Critical
Publication of CN116471327B publication Critical patent/CN116471327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a cloud resource processing method, a cloud resource processing device, cloud resource processing equipment and a cloud resource storage medium, and relates to the technical field of data processing. The cloud resource provider carries out security authentication on the cloud resource user according to the first random code; the cloud resource user performs security authentication on the cloud resource provider according to the second random code; if the authentication is successful, a cloud resource provider in the blockchain acquires a cloud resource demand issued by a cloud resource user on the blockchain, analyzes and processes a frequency variable in the cloud resource demand in terms of a time domain, analyzes and processes hot spot space distribution in the cloud resource demand in terms of the space domain, and determines whether the cloud resource provider meets the cloud resource demand at the same time; after receiving the information meeting the requirements and the cost sent by the cloud resource provider, the cloud resource user determines N target cloud resource providers.

Description

Cloud resource processing method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a cloud resource processing method, device, equipment, and storage medium.
Background
Cloud computing (Joint Cloud Computing) is based on open collaboration among cloud service providers, and through deep fusion of multi-party cloud resources, developers can customize cloud services in a software definition mode conveniently, cloud value is created, and a new generation cloud computing mode of 'no service boundary, collaboration among clouds, easy sharing of resources and switchable value' is achieved.
Currently, users are gradually accessing cloud resources of multiple cloud service providers, which can provide more flexible storage guarantee for users than storing data in a single cloud service provider.
However, at present, certain confusion exists for the use condition of cloud resources, the cloud resources are not universal, so that waste of a lot of idle cloud resources is caused, access of illegal cloud resources cannot be avoided in the prior art, and cloud storage security is low.
Disclosure of Invention
The application provides a cloud resource processing method, device, equipment and storage medium, which are used for solving the technical problems that the prior art cannot avoid the access of illegal cloud resources and the cloud storage security is low because the cloud resources are not universal and a lot of idle cloud resources are wasted.
In a first aspect, the present application provides a cloud resource processing method, including:
the cloud resource sharing platform generates a first random code and a second random code, the first random code is sent to a cloud resource user, and the second random code is sent to a cloud resource provider;
the cloud resource provider carries out security authentication on the cloud resource user according to the first random code to obtain a first authentication result;
the cloud resource user performs security authentication on the cloud resource provider according to the second random code to obtain a second authentication result;
if the first authentication result and the second authentication result are authentication success, at least one cloud resource provider in a blockchain acquires a cloud resource requirement issued by a cloud resource user on the blockchain, analyzes and processes frequency variables in the cloud resource requirement in a time domain, analyzes and processes hot spot space distribution in the cloud resource requirement in a space domain, determines whether the cloud resource provider meets requirements of the cloud resource requirement on the time domain and the space domain at the same time, and if so, broadcasts meeting requirement information and cost information on the blockchain;
After receiving the demand meeting information and the cost information sent by the at least one cloud resource provider, the cloud resource user determines N target cloud resource providers according to the demand meeting information and the cost information sent by the at least one cloud resource provider, wherein N is any positive integer.
The cloud resource sharing platform can assist the cloud resource provider and the cloud resource user to carry out safety authentication of the two parties based on random numbers, the cloud resource provider confirms the resources by combining the two aspects of a time domain and a space domain on the premise of confirming the safety of the two parties, determines whether the resources can be provided for the cloud resource user or not, realizes sharing of the cloud resources through a block chain, realizes allocation of the resources by combining the time domain and the space domain, improves the utilization rate of the resources, ensures the legality of the cloud resources through bidirectional confirmation, and improves the safety of cloud storage.
Optionally, the cloud resource provider performs security authentication on the cloud resource user according to the first random code to obtain a first authentication result, including:
After receiving the first random code, the cloud resource user performs private key encryption processing on the first random code according to a preset algorithm to obtain a first encryption result, and sends a cloud resource requirement and the first encryption result to a blockchain network;
the cloud resource provider receives the cloud resource requirement and the first encryption result, decrypts the first encryption result to obtain a third random code, and sends the third random code and a cloud resource user identifier to a cloud resource sharing platform;
after receiving the third random code and the cloud resource user identifier, the cloud resource sharing platform determines a first random code corresponding to the cloud resource user identifier, compares the first random code with the third random code, and determines a first authentication result according to the comparison result.
Here, when the cloud resource provider performs security authentication and validation on the cloud resource user, the cloud resource provider performs encryption processing through a preset algorithm by combining the first random code sent by the cloud resource sharing platform to obtain a first encryption result, sends the first encryption result to the cloud resource provider through the block chain, obtains a third random code to be sent to the cloud resource sharing platform for comparison after decryption processing by the cloud resource provider, and provides the security authentication result for the cloud resource provider through the comparison of the random numbers, so that the security and validation on the cloud resource user is realized, the verification mode is simple, the efficiency is high, the accuracy is high, and the security and the reliability of cloud resource processing are further improved.
Optionally, the cloud resource user performs security authentication on the cloud resource provider according to the second random code to obtain a second authentication result, including:
after receiving the second random code, the cloud resource provider performs private key encryption processing on the second random code according to a preset algorithm to obtain a second encryption result, and sends the second encryption result to a blockchain network;
the cloud resource user receives the second encryption result, decrypts the second encryption result to obtain a fourth random code, and sends the fourth random code and a cloud resource provider identifier to a cloud resource sharing platform;
and after receiving the fourth random code and the cloud resource provider identifier, the cloud resource sharing platform determines a second random code corresponding to the cloud resource provider identifier, compares the second random code with the fourth random code, and determines a second authentication result according to the comparison result.
Here, the cloud resource user can realize the security right of the cloud resource provider by means of the random number issued by the cloud resource sharing platform, so that the validity and reliability of the cloud resource provider are further ensured, and the security of cloud storage processing is improved.
Optionally, the analyzing the frequency variable in the cloud resource requirement in the time domain includes:
and in the aspect of time domain, combining discrete Fourier transform and an autocorrelation function, and analyzing and processing the frequency variable in the cloud resource demand.
According to the method and the device, whether the cloud resource provider can meet the cloud resource requirements in terms of time domain is analyzed by combining the discrete Fourier transform and the autocorrelation function, the resource allocation and scheduling conditions can be accurately and comprehensively determined, and accurate and efficient resource sharing is achieved.
Optionally, the analyzing the spatial distribution of the hot spots in the cloud resource requirement in the spatial domain includes:
in the aspect of a space domain, carrying out self-adaptive clustering processing on the resource geographic distribution interest sites in the cloud resource demands, and determining the hot spot space distribution of the cloud resource demands.
The cloud resource distribution method and the cloud resource distribution system have the advantages that the self-adaptive clustering processing is carried out on the resource geographic distribution interest sites in the cloud resource demands, the hot spot spatial distribution of the cloud resource demands can be accurately determined, and therefore whether the cloud resource provider can meet the cloud resource demands in terms of spatial domain is determined and comprehensively analyzed, the resource distribution and scheduling conditions can be accurately and comprehensively determined, and accurate and efficient resource sharing is achieved.
Optionally, after the cloud resource user receives the meeting requirement information and the cost information sent by the at least one cloud resource provider, determining N target cloud resource providers according to the meeting requirement information and the cost information sent by the at least one cloud resource provider, the method further includes:
the cloud resource user signs the data to be stored through a cloud resource user certificate;
and uploading the data to be stored after signature processing to a target cloud resource provider.
When the cloud resource provided by the cloud resource provider is used, the cloud resource user signs the data stream through the certificate of the cloud resource user, so that signature tracing in the data circulation process is realized, each data can find the data source, traceability, safety and legality of the cloud resource data stream are ensured, and the safety of cloud resource processing is further improved.
Optionally, before the cloud resource sharing platform generates the first random code and the second random code, the first random code is sent to a cloud resource user, and the second random code is sent to a cloud resource provider, the method further includes:
the cloud resource sharing platform, the cloud resource provider and the cloud resource user are accessed into the blockchain network and respectively realize registration in the blockchain network;
The cloud resource provider publishes cloud resource description information on the blockchain in a private key signed broadcast information mode.
Here, before cloud resource allocation and scheduling, the cloud resource sharing platform, the cloud resource provider and the cloud resource user access the blockchain network in advance and realize registration, so that information interaction and resource sharing are realized through the blockchain, and the utilization rate of resources is improved.
Optionally, the sending the first random code to the cloud resource user and the second random code to the cloud resource provider includes:
and the first random code is sent to a cloud resource user in a mobile switching network mode, and the second random code is sent to a cloud resource provider in a mobile switching network mode.
The information is sent in a mobile switching network mode, so that confidentiality is achieved, and the security of cloud resource processing is further improved.
In a second aspect, the present application provides a cloud resource processing apparatus, including:
the cloud resource sharing platform is used for generating a first random code and a second random code, sending the first random code to a cloud resource user and sending the second random code to a cloud resource provider;
The first authentication module is used for carrying out security authentication on the cloud resource user by the cloud resource provider according to the first random code to obtain a first authentication result;
the second authentication module is used for carrying out security authentication on the cloud resource provider by the cloud resource user according to the second random code to obtain a second authentication result;
the first processing module is used for acquiring cloud resource requirements issued by a cloud resource user on a blockchain if the first authentication result and the second authentication result are authentication success, analyzing and processing frequency variables in the cloud resource requirements in a time domain, analyzing and processing hot spot space distribution in the cloud resource requirements in a space domain, and determining whether the cloud resource requirements meet the requirements of the cloud resource requirements on the time domain and the space domain at the same time or not, and broadcasting meeting requirement information and cost information on the blockchain by the cloud resource provider if the cloud resource requirements meet the requirements of the cloud resource requirements at the same time;
the second processing module is used for determining N target cloud resource providers according to the meeting demand information and the cost information sent by the at least one cloud resource provider after the cloud resource user receives the meeting demand information and the cost information sent by the at least one cloud resource provider, wherein N is any positive integer.
Optionally, the first authentication module is specifically configured to:
after receiving the first random code, the cloud resource user performs private key encryption processing on the first random code according to a preset algorithm to obtain a first encryption result, and sends a cloud resource requirement and the first encryption result to a blockchain network;
the cloud resource provider receives the cloud resource requirement and the first encryption result, decrypts the first encryption result to obtain a third random code, and sends the third random code and a cloud resource user identifier to a cloud resource sharing platform;
after receiving the third random code and the cloud resource user identifier, the cloud resource sharing platform determines a first random code corresponding to the cloud resource user identifier, compares the first random code with the third random code, and determines a first authentication result according to the comparison result.
Optionally, the second authentication module is specifically configured to:
after receiving the second random code, the cloud resource provider performs private key encryption processing on the second random code according to a preset algorithm to obtain a second encryption result, and sends the second encryption result to a blockchain network;
The cloud resource user receives the second encryption result, decrypts the second encryption result to obtain a fourth random code, and sends the fourth random code and a cloud resource provider identifier to a cloud resource sharing platform;
and after receiving the fourth random code and the cloud resource provider identifier, the cloud resource sharing platform determines a second random code corresponding to the cloud resource provider identifier, compares the second random code with the fourth random code, and determines a second authentication result according to the comparison result.
Optionally, the first processing module is specifically configured to:
and in the aspect of time domain, combining discrete Fourier transform and an autocorrelation function, and analyzing and processing the frequency variable in the cloud resource demand.
Optionally, the first processing module is further specifically configured to:
in the aspect of a space domain, carrying out self-adaptive clustering processing on the resource geographic distribution interest sites in the cloud resource demands, and determining the hot spot space distribution of the cloud resource demands.
Optionally, after the second processing module is configured to determine N target cloud resource providers according to the meeting requirement information and the cost information sent by the at least one cloud resource provider after the cloud resource user receives the meeting requirement information and the cost information sent by the at least one cloud resource provider, the apparatus further includes a signature module configured to:
The cloud resource user signs the data to be stored through a cloud resource user certificate;
and uploading the data to be stored after signature processing to a target cloud resource provider.
Optionally, before the generating module is configured to generate a first random code and a second random code by using the cloud resource sharing platform, send the first random code to a cloud resource user, and send the second random code to a cloud resource provider, the apparatus further includes a registering module configured to:
the cloud resource sharing platform, the cloud resource provider and the cloud resource user are accessed into the blockchain network and respectively realize registration in the blockchain network;
the cloud resource provider publishes cloud resource description information on the blockchain in a private key signed broadcast information mode.
Optionally, the generating module is specifically configured to:
and the first random code is sent to a cloud resource user in a mobile switching network mode, and the second random code is sent to a cloud resource provider in a mobile switching network mode.
In a third aspect, the present application provides a cloud resource processing apparatus, including: at least one processor and memory;
the memory stores computer-executable instructions;
The at least one processor executes the computer-executable instructions stored by the memory, causing the at least one processor to perform the cloud resource processing method as described above in the first aspect and the various possible designs of the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium, where computer executable instructions are stored, when executed by a processor, to implement the cloud resource processing method according to the first aspect and the various possible designs of the first aspect.
In a fifth aspect, the present application provides a computer program product, comprising a computer program, which when executed by a processor, implements the cloud resource processing method according to the first aspect and the various possible designs of the first aspect.
According to the cloud resource processing method, device and equipment and storage medium, the cloud resource sharing platform, the cloud resource provider and the cloud resource user all join in the blockchain network, firstly, the cloud resource sharing platform can assist the cloud resource provider and the cloud resource user to carry out security authentication of the two parties based on random numbers, on the premise of determining the security of the two parties, the cloud resource provider confirms the resources by combining the time domain and the space domain, determines whether the resources can be provided for the cloud resource user or not, realizes sharing of the cloud resources through the blockchain, realizes allocation of the resources by combining the time domain and the space domain, improves the utilization rate of the resources, ensures legality of the cloud resources through bidirectional confirmation, and improves the security of cloud storage.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a schematic diagram of a cloud resource processing system architecture according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a cloud resource processing method provided in an embodiment of the present application;
fig. 3 is a schematic structural diagram of a cloud resource processing device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a cloud resource processing device according to an embodiment of the present application.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or fully authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards, and provide corresponding operation entries for the user to select authorization or rejection.
The cloud computing is based on open collaboration among cloud service providers, through deep fusion of multi-party cloud resources, developers can customize cloud services in a software definition mode conveniently, cloud value is created, and a new generation cloud computing mode of 'no service boundary, collaboration among clouds, easy sharing of resources and convertible value' is achieved. Currently, users are gradually accessing cloud resources of multiple cloud service providers, which can provide more flexible storage guarantee for users than storing data in a single cloud service provider. However, at present, certain confusion exists for the use condition of cloud resources, the cloud resources are not universal, so that waste of a lot of idle cloud resources is caused, access of illegal cloud resources cannot be avoided in the prior art, and cloud storage security is low.
In order to solve the technical problems described above, the embodiments of the present application provide a cloud resource processing method, apparatus, device, and storage medium, where in the method, a cloud resource sharing platform, a cloud resource provider, and a cloud resource user all join a blockchain network, first, the cloud resource sharing platform may assist the cloud resource provider and the cloud resource user to perform security authentication of both sides based on a random number, and on the premise of determining both sides are secure, the cloud resource provider determines whether to provide resources for the cloud resource user by combining two aspects of a time domain and a space domain, and implements resource allocation by combining the time domain and the space domain.
Optionally, fig. 1 is a schematic diagram of a cloud resource processing system architecture according to an embodiment of the present application. As shown in fig. 1, the above architecture includes: cloud resource sharing platform 101, cloud resource provider 102, and cloud resource consumer 103.
It can be appreciated that the number and specific structure of the cloud resource sharing platform, the cloud resource provider, and the cloud resource user may be determined according to practical situations, fig. 1 is only schematic, and the number of the nodes in the embodiment of the present application is not limited specifically.
The cloud resource sharing platform, the cloud resource provider and the cloud resource user are all nodes connected in the blockchain network, the nodes can be cloud servers, servers or terminal equipment, and the like, and communication can be realized between any two nodes through the blockchain network.
The cloud resource sharing platform, the cloud resource provider and the cloud resource user can be arranged on a server or terminal equipment, and the cloud resource sharing platform, the cloud resource provider and the cloud resource user can also be the server or the terminal equipment.
It will be appreciated that the architecture illustrated in the embodiments of the present application does not constitute a specific limitation on the architecture of the cloud resource processing system. In other possible embodiments of the present application, the architecture may include more or fewer components than those illustrated, or some components may be combined, some components may be separated, or different component arrangements may be specifically determined according to the actual application scenario, and the present application is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In addition, the network architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and as a person of ordinary skill in the art can know, with evolution of the network architecture and appearance of a new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The following description of the technical solutions of the present application will take several embodiments as examples, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is a flow chart of a cloud resource processing method provided in an embodiment of the present application, where the embodiment of the present application may be applied to the cloud resource processing system in fig. 1, and a specific execution body may be determined according to an actual application scenario. As shown in fig. 2, the method comprises the steps of:
s201: the cloud resource sharing platform generates a first random code and a second random code, the first random code is sent to a cloud resource user, and the second random code is sent to a cloud resource provider.
Optionally, before the cloud resource sharing platform generates the first random code and the second random code, the first random code is sent to the cloud resource user, and the second random code is sent to the cloud resource provider, the method further includes: the cloud resource sharing platform, the cloud resource provider and the cloud resource user are accessed into the blockchain network and respectively realize registration in the blockchain network; the cloud resource provider publishes cloud resource description information on the blockchain in a private key signed broadcast information mode.
Here, before cloud resource allocation and scheduling, the cloud resource sharing platform, the cloud resource provider and the cloud resource user access the blockchain network in advance and realize registration, so that information interaction and resource sharing are realized through the blockchain, and the utilization rate of resources is improved.
Optionally, sending the first random code to the cloud resource user and the second random code to the cloud resource provider includes: and sending the first random code to the cloud resource user in a mobile switching network mode, and sending the second random code to the cloud resource provider in a mobile switching network mode.
Alternatively, the random code may be sent by way of a short message.
The information is sent in a mobile switching network mode, so that confidentiality is achieved, and the security of cloud resource processing is further improved.
S202: and the cloud resource provider carries out security authentication on the cloud resource user according to the first random code to obtain a first authentication result.
Optionally, the cloud resource provider performs security authentication on the cloud resource user according to the first random code to obtain a first authentication result, including:
after receiving the first random code, the cloud resource user performs private key encryption processing on the first random code according to a preset algorithm to obtain a first encryption result, and sends the cloud resource requirement and the first encryption result to a blockchain network; the cloud resource provider receives the cloud resource requirement and the first encryption result, decrypts the first encryption result to obtain a third random code, and sends the third random code and a cloud resource user identifier to the cloud resource sharing platform; after receiving the third random code and the cloud resource user identifier, the cloud resource sharing platform determines a first random code corresponding to the cloud resource user identifier, compares the first random code with the third random code, and determines a first authentication result according to the comparison result.
The cloud resource user and the cloud resource provider can be stored before encryption.
Here, when the cloud resource provider performs security authentication and validation on the cloud resource user, the cloud resource provider performs encryption processing through a preset algorithm by combining the first random code sent by the cloud resource sharing platform to obtain a first encryption result, the first encryption result is sent to the cloud resource provider through a blockchain, after decryption processing is performed by the cloud resource provider, the third random code is obtained and sent to the cloud resource sharing platform for comparison, and the cloud resource sharing platform provides the security authentication result for the cloud resource provider through comparison of the random numbers, so that security validation on the cloud resource user is achieved, the verification mode is simple, high in efficiency and high in accuracy, and security and reliability of cloud resource processing are further improved.
S203: and the cloud resource user performs security authentication on the cloud resource provider according to the second random code to obtain a second authentication result.
Optionally, the cloud resource user performs security authentication on the cloud resource provider according to the second random code to obtain a second authentication result, including:
After receiving the second random code, the cloud resource provider performs private key encryption processing on the second random code according to a preset algorithm to obtain a second encryption result, and the second encryption result is sent to the blockchain network; the cloud resource user receives the second encryption result, decrypts the second encryption result to obtain a fourth random code, and sends the fourth random code and the cloud resource provider identifier to the cloud resource sharing platform; after receiving the fourth random code and the cloud resource provider identifier, the cloud resource sharing platform determines a second random code corresponding to the cloud resource provider identifier, compares the second random code with the fourth random code, and determines a second authentication result according to the comparison result.
Here, the cloud resource user can realize the security right of the cloud resource provider by means of the random number issued by the cloud resource sharing platform, so that the validity and reliability of the cloud resource provider are further ensured, and the security of cloud storage processing is improved.
S204: if the first authentication result and the second authentication result are both successful in authentication, at least one cloud resource provider in the blockchain acquires a cloud resource requirement issued by a cloud resource user on the blockchain, analyzes and processes frequency variables in the cloud resource requirement in terms of a time domain, analyzes and processes hot spot space distribution in the cloud resource requirement in terms of a space domain, determines whether the cloud resource provider meets requirements of the cloud resource requirement on the time domain and the space domain at the same time, and if so, broadcasts meeting requirement information and cost information on the blockchain.
Optionally, analyzing and processing the frequency variable in the cloud resource demand in terms of time domain includes: in the aspect of time domain, the frequency variable in the cloud resource requirement is analyzed and processed by combining the discrete Fourier transform and the autocorrelation function.
The embodiment of the application combines the discrete Fourier transform and the autocorrelation function to analyze whether the cloud resource provider can meet the cloud resource requirement in terms of time domain, can accurately and comprehensively determine the resource allocation and scheduling conditions, and realizes accurate and efficient resource sharing.
Optionally, analyzing and processing the hot spot spatial distribution in the cloud resource demand in terms of spatial domain includes: in the aspect of space domain, self-adaptive clustering processing is carried out on the resource geographic distribution interest sites in the cloud resource demand, and the hot spot space distribution of the cloud resource demand is determined.
The embodiment of the application performs self-adaptive clustering processing on the resource geographic distribution interest sites in the cloud resource demands, and can accurately determine the hot spot spatial distribution of the cloud resource demands, so that whether the cloud resource provider can meet the cloud resource demands in terms of spatial domain is determined and comprehensively analyzed, the resource allocation and scheduling conditions can be accurately and comprehensively determined, and accurate and efficient resource sharing is realized.
S205: after receiving the demand meeting information and the cost information sent by the at least one cloud resource provider, the cloud resource user determines N target cloud resource providers according to the demand meeting information and the cost information sent by the at least one cloud resource provider.
Wherein N is any positive integer.
Optionally, after the cloud resource user receives the meeting requirement information and the cost information sent by the at least one cloud resource provider, determining N target cloud resource providers according to the meeting requirement information and the cost information sent by the at least one cloud resource provider, the method further includes: the cloud resource user signs the data to be stored through a cloud resource user certificate; and uploading the data to be stored after signature processing to a target cloud resource provider.
Optionally, if the cloud resource provider receives the unsigned data, an alarm message is initiated, for example, the alarm message is sent to the cloud resource sharing platform.
When the cloud resource provided by the cloud resource provider is used, the cloud resource user signs the data stream through the certificate of the cloud resource user, so that signature tracing in the data circulation process is realized, each data can find a data source, traceability, safety and legality of the cloud resource data stream are ensured, and the safety of cloud resource processing is further improved.
The embodiment of the application provides a cloud resource allocation determining mode, a cloud resource sharing platform, a cloud resource provider and a cloud resource user all join in a blockchain network, firstly, the cloud resource sharing platform can assist the cloud resource provider and the cloud resource user to carry out security authentication of the two parties based on random numbers, on the premise of determining the security of the two parties, the cloud resource provider confirms the resources by combining two aspects of a time domain and a space domain, determines whether the resources can be provided for the cloud resource user or not, realizes sharing of the cloud resources through a blockchain, realizes allocation of the resources by combining the time domain and the space domain, improves the utilization rate of the resources, ensures legality of the cloud resources through bidirectional confirmation, and improves the security of cloud storage.
The embodiment of the application also provides a cloud resource processing method which is applied to the cloud resource processing system. The method comprises the following steps:
step one: and the cloud resource provider and the cloud resource user and the cloud resource sharing platform are both accessed into the blockchain network, and the blockchain identification and the blockchain public key of the cloud resource provider and the cloud resource user are respectively issued into the blockchain network for registration in a mode of broadcasting messages signed by the private key.
Step two: registration information of the cloud resource provider and the cloud resource user is written into a new block of the blockchain by the blockchain miner, and then written into a blockchain ledger.
Step three: the cloud resource provider sends the cloud resource description information to the blockchain in a mode of broadcasting messages signed by the private key.
Step four: the cloud resource sharing platform carries a random code 1 generated based on a time stamp or another user name and the like with data for the cloud resource user, and for safety, the cloud resource sharing platform sends the random code 1 to the cloud resource user (for example, by means of short messages) by means of a mobile switching network.
Step five: the cloud resource user encrypts the random code by using a private key according to a preset algorithm to obtain an encryption result 1, and the cloud resource user sends a broadcast message signed by using the private key together with the cloud resource requirement and the encryption result 1 to the blockchain network.
Step six: the cloud resource provider firstly verifies the private key signature of the broadcast information in the step five, if the verification is passed, then the encryption result 1 is extracted, the public key of the cloud resource user is used for decryption, then a random code 2 is obtained, then the cloud resource provider sends the random code 2 and the identification of the cloud resource user to a cloud resource sharing platform (for example, in a short message mode) in a mobile switching network mode, the cloud resource sharing platform receives the random code 2 and the identification of the cloud resource user for correspondence, and whether the random code 2 is equal to the random code 1 is checked, if the random code 2 is equal, the identity of the cloud resource user is legal and reliable.
Step seven: the legitimacy of the identity of the cloud resource provider by the cloud resource user also performs authentication in the steps four to six.
Step eight: and if the authentication in the step six and the step seven are passed, then, in terms of a time domain, the cloud resource provider analyzes frequency (period) components of the cloud resource requirements in the cloud resource requirement description by combining discrete Fourier transform and an autocorrelation function, and in terms of a space domain, performs self-adaptive clustering processing on the resource geographic distribution interest places in the cloud resource requirement description, and analyzes the spatial distribution of the cloud resource use requirement hot spots. If the cloud resource provider finds that the cloud resource provider can meet the requirements of the cloud resource using requirement of the cloud resource using party in the time domain and the space domain, the cloud resource provider issues the information meeting the requirements of the cloud resource using party and the charging standard of the cloud resource using party to the blockchain network in a mode of using broadcast information signed by a private key.
Step nine: according to the information of different cloud resource providers and charging standards received by the cloud resource user, selecting which cloud resource services are used, and signing the data flow of the cloud resource through the certificate of the cloud resource user when the cloud resource user uses the cloud resource. Data sent by the cloud resource server without signature is not allowed to be used in circulation. In this way, the data circulated in the cloud resource can be traced to where according to the signature. Thereby ensuring traceability and security legitimacy of the cloud resource data stream.
Fig. 3 is a schematic structural diagram of a cloud resource processing device provided in an embodiment of the present application, and as shown in fig. 3, the device in the embodiment of the present application includes: a generation module 301, a first authentication module 302, a second authentication module 303, a first processing module 304 and a second processing module 305. The cloud resource processing device may be a server or a terminal device, or a chip or an integrated circuit that realizes functions of the server or the terminal device. Here, the generating module 301, the first authenticating module 302, the second authenticating module 303, the first processing module 304, and the second processing module 305 are only a logical functional partition, and may be physically integrated or independent.
The cloud resource sharing platform is used for generating a first random code and a second random code, sending the first random code to a cloud resource user and sending the second random code to a cloud resource provider;
the cloud resource provider is used for carrying out security authentication on the cloud resource user according to the first random code to obtain a first authentication result;
the second authentication module is used for carrying out security authentication on the cloud resource provider by the cloud resource user according to the second random code to obtain a second authentication result;
The first processing module is used for acquiring the cloud resource requirements issued by the cloud resource user on the blockchain by at least one cloud resource provider in the blockchain if the first authentication result and the second authentication result are authentication success, analyzing and processing frequency variables in the cloud resource requirements in terms of time domain, analyzing and processing hot spot space distribution in the cloud resource requirements in terms of space domain, determining whether the cloud resource provider meets the requirements of the cloud resource requirements on the time domain and the space domain at the same time, and broadcasting meeting requirement information and cost information on the blockchain by the cloud resource provider if the cloud resource requirements meet the requirements;
the second processing module is used for determining N target cloud resource providers according to the meeting demand information and the cost information sent by the at least one cloud resource provider after the cloud resource user receives the meeting demand information and the cost information sent by the at least one cloud resource provider, wherein N is any positive integer.
Optionally, the first authentication module is specifically configured to:
after receiving the first random code, the cloud resource user performs private key encryption processing on the first random code according to a preset algorithm to obtain a first encryption result, and sends the cloud resource requirement and the first encryption result to a blockchain network;
The cloud resource provider receives the cloud resource requirement and the first encryption result, decrypts the first encryption result to obtain a third random code, and sends the third random code and a cloud resource user identifier to the cloud resource sharing platform;
after receiving the third random code and the cloud resource user identifier, the cloud resource sharing platform determines a first random code corresponding to the cloud resource user identifier, compares the first random code with the third random code, and determines a first authentication result according to the comparison result.
Optionally, the second authentication module is specifically configured to:
after receiving the second random code, the cloud resource provider performs private key encryption processing on the second random code according to a preset algorithm to obtain a second encryption result, and the second encryption result is sent to the blockchain network;
the cloud resource user receives the second encryption result, decrypts the second encryption result to obtain a fourth random code, and sends the fourth random code and the cloud resource provider identifier to the cloud resource sharing platform;
after receiving the fourth random code and the cloud resource provider identifier, the cloud resource sharing platform determines a second random code corresponding to the cloud resource provider identifier, compares the second random code with the fourth random code, and determines a second authentication result according to the comparison result.
Optionally, the first processing module is specifically configured to:
in the aspect of time domain, the frequency variable in the cloud resource requirement is analyzed and processed by combining the discrete Fourier transform and the autocorrelation function.
Optionally, the first processing module is further specifically configured to:
in the aspect of space domain, self-adaptive clustering processing is carried out on the resource geographic distribution interest sites in the cloud resource demand, and the hot spot space distribution of the cloud resource demand is determined.
Optionally, after the second processing module is configured to determine, after the cloud resource user receives the meeting requirement information and the cost information sent by the at least one cloud resource provider, N target cloud resource providers according to the meeting requirement information and the cost information sent by the at least one cloud resource provider, the apparatus further includes a signature module configured to:
the cloud resource user signs the data to be stored through a cloud resource user certificate;
and uploading the data to be stored after signature processing to a target cloud resource provider.
Optionally, before the generating module is configured to generate the first random code and the second random code by using the cloud resource sharing platform, send the first random code to a cloud resource user, and send the second random code to the cloud resource provider, the apparatus further includes a registering module configured to:
The cloud resource sharing platform, the cloud resource provider and the cloud resource user are accessed into the blockchain network and respectively realize registration in the blockchain network;
the cloud resource provider publishes cloud resource description information on the blockchain in a private key signed broadcast information mode.
Optionally, the generating module is specifically configured to:
and sending the first random code to the cloud resource user in a mobile switching network mode, and sending the second random code to the cloud resource provider in a mobile switching network mode.
Referring to fig. 4, there is shown a schematic diagram of a configuration of a cloud resource processing device 400 suitable for use in implementing embodiments of the present disclosure, where the cloud resource processing device 400 may be a terminal device or a server. The terminal device may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a personal digital assistant (Personal Digital Assistant, PDA for short), a tablet (Portable Android Device, PAD for short), a portable multimedia player (Portable Media Player, PMP for short), an in-vehicle terminal (e.g., an in-vehicle navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The cloud resource processing device illustrated in fig. 4 is only one example, and should not impose any limitation on the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the cloud resource processing apparatus 400 may include a processing device (e.g., a central processor, a graphics processor, etc.) 401 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 402 or a program loaded from a storage device 408 into a random access Memory (Random Access Memory, RAM) 403. In the RAM 403, various programs and data required for the operation of the cloud resource processing apparatus 400 are also stored. The processing device 401, the ROM 402, and the RAM 403 are connected to each other by a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
In general, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a liquid crystal display (Liquid Crystal Display, LCD for short), a speaker, a vibrator, and the like; storage 408 including, for example, magnetic tape, hard disk, etc.; and a communication device 409. The communication means 409 may allow the cloud resource processing device 400 to communicate wirelessly or by wire with other devices to exchange data. While fig. 4 illustrates a cloud resource processing apparatus 400 having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via communications device 409, or from storage 408, or from ROM 402. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing device 401.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the cloud resource processing apparatus; or may exist alone without being assembled into the cloud resource processing device.
The computer-readable medium carries one or more programs which, when executed by the cloud resource processing device, cause the cloud resource processing device to perform the method shown in the above embodiment.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a local area network (Local Area Network, LAN for short) or a wide area network (Wide Area Network, WAN for short), or it may be connected to an external computer (e.g., connected via the internet using an internet service provider).
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A cloud resource processing method, the method comprising:
the cloud resource sharing platform generates a first random code and a second random code, the first random code is sent to a cloud resource user, and the second random code is sent to a cloud resource provider;
the cloud resource provider carries out security authentication on the cloud resource user according to the first random code to obtain a first authentication result;
the cloud resource user performs security authentication on the cloud resource provider according to the second random code to obtain a second authentication result;
if the first authentication result and the second authentication result are authentication success, at least one cloud resource provider in a blockchain acquires a cloud resource requirement issued by a cloud resource user on the blockchain, analyzes and processes frequency variables in the cloud resource requirement in a time domain, analyzes and processes hot spot space distribution in the cloud resource requirement in a space domain, determines whether the cloud resource provider meets requirements of the cloud resource requirement on the time domain and the space domain at the same time, and if so, broadcasts meeting requirement information and cost information on the blockchain;
After receiving the demand meeting information and the cost information sent by the at least one cloud resource provider, the cloud resource user determines N target cloud resource providers according to the demand meeting information and the cost information sent by the at least one cloud resource provider, wherein N is any positive integer.
2. The method of claim 1, wherein the cloud resource provider performs security authentication on the cloud resource consumer according to the first random code to obtain a first authentication result, including:
after receiving the first random code, the cloud resource user performs private key encryption processing on the first random code according to a preset algorithm to obtain a first encryption result, and sends a cloud resource requirement and the first encryption result to a blockchain network;
the cloud resource provider receives the cloud resource requirement and the first encryption result, decrypts the first encryption result to obtain a third random code, and sends the third random code and a cloud resource user identifier to a cloud resource sharing platform;
after receiving the third random code and the cloud resource user identifier, the cloud resource sharing platform determines a first random code corresponding to the cloud resource user identifier, compares the first random code with the third random code, and determines a first authentication result according to the comparison result.
3. The method of claim 1, wherein the cloud resource consumer securely authenticates the cloud resource provider according to the second random code to obtain a second authentication result, comprising:
after receiving the second random code, the cloud resource provider performs private key encryption processing on the second random code according to a preset algorithm to obtain a second encryption result, and sends the second encryption result to a blockchain network;
the cloud resource user receives the second encryption result, decrypts the second encryption result to obtain a fourth random code, and sends the fourth random code and a cloud resource provider identifier to a cloud resource sharing platform;
and after receiving the fourth random code and the cloud resource provider identifier, the cloud resource sharing platform determines a second random code corresponding to the cloud resource provider identifier, compares the second random code with the fourth random code, and determines a second authentication result according to the comparison result.
4. The method of claim 1, wherein said analyzing the frequency variation in the cloud resource demand in the time domain comprises:
And in the aspect of time domain, combining discrete Fourier transform and an autocorrelation function, and analyzing and processing the frequency variable in the cloud resource demand.
5. The method of claim 1, wherein the analyzing the spatial distribution of the hot spots in the cloud resource demand in the spatial domain comprises:
in the aspect of a space domain, carrying out self-adaptive clustering processing on the resource geographic distribution interest sites in the cloud resource demands, and determining the hot spot space distribution of the cloud resource demands.
6. The method according to any one of claims 1 to 5, wherein after the cloud resource consumer receives the meeting demand information and the cost information sent by the at least one cloud resource provider, determining N target cloud resource providers according to the meeting demand information and the cost information sent by the at least one cloud resource provider, further comprises:
the cloud resource user signs the data to be stored through a cloud resource user certificate;
and uploading the data to be stored after signature processing to a target cloud resource provider.
7. The method of any one of claims 1 to 5, wherein before the cloud resource sharing platform generates a first random code and a second random code, the first random code is sent to a cloud resource consumer, and the second random code is sent to a cloud resource provider, further comprising:
The cloud resource sharing platform, the cloud resource provider and the cloud resource user are accessed into the blockchain network and respectively realize registration in the blockchain network;
the cloud resource provider publishes cloud resource description information on the blockchain in a private key signed broadcast information mode.
8. The method of any of claims 1 to 5, wherein the sending the first random code to a cloud resource consumer and the second random code to a cloud resource provider comprises:
and the first random code is sent to a cloud resource user in a mobile switching network mode, and the second random code is sent to a cloud resource provider in a mobile switching network mode.
9. A cloud resource processing apparatus, characterized by comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the cloud resource processing method of any of claims 1 to 8.
10. A computer readable storage medium having stored therein computer executable instructions which when executed by a processor are for implementing the cloud resource processing method according to any of claims 1 to 8.
CN202310714491.5A 2023-06-16 2023-06-16 Cloud resource processing method, device, equipment and storage medium Active CN116471327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310714491.5A CN116471327B (en) 2023-06-16 2023-06-16 Cloud resource processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310714491.5A CN116471327B (en) 2023-06-16 2023-06-16 Cloud resource processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116471327A true CN116471327A (en) 2023-07-21
CN116471327B CN116471327B (en) 2023-09-05

Family

ID=87181117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310714491.5A Active CN116471327B (en) 2023-06-16 2023-06-16 Cloud resource processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116471327B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474544A (en) * 2018-11-20 2019-03-15 郑州云海信息技术有限公司 A kind of distribution method and system interconnecting cloud resource
CN111324881A (en) * 2020-02-20 2020-06-23 铭数科技(青岛)有限公司 Data security sharing system and method fusing Kerberos authentication server and block chain
CN111489239A (en) * 2020-04-13 2020-08-04 成都链向科技有限公司 Public chain-based cloud manufacturing service platform construction method
US20200379816A1 (en) * 2019-05-31 2020-12-03 Ecloudvalley Digital Technology Co., Ltd. Cloud resource management system, cloud resource management method, and non-transitory computer-readable storage medium
CN114860425A (en) * 2022-04-02 2022-08-05 武汉理工大学 Service cloud platform based on cloud resources
CN115766294A (en) * 2023-01-05 2023-03-07 中国联合网络通信集团有限公司 Cloud server resource authentication processing method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474544A (en) * 2018-11-20 2019-03-15 郑州云海信息技术有限公司 A kind of distribution method and system interconnecting cloud resource
US20200379816A1 (en) * 2019-05-31 2020-12-03 Ecloudvalley Digital Technology Co., Ltd. Cloud resource management system, cloud resource management method, and non-transitory computer-readable storage medium
CN111324881A (en) * 2020-02-20 2020-06-23 铭数科技(青岛)有限公司 Data security sharing system and method fusing Kerberos authentication server and block chain
CN111489239A (en) * 2020-04-13 2020-08-04 成都链向科技有限公司 Public chain-based cloud manufacturing service platform construction method
CN114860425A (en) * 2022-04-02 2022-08-05 武汉理工大学 Service cloud platform based on cloud resources
CN115766294A (en) * 2023-01-05 2023-03-07 中国联合网络通信集团有限公司 Cloud server resource authentication processing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN116471327B (en) 2023-09-05

Similar Documents

Publication Publication Date Title
CN111914229B (en) Identity verification method and device, electronic equipment and storage medium
CN111199037B (en) Login method, system and device
CN108923925B (en) Data storage method and device applied to block chain
CN112149168B (en) File data encryption method and device and electronic equipment
CN107920060B (en) Data access method and device based on account
CN110705985B (en) Method and apparatus for storing information
CN114244525B (en) Request data processing method, device, equipment and storage medium
CN115766294B (en) Cloud server resource authentication processing method, device, equipment and storage medium
CN115987657B (en) Cloud storage security authentication method, device, equipment and storage medium
CN116015900B (en) Data self-storage self-verification method, device, equipment and storage medium
CN116471327B (en) Cloud resource processing method, device, equipment and storage medium
CN114584324B (en) Identity authorization method and system based on block chain
CN114640533B (en) Method and device for transmitting message, storage medium and electronic equipment
CN115906140A (en) Bidding data processing method, device, equipment and storage medium
CN115150086A (en) Identity authentication method and equipment of public key based on biological characteristics of cloud service
CN115987661B (en) Cloud server data self-storage method, device, equipment and storage medium
CN115879135B (en) Bid data processing method, device, equipment and storage medium
CN115766830B (en) Computing power network processing method, device, equipment and storage medium
CN116132125B (en) Cloud service data storage method, device, equipment and storage medium
CN113138739B (en) Screen projection method, system, device, electronic equipment and storage medium
CN115174062B (en) Cloud service authentication method, device, equipment and storage medium
CN116456341B (en) Data security authentication method, device, equipment and storage medium
CN115906182A (en) Data comparison processing method, device, equipment and storage medium
CN116996201A (en) Method, device, equipment and storage medium for processing calculation force data
CN117254979A (en) Multi-cloud access method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant