期刊文献+

一种用于云计算的数据容灾分配算法的改进 被引量:8

An Improved Data Disaster Allocation Algorithm for Cloud Computing
下载PDF
导出
摘要 在云计算环境下进行数据容灾分配,可以提高云计算数据资源调度能力。传统算法采用粒子群数据聚类方法进行数据的容灾分配,数据负载均衡差,同时消耗数据任务调度的吞吐率。提出一种新的数据容灾分配改进算法。首先建立云计算环境下数据容灾分配层次结构模型,计算整个数据资源处理平台的整体响应时间,将云计算下的数据资源容灾分配优化问题转化为数据资源分配响应时间最小化问题;利用多用户QoS开销适应度运算机制和粒子群聚类算法对云计算中数据资源任务进行权衡分配,减少数据权衡调度时间,提高数据容灾备份能力。实验结果表明,采用改进算法可以提高数据容灾分配时数据的召回率和云计算数据任务权衡调度能力,在云计算信息处理中具有较好的应用价值。 In cloud computing environment disaster data distribution,the ability of cloud computing data resource scheduling can be improved. Traditional algorithm uses the particle swarm disaster data clustering method of data distribution,data load balance,at the same time consumption data throughput rate of task scheduling. Presents a new disaster data allocation algorithm. First a cloud computing environment disaster data distribution hierarchy model was established,the overall response time of the whole resource data processing platform was calculated,disaster will under the cloud of data resource allocation optimization problem is transformed into the data response time minimization problem of resource distribution,multiple users QoS overhead fitness operation mechanism and particle clustering algorithm were used to weigh the data resources in cloud computing task allocation. The data balance scheduling time was reduced,the ability of disaster data backup was improved. The experimental results show that the improved algorithm can improve the recall of disaster data distribution when the data rate and the cloud data task scheduling ability to balance,in cloud computing information processing has good application value.
作者 林国勇 黄帆
出处 《科学技术与工程》 北大核心 2017年第1期260-264,共5页 Science Technology and Engineering
基金 2015年度广西壮族自治区高等学校科学研究项目(KY2015YB495)资助
关键词 云计算 QoS开销适应度 粒子群聚类 cloud computing QoS overhead fitness particle cluster class
  • 相关文献

参考文献7

二级参考文献100

  • 1刘正伟,文中领,张海涛.云计算和云数据管理技术[J].计算机研究与发展,2012,49(S1):26-31. 被引量:170
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1148

同被引文献56

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部