期刊文献+

数据虚拟化平台的设计与实现 被引量:7

Design and implementation of data virtualization platform
下载PDF
导出
摘要 为了解决大数据所面临的数据源多样化、数据规模大、数据异构异质性、数据抽取、共享和整合等问题,提出了一种利用数据虚拟化技术来设计和构建数据虚拟化平台以实现数据融合的方法。首先,从整体上介绍了数据虚拟化平台的设计架构;其次,详细介绍了源数据层对异构、异质数据的处理方案;再次,分析了虚拟数据对象层的结构并对数据的抽取和回写等方法进行了详细的论述;最后,阐述了应用接口层的实现机理和实现方法。通过数据虚拟化平台,能够将各种异构、异质的数据进行重新整合、抽象,然后定义出新的数据对象供上层使用,有效解决了大数据环境下数据融合的问题。 In order to solve the issues faced by big data, such as diversity of data sources, large scale of data,heterogeneous data, data extraction, data sharing and integrating, a method for data fusion using data virtualization to design and construct data virtualization platform was proposed. Firstly, the design framework of data virtualization platform was given from a global view. Secondly, the scheme was introduced that the heterogeneous data was processed in the source data layer.Thirdly, the structure of the virtual data object layer was analyzed, and the methods of data extracting and writing back were discussed in detail. Finally, the mechanism and method of realizing are expounded in the application interface layer. The problem of data fusion in big data environment was effectively solved through the data virtualization platform, by reintegrating and abstracting the heterogeneous data and then new data objects were defined for upper level using.
出处 《计算机应用》 CSCD 北大核心 2017年第A02期225-228,235,共5页 journal of Computer Applications
基金 广州市教育科学"十二五"规划2015年度课题(1201533344)
关键词 数据虚拟化 大数据 云计算 数据融合 数据即服务 data virtualization big data cloud computing data fusion Data as a Service (DaaS)
  • 相关文献

参考文献9

二级参考文献93

  • 1牛燕华,任新华,毕经平.Internet网络测量方式综述[J].计算机应用与软件,2006,23(7):11-13. 被引量:18
  • 2胡嘉玺.虚拟智慧:VmwarevSphere运维实录[M].北京:清华大学出版社,2011.
  • 3欧阳春娟,李斌,李霞.基于蛙跳优化的安全LSB匹配隐写算法[J].新型工业化,2012,2(1):32-38.
  • 4和轶东,张怡,曹乃刚.SAPMDM主数据管理[M].北京:清华大学出版社,2013:494-498,553.
  • 5Holz R, Braun L, Kammenhuber N, et al. The SSL landscape: A thorough analysis of the x. 509 PKI using active and passive measurements/ /Proceedings of the 20 II ACM SIGCOMM Conference on Internet Measurement. Berlin, Germany, 2011: 427-444.
  • 6Levillain 0, Ebalard A, Morin B, et al. One year of SSL internet measurement/ /Proceedings of the 28th Annual Computer Security Applications Conference. Orlando, USA, 2012: 11-20.
  • 7Ristic I. Internet SSL survey 2010. Redwood City, USA: Qualys , Inc. , Talk at Black Hat , 2010.
  • 8Bernaille L, Teixeira R. Early recognition of encrypted applications/ /Proceedings of the 8th International Conference on Passive and Active Network Measurement. Louvain-laneuve , Belgium, 2007: 165-175.
  • 9Hirvonen M, Sailio M. Two-phased method for identifying SSH encrypted application flows/ /Proceedings of the 7th International Wireless Communications and Mobile Computing Conference. Istanbul, Turkey, 2011: 1033-1038.
  • 10Fu Pei-Pei, Guo Li , Xiong Gang, et al. Classification research on SSL encrypted application/ /Proceedings of the 2012 International Standard Conference on Trustworthy Computing and Services. Beijing, China, 2013: 404-411.

共引文献278

同被引文献58

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部