首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 203 毫秒
1.
云计算是以虚拟化技术为基础,以网络为载体提供基础架构、平台、软件等服务为形式,整合大规模可扩展的计算、存储、数据、应用等分布式计算资源进行协同工作的超级计算模式。云计算技术的出现使得人们可以直接通过网络应用获取软件和计算能力,这一新的模式将会给传统的IT产业带来一场巨大的变革,云计算正在成为一种发展趋势。本文就云计算的发展前景和存在的风险谈几点思考。  相似文献   

2.
基于云计算的高校机房管理方法   总被引:2,自引:0,他引:2  
通过互联网网连接到云计算中心的方式,并利用云计算技术的自身优势,包括软件服务Saas、平台服务PAAS、基础设施服务IAAS、虚拟化资源和物理资源池几大平台,探讨了一种云计算技术在高校机房管理的应用模式。基于云计算的高校机房管理方法,可为机房管理人员提供方便快捷的管理方法,降低学校在机房管理方面的投资,并为高校所有用户提供更为智能化的优质服务。  相似文献   

3.
一种扩展的多操作系统远程启动协议ENCBP   总被引:1,自引:0,他引:1  
提出一种在局域网环境下对网络计算设备进行远程多操作系统引导的协议--ENCBP(extended network_based client boot protocol)协议,对现有的NCBP(network-based client bootprotocol)协议进行改进,通过区分引导的操作系统内核结构的类型改进了协议交互的过程,提高了单内核操作系统远程启动的效率,提出更安全的传输方法,增强了协议的安全性,引入在BIOS芯片中的固件启动代理,节省了对附加芯片的需求.最后以基于龙芯Ⅱ号平台的透明计算系统作为应用实例进行测试,并对测试结果做了分析和评价,验证了该方法的有效性.  相似文献   

4.
宋彬彬 《软件》2020,(2):276-278,287
云计算可以用于商业计算方法,它可以使计算指令发给很多计算机组建的资源池上,使用客户可以按照自己的去求得到想要的计算方式、存储空间和信息服务,客户可以从逻辑底层硬件、网络协议和软件中更好的解脱出来。我们在使用计算机技术中,肯定存在信息安全问题,所以我们需要加强计算机网络信息安全及防护。同时也要深入探讨和分析计算机网络防护以及安全。因此,本文主要就云计算背景下环计算机网络安全进行研究和讨论。也会主要说明做好计算机网络安全防范的重要性,希望可以在保证资源信息共享的情况下,使运行稳定,还可以使用户的生活和工作更加便捷。  相似文献   

5.
云计算已成为信息通信领域最具活力的增长点之一.云服务改变了以往的信息化模式,正引领软件、硬件和网络技术的深度融合与快速创新,深刻地影响着整个信息通信产业的发展格局.2013年10月,可信云服务认证正式启动,这标志着我国也拥有了自己的云服务质量评估体系.可信云服务认证的核心目标是建立云服务商的评估体系,为用户选择安全、可信的云服务商提供支撑,并最终促进我国云计算市场健康、有序发展.  相似文献   

6.
While the infrastructure of computing shifting from isolated computers to Internet-linked resources, the software industry transfers its focus from computing products to dependable services. That''s one of the reasons why pervasive computing, grid computing, service computing and cloud computing are introduced on the open and dynamic Internet-linked platform. The communication abilities it introduced enable various resources exchanging and sharing freely, and participating in the community in the social network. There are three layers in such a platform: computing infrastructure, software services and information web. The underline layer, computing infrastructure, provides computing and communication facilities, and the surface layer, information web, is full of information recombination and consuming. The layer of software services serves as a factory to process constantly emerging and heterogeneous dynamic information using distributed, autonomous, and evolvable computing facilities. Therefore, services provided by such software systems should be adaptive, situational, trustworthy, autonomous and etc. To achieve flexible objectives, these services can be coordinated in various styles such as integration, cooperation, orchestration and etc. A portmanteau term \Internetware" is used  相似文献   

7.
Massimo Ficco  Stefano Russo 《Software》2009,39(13):1095-1125
Location‐aware computing is a form of context‐aware mobile computing that refers to the ability of providing users with services that depend on their position. Locating the user terminal, often called positioning, is essential in this form of computing. Towards this aim, several technologies exist, ranging from personal area networking, to indoor, outdoor, and up to geographic area systems. Developers of location‐aware software applications have to face with a number of design choices, that typically depend on the chosen technology. This work addresses the problem of easing the development of pull location‐aware applications, by allowing uniform access to multiple heterogeneous positioning systems. Towards this aim, the paper proposes an approach to structure location‐aware mobile computing systems in a way independent of positioning technologies. The approach consists in structuring the system into a layered architecture, that provides application developers with a standard Java Application Programming Interface (JSR‐179 API), and encapsulates location data management and technology‐specific positioning subsystems into lower layers with clear interfaces. In order to demonstrate the proposed approach we present the development of HyLocSys. It is an open hybrid software architecture designed to support indoor/outdoor applications, which allows the uniform (combined or separate) use of several positioning technologies. HyLocSys uses a hybrid data model, which allows the integration of different location information representations (using symbolic and geometric coordinates). Moreover, it allows support to handset‐ and infrastructure‐based positioning approaches while respecting the privacy of the user. The paper presents a prototypal implementation of HyLocSys for heterogeneous scenarios. It has been implemented and tested on several platforms and mobile devices. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

8.
目前,在新一代大规模互联网迅猛发展的背景下,产生的数据量也随之持续增长,这就导致用户的本地设备难以满足海量数据的存储和计算需求。与此同时,云计算作为一种经济高效且灵活的模式,具有易于使用、随用随付、不受时间和空间限制的优势,彻底改变了传统IT基础设施的提供和支付方式,可以有效解决无限增长的海量信息存储和计算问题。因此,在没有昂贵的存储成本和计算资源消耗的情况下,资源有限的用户可以采用云服务提供商(CloudServiceProvider,CSP)为用户提供所期望的服务。其中,基础设施即服务(Infrastructure as a Service, IaaS)作为云计算的三种服务类型之一,将虚拟化、分布式计算和网络存储等技术结合,可以在互联网上提供和租用计算基础设施资源服务(如计算、存储和网络)。故云计算依靠Iaa S层提供的计算基础设施资源,使用户不再需要购买额外设备,从而大大降低使用成本,同时也为上层服务奠定基础。然而,随着云计算服务的不断发展,基于IaaS的安全问题引起人们的关注。为了系统了解Iaa S的安全研究进展和现状,本文对IaaS的安全问题以及学术界和工业界的解决方案进行了...  相似文献   

9.
当前,云计算的研究和应用受到越来越多的关注,广阔的云计算平台能够为用户提供从基础设施到平台再到软件的一系列服务,云计算正逐步进入商业化阶段,因此基于云计算环境下的服务计费管理成为服务提供商的迫切需要。文章提出了一种针对云计算服务的计费方法,该方法兼顾了用户和服务提供商的权益,对云计算服务商用和市场化有积极的推动作用。  相似文献   

10.
Cloud computing is a rapid growing technology which delivers computing services such as servers, storage, database, networking, software and analytics. It has brought a new way to securely store and share information and data with multiple users. When authorized person access these clouds, the released data should not compromise any individual’s privacy and identity should not be revealed. Fog Computing is the extension of cloud with decentralized structure which stores the data in locations somewhere between the data source and cloud. The goal of fog computing is to provide high security, improve performance and network efficiency. We use quantum key distribution to produce and distribute key which change its quantum state and key, when key is known by mediator and it has ability to detect presence of mediator trying to gain lore of the key. In this paper, we introduced sugar-salt encryption which overcomes brute-force attack in effect delivers phony data in return to every incorrect guess of the password or key.  相似文献   

11.
雾计算可以为用户提供近距离的数据存储、计算和其他服务,因此雾计算中的任务调度和资源分配已经成为一个新的研究热点。考虑终端用户和雾设备通常处于一种相对开放的状态,扩展了雾计算的体系结构,提出一种开放式雾计算环境中基于稳定匹配的计算资源分配方案,利用雾网络中动态的计算资源协同为用户提供计算服务并收取计算收益,同时终端用户向雾服务器提交任务请求并支付一定的费用。基于稳定匹配的思想,利用子任务的优先级列表、子任务和计算服务设备的偏好列表解决子任务与计算服务设备的分配问题,保证任务的完成时间和计算服务设备的收益。通过实验对方案性能进行了分析,实验结果表明该方案的资源分配时间相对稳定,且在执行雾计算任务时延以及任务违规率上都优于SGA算法和ACOSA算法。  相似文献   

12.
Much of the ongoing research in ubiquitous computing has concentrated on providing context information, e.g. location information, to the level of services and applications. Typically, mobile clients obtain location information from their environment which is used to provide “locally optimal” services. In contrast, it may be of interest to obtain information about the current context a mobile user or device is in, from a client somewhere on the Web, i.e. to use the mobile device as an information provider for Internet clients. As an instance of such services we propose the metaphor of a “location-aware” Web homepage of mobile users providing information about, e.g. the current location a mobile user is at. Requesting this homepage can be as easy as typing a URL containing the mobile user's phone number such ashttp://mhp.net/+49123456789 in an off-the-shelf browser. The homepage is dynamically constructed as Web users access it and it can be configured in various ways that are controlled by the mobile user. We present the architecture and implementation and discuss issues around this example of “inverse” ubiquitous computing.  相似文献   

13.
As the sizes of IT infrastructure continue to grow, cloud computing is a natural extension of virtualisation technologies that enable scalable management of virtual machines over a plethora of physically connected systems. The so-called virtualisation-based cloud computing paradigm offers a practical approach to green IT/clouds, which emphasise the construction and deployment of scalable, energy-efficient network software applications (NetApp) by virtue of improved utilisation of the underlying resources. The latter is typically achieved through increased sharing of hardware and data in a multi-tenant cloud architecture/environment and, as such, accentuates the critical requirement for enhanced security services as an integrated component of the virtual infrastructure management strategy. This paper analyses the key security challenges faced by contemporary green cloud computing environments, and proposes a virtualisation security assurance architecture, CyberGuarder, which is designed to address several key security problems within the ‘green’ cloud computing context. In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service. Specifically, the proposed virtual machine security service incorporates a number of new techniques which include (1) a VMM-based integrity measurement approach for NetApp trusted loading, (2) a multi-granularity NetApp isolation mechanism to enable OS user isolation, and (3) a dynamic approach to virtual machine and network isolation for multiple NetApp’s based on energy-efficiency and security requirements. Secondly, a virtual network security service has been developed successfully to provide an adaptive virtual security appliance deployment in a NetApp execution environment, whereby traditional security services such as IDS and firewalls can be encapsulated as VM images and deployed over a virtual security network in accordance with the practical configuration of the virtualised infrastructure. Thirdly, a security service providing policy based trust management is proposed to facilitate access control to the resources pool and a trust federation mechanism to support/optimise task privacy and cost requirements across multiple resource pools. Preliminary studies of these services have been carried out on our iVIC platform, with promising results. As part of our ongoing research in large-scale, energy-efficient/green cloud computing, we are currently developing a virtual laboratory for our campus courses using the virtualisation infrastructure of iVIC, which incorporates the important results and experience of CyberGuarder in a practical context.  相似文献   

14.
A Smart City is a cyber–physical system improving urban behavior and capabilities by providing ICT-based functionalities. An infrastructure for Smart City has to be geographically and functionally extensible, as it requires both to grow up with the physical environment and to meet the increasing in needs and demands of city users/inhabitants. In this paper, we propose iSapiens, an IoT-based platform for the development of general cyber–physical systems suitable for the design and implementation of smart city services and applications. As distinguishing features, the iSapiens platform implements the edge computing paradigm through both the exploitation of the agent metaphor and a distributed network of computing nodes directly scattered in the urban environment. The platform promotes the dynamic deployment of new computing nodes as well as software agents for addressing geographical and functional extensibility. iSapiens provides a set of abstractions suitable to hide the heterogeneity of the physical sensing/actuator devices embedded in the system, and to support the development of complex applications. The paper also furnishes a set of methodological guidelines exploitable for the design and implementation of smart city applications by properly using iSapiens. As a significant case study, the design and implementation of a real Smart Street in the city of Cosenza (Italy) are shown, which provides decentralized urban intelligence services to citizens.  相似文献   

15.
狄筝  曹一凡  仇超  罗韬  王晓飞 《计算机应用》2022,42(6):1656-1661
随着人工智能(AI)算力向网络边缘甚至终端设备扩散,端边云超协同的算力网络成为最佳计算解决方案,而新机遇催生了端边云超计算和网络之间的深度集成。然而,集成系统的完整开发还没有得到很好的解决,包括适应性、灵活性和价值性,因此提出了一种区块链赋能的端边云超算力网络架构。其中,端边云超融合为框架提供基础设施,该设施构成的算力资源池为用户提供安全可靠的算力,网络通过调度资源满足用户需求,而框架内的神经网络和执行平台为AI任务执行提供接口;同时,区块链保证资源交易的可靠性,以激励更多算力贡献者加入平台。本框架为算力网络中的用户提供了适应性,为组网算力资源调度提供了灵活性,为算力供应商提供了价值激励,并利用案例清晰地描述了该新型算力网络架构。  相似文献   

16.
基于WebGIS信息整合与利用的林业电子政务   总被引:1,自引:0,他引:1  
林业电子政务要向社会公众提供专业服务。面向服务的架构和万维网地理信息系统是处理林业电子政务信息资源整合和利用的重要技术工具。文章以林业电子政务中森林火点检测的应用流程为例展示上述技术的运用方法。工作流程可以利用分布式的遥感数据、矢量辅助数据资源、森林火点检测算法和万维网地图发布服务,通过一个网格的基础架构把这些资源集成起来形成林业专业应用。文章展示的试验床用Web服务技术封装了专业算法。网格中间件采用的是自主研制的SIRGE,调度资源的工作流中间件采用的是自主研制的SIGApp,它们的专长是可以处理空间数据。用于通过这个试验床可以访问基于不同来源数据和服务得到的森林火点信息,为林业电子政务服务。  相似文献   

17.
云计算是网络计算平台的下一代核心技术。将云计算应用于高职院校校园网建设,能够实现基础设施与实际应用的分离,解决校园网面临的资金不足、设备老化、资源不充足等一系列问题,并为校园网络资源的存储和安全提供了保障,为信息技术在校园中科学合理的应用奠定了基础。  相似文献   

18.
云计算是一个令人激动且非常重要的技术,但它仍处于萌芽阶段。云方法是一种基于互联网的计算新方式,通过互联网上异构自治的服务为个人和企业用户提供按需即取的计算。本文介绍了云计算的基本概念和原理,分析了云计算在中小型企业中的优势,介绍了基于开源平台的Ubuntu企业云UEC方案的基本应用防范,分析探讨了私有云计算方案在中小型企业中的应用。  相似文献   

19.
Computing power is largely becoming a basic supply which you can envisage to buy from a provider like you buy power or water. This is the result of a now long running trend that consists in connecting computing resources together so as to set up what can globally be referred to as a remote computing platform, the most up-to-date incarnation of which is the notion of a grid (Foster and Kesselman, 2003). These resources can then be shared among users, what means circulating codes and the results of their execution over a network, what is highly insecure. At the other end of the spectrum of computing devices, smart cards ([Mayes and Markantonakis, 2008] and [Hendry, 2001]) offer extremely secure but extremely limited computing capabilities. The question is thus to bridge the gap between computational power and high security. The aim of this paper is to show how large and high capacity remote computing architectures can interact with smart cards, which certainly are the most widely deployed, still the smallest computing systems of the information technology era, so as to improve the overall security of a global infrastructure.  相似文献   

20.
Pervasive computing is an emerging technology that offers new possibilities to distributed computing and computer networking; it employs a wide variety of smart, ubiquitous devices throughout an individual's working and living environment. Mobile agents are software entities that can migrate between servers (mobile agent environments) of the network accomplishing various tasks on the behalf of their owners. The objective of this paper is to describe a test and prototyping environment for experimenting with mobile agents in pervasive environments. A prototype environment for a novel, proactive infrastructure is described for mobile agent assisted pervasive computing. In addition, a new message passing algorithm is provided for mobile agent connection establishment and management (CEMA). Simulation results show the performance of the proposed approach.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号