CN106850686A - A kind of cloud computing system - Google Patents
A kind of cloud computing system Download PDFInfo
- Publication number
- CN106850686A CN106850686A CN201710185382.3A CN201710185382A CN106850686A CN 106850686 A CN106850686 A CN 106850686A CN 201710185382 A CN201710185382 A CN 201710185382A CN 106850686 A CN106850686 A CN 106850686A
- Authority
- CN
- China
- Prior art keywords
- cloud computing
- client
- sub
- computing end
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of cloud computing system, including cloud computing end, sub- cloud computing end and client, the quantity at sub- cloud computing end is one or more;Sub- cloud computing end is used to receive the operation requests of client transmission, and send to cloud computing end to verify the legitimacy of client the client identity information in operation requests, when client identity information is legal, judge the application program copy of the local client request that whether is stored with, if no, sending the carry request after encryption;Cloud computing end is used to receive the information that sub- cloud computing end sends, when the information of transmission is client identity information, return to the whether legal judgement information of the client identity information, when the information of transmission is asked for carry, selection is stored with and the corresponding application program copy of identification code in carry request and the sub- cloud computing end close to the carry corresponding client of request, and fed back the address at the sub- cloud computing end, for carry.Said system can improve data transmission efficiency.
Description
Technical field
The present invention relates to field of cloud computer technology, more particularly to a kind of cloud computing system.
Background technology
Cloud computing is network calculations, Distributed Calculation, parallel computation, effectiveness calculating, the network storage, virtualization, load equal
The computer technologies such as weighing apparatus and the product of network technical development fusion, its core concept are by a large amount of computing resources with network connection
Unified management and scheduling, constitute a computing resource pond to user service.Cloud computing as information industry a great innovation,
Its application is more and more extensive, but existence information safety and data transmission efficiency problem simultaneously, how to overcome above mentioned problem, is cloud meter
One of calculation field problem demanding prompt solution.
The content of the invention
The present invention solves the technical problem of a kind of cloud computing system of offer, it can be ensured that data communications security, and can
Improve data transmission efficiency.
In order to solve the above technical problems, the present invention provides a kind of cloud computing system, including cloud computing end, sub- cloud computing end and
Client, the quantity at sub- cloud computing end is one or more, and is located in a different geographical location;Sub- cloud computing end is used to connect
The operation requests that client sends are received, operation requests include that the identification code of application program and IP address, the body of client need to be run
Part information, and the client identity information in operation requests is sent to cloud computing end to verify the legitimacy of client, work as visitor
When family end identity information is legal, whether the local application program copy corresponding with identification code that is stored with is judged, if not having, to cloud
Calculate end and send the carry request after encryption, carry request includes identification code and the visitor of the need operation application program in operation requests
The IP address at family end;Cloud computing end is used to receive the information that sub- cloud computing end sends, when the information of transmission is client identity information
When, return to the whether legal judgement information of the client identity information, when send information ask for carry when, select be stored with
The corresponding application program copy of identification code in carry request and the sub- cloud computing end close to carry request correspondence client,
And fed back the address at the sub- cloud computing end, for carry.
Wherein, sub- cloud computing end is specifically for carrying out MD5 computings to the client identity information in operation requests, and will count
The MD5 values of calculation are sent to cloud computing end.
Wherein, after cloud computing end is specifically for receiving MD5 values, the MD5 values are matched with identity storehouse, when the MD5 values
During in the presence of corresponding occurrence, the legal judgement information of feedback client identity information.
Wherein, after cloud computing end is specifically for receiving carry request, treatment is decrypted to carry request.
Wherein, cloud computing end according to the identification code of the need operation application program for decrypting specifically for judging to be stored with and this
The sub- cloud computing end of the corresponding application program copy of identification code, and obtain the ground at the sub- cloud computing end of the application program copy that is stored with
Reason position;IP address according to the client for decrypting judges the geographical position of the client.
Wherein, cloud computing end is specifically for the geographical position at sub- cloud computing end is compared with the geographical position of client
Compared with to select the sub- cloud computing end close to client.
Wherein, cloud computing end is specifically for the address of the application program copy at the sub- cloud computing end for selecting is fed back.
Wherein, carry request is encrypted using Advanced Encryption Standard.
Wherein, sub- cloud computing end was specifically for when it is stored with application program copy corresponding with identification code, operation should
Application program copy, and operation result is back to client.
The beneficial effects of the invention are as follows:The situation of prior art is different from, cloud computing system of the invention includes cloud computing
End, sub- cloud computing end and client, wherein, the quantity at sub- cloud computing end is one or more, and positioned at different geography
Position.Above-mentioned cloud computing system has the characteristics that:After sub- cloud computing termination receives the operation requests of client transmission, sentence first
Whether the client of breaking is legal, specifically, the identity information of client is carried out into MD5 computings, and the MD5 values that will be calculated send extremely
To verify the legitimacy of client, this mode can ensure that cloud computing system is communicated with legal client at cloud computing end, and
It is encrypted in communication process, further ensures that the safety of data transfer;When group cloud computing end sends carry request, to hanging
Carry request to be encrypted, this mode can ensure that the safety of data transfer;Cloud computing end is selected from carry request correspondence client
The nearer sub- cloud computing end in end carries out carry, can improve data transmission efficiency.
Brief description of the drawings
Fig. 1 is the structural representation of the embodiment of cloud computing system of the present invention.
Specific embodiment
The present invention is described in detail with reference to the accompanying drawings and examples.
Fig. 1 is referred to, Fig. 1 is the structural representation of the embodiment of cloud computing system of the present invention, as shown in figure 1, including cloud
End 10, sub- cloud computing end 20 and client 30 are calculated, wherein, the quantity at sub- cloud computing end 20 can be one or more, and
It is located in a different geographical location.
The course of work of the present embodiment cloud computing system is illustrated in detail below.
First, when client 30 need to run the application program in high in the clouds, operation requests to sub- cloud computing end 20, the behaviour are sent
Making request includes that the identification code of application program and IP address, the identity information of client 30 need to be run.Wherein, identification code is uniquely marked
Know application program, the identity information of client 30 includes the username and password for logging in.Wherein, sent in client 30 and grasped
When asking, sub- cloud computing end 20 of the selection geographical position close to it is transmitted, and the implementation is specifically, client 30
Be stored with the geographical position at each sub- cloud computing end 20, when sending operation requests, by the geographical position of its own and each sub- cloud computing
The geographical position at end 20 is compared, and is then selected.
After sub- cloud computing end 20 receives the operation requests of the transmission of client 30, first by the client body in operation requests
Part information is sent to cloud computing end 10 to verify the legitimacy of client 30.For send client identity information, specially
The MD5 values of client identity information, after group cloud computing end 20 receives operation requests, to the client identity in operation requests
Information carries out MD5 computings, to obtain the MD5 values of the client identity information.
After cloud computing end 10 receives MD5 values, the MD5 values are matched with identity storehouse, when there is corresponding occurrence
When, the legal judgement information of feedback client identity information when in the absence of corresponding occurrence, feeds back client identity information
Illegal judgement information.Wherein, identity storehouse includes the MD5 values of all legitimate client identity informations.
When group cloud computing end 20 receives client identity information legal judgement information, then judge locally whether deposit
Contain application program copy corresponding with the identification code in operation requests, when be stored with application program copy when, run the application
Copies of programs, and operation result is back to client 30.It is illegal that group cloud computing end 20 receives client identity information
During judgement information, client 30 is not responded.When group cloud computing end 20 does not locally store application program copy, Xiang Yun
Calculate end 10 and send the carry request after encryption, carry request includes that the need in operation requests run the identification code of application program
With the IP address of client 30.In the present embodiment, carry request is encrypted using Advanced Encryption Standard, i.e., using AES
It is encrypted, in other embodiments, can be also encrypted using rivest, shamir, adelman.
After cloud computing end 10 receives the carry request that sub- cloud computing end 20 sends, treatment is decrypted to carry request, and
Identification code according to the need operation application program for decrypting judges the son of application program copy corresponding with the identification code of being stored with
Cloud computing end 20.For the sub- cloud computing end 20 of the application program copy that is stored with, its geographical position is obtained, acquisition modes are specific
For, cloud computing end 10 is stored with the geographical location information at each sub- cloud computing end 20, directly transfer.Cloud computing end 10 is while root
The geographical position of the client 30 is judged according to the IP address of the client 30 for decrypting, the geographical position of client 30 is being obtained
Afterwards, the geographical position at the sub- cloud computing end 20 for obtaining is compared with the geographical position of client 30 of acquisition, with select from
The nearer sub- cloud computing end 20 of client 30, and the address of the application program copy at the sub- cloud computing end 20 for selecting is carried out instead
Feedback, for carry.
In the present embodiment, the application program copy that sub- cloud computing end 20 does not store for it, is met in the way of carry
30 pairs of requirements for access of the application program of client.
It is pointed out that the cloud computing system shown in Fig. 1 only shows 3 sub- cloud computing ends 20, and in actual applications, son
The quantity at cloud computing end 20 is one or more.It is pointed out that embodiment illustrated in fig. 1 only shows a client 30
The situation of high in the clouds application program need to be run, in actual applications, there can be one or more client 30 while needing operation
The application program in high in the clouds.
In sum, cloud computing system of the present invention has the characteristics that:Sub- cloud computing termination receives the behaviour of client transmission
After asking, first determine whether whether the client is legal, specifically, the identity information of client is carried out into MD5 computings, and will meter
The MD5 values of calculation are sent to cloud computing end to verify the legitimacy of client, and this mode can ensure that cloud computing system with legal visitor
Family end is communicated, and is encrypted in communication process, further ensures that the safety of data transfer;Group cloud computing end sends
When carry is asked, carry request is encrypted, this mode can ensure that the safety of data transfer;Cloud computing end is selected from extension
Carrying the nearer sub- cloud computing end of request correspondence client carries out carry, can improve data transmission efficiency.
Embodiments of the invention are the foregoing is only, the scope of the claims of the invention is not thereby limited, it is every to utilize this hair
Equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
Claims (9)
1. a kind of cloud computing system, it is characterised in that including cloud computing end, sub- cloud computing end and client, the sub- cloud computing
The quantity at end is one or more, and is located in a different geographical location;
The sub- cloud computing end is used to receive the operation requests of client transmission, and the operation requests include that application program need to be run
Identification code and client IP address, identity information, and the client identity information in the operation requests is sent to institute
Cloud computing end is stated to verify the legitimacy of client, when client identity information is legal, whether judgement is locally stored with and institute
The corresponding application program copy of identification code is stated, if not having, the carry after encryption is sent to the cloud computing end and is asked, the extension
Carry the identification code and the IP address of client of the need operation application program that request is included in the operation requests;
The cloud computing end is used to receive the information that sub- cloud computing end sends, and when the information of transmission is client identity information, returns
Return the whether legal judgement information of the client identity information, when the information of transmission ask for carry, select to be stored with it is described
The corresponding application program copy of identification code in carry request and the sub- cloud computing close to carry request correspondence client
End, and the address at the sub- cloud computing end is fed back, for carry.
2. cloud computing system according to claim 1, it is characterised in that the sub- cloud computing end is specifically for the behaviour
Client identity information in asking carries out MD5 computings, and the MD5 values that will be calculated are sent to the cloud computing end.
3. cloud computing system according to claim 2, it is characterised in that the cloud computing end is described specifically for receiving
After MD5 values, the MD5 values are matched with identity storehouse, when the MD5 values have corresponding occurrence, fed back client identity
The legal judgement information of information.
4. cloud computing system according to claim 3, it is characterised in that the cloud computing end is specifically for receiving the extension
After carrying request, treatment is decrypted to carry request.
5. cloud computing system according to claim 4, it is characterised in that the cloud computing end is specifically for according to decrypting
The identification code of need operation application program judge the sub- cloud computing end of application program copy corresponding with the identification code of being stored with, and
Obtain the geographical position at the sub- cloud computing end of the application program copy that is stored with;
IP address according to the client for decrypting judges the geographical position of the client.
6. cloud computing system according to claim 5, it is characterised in that the cloud computing end is specifically for by the sub- cloud
The geographical position for calculating end is compared with the geographical position of the client, in terms of selecting the sub- cloud close to the client
Calculate end.
7. cloud computing system according to claim 6, it is characterised in that the cloud computing end is specifically for the son that will select
Fed back the address of the application program copy at cloud computing end.
8. cloud computing system according to claim 7, it is characterised in that the carry request is entered using Advanced Encryption Standard
Row encryption.
9. cloud computing system according to claim 7, it is characterised in that the sub- cloud computing end is specifically for when its storage
When having application program copy corresponding with the identification code, the application program copy is run, and operation result is back to described
Client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710185382.3A CN106850686A (en) | 2017-03-25 | 2017-03-25 | A kind of cloud computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710185382.3A CN106850686A (en) | 2017-03-25 | 2017-03-25 | A kind of cloud computing system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106850686A true CN106850686A (en) | 2017-06-13 |
Family
ID=59130453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710185382.3A Pending CN106850686A (en) | 2017-03-25 | 2017-03-25 | A kind of cloud computing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106850686A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124357A (en) * | 2017-07-11 | 2017-09-01 | 王焱华 | A kind of cloud computing intelligent gateway |
CN107566384A (en) * | 2017-09-13 | 2018-01-09 | 湖南涉外经济学院 | A kind of efficient cloud computing system |
CN107920069A (en) * | 2017-11-15 | 2018-04-17 | 中国联合网络通信集团有限公司 | Application security processing method and processing device in ciphering terminal |
CN109542862A (en) * | 2018-11-21 | 2019-03-29 | 北京百度网讯科技有限公司 | For controlling the methods, devices and systems of the carry of file system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202143098U (en) * | 2011-05-20 | 2012-02-08 | 重庆广典网络信息技术有限公司 | Intelligent mobile phone open cross-platform system based on cloud computing |
CN103023981A (en) * | 2012-11-21 | 2013-04-03 | 北京航空航天大学 | Cloud computation system |
CN103312823A (en) * | 2013-07-09 | 2013-09-18 | 苏州市职业大学 | Cloud computing system |
US20140082350A1 (en) * | 2012-09-14 | 2014-03-20 | NETFLIX Inc. | Security credential deployment in cloud environment |
CN104333542A (en) * | 2014-10-23 | 2015-02-04 | 张勇平 | Cloud computing access control system and method |
-
2017
- 2017-03-25 CN CN201710185382.3A patent/CN106850686A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202143098U (en) * | 2011-05-20 | 2012-02-08 | 重庆广典网络信息技术有限公司 | Intelligent mobile phone open cross-platform system based on cloud computing |
US20140082350A1 (en) * | 2012-09-14 | 2014-03-20 | NETFLIX Inc. | Security credential deployment in cloud environment |
CN103023981A (en) * | 2012-11-21 | 2013-04-03 | 北京航空航天大学 | Cloud computation system |
CN103312823A (en) * | 2013-07-09 | 2013-09-18 | 苏州市职业大学 | Cloud computing system |
CN104333542A (en) * | 2014-10-23 | 2015-02-04 | 张勇平 | Cloud computing access control system and method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124357A (en) * | 2017-07-11 | 2017-09-01 | 王焱华 | A kind of cloud computing intelligent gateway |
CN107566384A (en) * | 2017-09-13 | 2018-01-09 | 湖南涉外经济学院 | A kind of efficient cloud computing system |
CN107920069A (en) * | 2017-11-15 | 2018-04-17 | 中国联合网络通信集团有限公司 | Application security processing method and processing device in ciphering terminal |
CN109542862A (en) * | 2018-11-21 | 2019-03-29 | 北京百度网讯科技有限公司 | For controlling the methods, devices and systems of the carry of file system |
CN109542862B (en) * | 2018-11-21 | 2020-04-24 | 北京百度网讯科技有限公司 | Method, device and system for controlling mounting of file system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10686837B2 (en) | Method and device for customizing security service | |
CN109561226A (en) | A kind of API mixing multi-tenant method for routing, system and API gateway | |
CN106850686A (en) | A kind of cloud computing system | |
CN110933084B (en) | Cross-domain shared login state method, device, terminal and storage medium | |
CN109690491B (en) | Executing remote commands | |
US20200293361A1 (en) | Method and distributed database system for computer-aided execution of a program code | |
CN109005220B (en) | Service implementation method of Internet of things terminal and Internet of things access gateway | |
CN105306576A (en) | Scheduling method and system for password arithmetic units | |
CN103023980B (en) | A kind of method and system of cloud platform processes user service request | |
CN104951712B (en) | A kind of data security protection method under Xen virtualized environment | |
Das et al. | A QoS and profit aware cloud confederation model for IaaS service providers | |
CN110209484A (en) | Based on cloudy and Security mapping credible cloud task scheduling system and method | |
CN105530266B (en) | A kind of license passport management method, apparatus and system | |
KR20160013884A (en) | Updating software components through online stores | |
Zhang et al. | Novel efficient particle swarm optimization algorithms for solving QoS‐demanded bag‐of‐tasks scheduling problems with profit maximization on hybrid clouds | |
CN109492438A (en) | Distributed computing system based on TrustZone | |
CN109190341A (en) | A kind of login management system and method | |
CN104506600A (en) | Computation resource sharing method, device and system as well as client side and server | |
CN104065538B (en) | Measurement control method, control server and the system of network performance | |
US10119835B2 (en) | Multi-tenant customer portal | |
CN105321121A (en) | Power cloud platform based power utilization information acquisition system | |
CN104537284A (en) | Software protecting system and method based on remote service | |
CN104967515B (en) | A kind of identity identifying method and server | |
Yuan et al. | LbSP: Load-balanced secure and private autonomous electric vehicle charging framework with online price optimization | |
CN106302425A (en) | A kind of virtualization system communication method between nodes and virtualization system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |
|
RJ01 | Rejection of invention patent application after publication |