[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106406990A - Batch job-resource matching method and system with security constraint - Google Patents

Batch job-resource matching method and system with security constraint Download PDF

Info

Publication number
CN106406990A
CN106406990A CN201610749981.9A CN201610749981A CN106406990A CN 106406990 A CN106406990 A CN 106406990A CN 201610749981 A CN201610749981 A CN 201610749981A CN 106406990 A CN106406990 A CN 106406990A
Authority
CN
China
Prior art keywords
back end
data source
node
security
security constraint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610749981.9A
Other languages
Chinese (zh)
Other versions
CN106406990B (en
Inventor
李逸博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiangtan University
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201610749981.9A priority Critical patent/CN106406990B/en
Publication of CN106406990A publication Critical patent/CN106406990A/en
Application granted granted Critical
Publication of CN106406990B publication Critical patent/CN106406990B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/505Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/48Indexing scheme relating to G06F9/48
    • G06F2209/484Precedence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/50Indexing scheme relating to G06F9/50
    • G06F2209/502Proximity

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a batch job-resource matching method and system with a security constraint. A security constraint and load balance-based batch job and resource matching method is adopted; the batch job-resource matching method comprises the specific steps of (A) configuring the security at a preprocessing stage; (B) mapping a batch job set to an appropriate resource of meeting the security constraint and a load balance security constraint, sorting jobs on various nodes and sequentially executing the jobs; and (C) dynamically and repeatedly detecting a downtime fault and redistributing the jobs on a fault machine according to the security constraint and the load balance security constraint. The method disclosed by the invention is especially suitable for batch job scheduling applications, such as MapReduce-based police data job scheduling, traffic monitoring job scheduling and the like, with relatively high data security. Secure access of data can be ensured on the basis of obtaining relatively short batch job completion time.

Description

A kind of job stacking-reso urce matching method with security constraint and system
Technical field
The present invention relates to a kind of job stacking-reso urce matching method with security constraint and system, it is particularly suited for data The higher job stacking scheduling application of security, the such as police service data operation based on MapReduce is dispatched, traffic monitoring operation Scheduling etc., belongs to Distributed Parallel Computing field.
Background technology
The MapReduce framework of one of the core component as Hadoop is widely used.MapReduce is in data processing When, big task is divided into calculating operation little one by one, such operation be typical job stacking, include Map operation with Reduce operation.When a collection of task reaches, MapReduce is divided into very many Map and Reduce operations, now different The effect that is slightly different of job scheduling plan, the execution efficiency of the resource utilization to cluster for the job stacking scheduling strategy and system Have a significant impact.
Existing Hadoop scheduler mainly has:(1) prerequisite variable scheduler:The acquiescence scheduler of Hadoop, according to The order of arrival of operation arranges execution order;(2) Fair Scheduler:The resource occupation amount of configuration operation is so that each task Resource occupation amount keeps balance;(3) delay dispatching:When data needed for current work is not had on the machine of current idle, this work Industry postpones a period of time, executes this delay operation when there being the machine idle of data.
Researchers propose some methods with regard to job stacking scheduling, such as take and prefetch strategy to shorten data standard Standby time [University of Electronic Science and Technology. a kind of data prefetching method based on MapReduce:China, 201510299063.6 [P] .2015-09-23], different methods is applied to different job scheduling applications, and such as above-mentioned strategy is paying attention to the operation off period There is preferable effect of optimization in the job scheduling application of constraint.
In practical application, many job scheduling applications have security constraint, such as police service data operation scheduling, and traffic is supervised Control job scheduling etc., the security requirement of data is higher, and the transfer of data and duplication are somewhat limited, generally require through adding Close can be transferred or replicate.For this kind of application, existing job scheduling strategy is without reference to the method for security constraint.
In sum, existing job scheduling method can not well adapt to have in practical application security constraint batch at Reason job stacking scheduling problem.
Content of the invention
Goal of the invention:For problems of the prior art it is contemplated that the specific safety that data has constrains, this Invention provides a kind of job stacking-reso urce matching method with security constraint and system, meets the demand of practical application, is obtaining It is ensured that the secure access of data on the basis of shorter batch processing job completion date.
Technical scheme:A kind of job stacking-reso urce matching method with security constraint, comprises the following steps:
Step A, server end control node configure to security;
The current safety facilities of back end, are back end setting safe class;
According to the requirement to security for the data source, it is data source setting safety requirements grade;
According to job requester authority, operation Permission Levels are set;
Step B, server end control node are using the operation based on security constraint and load balance and back end mapping Method, Map operation is mapped to and meets in safety and the back end of load balance constraint, the operation on each node is pressed preferential Level is ranked up and executes successively;
Shown security constraint comprises at 2 points:(1) operation can only have permission execution on the back end of execution at it;(2) safety The data source having high demands must be stored on the low back end of safe class with encrypted state.
Shown load balance refers to control node according to back end computing capability, arranges permissible on each back end The operation transformation of mapping.
Step C, server end machine monitoring node of delaying is periodically detected back end current state, in real time by fault data section Point ID feeds back to server end control node;
Step D, server end control node receive fault data node ID, to be currently mapped on this node do not complete Operation, according to operation and the back end mapping method of security constraint and load balance, operation is remapped to machine data of not delaying Node.
Using the operation based on security constraint and load balance and back end mapping method, calculate some mapping sides Case, selects the minimum scheme of cost to be executed;Each data source of scheme cost=setting replicates cost * data source number of copy times Each encryption expenses * encryption number of times of+setting.It is likely that not having on this back end when Map operation is mapped on back end Activity Calculation desired data source, needs first to replicate by data source.The process replicating needs to meet security constraint, and that is, safety will The data source asking high must be stored on the low back end of safe class with encrypted state.Operation is being mapped to by control node When on back end, it should generation as few as possible replicates and encryption in addition to meeting security constraint and load balance.
A kind of job stacking with security constraint-resource matched system includes control node, back end and machine testing of delaying Node.
Control node:Receive the operation from user and receive the security constraint from machine testing node of delaying and machine letter of delaying Breath;After control node receives machine information of delaying, according to fault data node ID, to the operation being currently mapped on this node according to peace The operation of staff cultivation and load balance and back end mapping method, operation is remapped to machine back end of not delaying;Control After node receives security constraint information, mate the child node that can receive an assignment.
Control node configures to security:The current safety facilities of back end, are back end setting peace Congruent level;According to the requirement to security for the data source, it is data source setting safety requirements grade;According to job requester authority, Setting operation Permission Levels;Using the operation based on security constraint and load balance and back end mapping method, operation is reflected Be mapped to and meet in safety and the back end of load balance constraint, carry out job scheduling based on security constraint and load balance/ Weight traffic control.
Back end:There is provided the safety level information of each node to control node, after receiving the operation of control node distribution It is responsible for carrying out prioritization to the operation in respective waiting list and executing, necessary data is carried out according to operation distribution condition Operation and cryptographic operation are replicated in source, when that is, operation is mapped on back end, if not having Activity Calculation institute on this back end Need data source, need first to replicate by data source;The high data source of safety requirements is stored in the low back end of safe class On must encrypt;Gather respective node load information and submit to control node during Job execution;
Delay machine testing node:Carry out periodic back end to delay machine fault detect, the machine back end ID that will delay feeds back to Control node.
The present invention adopts technique scheme, has the advantages that:
Job stacking-the reso urce matching method with security constraint and system that the present invention provides, dispatched in job stacking Consider the actual conditions of security constraint in journey, strategy is simply direct, the job scheduling being related to security is applied and has very Good practicality.
Brief description
Fig. 1 is the configuration diagram of present system preferred embodiment;
Fig. 2 is flow chart of steps in control node for the inventive method preferred embodiment;
Fig. 3 Fig. 2 is flow chart of steps on back end for the inventive method preferred embodiment.
Specific embodiment
With reference to specific embodiment, it is further elucidated with the present invention it should be understood that these embodiments are merely to illustrate the present invention Rather than restriction the scope of the present invention, after having read the present invention, the various equivalences to the present invention for the those skilled in the art The modification of form all falls within the application claims limited range.
Traditional Map Reduce system includes control node data node, as shown in figure 1, the band peace that the present invention provides Job stacking-the reso urce matching method of staff cultivation is realized system and is additionally arranged machine testing node of delaying.Job stacking with security constraint- Resource matched system includes control node, back end and machine testing node of delaying.
Control node:
Control node:Receive the operation from user and receive the security constraint from machine testing node of delaying and machine letter of delaying Breath;After control node receives machine information of delaying, according to fault data node ID, to the operation being currently mapped on this node according to peace The operation of staff cultivation and load balance and back end mapping method, operation is remapped to machine back end of not delaying;Control After node receives security constraint information, mate the child node that can receive an assignment;
Control node configures to security:The current safety facilities of back end, are back end setting peace Congruent level;According to the requirement to security for the data source, it is data source setting safety requirements grade;According to job requester authority, Setting operation Permission Levels;Using the operation based on security constraint and load balance and back end mapping method, operation is reflected Be mapped to and meet in safety and the back end of load balance constraint, carry out job scheduling based on security constraint and load balance/ Weight traffic control.
Back end:There is provided the safety level information of each node to control node, after receiving the operation of control node distribution It is responsible for carrying out prioritization to the operation in respective waiting list and executing, necessary data is carried out according to operation distribution condition Operation and cryptographic operation are replicated in source, when that is, operation is mapped on back end, if not having Activity Calculation institute on this back end Need data source, need first to replicate by data source;The high data source of safety requirements is stored in the low back end of safe class On must encrypt;Gather respective node load information and submit to control node during Job execution;
Delay machine testing node:Carry out periodic back end to delay machine fault detect, the machine back end ID that will delay feeds back to Control node.
Control node, using the operation based on security constraint and load balance and back end mapping method, calculates some Mapping scheme, selects the minimum scheme of cost to be executed;It is multiple that each data source of scheme cost=setting replicates cost * data source Each encryption expenses * encryption number of times of number of times+setting processed.
With the job stacking-reso urce matching method of security constraint, comprise the following steps:
Step A, server end control node configure to security;
The current safety facilities of back end, are back end setting safe class;
According to the requirement to security for the data source, it is data source setting safety requirements grade;
According to job requester authority, operation Permission Levels are set;
In step A, safety status classification works based on the security configuration on back end geographic location, back end, Including fire wall setting, port setting, fail-safe software installation situation, the suggestion to safety status classification for the back end owner;
Step B, server end control node are using the operation based on security constraint and load balance and back end mapping Method, Map operation is mapped to and meets in safety and the back end of load balance constraint, the operation on each node is pressed preferential Level is ranked up and executes successively;
Shown security constraint comprises at 2 points:(1) operation can only have permission execution on the back end of execution at it;(2) safety The data source having high demands must be stored on the low back end of safe class with encrypted state.
Shown load balance refers to control node according to back end computing capability, arranges permissible on each back end The operation transformation of mapping, on each back end, the operation quantity of mapping not can exceed that specified threshold.
Step C, server end machine monitoring node of delaying is periodically detected back end current state, in real time by fault data section Point ID feeds back to server end control node;
Step D, server end control node receive fault data node ID, to be currently mapped on this node do not complete Operation, according to operation and the back end mapping method of security constraint and load balance, operation is remapped to machine data of not delaying Node.
Using the operation based on security constraint and load balance and back end mapping method, calculate some mapping sides Case, selects the minimum scheme of cost to be executed;Each data source of scheme cost=setting replicates cost * data source number of copy times Each encryption expenses * encryption number of times of+setting.It is likely that not having on this back end when Map operation is mapped on back end Activity Calculation desired data source, needs first to replicate by data source.The process replicating needs to meet security constraint, and that is, safety will The data source asking high must be stored on the low back end of safe class with encrypted state.Operation is being mapped to by control node When on back end, it should generation as few as possible replicates and encryption in addition to meeting security constraint and load balance.
As shown in Fig. 2 main step to be processed includes in control node:Setting back end safe class/data source peace Full requirement etc./operation authority;Operation distribution/reassignment based on security constraint and load balance;
Executed with back end mapping method and minimum scheme according to the operation based on security constraint and load balance Principle, operation distributes/reassignment scheme is required to meet following condition:
(1) operation can only be assigned to it and have permission on the back end of execution;Job stacking will not be mapped by control node Do not have on the back end of authority to it;
(2) operation is assigned on the data source place back end that it is calculated as far as possible, reduces data source number of copy times; If its desired data node is not had on the back end that operation is distributed, data source will be occurred to replicate;In reproduction process, peace The data source entirely having high demands copies on the low back end of safe class from the high back end of safe class, safe class Data source first must be encrypted operation by high back end, then the data source after encryption is copied to the low number of safe class According on node;
(3) if operation cannot be assigned on its data source place back end, avoid safety requirements is high as far as possible Data source copy on the low back end of safe class, with reduce data source encryption number of times;The data high to safety requirements Source can be stored on the high back end of safe class with clear-text way;The data source low to safety requirements can be with plaintext side Formula is stored on the back end that safe class is low or safe class is high;
(4) operation distribution should ensure that the operation quantity on each back end is less than specified threshold, equal with proof load Weighing apparatus;
As shown in figure 3, back end mainly executes flow process being:(1) receive job request and execute operation:Judge whether to connect Receive job request.If received, determine whether desired data source whether on this back end, if do not existed, to Data source place node sends data source duplicate requests and receiving data source copy executes operation and the information that will complete returns to control Node processed;Without receiving reception job request, then judge (2) whether receiving data source duplicate requests.If received, Judge whether that data source safety requirements is high and back end safe class of request data source is low, if it is need data source is entered Row encryption;Data source is sent to request data node.Without receiving or data source is replicated, then judge whether Delay machine, without generation, then (3) periodically send heartbeat to machine testing node of delaying;Otherwise terminate.
Table 1 is when occurring data source to replicate, and data source cryptographic operation executes table.Back end can be pacified according to back end Congruent level data source safety requirements grade, decides whether data source cryptographic operation with reference to this table.
When occurring data source to replicate, data source cryptographic operation executes table to table 1
The Map operation authority list of table 2 pretreatment stage
Service end control node configures to security, and the current safety facilities of back end, are back end Setting safe class;
Have 3 back end in current system, server controls node to the safe class set by these back end, As shown in table 3.In the present embodiment, safe class only has high and low two kinds of grades.
Table 3
Back end ID Safe class Current state
Back end 1 High Normally
Back end 2 Low Normally
Back end 3 High Normally
Control node requirement to security according to data source, is data source setting safety requirements grade;
Table 4 shows the safety requirements grade of data source on each back end current.If current data source is all not yet encrypted.
Table 4
Data source ID Safety requirements grade Whether encrypt Back end ID
Data source a Low No Back end 1
Data source b High No Back end 1
Data source c Low No Back end 2
Data source d Low No Back end 2
Data source e High No Back end 3
Data source f Low No Back end 3
Data source g High No Back end 3
Control node, according to job requester authority, arranges operation Permission Levels;
Control node receives 10 job request within this cycle.Control node views each operation from job request Desired data source and the information of requestor, arrange the authority of each job request.The operation that table 5 display control node is currently received Authority on each back end.0 expression lack of competence, 1 expression has permission;Table 6 shows the data source that each operation is asked And job state.
Table 5
Table 6
Operation ID Data source ID Job state
Operation 1 Data source c Do not complete
Operation 2 Data source g Do not complete
Operation 3 Data source b Do not complete
Operation 4 Data source d Do not complete
Operation 5 Data source e Do not complete
Operation 6 Data source f Do not complete
Operation 7 Data source g Do not complete
Operation 8 Data source a Do not complete
Operation 9 Data source b Do not complete
Operation 10 Data source c Do not complete
Control node, according to back end computing capability, is arranged in the operation quantity that can map on each back end Limit, as shown in table 7.
Table 7
Back end ID Load threshold
Back end 1 3
Back end 2 5
Back end 3 3
Server end control node, will using the operation based on security constraint and load balance and back end mapping method Map operation be mapped to meet safety and load balance constraint back end on, the operation on each node is ranked up and according to Secondary execution.Control node, according to table 3- table 7 information, based on safety and load balancing, calculates some mapping schemes.Every In individual scheme, by integer representation, integer value is lower for job priority, represents that priority is higher;In numerical procedure cost, setting Replicate cost for 10/ every time, encryption expenses are each for 15/.
Scheme one, as shown in table 8.Scheme one needs to carry out 6 times replicating and 3 encryptions altogether, and total cost is 105.
Table 8
Scheme two, as shown in table 9.Scheme two has carried out 5 times replicating and 1 encryption altogether, and total cost is 65.
Table 9
Operation ID Back end ID Whether replicate Whether encrypt Priority
Operation 1 Back end 2 It is No 0
Operation 2 Back end 1 It is No 0
Operation 3 Back end 3 It is No 0
Operation 4 Back end 2 No No 1
Operation 5 Back end 3 No No 1
Operation 6 Back end 2 It is No 2
Operation 7 Back end 2 It is It is 3
Operation 8 Back end 1 No No 1
Operation 9 Back end 1 No No 2
Operation 10 Back end 2 No No 4
Compared according to cost, scheme two cost is relatively low.Control node determines to carry into execution a plan two.
Carry into execution a plan after two, table 4 changes, as shown in table 10 because data source replicates.
Table 10
Data source ID Safety requirements grade Whether encrypt Back end ID
Data source a Low No Back end 1
Data source b High No Back end 1
Data source b High No Back end 3
Data source c Low No Back end 2
Data source d Low No Back end 2
Data source e High No Back end 3
Data source f Low It is Back end 2
Data source g High No Back end 1
Data source g High It is Back end 2
Server end machine monitoring node of delaying is periodically detected back end current state, in real time will be anti-for fault data node ID Feed server end control node;
During above-mentioned 10 Job executions sometime, server end machine monitoring node of delaying detects back end 1 delays machine.Now table 1 information changes, as shown in table 11
Table 11
Back end ID Safe class Current state
Back end 1 High Normally
Back end 2 Low Normally
Back end 3 High Delay machine
Current work performance is as shown in table 12.Find that back end 3 has operation 5 not complete above, need again to reflect It is mapped to the back end of normal operation.
Table 12
Operation ID Job state Back end ID
Operation 1 Complete Back end 2
Operation 2 Complete Back end 1
Operation 3 Complete Back end 3
Operation 4 Do not complete Back end 2
Operation 5 Do not complete Back end 3
Operation 6 Do not complete Back end 2
Operation 7 Do not complete Back end 2
Operation 8 Do not complete Back end 1
Operation 9 Do not complete Back end 1
Operation 10 Do not complete Back end 2
Control node finds according to table 5, and operation 5 only has permission on back end 1 data node 3, current only number According to node 1 normal operation, so operation 5 desired data source e is copied to node 1 at backup by control node, need not encrypt.And Operation 5 is remapped to back end 1.
By said process, the present invention realizes the batch processing job stacking scheduling based on security constraint, shorter obtaining It is ensured that the secure access of data on the basis of batch processing job completion date.

Claims (10)

1. a kind of job stacking-reso urce matching method with security constraint is it is characterised in that comprise the following steps:
Step A, server end control node configure to security;
Step B, server end control node adopt the operation and back end mapping method based on security constraint and load balance, Map operation is mapped to and meets in safety and the back end of load balance constraint, the operation on each node is according to priority entered Row sequence simultaneously executes successively;
Step C, server end machine monitoring node of delaying is periodically detected back end current state, in real time by fault data node ID Feed back to server end control node;
Step D, server end control node receive fault data node ID, to be currently mapped on this node do not complete operation According to operation and the back end mapping method of security constraint and load balance, operation is remapped to machine data section of not delaying Point.
2. as claimed in claim 1 job stacking-the reso urce matching method with security constraint it is characterised in that server end Control node carries out configuration and includes to security:
The current safety facilities of back end, are back end setting safe class;
According to the requirement to security for the data source, it is data source setting safety requirements grade;
According to job requester authority, operation Permission Levels are set.
3. as claimed in claim 1 job stacking-the reso urce matching method with security constraint it is characterised in that shown safety Constraint comprises at 2 points:(1)Operation can only have permission execution on the back end of execution at it;(2)The high data source of safety requirements must Must be stored on the low back end of safe class with encrypted state.
4. as claimed in claim 1 job stacking-the reso urce matching method with security constraint it is characterised in that shown load Balance refers to control node according to back end computing capability, arranges in the operation quantity that can map on each back end Limit, on each back end, the operation quantity of mapping not can exceed that specified threshold.
5. as claimed in claim 1 job stacking-the reso urce matching method with security constraint it is characterised in that using being based on The operation of security constraint and load balance and back end mapping method, calculate some mapping schemes, select the minimum side of cost Case is executed.
6. as claimed in claim 1 job stacking-the reso urce matching method with security constraint it is characterised in that Map operation is reflected When being mapped on back end, if Activity Calculation desired data source is not had on this back end, need first that data source is copied Come;The process replicating needs to meet security constraint.
7. as claimed in claim 1 job stacking-the reso urce matching method with security constraint it is characterised in that to safety will The data source asking high can be stored on the high back end of safe class with clear-text way;The data source low to safety requirements can To be stored on the back end that safe class is low or safe class is high with clear-text way.
8. as claimed in claim 5 job stacking-the reso urce matching method with security constraint it is characterised in that scheme cost= Each data source of setting replicates each encryption expenses * encryption number of times of cost * data source number of copy times+setting.
9. a kind of job stacking with security constraint-resource matched system is it is characterised in that include control node, back end With machine testing node of delaying:
Control node:Receive the operation from user and receive the security constraint from machine testing node of delaying and machine information of delaying; After control node receives machine information of delaying, according to fault data node ID, to the operation being currently mapped on this node according to safety The operation of constraint and load balance and back end mapping method, operation is remapped to machine back end of not delaying;
Control node configures to security:The current safety facilities of back end, are back end setting safety etc. Level;According to the requirement to security for the data source, it is data source setting safety requirements grade;According to job requester authority, arrange Operation Permission Levels;Using the operation based on security constraint and load balance and back end mapping method, operation is mapped to Meet in safety and the back end of load balance constraint, carry out the job scheduling/readjustment based on security constraint and load balance Degree work;
Back end:The safety level information of each node is provided to control node, is responsible for after receiving the operation of control node distribution Prioritization is carried out to the operation in respective waiting list and executes, necessary data source is carried out according to operation distribution condition multiple System operation and cryptographic operation, when that is, operation is mapped on back end, if do not have Activity Calculation requisite number on this back end According to source, need first to replicate by data source;The high data source of safety requirements is stored in must on the low back end of safe class Must encryption;Gather respective node load information and submit to control node during Job execution;
Delay machine testing node:Carry out periodic back end to delay machine fault detect, the machine back end ID that will delay feeds back to control Node.
10. as claimed in claim 9 the job stacking with security constraint-resource matched system it is characterised in that described control Node, using the operation based on security constraint and load balance and back end mapping method, calculates some mapping schemes, choosing Select the minimum scheme of cost to be executed;Each data source of scheme cost=setting replicates cost * data source number of copy times+setting Each encryption expenses * encryption number of times.
CN201610749981.9A 2016-08-26 2016-08-26 A kind of job stacking-reso urce matching method and system with security constraint Expired - Fee Related CN106406990B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610749981.9A CN106406990B (en) 2016-08-26 2016-08-26 A kind of job stacking-reso urce matching method and system with security constraint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610749981.9A CN106406990B (en) 2016-08-26 2016-08-26 A kind of job stacking-reso urce matching method and system with security constraint

Publications (2)

Publication Number Publication Date
CN106406990A true CN106406990A (en) 2017-02-15
CN106406990B CN106406990B (en) 2018-11-09

Family

ID=58002466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610749981.9A Expired - Fee Related CN106406990B (en) 2016-08-26 2016-08-26 A kind of job stacking-reso urce matching method and system with security constraint

Country Status (1)

Country Link
CN (1) CN106406990B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122849A (en) * 2017-04-19 2017-09-01 西安电子科技大学 Product checking total complete time minimization method based on SparkR
CN109634727A (en) * 2018-11-14 2019-04-16 中车青岛四方机车车辆股份有限公司 Data processing method and device
CN110125939A (en) * 2019-06-03 2019-08-16 湖南工学院 A kind of method of Robot Virtual visualization control
CN114265675A (en) * 2021-12-08 2022-04-01 阿里巴巴(中国)有限公司 Task scheduling method, system, equipment and storage medium for asynchronous training

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102769615A (en) * 2012-07-02 2012-11-07 北京大学 Task scheduling method and system based on MapReduce mechanism
CN103294558A (en) * 2013-05-29 2013-09-11 北京大学 MapReduce scheduling method supporting dynamic trust evaluation
CN103414761A (en) * 2013-07-23 2013-11-27 北京工业大学 Mobile terminal cloud resource scheduling method based on Hadoop framework
CN105022666A (en) * 2014-04-24 2015-11-04 中国电信股份有限公司 Method, device and system for controlling MapReduce task scheduling

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102769615A (en) * 2012-07-02 2012-11-07 北京大学 Task scheduling method and system based on MapReduce mechanism
CN103294558A (en) * 2013-05-29 2013-09-11 北京大学 MapReduce scheduling method supporting dynamic trust evaluation
CN103414761A (en) * 2013-07-23 2013-11-27 北京工业大学 Mobile terminal cloud resource scheduling method based on Hadoop framework
CN105022666A (en) * 2014-04-24 2015-11-04 中国电信股份有限公司 Method, device and system for controlling MapReduce task scheduling

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122849A (en) * 2017-04-19 2017-09-01 西安电子科技大学 Product checking total complete time minimization method based on SparkR
CN107122849B (en) * 2017-04-19 2021-01-05 西安电子科技大学 Spark R-based product detection total completion time minimization method
CN109634727A (en) * 2018-11-14 2019-04-16 中车青岛四方机车车辆股份有限公司 Data processing method and device
CN110125939A (en) * 2019-06-03 2019-08-16 湖南工学院 A kind of method of Robot Virtual visualization control
CN110125939B (en) * 2019-06-03 2020-10-20 湖南工学院 Virtual visual control method for robot
CN114265675A (en) * 2021-12-08 2022-04-01 阿里巴巴(中国)有限公司 Task scheduling method, system, equipment and storage medium for asynchronous training

Also Published As

Publication number Publication date
CN106406990B (en) 2018-11-09

Similar Documents

Publication Publication Date Title
CN102063336B (en) Distributed computing multiple application function asynchronous concurrent scheduling method
CN106406990B (en) A kind of job stacking-reso urce matching method and system with security constraint
CN102137133B (en) Method and system for distributing contents and scheduling server
CN104601664B (en) A kind of control system of cloud computing platform resource management and scheduling virtual machine
CN103713956B (en) Method for intelligent weighing load balance in cloud computing virtualized management environment
CN103927231B (en) The energy optimization data set distribution method that a kind of data-oriented processes
CN102508714A (en) Green-computer-based virtual machine scheduling method for cloud computing
CN104239123A (en) Campus-cloud-platform-oriented virtual machine management dispatching method and system
CN103763365A (en) Method and system for load balancing of metadata service under cloud storage
CN104023042B (en) Cloud platform resource scheduling method
CN104536804A (en) Virtual resource dispatching system for related task requests and dispatching and distributing method for related task requests
CN103957280A (en) Connection allocation and scheduling method of sensor network in Internet of things
CN105786909A (en) Message queue backlog load self-adaptive application triggering method and system
CN106681656A (en) Dynamically-adjustable cloud storage system fault tolerance method
Ahmed et al. A hybrid and optimized resource scheduling technique using map reduce for larger instruction sets
CN104156505A (en) Hadoop cluster job scheduling method and device on basis of user behavior analysis
CN102098223B (en) Method, device and system for scheduling node devices
Biswas et al. A novel resource aware scheduling with multi-criteria for heterogeneous computing systems
JP5327314B2 (en) Event processing system, event processing method, local system, dispatcher, and program storage medium
CN118193188A (en) Dynamic load balancing system and method based on virtualization platform
CN108469990A (en) A kind of parallel calculating method and system
KR101451781B1 (en) System and method for device duplication of virtualization system in virtual machine environment
Barazandeh et al. Two hierarchical dynamic load balancing algorithms in distributed systems
Mishra et al. A memory-aware dynamic job scheduling model in Grid computing
CN106899392B (en) Method for carrying out fault tolerance on instantaneous fault in EtherCAT message transmission process

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20181018

Address after: 411105 Yuhu District, Xiangtan, Hunan

Applicant after: Xiangtan University

Address before: 210096 Shuangjing lane, Xuanwu District, Nanjing, Jiangsu 7

Applicant before: Li Yibo

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181109

Termination date: 20190826

CF01 Termination of patent right due to non-payment of annual fee