The current conventional collaborative resource scheduling algorithms in heterogeneous cloud environments mainly process the allocation through the quantified results of data characteristics of heterogeneous cloud resources, which leads to low integrated scheduling efficiency due to the differences in the attributes of resources. In this regard, a collaborative and comprehensive resource scheduling algorithm in heterogeneous cloud environment is proposed. Firstly, the heterogeneous cloud resource information data is sampled and processed, and the resource quality is graded. The scheduling task model is constructed by constructing the mapping function of scheduling task assignment sub-nodes, and the hierarchical scheduling strategy is proposed by combining with ant colony algorithm. In the experiments, the designed collaborative integrated scheduling algorithm is tested for the scheduling efficiency. The final results can prove that the algorithm has a lower average delay and a more desirable integrated scheduling efficiency when the proposed method is used for scheduling heterogeneous cloud resources.
The current conventional illegal access behavior security control strategy for heterogeneous cloud resources mainly realizes the access control of resources by conceiving the digital identity of access units, which leads to the low security of access control due to the low encryption of heterogeneous cloud resources. In this regard, the heterogeneous cloud resource illegal access behavior security control strategy based on life cycle characteristics is proposed. By analyzing the user access history behavior data, the trust value of user access operation is calculated. And the access control policy is constructed based on the encryption of user's operation behavior as well as resources by using a two-layer encryption algorithm. In the experiment, the designed illegal access behavior security control policy is tested for security type. The final result can prove that when using the proposed method for access control of heterogeneous cloud resources, the speed of intercepting illegal users is faster, and when facing various types of attacks, this method has a low success rate and high access control security.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.