Construction of website group system based on the digital campus

被引:0
作者
Jiang P. [1 ]
Zhao Z. [2 ]
机构
[1] Network and Information Center, Ocean University of China, Qingdao, 266100, Shandong
[2] Department of Education, Ocean University of China, Qingdao, 266100, Shandong
来源
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition) | 2016年 / 44卷
关键词
Cloud computing; Data formatting; Digital campus; Information security; Software design project; Websites;
D O I
10.13245/j.hust.16S122
中图分类号
学科分类号
摘要
In order to exchange information between the system of digital campus and the website, and to ensure the stability and security of all web services, in this paper, the advantages and disadvantages of the old sites were analyzed, and then combined with the existing website group technology, cloud computing theory and the concept of network system security, the standard system of planning, construction and maintenance of website group system was established. Common failures of the old system did not occur during the test run of the website group system following this standard. The information exchange between the website group system and the system of digital campus was unimpeded. Multiple network attacks had been resisted. The lower latency was maintained during busy periods of access, and many types of log data were saved. © 2016, Editorial Board of Journal of Huazhong University of Science and Technology. All right reserved.
引用
收藏
页码:109 / 113and117
相关论文
共 5 条
  • [1] Putnam A., Caulfield A.M., Chung E.S., Et al., A reconfigurable fabric for accelerating large-scale datacenter services, IEEE Micro, 35, 3, pp. 13-24, (2014)
  • [2] Alizadeh M., Edsall T., Dharmapurikar S., Et al., CONGA: distributed congestion-aware load balancing for datacenters, ACM Sigcomm Computer Communication Review, 44, 4, pp. 503-514, (2015)
  • [3] Huang Q., Gudmundsdottir H., Vigfusson Y., Et al., Characterizing Load Imbalance in Real-World Networked Caches, ACM Workshop on Hot Topics in Networks, pp. 1-7, (2014)
  • [4] Juels A., Oprea A., New approaches to security and availability for cloud data, Communications of the ACM, 56, 2, pp. 64-73, (2013)
  • [5] Chen P., Nikiforakis N., Desmet L., Et al., Security Analysis of the Chinese Web: How well is it protected?, Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, pp. 3-9, (2014)