17808233. DATA PRIVACY WORKLOAD DISTRIBUTION IN A MULTI-TENANT HYBRID CLOUD COMPUTING ENVIRONMENT simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

DATA PRIVACY WORKLOAD DISTRIBUTION IN A MULTI-TENANT HYBRID CLOUD COMPUTING ENVIRONMENT

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Uwe Karl Hansmann of Tuebingen (DE)

Timo Kussmaul of Boeblingen (DE)

Thomas Stober of Herrenberg (DE)

DATA PRIVACY WORKLOAD DISTRIBUTION IN A MULTI-TENANT HYBRID CLOUD COMPUTING ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 17808233 titled 'DATA PRIVACY WORKLOAD DISTRIBUTION IN A MULTI-TENANT HYBRID CLOUD COMPUTING ENVIRONMENT

Simplified Explanation

The patent application describes a method to improve service routing by routing service requests to specific execution environments based on trust levels. Here are the key points:

  • The system provides multiple execution environments where executable services can be deployed.
  • A service registry is used to maintain information about these execution environments.
  • When a service routing request is received, a trained machine-learning system is used to determine the required trust level for the service.
  • The service registry then identifies a set of execution environments that match the trust level determined by the machine-learning system.
  • From the set of execution environments, one is selected by the service registry.
  • Finally, the service request is routed to the selected execution environment for execution.

Potential applications of this technology:

  • Cloud computing platforms can use this method to efficiently route service requests to appropriate execution environments based on trust levels.
  • Service-oriented architectures can benefit from improved service routing, ensuring that services are executed in trusted environments.
  • Internet of Things (IoT) systems can use this method to route service requests to specific devices or environments based on trust levels.

Problems solved by this technology:

  • Efficient service routing: The method ensures that service requests are routed to appropriate execution environments based on trust levels, improving overall system efficiency.
  • Trust-based execution: By considering trust levels, the method ensures that services are executed in environments that meet the required level of trust, enhancing security and reliability.

Benefits of this technology:

  • Improved system efficiency: By routing service requests to appropriate execution environments, the method optimizes resource utilization and reduces response times.
  • Enhanced security and reliability: By considering trust levels, the method ensures that services are executed in environments that meet the required level of trust, reducing the risk of security breaches and improving overall system reliability.


Original Abstract Submitted

In an approach to improve service routing, embodiments route a service request to an execution environment. Embodiments provide a plurality of execution environments, wherein in each execution environment executable services are deployable, provide a service registry maintaining a plurality of execution environments, and receive, by the service registry, a service routing request. Further, embodiments determine a required trust level for a service relating to the service routing request by using a trained machine-learning system for outputting a trust level class when receiving service context data of the service relating to the service routing request as input, determine, using the service registry, a set of execution environments matching the output trust level class, and select, by the service registry, one execution environment of the determined set of execution environments. Further, embodiments route, by the service registry, the service request to the selected one of the execution environments for execution.