Research and Application of Digital Oilfield Cloud Computing

  • Yang JiaoEmail author
  • Yujiang Shi
  • Juan Wang
  • Shan Xie
  • Lixing Liang
Conference paper
Part of the Springer Series in Geomechanics and Geoengineering book series (SSGG)


As core of back-end system of digital oilfield framework, Reservoir Decision-Making Supporting System (RDMS) of Changqing Oilfield Company contains variety of databases, softwares, and large amount of users. The management of hardware, software resources, and IT operations faces new challenges. Due to difficulties above, a working mentality of RDMS cloud service center is proposed according to the advantage of could computing in system infrastructure, user desktop, and data storage. Based on recent RDMS resource situation, the center mainly focuses on establishment of cloud computing resource pool, virtual desktop access, and cloud storage. Besides, application in the field conveys that utilization ratio of hardware increases from 10 to 70%, bearing capacity improves three times, as well as it greatly improves the implementation efficiency of RDMS software. Problems such as low utilization ratio of hardware resources, fussy initialization of RDMS plug-ins, and security of intermediate outcomes storage are solved. In the meanwhile, cloud service center realizes centralized management of hardware resource, dynamic allocation of users’ need, unity of program development, integrated application of professional softwares. Finally, technical support of cloud computing facilitation in other oilfield business area is provided.


Cloud computing Digital reservoir Server resource Virtualization Cloud desktop Cloud storage 


  1. 1.
    Mell P, Grance T (2011) The NIST definition of cloud computing. NIST specialpublication 800Google Scholar
  2. 2.
    Al Morsy M, Grundy J, Muller I (2010) An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010, Cloud workshopGoogle Scholar
  3. 3.
    Wang Z, Su X, Diao Y et al (2015) Study of data security risk relevance about cloud computing for small and medium-sized enterprises. Appl Res Comput 32(6):1782–1786Google Scholar
  4. 4.
    Ristenpart T, Tromer E, Shacham H et al (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Acm Conference on Computer & Communications Security, pp 199–212Google Scholar
  5. 5.
    Chen Hong, Min Zhang, Chengguo Feng (2011) Achieving efficient dynamic cryphotographic access control in cloud storage. J Commun 32(7):125–132Google Scholar
  6. 6.
    Michael JB, Drusinsky D, Otani TW et al (2011) Verification and validation for trustworthy software systems. IEEE Softw 28(6):86–92CrossRefGoogle Scholar
  7. 7.
    Li H (2014) Application and prospect of cloud computing in oilfield enterprises. Electron Technol Softw Eng (15):180Google Scholar
  8. 8.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  9. 9.
    Lin C, Su W, Meng K et al (2013) Cloud computing security: architecture, mechanism and modeling. Chin J Comput 36(9):1785–1781CrossRefGoogle Scholar
  10. 10.
    Chadwick DW, Fatema K (2012) A privacy preserving authorisation system for the cloud. J Comput Syst Sci 78(5):1359–1373CrossRefGoogle Scholar
  11. 11.
    Saini V, Duan Q, Paruchuri V (2008) Threat modeling using attact trees. J Comput Sci Coll 23(4):124–131Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Yang Jiao
    • 1
    • 2
    Email author
  • Yujiang Shi
    • 1
  • Juan Wang
    • 1
  • Shan Xie
    • 1
  • Lixing Liang
    • 1
  1. 1.Research Institute of Exploration and DevelopmentChangqing Oilfield Company, XianShaanxiPeople’s Republic of China
  2. 2.The School of Electronic and Information EngineeringXi’an Jiao Tong University, XianShaanxiPeople’s Republic of China

Personalised recommendations