期刊文献+

分布式系统数据一致性和并发性优化研究 被引量:7

Research on Data Consistency and Concurrency Optimization of Distributed System
下载PDF
导出
摘要 为满足云存储的高数据读写吞吐量需求,提出一种用于分布式系统的数据锁和快速定位数据锁方法。该锁结构通过细化数据覆盖的颗粒度,在确保数据一致性的前提下允许数据共享。以吞吐量和冲突率为指标进行仿真实验,结果证明,该数据锁定位方法可以向上层提供高性能的随机数据存取服务。 A novel lock scheme applied in distributed systems is proposed in order to fulfill the requirement of huge data throughput, The lock structure refines the granularity of data coverage and allows data sharing in the premise of data consistency while the lock localization algorithm decreases the time to look up lock objects. These methodologies are evaluated in terms of throughput benchmark and lock collision ratio, and simulation result demonstrates that with these optimizations the storage layer can provide high-performance random access to data retrieval requests from upper layer.
出处 《计算机工程》 CAS CSCD 2012年第4期260-262,共3页 Computer Engineering
关键词 分布式系统 云计算 哈希 B+树索引 数据锁 并发性 distributed system cloud computing Hash B+ tree index data lock concurrency
  • 相关文献

参考文献6

  • 1Buyya R, Yeo C S, Venugopal S. Market-oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C] //Proc. of the 10th IEEE Int’l Conf. on High Performance Computing and Communication. Dalian, China, [s. n.] , 2008.
  • 2Sotomayor B, Montero R S, Lorente I M, et al. Virual Infrastructure Management in Private and Hybrid Clouds[J]. IEEE Internet Computing, 2009, 13(5): 14-22.
  • 3麻浩,王晓明.外包数据库的安全访问控制机制[J].计算机工程,2011,37(9):173-175. 被引量:2
  • 4Burns R C, Rees R M, Darrel D E L. Semi-preemptible Locks for a Distributed File System[C] //Proc. of International Performance Computing and Communication Conference. Phoenix, USA: [s. n.] , 2000, 397-404.
  • 5Jaechun N. Data Consistency Protocol for Distributed File Systems[C] //Proc. of Conf. on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. Rende, Italy: [s. n.] , 2009.
  • 6Choi Sung-Chune, Choi Min-Seuk, Lee Chun-Kyeong, et al. Distributed Lock Manager for Distributed File System in Shared-disk Environment[C] //Proc. of the 10th Int’l Conference on Computer and Information Technology. Bradford, UK: [s. n.] , 2010.

二级参考文献6

  • 1Damiani E,Vimercati S D C D,Foresti S,et al.Metadata Management in Outsourced Encrypted Databases[C]//Proc.of the 4th VLDB Workshop on Secure Data Management.Heidelberg,Germany:Springer-Verlag,2007.
  • 2Vimercati S D C D,Foresti S,Jajodia S,et al.A Data Outsourcing Architecture Combining Cryptography and Access Control[C]//Proc.of ACM Workshop on Computer Security Architecture.[S.l.]:ACM Press,2007.
  • 3Vimercati S D C D,Foresti S,Jajodia S,et al.Over-encryption:Management of Access Control Evolution on Outsourced Data[C]//Proc.of International Conference on Very Large Data Bases.Vienna,Austria:[s.n.],2007.
  • 4Liu Shuai,Li Wei,Wang Lingyu.Towards Efficient Overencryption in Outsourced Databases Using Secret Sharing[C]//Proc.of the 2nd IFIP International Conference on New Technologies,Mobility and Security.[S.l.]:ACM Press,2008.
  • 5袁多宝,王晓明.基于MH树的外包数据库查询验证方法[J].计算机工程,2010,36(4):115-117. 被引量:9
  • 6田秀霞,王晓玲,高明,周傲英.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):991-1006. 被引量:61

共引文献1

同被引文献67

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部