期刊文献+

一种成本相关的云提供商高可靠性保证算法

A Cost-aware Data Reliability Provision Algorithm for the Cloud Providers
下载PDF
导出
摘要 文章提出了一种"富云"的数据容灾模型,即通过在云提供商之间相互进行数据备份和容灾,从而节省构建远程容灾中心的成本,并在此基础上设计了一种成本相关的云计算服务高可靠性保证算法CAHRPA,其根据数据恢复时间和容灾费用选择合适的容灾方案。实验结果证明,CAHRPA能够在满足数据恢复时间的同时选取一种成本最优的数据备份策略。 Data reliability is a desirable feature for all cloud providers. This paper firstly illustrates the existing assurance mechanisms for data reliability and points out that the data recovery time and cost are two optimization objectives for cloud providers. Then, a novel rich cloud based disaster recovery model is introduced for cloud providers, in which a cloud provider is able to replicate data with lower cost by utilizing the virtual resource from other clouds. In order to minimize the DR cost at the same to guarantee the data protection, a novel cost aware high reliability provision algorithm (CAHRPA) is proposed to tackle such an optimization problem. The feasibility and efficiency of this method is verified by comparing with some other replication strategies.
出处 《信息网络安全》 2012年第8期101-104,共4页 Netinfo Security
基金 国家自然科学基金[60273006]
关键词 云计算 可靠性 容灾 cloud computing data reliability disaster recovery
  • 相关文献

参考文献8

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2李研,毛弘毅,栾慧先.如何构建可靠的云服务系统[C].2011年通信与信息技术新进展-第八届中国通信学会学术年会论文集,武汉:2011,285-287.
  • 3Vrable M,SavageS, Voelker GM.Cumulus: Filesystem Backup to the Cloud[J]. ACM Transactions on Storage (TOS), 2009, 5(04):1-28.
  • 4IBM Corporation.A Disaster Recovery very Solution Selection Methodology[R] .February 2004.
  • 5Wood T, CecchetE, Ramakrishnan K K. Disaster Recovery as a Cloud Service:Economic Benefits & Deployment Challenges[C]. HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing. Boston,USA: 2010, 8-15.
  • 6WangH,JingQ,Jiao S. Distributed Systems Meet Economics: Pricing in the Cloud[C]. HotCloud'10 Proceedings of the 2nd USENIX conference on Hot topics in cloud computing. Boston, USA:2010.
  • 7Storn, R. and Price, K. Differential evolution-A simple and efficient adaptive scheme for global optimization over continuous spaces[J]. Journal of Global Optimization, 1997,11:341-359.
  • 8Deb K, Pratap A, Agarwal S, at al. A Fast and Elitist Multi- Objective Genetic Algorithm: NSGA-Ⅱ[J]. IEEE Transactions on Evolutionary Computation, 2002, 6(02):182- 197.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部