期刊文献+

一种由智能终端控制的数据同步算法 被引量:3

Data synchronization algorithm controlled by the intelligent terminal
下载PDF
导出
摘要 提出了基于HASH指纹信息的数据同步算法,将数据严格一致同步和弱一致同步策略整合在一个算法中.数据同步的计算由智能终端控制,将HASH指纹信息映射至HASH指纹信息文件,与同步数据独立.计算完文件名和文件内容的哈希码后,先匹配文件名再匹配文件内容的哈希码,降低了对哈希算法的要求.仿真实验使用改进的BKDR哈希算法,实现了20 000数量级的文件重复性检测,验证了该数据同步算法可以由智能终端独立实施,而不依赖服务器,可以整合不同厂商的云存储服务. To integrate different vendors' cloud storage services, we put forward a data synchronization algorithm based on HASH fingerprint information, which combines strictly consistent data synchronization and weak consistent data synchronization. Intelligent terminal controled data synchronization calculation maps HASH fingerprint information into HASH fingerprint information file which is independent of the needed synchronous data. The algorithm is used to calculate the hash code for filename and file content. First we match the filename's hash code and then the file content, which strategy can reduce the requirement for the hash algorithm. The simulation experiment uses the improved BKDR hash algorithm, the results achieve 20000 order-of-magnitude file repeatability test and verify that the data synchronization algorithm can be implemented independently by the intelligent terminal, instead of relying on the server, and can integrate different vendors' cloud storage services.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2013年第2期172-180,212,共10页 Journal of Xidian University
基金 无锡科技职业学院重点指南项目资助(rj12001)
关键词 智能终端 数据同步 哈希指纹信息 整合 云存储 intelligent terminal data synchronization hash fingerprint information integration cloud storage
  • 相关文献

参考文献12

  • 1Abidar R, Moummadi K, Medromi H. Mobile Device and Multi Agent Systems: an Implemented Platform of Real Time Data Communication and Synchronization [C]//International Conference on Multimedia Computing and Systems (ICMCS). Ouarzazate: IEEE Computer Society, 2011 : 1-6.
  • 2Suneja A. Data Management and Synchronization in a Mobile Ad Hoc Network [J]. IEEE Potentials, 2012, 31(2) : 28- 30.
  • 3Choi E, Bae C S, Lee J. Data Synchronization between Adjacent User Devices for Personal Cloud Computing[C]//IEEE International Conference on Consumer Electronics(ICCE). Berlin: IEEE, 2012: 49-50.
  • 4Open Mobile Alliance. SyncML [EB/OL]. [2012-04-11]. http://www, openmobilealliance, org/tech/affiliates/syncml/ syncmlindex, html.
  • 5Cheng Chunlei, Du Jianqiang. Design and Implementation of Data Synchronization in Embedded TCM System Based on SyncML[C]//International Conference on Computer Application and System Modeling (ICCASM). Tiayuan: IEEE, 2010: 619-622.
  • 6Xie Jing, Yu Dan, Ma Shilong. A Novel Enterprise Mobile E-mail System Using the SyncML Protocol [C]//Seventh IEEE/AClS International Conference on Computer and Information Science. Washington: IEEE Computer Society, 2008: 391-396.
  • 7Lee B Y, Lee G H, Choi H. Performance Analysis of SyncML Server System Using Stochastic Petri Nets[J]. ETRI Journal, 2004, 26(4): 360-366.
  • 8Tridgell A, Mackerras P. The Rsync Algorithm[EB/OL]. [2012-04-11]. https://rsync, samba, org/tech_ report/.
  • 9Microsoft Corporation. Remote Differential Compression Algorithm Specification[EB/OL]. [2012-04-11]. http://msdn. microsoft, com/ zh-cn/ dd357428.
  • 10徐旦,生拥宏,鞠大鹏,吴建平,汪东升.高效的两轮远程文件快速同步算法[J].计算机科学与探索,2011,5(1):38-49. 被引量:12

二级参考文献16

  • 1张帆,马建峰.WAPI认证机制的性能和安全性分析[J].西安电子科技大学学报,2005,32(2):210-215. 被引量:29
  • 2SNIA-Storage Networking Industry Association.OSD:Object Based Storage Devices Technical Work Group[EB/OL].[2010-05-11].http://www.snia.org/tech activities/workgroups/osd/.
  • 3Factor M,Meth K,Naor D,et al.Object Storage:the Future Building Block for Storage Systems[C]//Local to Global Data Interoperability-Challenges and Technologies.Sardinia:IEEE Press,2005:119-123.
  • 4Kher V,Kim Y.Securing Distributed Storage:Challenges,Techniques,and Systems[C]//StorageSS05.Virginia:ACM,2005:9-25.
  • 5Gibson G A,Nagle D F,Courtright W,et al.NASD Scalable Storage Systems[C]//Proceedings of the USENIX99 Extreme Linux Workshop.Monterey:USENIX.1999:121-130.
  • 6Halevi S,Karger P A,Naor D.Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control[EB/OL].[2010-05-11].Http://eprint.iacr.org/2005/169.
  • 7Garg D.Proof Theory for Authorization Logic and Its Application to a Practical File System[D].Pittsburgh:School of Computer Science,2009.
  • 8Garg D,Pfenning F.A Proof-carrying File System[R].Pittsburgh:MU-CS-09-123,Carnegie Mellon University,2009.
  • 9Blanchet B.Automatic Verification of Correspondences for Security Protocols[J].Journal of Computer Security,2009,17(4):363-434.
  • 10Niu Zhongying,Jiang Hong,Zhou Ke,et al.Identification and Authentication in Large-Scale Storage Systems[C]//2009 IEEE International Conference on Networking,Architecture,and Storage.Changsha:IEEE Press,2009:421-427.

共引文献13

同被引文献15

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部