期刊文献+

云存储与网络相互影响的研究 被引量:3

Study on Interplay of Cloud Storage and Network
下载PDF
导出
摘要 目前对云存储产生的网络流量缺乏系统研究,在分析云存储业务实现机制基础上,设计云存储业务自动测试工具,提出云存储业务的网络流量估算模型,并实际测量各种网络服务质量(QoS)条件对云存储用户体验的影响。实验数据表明,云存储业务会产生几十Gb/s的数据洪流。不同类型服务器的事务时延存在差异,云存储对丢包率的容忍度为2%,4 Mb/s~6 Mb/s带宽具有较高性价比。降低网络时延、丢包率、提高接入带宽可提升云存储用户体验。基于网络能力感知的云存储服务架构可以确保较好的网络QoS,与网络扩容相比,具有投资小、部署快、能充分利用现网资源的优势。 Aiming at the systematic research of the network traffic generated by cloud storage services, an automatic test tool is designed based on the analysis of cloud storage services. And an estimation model of network flow is put forward. The user experience under various network Quality of Service(QoS) conditions is also measured. Experimental data show that cloud storage service can generate a data deluge of several Gb/s. There is a gap between the overall transacti0rt times of two different kinds of servers. Packet loss rate lower than 2% has a smaller effect on cloud storage services. Bandwidth between 4 Mb/s and 6 Mb/s is more cost efficient. Either reducing network delay time and packet loss rate or increasing access bandwidth can improve the Quality of Experiece(QoE). A cloud storage service framework based on the perception of capabilities of network devices can ensure better network QoS condition which has advantages of smaller investment, easier deployment and full use of existing network resource compared with traditional method of network expansion.
作者 王浩
出处 《计算机工程》 CAS CSCD 2013年第10期24-30,36,共8页 Computer Engineering
关键词 云存储 网络流量模型 服务质量 时延 抖动 丢包率 体验质量 cloud storage network traffic model Quality of Service(QoS) delay jitter packet loss rate Quality of Experiece(QoE)
  • 相关文献

参考文献13

  • 1Verma S. Forecast: Consumer Digital Storage Needs, 2010- 2016[EB/OL]. (2013-01-20). http://www.gartner.com/Display Document?ref=clientFriendlyUrl&id= ! 953315.
  • 2艾瑞咨询集团.市场分析:云存储是云计算应用的突破口[EB/OL].(2013-01-20).http://service.iresearch.cn/cloud/20120918/181903.shtml.
  • 3Wu Jiyi, Ping Lingdi, Ge Xiaoping, et al. Cloud Storage as the Infrastructure of Cloud Computing[C]//Proc. of International Conference on Intelligent Computing and Cognitive Informatics. Kuala Lumpur, Malaysia: IEEE Press, 2010.
  • 4Zeng Wenying, Zhao Yuelong, Ou Kairi, et al. Research on Cloud Storage Architecture and Key Technologies[C]//Proc. of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human. Seoul, Korea: ACM Press, 2009.
  • 5Wang Guojun, Liu Qin, Wu Jie. Hierarchical Attribute-based Encryption for Fine-grained Access Control in Cloud Storage Services[C]//Proc. of the 17th ACM Conference on Computer and Communications Security. Chicago, USA: ACM Press, 2010.
  • 6林秦颖,桂小林,史德琴,王小平.面向云存储的安全存储策略研究[J].计算机研究与发展,2011,48(S1):240-243. 被引量:19
  • 7侯清铧,武永卫,郑纬民,杨广文.一种保护云存储平台上用户数据私密性的方法[J].计算机研究与发展,2011,48(7):1146-1154. 被引量:40
  • 8洪澄 张敏 冯登国.AB-ACCS一种云存储密文访问控制方法.计算机研究与发展,2010,47(1):259-265.
  • 9黄格仕.云存储安全技术的研究[D].广州:华南理工大学,2012.
  • 10Bowers K D, Juels A, Oprea A. HAIL: A High-availability and Integrity Layer for Cloud Storage[C]//Proc. of the 16th ACM Conference on Computer and Communications. Chicago, USA ACM Press, 2009.

二级参考文献21

  • 1Jitendra Padhye, Victor Firoiuy, Don Towsley, et al. Modeling TCP throughput: a simple model and its empirical validation,www.sigcomm.org/sigeomm98/tp/paper25.pdf.
  • 2Ghemawat S, Gobioff H, Leung S T. The Google file system [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003:29-43.
  • 3Borthakur D, HDFS Architecture [EB/OL]. (2010-02 19) [2010-08-21]. http://hadoop, apache, org/common/docs/ current/hdfs_design, html.
  • 4Jones M Tim. Cepb: A Linux petabyte-scale distributed file system[EB/OL]. (010 05-04)[2010-08-21]. http://www. ibm. eom/developerworks/linux/library/l-eeph/index, html.
  • 5Barbara P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization [C] //Proc of the 19th ACM Symp on Operating Systems Principles. New York: ACM, 2003: 164- 177.
  • 6Chen Xiaoxin, Garfinkel Tal, Lewis E Christopher, et al. Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems [C] //Proc of the 13th lnt Conf on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2008: 2-13.
  • 7Abramson D, Jackson J, Muthrasanallur Sridhar, et al. Intel virtualization technology for directed I/O [J]. lntel Virtualization Technology, 2006, 10(3), 179-192.
  • 8Lie David, Thekkath Chandramohan A, Horowitz Mark. Implementing an untrusted operating system on trusted hardware [C] //Proc of the 19th ACM Syrup on Operating Systems Principles. New York: ACM, 2003: 179-192.
  • 9Lie David, Thekkath Chandramohan, Mitchell Mark, et al. Architectural support for copy and tamper resistant software [C] //Proc of the 9th Int Conf on Architectural Support for Programming Languages and Operating Syslems. New York: ACM, 2000:168-177.
  • 10Dwoskin Jeffrey S, Lee Ruby B. Hardware rooted trust for secure key management and transient trust [C] //Proe of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:389-400.

共引文献69

同被引文献28

  • 1邓永红.4G通信技术综述[J].数字通信世界,2005(2):58-63. 被引量:23
  • 2Ateniese G,Burns R,Curtmola R,et al.Remote Data Checking Using Provable Data Possession[J].ACM Transactions on Information and System Security,2011,14(1):12-34.
  • 3付伟,叶清,陈泽茂,等.云存储中的数据持有性证明研究综述[J].通信学报,2012,33(z2):201-206.
  • 4Ateniese G,di Pietro R,Mancini L V,et al.Scalable and Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York,USA:ACM Press,2008:1-10.
  • 5Zhu Yan,Hu Hongxin,Ahn G J,et al.Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244.
  • 6Zhu Yan,Ahn G J,Hu Hongxin,et al.Dynamic Audit Services for Outsourced Storages in Clouds[J].IEEE Transactions on Services Computing,2013,6(2):227-238.
  • 7Wang Boyang,Li Baochun,Li Hui.Oruta:Privacypreserving Public Auditing for Shared Data in the Cloud[J].IEEE Transactions on Cloud Computing,2014,2(1):43-56.
  • 8Erway C C,KüpüA,Papamanthou C,et al.Dynamic Provable Data Possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:213-222.
  • 9Wang Cong,Chow S,Wang Q,et al.Privacy-preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
  • 10陈殿房,韩祥立,杨晶.油井液面探测方法探讨[J].油气井测试,2008,17(2):60-61. 被引量:17

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部