期刊文献+

一种基于LT码的数据云存储方案 被引量:3

A Data Cloud Storage Scheme Based on LT Code
下载PDF
导出
摘要 拜占庭失效或恶意攻击会降低云服务供应商的云存储服务可靠性,为此,提出一种基于云计算的安全可靠数据存储方案。通过LT编码增加分布式云服务器的数据冗余度,在保证性能全局准最优的同时,提升数据用户在数据检索阶段的解码效率。利用支持公共数据完整性检查和准确数据修复,避免数据拥有者长期保持在线状态,并设计数据修复解决方案,使服务运行期间无需产生元数据也能进行数据修复。实验结果表明,与基于网络编码和基于RS码的云存储方案相比,该方案的通信成本只增加了15%,但数据检索效率却提高了约1倍。 To figure out the solution of the low reliability of cloud storage service caused by the Byzantine failures or malicious attacks, a secure and reliable cloud storage scheme is designed which enhances the reliability with near-optimal overall performance, To enable efficient decoding for data users in the data retrieval procedure, this paper adopts a LT codes for adding data redundancy in distributed cloud servers. In addition, the data owner from the burden of being online is released by enabling public data integrity check and employing exact repair. Furthermore, this paper proposes an exact repairing solution so that no meta data needs to be generated on the fly for repaired data. Experimental results show that the proposed scheme remarkably doubles the efficiency of data retrieval while only adding cost by 15%, compared with the existing cloud storage solutions.
作者 李力 鄢田云
出处 《计算机工程》 CAS CSCD 2014年第4期7-13,共7页 Computer Engineering
基金 四川省科技支撑计划基金资助项目(2013GZ0028)
关键词 云存储 LT码 可靠性 数据修复 数据检索 元数据 cloud storage LT code reliability data recovery data query metadata
  • 相关文献

参考文献16

  • 1陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. 被引量:1312
  • 2Armbrust M, Fox A, Griffith R, et al. A View of Cloud Computing[J]. Communications of the ACM, 2010, 53(4): 50-58.
  • 3周茜,于炯.云计算下基于信任的防御系统模型[J].计算机应用,2011,31(6):1531-1535. 被引量:26
  • 4刘亚秋,邢乐乐,景维鹏.云计算环境下基于时间期限和预算的调度算法[J].计算机工程,2013,39(6):56-59. 被引量:11
  • 5Gu Yunhong, Grossman R L. Sector: A High PerformanceWide Area Community Data Storage and Sharing System[J]. Future Generation Computer Systems, 2010, 26(5): 720-728.
  • 6Kubiatowicz J, Bindel D, Chen Yan, et al. OceanStore: An Architecture for Global-scale Persistent Storage[J]. ACM Sigplan Notices, 2000, 35(11): 190-201.
  • 7Dimakis A, Godfrey P, Wu Yunnan, et al. Network Coding for Distributed Storage Systems[J]. IEEE Transactions on Information Theory, 2010, 56(9): 4539-4551.
  • 8Ateniese G, Bums R, Curtmola R, et al. Remote Data Checking Using Provable Data Possession[J]. ACM Transactions on Information and System Security, 2011, 14(1).
  • 9Wu Yunnan. A Construction of Systematic MDS Codes with Minimum Repair Bandwidth[J]. IEEE Transactions on Information Theory, 2011, 57(6): 3738-3741.
  • 10Dimakis A G, Ramchandran K, Wu Yunnan, et al. A Survey on Network Codes for Distributed Storage[J]. Proceedings of the IEEE, 2011, 99(3): 476-489.

二级参考文献48

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2冀铁果,田立勤,胡志兴,孙锦霞.可信网络中一种基于AHP的用户行为评估方法[J].计算机工程与应用,2007,43(19):123-126. 被引量:27
  • 3Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 4Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 5Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 6Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 7Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 8Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 9Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.
  • 10Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters. In: Proc. of the 6th Symp. on Operating System Design and Implementation. Berkeley: USENIX Association, 2004. 137-150.

共引文献1344

同被引文献23

  • 1Ateniese G,Burns R,Curtmola R,et al.Remote Data Checking Using Provable Data Possession[J].ACM Transactions on Information and System Security,2011,14(1):12-34.
  • 2付伟,叶清,陈泽茂,等.云存储中的数据持有性证明研究综述[J].通信学报,2012,33(z2):201-206.
  • 3Ateniese G,di Pietro R,Mancini L V,et al.Scalable and Efficient Provable Data Possession[C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks.New York,USA:ACM Press,2008:1-10.
  • 4Zhu Yan,Hu Hongxin,Ahn G J,et al.Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(12):2231-2244.
  • 5Zhu Yan,Ahn G J,Hu Hongxin,et al.Dynamic Audit Services for Outsourced Storages in Clouds[J].IEEE Transactions on Services Computing,2013,6(2):227-238.
  • 6Wang Boyang,Li Baochun,Li Hui.Oruta:Privacypreserving Public Auditing for Shared Data in the Cloud[J].IEEE Transactions on Cloud Computing,2014,2(1):43-56.
  • 7Erway C C,KüpüA,Papamanthou C,et al.Dynamic Provable Data Possession[C]//Proceedings of the 16th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2009:213-222.
  • 8Wang Cong,Chow S,Wang Q,et al.Privacy-preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 10罗军舟,金嘉晖,宋爱波,东方.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. 被引量:827

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部