期刊文献+

云存储中基于竞标模式的副本管理策略

Data replication management strategy based on bidding mode for cloud storage cluster
下载PDF
导出
摘要 为提高数据的可用性、减小程序的响应时间及保证负载均衡,提出带有竞标思想的副本管理策略.将竞标模式中的元素(如竞标时间,竞标底价,竞标价格等)运用到副本放置过程中,在副本放置过后优化副本的分布情况.当文件数据的可用性不能满足用户需求时,副本竞标活动开始.副本的放置考虑到副本集的地理分布差异性和分布疏密程度.当数据可用性达到用户需求时,策略开始进行副本的管理和优化操作.实验结果分析表明,该策略能改善云存储系统的负载平衡和响应时间等方面的性能,满足云存储环境的实际需求. To provide high availability,minimize the response time of applications and make load balancing for cloud storage,a new replica management policy with bidding thought is proposed. The policy combines the own characteristics of replica and factors of bidding mode( e. g. bidding time,bidding standard,bidding price etc.) and after placing the replica the system begins to optimize and manage the distribution of copies. Replica bidding activity starts when the file data availability cannot meet the given requirement. The geographical diversity of replica set has been considered in the process of replica placement. When the data availability meet the user's needs,the system begin to manage the replica set. The experimental results show that our policy can improve the performance in both load balance and response time.
出处 《福州大学学报(自然科学版)》 CAS 北大核心 2015年第1期28-34,共7页 Journal of Fuzhou University(Natural Science Edition)
基金 国家自然科学基金资助项目(61103175) 福建省杰出青年基金资助项目(2014J06017) 福建省自然科学基金资助项目(2014J01231)
关键词 数据副本 竞标模式 云存储 负载均衡 data replica bidding mode cloud storage load balance
  • 相关文献

参考文献2

二级参考文献25

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Brodkin. Gartner: seven cloud-computing security risks[DB/OL]. http://www.networkworld.comlnews/2008/070208-cloud. html, 2008-07-02.
  • 3Cao Tian-jie , Zhang Yong-ping, Wang Chu-jiao. Security protocol [ M]. Beijing: Beijing University of Posts and Telecommunications Press, 2009.
  • 4Aaram Yun, Shi Chun-hui, Yongdae Kim. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [ C]. In CCSW'09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009: 67- 75.
  • 5Carter J L, Wegman M N. Universal classes of hash functions (extended abstract) [ A]. STOC '77: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, New York, NY, USA [C]. ACMPress, 1977:106-112.
  • 6Wang Cong , Wang Qian , Ren Kui, et al. Ensuring data storage security in cloud computing [ C]. In IWQoS' 09: Proceedings of 17th International Workshop on Quality of Service, Charleston, SC, USA, 2009:1-9.
  • 7Adi Shamir. Identity-based cryptosystems and signature schemes [ C]. In Proceedings of CRYPTO'84 on Advances in Cryptology, Santa Barbara, California, USA, 1985 :47-53.
  • 8Horwitz J, Lynn B. Toward hierarchical identity-based encryption [C]. In Proceedings of EUROCRYPT 2002, LNCS, Springer, Heidelberg ,2002 ,2332 :466481.
  • 9Li H, Dai Y, Tian L,et al. Identity-based authentication for cloud computing[ C]. In CloudCom'09: Proceedings of the 1 st International Conference on Cloud Computing, Beijing, China, 2009: 157-166.
  • 10Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [ C]. In Proceedings of IEEE INFOCOM, 2010:534-542.

共引文献367

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部