期刊文献+

基于纠删码的云计算存储备份及恢复策略 被引量:5

Cloud storagebackup and recoverystrategy based onerasure codes
下载PDF
导出
摘要 如何保障云存储系统中数据的可靠性是云计算领域的热点问题。副本备份技术是保障数据可靠性的重要手段,但是存在占用存储空间大、存储效率低等问题。纠删码能够提供优化的数据冗余度,以防止数据丢失,恰当地使用纠删码可以提高空间的利用效率并获得较好的数据保护效果,在通讯方面已经得到广泛应用。将纠删码引入云存储系统中,代替副本备份策略,以提高云存储系统的性能。实验表明该方案可以有效提高数据可靠性和空间利用率。 It is a hot topic in the area of cloud computing how to guarantee data reliability in cloud storage systems. The copy backup technology is an important approach to guaranteeing data reliability. However,there are some disadvantages such as taking up too much disk space and having low saving efficiency. Erasure code can provide optimized data redundancy thereby preventing data loss. Applying erasure code properly can help improve space utilization ratios and acquire satisfactory data protection effects. It has been widely used in communications. This paper introduces erasure code to cloud storage systems to replace the copy backup strategy and improve the performance of cloud storage systems. Experiments show that the scheme can effectively improve data reliability and space utilization.
作者 芦欣 刘渊
出处 《计算机工程与应用》 CSCD 北大核心 2016年第4期56-60,134,共6页 Computer Engineering and Applications
基金 江苏省自然科学基金重点研究专项(No.BK2011003)
关键词 云存储 纠删码 容错 冗余备份 cloud storage erasure codes tolerant redundant backup
  • 相关文献

参考文献15

  • 1Schmuck F B,Haskin R L.GPFS:A shared-disk file system for large computing clusters[C]//Proceedings of the Conference on File and Storage Technologies,January28-30,2002:231-244.
  • 2Cloud storage for cloud computing[EB/OL].(2009).http://ogf.org/Resources/documents/Cloud Storage For Cloud Computing.pdf.
  • 3Raluca A P.Secure,searchable and efficient cloud storage[EB/OL].(2010).http://www.usenix.org/event/sec09/tech/slides/popa.pdf.
  • 4Cloud storage standards overview and research ideas brainstorm[EB/OL].(2009).http://www.pdl.cmu.edu/SDI/2009/Mark Carlson_Cloud CMU.pdf.
  • 5Hayes B.Cloud computing[J].Communications of the ACM,2008,51(7):9-11.
  • 6Knorr E,Gruman G.What cloud computing really means[EB/OL].[2013-10-19].http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031.
  • 7Ghemawat S,Gobioff H,Leung S T.The google file system[J].Operating Systems Review,2003,37(5):29-43.
  • 8慕建君,路成业,王新梅.关于纠删码的研究与进展[J].电子与信息学报,2002,24(9):1276-1281. 被引量:15
  • 9Rizzo L.Effective erasure codes for reliable computer.communication protocols[J].ACM SIGCOMM Computer Communication Review,1997,27(2):24-36.
  • 10Lustre File System.High-performance storage architecture and scalable cluster file system[N].White paper,2007.

二级参考文献13

  • 1[1]J.W. Byers, M. Luby, M. Mitzenmacher, A. Rege, A digital fountain approach to reliable distribution of bulk data, available at http://www.icsi.berkeley. edu/~luby/, 1998.
  • 2[2]M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, V. Stemann, Practical loss-resilientcodes, available at http://www.icsi.berkeley. edu/~luby/, 1998.
  • 3[3]P. Elias, Coding for two noisy channels, Information Theory, Third London Symposium, 1955,61-67.
  • 4[4]L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM ComputerCommunication, Review, 1997, 27(2), 24-36.
  • 5[5]L. Rizzo, On the feasibility of software FEC, available as http://www.iet.unipi.it/‘luigi/softfec.ps.
  • 6[6]J. Blomer, M. Mitzenmacher, A. Shokrollahi, An XOR-based erasure-resilient coding scheme,ICSI Technical Report, No.TR-95048[R], August 1995, Available at http://www.icsi.berkeley.edu/~luby/.
  • 7[7]F.J. MacWilliams, N. J. A. Sloane, The Theory of Error-Correcting Codes, North Holland,Amsterdam, 1977, Chapter 11.
  • 8[8]M. Luby, M. Mitzenmacher, A. Shokrollahi, D. Spielman, Improved low-density parity-checkcodes using irregular graphs and belief propagation, In Proc. of IEEE International Symposiumon Information Theory (ISIT), Cambridge, MA, 1998, 16-21.
  • 9[9]M. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. Spielman, Analysis of random processes viaAnd-Or tree evaluation, In Proc. of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, California, 1998, 364-373.
  • 10[10]D.J.C. MacKay, S. T. Wilson, M. C. Davey, Comparison of constructions of irregular Gallagercodes, IEEE Trans. on Communications, 1998, COM-47(10), 1449-1454.

共引文献14

同被引文献42

引证文献5

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部