期刊文献+

Hadoop云存储策略的研究与优化 被引量:1

Research and Optimization of the Hadoop Cloud Storage Strategy
下载PDF
导出
摘要 分布式文件系统(HDFS)是海量数据的主要存储方式。HDFS默认的存储策略中,采用固定的数据副本个数以及随机选择远端节点的策略来保证数据的本地性和安全性,但当系统发生故障需要进行数据恢复时,默认策略将会造成系统时间的损失和节点存储负载的不均衡。提出一种改进的HDFS存储策略,根据节点的失效率以及期望的数据可用性建立一种概率模型,通过模型来优化数据副本个数,并根据节点的评价系数来选择远端节点进行副本存储。实验结果表明该策略针对海量数据时提高系统的存储性能。 HDFS is the main storage method of massive data. In the default storage strategy, HDFS uses fixed data replica and randomly chooses remote node to ensure data locality and security. However, when system needs data recovery because of system fault, random strategy will cause loss of system time and imbalance of node storage load. In this case, puts forward an improved HDFS storage strategy to generate a probability model based on node failure rate and expected data availability. It can optimize the number of data replica by the model and select remote node as copy storage according to its evaluation coefficient. The experiment result shows the strategy can improve system performance aiming at massive data.
出处 《现代计算机(中旬刊)》 2016年第1期33-37,共5页 Modern Computer
基金 广州市科技项目(No.2014XYD-007)
关键词 分布式文件系统 存储策略 数据副本 评价系数 HDFS Storage Strategy Data Copy Eva]uation Coefficient
  • 相关文献

参考文献7

二级参考文献154

  • 1陆蕊,魏振钢,林欣,徐伶伶,郭曙超.SAN和NAS融合构架数字档案馆信息存储管理平台[J].计算机应用,2006,26(B06):219-220. 被引量:6
  • 2刘玉照,刘建准,岳修志.基于SAN与NAS混合模式的数字图书馆网络存储系统研究[J].图书馆工作与研究,2006(5):18-21. 被引量:11
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1825

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部