期刊文献+

基于RS纠删码下HDFS云存储动态副本策略的思考 被引量:1

On Dynamic Replication Strategies of HDFS Cloud Storage Based on RS Erasure Codes
下载PDF
导出
摘要 现如今,科技发展速度不断加快,云存储效率在先进科技的带动下大大提高,但云存储文件系统应用期间受静态完全副本冗余机制影响较大,这在一定程度上会增加云存储负载压力,最终影响系统运行稳定性,减慢系统运行速度。文章首先简要介绍RS纠删码,然后针对HDFS完全副本与纠删码对比分析,最后重点探究RS纠删码基础下HDFS云存储动态副本策略。 Nowadays, the scientific and technological development is being accelerated, and the efficiency of cloud storage isgreatly improved by advanced science and technology. However, the redundant mechanism of static full replica greatly affects the ap-plication of cloud storage file system. To some extent, this will increase the cloud storage load pressure, and ultimately affect the sta-bility of the system and slow down the speed of the system. This paper first briefly introduces RS erasure codes, then comparesHDFS full replica with erasure codes, and finally focuses on the dynamic replication strategy of HDFS cloud storage based on RSerasure codes.
机构地区 山东省肿瘤医院
出处 《科技创新与应用》 2018年第24期38-39,共2页 Technology Innovation and Application
关键词 RS纠删码 HDFS 云存储 动态副本策略 RS erasure code HDFS cloud storage dynamic replication strategy
  • 相关文献

参考文献3

二级参考文献45

  • 1ATENIESE G,PIETRO R D,MANCINI L V,et al.Scalable and efficient provable data possession[C]//Proc of the 4th International Conference on Security and Privacy in Communication Networks.New York:ACM Press,2008:1-10.
  • 2ERWAY C,KP A,PAPAMANTHOU C,et al.Dynamic pro-vable data possession[C]//Proc of the 16th ACM Conference on Computer and Communications Security.New York:ACM Press,2009:213-222.
  • 3SHACHAM H,WATERS B.Compact proofs of retrievability[C]//Proc of the 14th International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer-Verlag,2008:90-107.
  • 4BONEH D,LYNN B,SHACHAM H.Short signatures from the Weil pairing[J].Journal of Cryptology,2004,17(4):297-319.
  • 5BOWERS K D,JUELS A,OPREA A.Proofs of retrievability:theory and implementation[C]//Proc of ACM Workshop on Cloud Computing Security.New York:ACM Press,2009:43-54.
  • 6JONES G A,JONES J M.Elementary number theory[M].[S.l.]:Springer-Verlag,1998.
  • 7YANG Yi,WANG Xin-yan,ZHU Sen-cun,et al.SDAP:a secure hop-by-hop data aggregation protocol for sensor networks[J].ACM Trans on Information and System Security,2008,11(4):1-43.
  • 8VARALAKSHMI P,DEVENTHIRAN H.Integrity checking for cloud environment using encryption algorithm[C]//Proc of International Conference on Receut Treuds in Information Technology.2012:228-232.
  • 9DESWARTE Y,QUISQUATER J J,SAIDANE A.Remote integrity checking[C]//Proc of IFIP Integrity and Internal Control in Information Systems.Berlin:Springer,2003:1-11.
  • 10Stefanov E, Shi E. Multi-cloud oblivious storage [C] //Proc of the 2013 ACM SIGSAC Conf on Computer Communications Security. New York: ACM, 2013:247-258.

共引文献31

同被引文献6

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部