期刊文献+

On Distributed Object Storage Architecture Based on Mimic Defense 被引量:1

下载PDF
导出
摘要 With the advent of the era of big data,cloud computing,Internet of things,and other information industries continue to develop.There is an increasing amount of unstructured data such as pictures,audio,and video on the Internet.And the distributed object storage system has become the mainstream cloud storage solution.With the increasing number of distributed applications,data security in the distributed object storage system has become the focus.For the distributed object storage system,traditional defenses are means that fix discovered system vulnerabilities and backdoors by patching,or means to modify the corresponding structure and upgrade.However,these two kinds of means are hysteretic and hardly deal with unknown security threats.Based on mimic defense theory,this paper constructs the principle framework of the distributed object storage system and introduces the dynamic redundancy and heterogeneous function in the distributed object storage system architecture,which increases the attack cost,and greatly improves the security and availability of data.
出处 《China Communications》 SCIE CSCD 2021年第8期109-120,共12页 中国通信(英文版)
基金 National Keystone R&D Program of China(No.2017YFB0803204) Shenzhen Research Programs(JCYJ20170306092030521) the PCL Future Regional Network Facilities for Largescale Experiments and Applications(LZC0019) ZTE University Funding,Natural Science Foundation of China(NSFC)(No.61671001) GuangDong Prov.,R&D Key Program(No.2019B010137001) the Shenzhen Municipal Development and Reform Commission(Disciplinary Development Program for Data Science and Intelligent Computing).
  • 相关文献

参考文献6

二级参考文献53

  • 1Amazon simple storage service (Amazon $3), http://aws.amazon.com/s3/, 2013.
  • 2Worl' data more than doubling every two years Driving big data opportunity, new IT roles, http://www.emc.com/about/news/pres s/2011/20110628 -01. htm, 2013.
  • 3IDC says world's storage is breaking Moore's law, more than doubling every two years, http://enterprise.media.seagate.com/2011/06/inside- it-storage/idc-says-worlds-storage-is-breaking-moores- law-more-than-doubling-every-two-years/, 2012.
  • 4D. Beaver, S. Kumar, H. C. Li, J. Sobel, and E Vajgel, Finding a needle in Haystack: Facebook's photo storage, in Proc. 9th USENIX Conference on Operating Systems Design and Implementation (OSD1), 2010.
  • 5M. Sathiamoorthy, M. Asteris, D. Papailiopoulos, A. G. Dimakis, R. Vadali, S. Chen, and D. Borthakur, XORing elephants: Novel erasure codes for big data, Proc. VLDB Endowment, to appear.
  • 6A. W. Kosner, Amazon cloud goes down Friday night, taking Netflix, Instagram And Pinterest with it, http://www.forbes.com/sites/anthonykosner/2012/06/30/ amazon-cloud-goes-down-friday-night-taking-netflix- instagram-and-pinterest-with-it/, Forbes, 2012, June 30.
  • 7Wuala, http://www.wuala.com/en/learn/technology, 2012.
  • 8M. A1-Fares, A. Loukissas, and A. Vahdat, A scalable, commodity data center network architecture, in Proc. ACM S1GCOMM Conference on Data Communication (SIGCOMM), 2008.
  • 9A. G. Dimakis, R B. Godfrey, M. J. W. Y. Wu, and K. Ramchandran, Network coding for distributed storage system, IEEE Trans. Inform. Theory, vol. 56, no. 9, pp. 4539-4551, 2010.
  • 10I. Reed and G. Solomon, Polynomial codes over certain finite fields, Journal of the Society for Industrial and Applied Mathematics, vol. 8, no. 2, pp. 300-304, 1960.

共引文献143

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部