期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A reliable power management scheme for consistent hashing based distributed key value storage systems 被引量:1
1
作者 Nan-nan ZHAO Ji-guang WAN +1 位作者 Jun WANG Chang-sheng XIE 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第10期994-1007,共14页
Distributed key value storage systems are among the most important types of distributed storage systems currently deployed in data centers. Nowadays, enterprise data centers are facing growing pressure in reducing the... Distributed key value storage systems are among the most important types of distributed storage systems currently deployed in data centers. Nowadays, enterprise data centers are facing growing pressure in reducing their power consumption. In this paper, we propose GreenCHT, a reliable power management scheme for consistent hashing based distributed key value storage systems. It consists of a multi-tier replication scheme, a reliable distributed log store, and a predictive power mode scheduler (PMS). Instead of randomly placing replicas of each object on a number of nodes in the consistent hash ring, we arrange the replicas of objects on nonoverlapping tiers of nodes in the ring. This allows the system to fall in various power modes by powering down subsets of servers while not violating data availability. The predictive PMS predicts workloads and adapts to load fluctuation. It cooperates with the multi-tier replication strategy to provide power proportionality for the system. To ensure that the reliability of the system is maintained when replicas are powered down, we distribute the writes to standby replicas to active servers, which ensures failure tolerance of the system. GreenCHT is implemented based on Sheepdog, a distributed key value storage system that uses consistent hashing as an underlying distributed hash table. By replaying 12 typical real workload traces collected from Microsoft, the evaluation results show that GreenCHT can provide significant power savings while maintaining a desired performance. We observe that GreenCHT can reduce power consumption by up to 35%-61%. 展开更多
关键词 consistent hash table (CHT) REPLICATION Power management Key value storage system Reliability
原文传递
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management 被引量:1
2
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
Construction and Resource Locating of Semantic P2P Grid Based on Description Logics 被引量:1
3
作者 SUN Xiao-lin LU Zheng-ding LI Yu-hua WEN Kun-mei Li Rui-xuan 《Wuhan University Journal of Natural Sciences》 EI CAS 2006年第1期78-82,共5页
This paper proposes an algorithm applied in se mantic P2P network based on the description logics with the purpose for realizing the concepts distribution of resources, which makes the resources semantic locating easy... This paper proposes an algorithm applied in se mantic P2P network based on the description logics with the purpose for realizing the concepts distribution of resources, which makes the resources semantic locating easy. With the idea of the consistent hashing in the Chord, our algorithm stores the addresses and resources with the values of the same type to select instance. In addition, each peer has its own ontology, which will be completed by the knowledge distributed over the network during the exchange of CHGs (classification hierarchy graphs). The hierarchy classification of concepts allows to find matching resource by querying to the upper level concept because the all concepts described in the CHG have the same root. 展开更多
关键词 semantic P2P description logics consistent hashing ONTOLOGY CHG (classification hierarchy graphs)
下载PDF
校园二手交易平台的设计与实现 被引量:10
4
作者 高星宇 张家骏 《福建电脑》 2020年第2期87-89,共3页
对已有的校园二手交易平台进行研究分析,发现现有的平台存在商品质量无法得到保证、售后没有保障、无法保证交易的安全性、诈骗行为等问题。针对这些问题,本文提出并设计了一个二手交易平台。本平台采用B/S结构,以Spring MVC+Mybatis为... 对已有的校园二手交易平台进行研究分析,发现现有的平台存在商品质量无法得到保证、售后没有保障、无法保证交易的安全性、诈骗行为等问题。针对这些问题,本文提出并设计了一个二手交易平台。本平台采用B/S结构,以Spring MVC+Mybatis为框架,JSP技术开发前台页面,Servlet技术实现后台服务,MYSQL作为数据库,实现了身份认证、二手商品审核评级、中间平台保障资金安全等功能。 展开更多
关键词 SSM框架 二手交易平台 consistent Hash算法 改进
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部