Cloud storage Stealth costs: Data migration and usage costs

As early as the spring of 2009, it was not too difficult to talk about the hidden costs of cloud storage, since cloud storage service providers did not help customers determine the true cost of using the technology.       But then, as cloud storage services offer a variety of prices and different features, cloud storage service providers are now starting to provide customers with tools to estimate monthly costs. ...

Nine large cloud storage services to attract SMEs

Managing and maintaining storage is expensive, not to mention the growing need for more hard disk space. By using data storage based on cloud computing, business owners can leverage more attractive prices and consistently reduced costs while integrating a variety of new features from different vendors. Cloud services, as cloud computing or cloud storage, can be valuable assets for cost-sensitive SMEs. Although some of the larger organizations have the resources to build their own cloud storage services, small and medium-size enterprises often need to turn to some cloud storage providers for Internet-accessible storage ...

An algorithm of cloud data integrity verification based on Bilinear pair

An algorithm for cloud data integrity verification based on bilinear pairs Deng, Ma Tong, Gao Minxia a new algorithm for verifying the integrity of outsourced data on a cloud server is presented. By introducing bilinear pairs, the user randomly chooses the challenge data to send to the server, the cloud storage server returns the generated evidence, verifies the balance of the judgment equation to know whether the outsourced data is complete, and the introduction of the trusted third party avoids the dispute's inability to arbitrate. The algorithm can realize the unlimited integrity verification of the outsourced data remotely, and it takes the benefit of the users and the cloud storage service providers into account well. An algorithm of cloud data integrity verification based on Bilinear pair

Technical paper: A cloud storage reliability mechanism oriented to erasure code technology

A cloud storage reliability mechanism oriented to erasure code technology Du Yunyin in cloud storage, data can be divided into three types: frequent reads, frequent writes, and cold data. Different kinds of data are set up in different encoding mechanism: The multiple copy technique is used for frequent reading data, the single file coding scheme is used to write the data frequently, and the cold data adopts the cross file coding scheme. In the cloud storage system, this paper presents a new method for the reliability of the erasure code, which is easy to implement, has high fault tolerance and can reduce the resource consumption compared with the multiple copy mechanism. Based on a RAID package on HDFs ...

A revocable attribute encryption scheme for cloud storage

A Revocable property encryption scheme for cloud storage penning Zhu Zhiqiang Nate Zhihuian Because of the large number of cloud storage users and complex components, the security protection of data in cloud storage has become a major constraint, in recent years, based on attribute encryption technology to solve the problem of data security storage in cloud storage becomes a research hotspot, However, traditional attribute encryption schemes have some problems, such as relatively large cipher length and complex attribute cancellation. By introducing proxy encryption technology, a revocable ciphertext attribute base encryption scheme is proposed for the above problems, and the attribute cancellation is realized while shortening the cipher length.

A multi-device file synchronization algorithm in cloud environment

A multi-device file synchronization algorithm in cloud environment Liu Shujun, Chang, Frankfurt Cloud Environment, the client and cloud show a dynamic star topology, the client anytime, anywhere online, off-line dynamic characteristics, so that maintaining user data in the consistency between multiple replicas becomes complex. In this paper, a real-time automatic file synchronization algorithm based on file metadata is proposed, and a cloud network client prototype program is realized by calling the open API provided by Peng Yun T disk and combining the synchronization algorithm presented in this paper. A multi-device file synchronization algorithm in cloud environment

Research on heterogeneous large data storage method

Research on the storage method of heterogeneous large data the main research contents of Beijing Jiaotong University Tanxu include the following aspects: first, in view of the emergence of large data and the challenges, from a technical point of view of the development of the non-relational database. In general, the characteristics of relational database and non relational database are compared, this paper analyzes the advantages and disadvantages of the relational database and the bottleneck in the large data environment, deeply studies the structure, theory, feature and storage model of the non relational database, and expounds its advantages compared with the relational database. Then, the function and performance of micro ...

Overview of cloud storage security technology

Overview of cloud storage Security technology Beam companion section radium Wei Chi du June Zheng the security technology issues related to cloud storage are attributed to 5 categories (user needs 3 categories, service provider requirements 2), and combined with the latest academic research results. The analysis shows that cloud storage security technology involves a wide range and high risk.  The development of related technology has produced some good results, but there are still many problems which need further study. Overview of cloud storage security technology

Research on QoS guarantee mechanism of multilevel metadata in cloud storage

Research on QoS guarantee mechanism of multilevel metadata in cloud storage Zhiyong Lichunlin in the master-slave architecture of the cloud storage system, all data access needs to go through the metadata server, in the event of a surge in access, the metadata server may become a system bottleneck. Most of the current cloud storage systems employ FIFO scheduling strategies, when the service is congested, the service quality cannot be guaranteed, in order to ensure the quality of service, this paper makes the QoS distinction by the Congestion Admission control and the queue scheduling technology, which is based on the priority, restricts the access request of the low priority to enter the service queue, and avoids ...

Security analysis and improvement of cloud storage access control scheme

Security analysis and improvement of cloud storage access control scheme Crown Fan Hong Dudahai on Tang, Tang Y,lee p,lui j,et al. Secure Overlay Cloud with access controls and storage Deletion. IEEE transactions on dependable and Secure computing,2012,9 (6): 9 ...

Design and implementation of data storage encryption mechanism for cloud storage server

Design and implementation of data storage encryption mechanism in cloud storage server LU from East Han Yu Wei to ensure the confidentiality of server-side data storage in cloud storage, the data storage encryption mechanism is designed, and the basic management layer and the storage layer encryption mechanism are realized in the application environment of personal storage of Office system based on Cloud desktop. Based on Java and JSP technology, the basic management layer is realized, the interface between the basic management layer and the storage layer is realized based on the bash script, and the storage layer data encryption mechanism is realized based on the open source project TGT, which guarantees the confidentiality of the data stored in the server. Cloud Storage server-side data Save ...

Research on replica creation strategy in cloud storage environment

Research on the strategy of replica creation in cloud storage environment Hainan University leaf Xianglong with the development of Internet technology, especially in recent years, the data show the development of explosion, the traditional methods of data processing can not meet the needs of people. The emergence of cloud storage brings the gospel to people, which can meet the needs of user data processing well. However, the emergence of cloud storage also brings the problems of system fault tolerance, access efficiency and data reliability. To solve these problems, the paper introduces the replica technology for cloud storage. The introduction of replica technology, but also to the system to bring a copy of consistent maintenance, negative ...

A comparative study of cloud storage structure model and cloud storage architecture

A comparative study of cloud storage structure model and cloud storage architecture The concept of Wang Hachen cloud storage is a new concept, which includes cluster computing, distributed File system and Grid computing technology. These heterogeneous storage systems form a virtual, huge storage system as a whole to provide data storage and business access functions together. This paper expounds the cloud storage structure model, and makes a comparative study on several typical cloud storage architectures. A comparative study of cloud storage structure model and cloud storage architecture

Research on key technologies of cloud storage System

Research on key technologies of cloud storage System the Chaofeng thesis of Zhengzhou University studies the architecture of general cloud storage system, and gives a method of processing mass small files based on Hadoop. The main contents of this paper are as follows: On the basis of in-depth analysis of HDFS, the characteristics of general cloud storage System are considered comprehensively, and a cloud storage system architecture is proposed to improve storage efficiency. With reference to the domestic and foreign processing methods of HDFs medium and small files, using two-dimensional boxing algorithm and dynamic optimization idea, the paper designs ...

Research on dynamic load balancing algorithm in cloud storage System

Research on dynamic load balancing algorithm in cloud storage System Tanaki Chen Wiewei Chenweidon li a load balancing algorithm based on node dynamic forward shift (NDF) is proposed to solve the problem of storage load inequality in a distributed hash table (DHT) cloud storage System. Through the overload node dynamic forward, reduce the node storage partition, thereby reducing node storage load. At the same time, the overload node replicates the relevant data to the 3rd successor node to ensure the stable copy quantity of the data in the system. In the process of the implementation of the NDF algorithm, only the overload node and the 3rd successor node are simply coordinated, and multiple overload nodes can be concurrent ...

Research on the interaction between cloud storage and network

Research on the interaction between cloud storage and network Wang Hao's current lack of systematic research on the network traffic generated by cloud storage, based on the analysis of cloud storage business implementation mechanism, design cloud storage business automated testing tool, put forward the cloud storage Business network traffic estimation model, and actual measurement of various network service quality (QoS) The impact of conditions on the cloud storage user experience. Experimental data show that cloud storage business generates dozens of GB/s data torrent. There are differences in transaction delays for different types of servers, and the tolerance of cloud storage to packet loss rates is 2%,4 mb/s~6 MB/s bandwidth. To reduce the ...

Data recovery system based on fountain code in cloud storage

Data recovery system based on fountain code in cloud storage Peng Chen Lanchang Guo Yan undistracted Storage Service has a portable and easy-to-use feature as a new data storage and management service, but it is also accompanied by an important issue: how to ensure the integrity and recoverability of the data. To resolve this problem, A data recovery system based on fountain Code is designed and implemented. The scheme uses fountain code to encode data to ensure the data can be recovered under certain tamper ratio, and the time complexity of hash function is verified when data integrity is validated. When users are worried about tampering with their data, simply challenge the server, depending on the service ...

Research on proof model of data holding in cloud storage

Research on the proof model of data holding in cloud storage the Liu Huanan of Zhengzhou University, as the next-generation architecture of the IT industry, cloud computing is more than simply putting applications and databases in a centralized large-scale data center, but with greater flexibility, allowing arbitrary endpoints to participate in cloud service interactions, This is reflected in cloud storage services: entities that provide storage services may be the integration of a variety of providers. This heterogeneous new feature and the incomplete credibility of the storage provider makes it possible to prove the data holdings in the cloud environment.

Secure access to dual backup data in cloud storage

Secure access to dual backup data in cloud storage Hongwei Blade leap Ku Chunsheng Yu Zhimin Jingzheng in cloud storage, cloud service providers can ensure that the integrity and privacy of customer data is a concern for every customer how to recover data lost due to device failure or mismanagement, How to guard against adversary's attack on the customer tampering with data or peering into the address sequence of a customer's access to cloud storage is a problem that customers need to consider when storing important and private data. Secure access to dual backup data in cloud storage

Storage technology in cloud computing era--cloud storage

Cloud computing Concept Cloud is actually a metaphor for the network, the Internet. In the past, the cloud was used to represent the telecommunications network, which was later used to represent the abstraction of the Internet and underlying infrastructure. Cloud computing is divided into narrow cloud computing and broad cloud computing. Narrow cloud computing refers to the delivery and usage patterns of IT infrastructure, which means acquiring the required resources through the network on an as-needed and extensible basis; broad cloud computing refers to the delivery and usage patterns of services, which means that the required services are obtained through the network in an on-demand, extensible manner. If only the next definition, people still can't understand what is cloud computing, we give a very simple example ...

Total Pages: 2156 1 .... 1352 1353 1354 1355 1356 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.