A trusted cloud storage Control model based on Peer-to-peer

A peer-to-peer-based trusted cloud storage Control model Zhu Jian Wang Wang cloud storage is the ideal storage information technology in cloud computing. The paper aims at the bottleneck problem of cloud storage mainly using centralized architecture, and combines the main ideas of Peer-to-peer technology. A trusted cloud storage Control model based on Peer-to-peer is proposed. This model not only improves the performance of cloud storage, but also uses trusted computing technology to enhance the privacy security of access control and data storage of cloud users, and analyzes the security of the proposed model. A trusted cloud storage Control model based on Peer-to-peer

Design of backup system based on Peer-to-peer cloud storage and implementation of log recovery

Design and log recovery of backup system based on Peer-to-peer cloud storage The Lu Dan of Jilin University This article has done the following work: 1. Integrated cloud storage with the ability to provide storage services and an unstructured, scalable peer-to-peer technology, a peer-to-peer cloud storage backup system is proposed, which is based on the system architecture, network topology, The structure of the system is expounded in three aspects of the overall frame structure. Using chord algorithm to coordinate multiple service management nodes, and distribute user requests to multiple data block servers, a service management node, multiple data block server and backup server form a node storage cluster, node save ...

Research and implementation of cloud storage access control technology based on ontology

Research and implementation of cloud storage access control technology based on ontology Ecust Hong based on the characteristics of cloud storage access control and cloud storage standard (CDMI), this paper improves the access control domain, storage object and role inheritance of RBAC model, and increases the time constraint on roles and permissions. At the same time, using ontology technology and owl language, the ontology of access control model is established, and the semantic technology describes the entity and strategy of DONTO_RBAC, which realizes the security strategy of access control in the multi domain environment through ontology, which is based on the ...

An optimization algorithm for I/O performance of cloud storage system based on dynamic mixed partitioning mechanism

An optimal algorithm for I/O performance of cloud storage system based on dynamic mixed partitioning mechanism Ma Yi June, Ran, Feng Keng, Shen Ye in order to solve the problem of the storage I/O performance optimization in the cloud storage system, the paper studies from the angle of the data distribution, and based on this, gives the I/O The piecewise decision algorithm with optimal performance and the calculation method of the optimal fragment number, a data distribution algorithm (DADH) based on dynamic mixed fragmentation mechanism is proposed. Dhah can take full account of each storage node and the actual performance of the client, dynamic file fragmentation ...

Digital Image cloud storage mechanism based on segmentation

Digital Image cloud storage mechanism based on segmentation Lu Jibo Guo Yaoxen with the development of cloud computing and data center, data processing and storage work gradually shifted to cloud platform. Storing digital images through cloud servers can solve the problem of image storage and sharing, but some cloud servers may be difficult to guarantee the reliability and usability of these digital image data, resulting in user privacy disclosure. In this paper, a segmentation based digital Image cloud storage mechanism is proposed, and two different image segmentation algorithms are used: Partition segmentation and layered segmentation. To verify this mechanism, a number of privacy protection is implemented ...

A secure cloud storage scheme based on secret sharing

A secure cloud storage scheme based on secret sharing Zhang Xu Yanhong Zhang Haojian-Wei article on the basis of the analysis of the current network disk application prospects and security risks, a secure cloud storage scheme based on secret sharing is proposed, which uses information digest algorithm, symmetric encryption algorithm, threshold scheme and data distributed storage to read, write, store and The encryption permission separates, guarantees the user to the file all highest authority, thus guaranteed the user privacy. At the same time, reduce the bottleneck of hardware expansion of each network disk manufacturer. It is beneficial to the establishment of wide cloud platform and has good application prospect. Based on secret sharing ...

Study on cloudy storage model based on secret sharing

Study on cloudy storage model based on secret sharing ecust fan Dragon This paper uses the idea of an independent redundant disk array to partition a piece of data and store it in a number of cloud storage providers, resolving the problem of using a single cloud storage provider. At present, most of the cloudy storage models use the reed Solomon algorithm to partition data to improve the redundancy of data. However, the data obtained by the algorithm are displayed in plaintext, so the confidentiality of the data is not guaranteed. To ensure the confidentiality of the data, some cloudy storage models use Shamir secret sharing to calculate ...

A cloud data integrity verification algorithm based on homomorphic hash function

Cloud data integrity verification algorithm based on homomorphic hash function Zhou Rui Wang Cloud storage has become a trend for future storage development, but it also poses new security challenges, such as the possibility that cloud service providers might tamper with data for some reason. To ensure the integrity of cloud data, a cloud data integrity checking algorithm based on homomorphic hash function is proposed. Under the audit of trusted third party, the algorithm verifies the integrity of cloud data by aggregating multiple RSA signatures. In order not to disclose user data information, the same-state linear authentication and random masking technology are adopted to realize privacy protection. The analysis results show that the algorithm can not only ...

A state monitoring method for cloud storage system based on compression perception

State monitoring method of cloud storage system based on compressed sensing Feng-Keng Zhangliangliang Shen Ye Liang in order to solve the contradiction between high precision and large scale in large-scale state monitoring data processing, it is superior to the Nyquist sampling law to use the compression perception to deal with the wideband signal, A method for monitoring the state of a cloud storage system is proposed, which is Sdcs. Based on the classical matching and tracking MP algorithm, this method can be used to measure the sparse signal with DC component and to ensure that the original reconstruction algorithm still satisfies the improved Bernoulli, by increasing the row and zero constraint condition of the matrix.

Research and optimization of distributed file system based on cloud storage

Research and optimization of distributed file system based on cloud storage University-ocean in this paper, based on the systematic and comprehensive study and summary of the development status and characteristics of distributed storage system, the advantages and disadvantages of several common distributed storage System architectures are analyzed emphatically. At the same time, a namenode system architecture with partial equivalence is designed. By adding some equivalent multiple namenode in the metadata server layer, the architecture changes the single point dependence of the centralized storage system represented by HDFS, which reduces the latency of concurrent users and the level of metadata server.

Video surveillance data management technology for college entrance examination based on cloud storage

Video surveillance data management technology for college entrance examination based on cloud storage Xu Budong Tianxiaoyan introduces the system structure and service model of cloud storage, analyzes the main video surveillance technology at present, and designs the video surveillance data management system of college entrance examination based on cloud storage technology. Using cloud storage to realize the remote monitoring processing, distributed storage and backup in the video monitoring data management of college entrance examination. Aiming at the problem of single point failure which is easy to appear under multilevel monitoring, a method of peer interconnect and multi point backup is proposed, which improves the robustness of the system. Video surveillance data management technology for college entrance examination based on cloud storage

Non-book Data management system based on cloud storage mode

Non-book Data management system based on cloud storage mode Huang Xingyan introduces the traditional management mode of non book data, the problems existing in the network management mode of optical disk, and the concept and structure model of cloud storage. This paper discusses the establishment of the non-book data management system in the cloud storage mode and the characteristics and advantages of the system. Non-book Data management system based on cloud storage mode

--ustor of cloud storage system based on regeneration code

Cloud storage System based on regeneration code--ustor Liu Vondanley currently uses multiple clouds to store data to ensure user data reliability. In order to reduce storage cost and repair bandwidth, a method of using functional repair Regeneration Code (FRC) to encode data into multiple data blocks and distribute them in different clouds is proposed. This approach reduces the amount of data that needs to be transferred from the network when a single cloud in multiple clouds is lost, and reduces the cost of repairs, and has been successfully applied to the ustor of the cloud storage system being built. Experiments show that: compared with the coding, the redundancy code is increased ...

Cloud storage ciphertext retrieval system based on homomorphic encryption on integer

Ocean Zhang Xiejiao of cloud storage ciphertext retrieval system based on homomorphic encryption on integers based on the analysis and comparison of existing homomorphic encryption algorithms, a homomorphic encryption algorithm is selected for the system, and a search algorithm is designed by using the Homomorphic encryption algorithm, and the range retrieval is completed effectively. Using XML to construct the structured index file, the attribute value of the element is the ciphertext of the index word, only the element attribute value of the index file is retrieved, the structure of the XML is convenient for the implementation of the retrieval, both the security of the original document and the fast and effective ...

What are the advantages of cloud storage backup?

Scalable, cost-saving enterprises can rely on the unlimited scalability of third cloud providers, without worrying about investment issues, after using cloud storage for backup. In fact, a pay-as-you-go model reduces the annoyance of backup purchases and implementations.     This approach allows us to anticipate and manage capacity growth and operating costs. Efficient, reliable cloud providers often provide state-of-the-art technology, such as disk-based backup, compression, encryption, data de-duplication, services ...

Scalable distributed relational Cloud database scheme

Scalable distributed Relational Cloud database scheme Wang Minwudi Chong Zhu Zefei Li Renwang analyzing the base of various relational and database to meet the requirement of high concurrency and high availability of cloud database Based on the convenience and scalability of relational data, a scalable relational cloud database scheme is proposed. This scheme presents a new system architecture. Database read-write process data merging process data model and structure and storage and analyzing the bottleneck of its system architecture theory finally, the data consistency availability and online running performance are analyzed and the results show that this scheme ...

The golden key to unlock the shackles of cloud storage

Ciphertext retrieval---The golden key to unlock the shackles of cloud storage Feng Deng Content Summary • Cloud computing and ciphertext retrieval • redaction Retrieval Technology Overview • The future development trend of ciphertext retrieval technology • Concluding remarks Open the key to the shackles of cloud storage encryption

Research on high concurrency key technologies for public cloud storage and its system implementation

Research on high concurrency key technology for public cloud storage and its system implementation the South University of south of the bridge first, this article describes two key technologies that can provide concurrent capability: Load balancing and reverse proxy caching. This paper takes LVs as an example to study the algorithms and working modes commonly used in load balancing, and briefly studies the implementation principle of reverse proxy caching. Secondly, we analyze and study OpenStack's object Storage Swift project, build a multi-node public cloud storage model based on load balancing, and increase the concurrency of the system by horizontally expanding the number of proxy nodes.

A distributed and unstructured data copy management model

A distributed and unstructured data copy management model Lin, Zhang Wanjun, Sun Yong A distributed replica management model oriented to unstructured data for the delay response of data replica management in cloud storage systems. This model adopts the frame election algorithm to reduce the overall energy consumption of the system by improving the utilization ratio of each rack, and provides technical support for the Green data center. In order to improve system performance, balance load and resource utilization, a multiple-route hashing algorithm is used to distribute the data copy dynamically and evenly across different frame nodes. Simulation results show that with the traditional global map ...

A data cloud storage scheme based on LT code

A data cloud storage scheme based on LT Code Lili Tang Tanyun Byzantine failure or malicious attack would reduce the reliability of cloud storage services for cloud service providers, and a secure and reliable data storage scheme based on cloud computing was proposed. The data redundancy of distributed cloud server is increased by the LT code, and the decoding efficiency of data users in the data retrieval stage is improved while guaranteeing the global quasi optimal performance. Use support for public data integrity checking and accurate data repair to prevent data owners from staying online for long periods of time, and to design data repair solutions to enable services to run ...

Total Pages: 2156 1 .... 1353 1354 1355 1356 1357 .... 2156 Go to: GO

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.