Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage

Author(s):  
Yongjun Ren ◽  
Lin Zhou ◽  
Yepeng Liu ◽  
Xiaorui Zhang
2014 ◽  
Vol 556-562 ◽  
pp. 6241-6245 ◽  
Author(s):  
Kai Guo ◽  
Peng Yan Shen ◽  
Ming Zhong Xiao

In this paper, we present UBackup, which describes an easy way to build a private cloud storage system with high-efficient and high-disaster-tolerance. UBackup client enables file-level de-duplication by using a file fingerprint check. The utilization of compressed erasure code algorithm ensures data security and cuts down the cost. A space utilization rate variance minimizing algorithm is used on index server to balance system load. We present the system architecture of UBackup and its components, and we have implemented a proof-of-concept prototype of UBackup. By conducting performance evaluation in a public Internet, experimental results demonstrate the efficiency of the system.


2013 ◽  
Vol 2013 ◽  
pp. 1-11 ◽  
Author(s):  
Chao Yin ◽  
Changsheng Xie ◽  
Jiguang Wan ◽  
Chih-Cheng Hung ◽  
Jinjiang Liu ◽  
...  

To protect data in cloud storage, fault tolerance and efficient recovery become very important. Recent studies have developed numerous solutions based on erasure code techniques to solve this problem using functional repairs. However, there are two limitations to address. The first one is consistency since the Encoding Matrix (EM) is different among clouds. The other one is repairing bandwidth, which is a concern for most of us. We addressed these two problems from both theoretical and practical perspectives. We developed BMCloud, a new low repair bandwidth, low maintenance cost cloud storage system, which aims to reduce repair bandwidth and maintenance cost. The system employs both functional repair and exact repair while it inherits advantages from the both. We propose the JUDGE_STYLE algorithm, which can judge whether the system should adopt exact repair or functional repair. We implemented a networked storage system prototype and demonstrated our findings. Compared with existing solutions, BMCloud can be used in engineering to save repair bandwidth and degrade maintenance significantly.


2014 ◽  
Vol 496-500 ◽  
pp. 1905-1908
Author(s):  
Hong Xia Mao

Cloud storage has so many advantages that it has been an ideal way to store data. So, the technical questions of security and reliability should be researched. Access control and encryption are used for security of data storage. Redundancy technology which can improve the data reliability in cloud storage includes replication technology and erasure code. Under the specific experimental environment, the erasure code has an absolute advantage in fault tolerance and storage capacity.


2013 ◽  
Vol 4 (1) ◽  
pp. 106-110
Author(s):  
Rajasekaran S ◽  
Kalifulla. Y ◽  
Murugesan. S ◽  
Ezhilvendan. M ◽  
Gunasekaran. J

cloud storage system, consisting of a collection of storage servers, provides long-term storage services over the Internet.  Storing data in a third party’s cloud system causes serious concern over data confidentiality. General encryption schemes protect data confidentiality, but also limit the functionality of the storage system because a few operations are supported over encrypted data. Constructing a secure storage system that supports multiple functions is challenging when the storage system is distributed and has no central authority. We propose a threshold proxy re-encryption scheme and integrate it with a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval, but also lets a user forward his data in the storage servers to another user without retrieving the data back. The main technical contribution is that the proxy re-encryption scheme supports encoding operations over encrypted messages as well as forwarding operations over encoded and encrypted messages. Our method fully integrates encrypting, encoding, and forwarding. We analyze and suggest suitable parameters for the number of copies of a message dispatched to storage servers and the number of storage servers queried by a key server. These parameters allow more flexible adjustment between the number of storage servers and robustness.


2014 ◽  
Vol 2014 ◽  
pp. 1-8
Author(s):  
Wenfeng Wang ◽  
Peiwu Li ◽  
Longzhe Han ◽  
Shuqiang Huang ◽  
Kefu Xu ◽  
...  

Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS). The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.


2019 ◽  
Vol 44 (11) ◽  
pp. 9127-9142
Author(s):  
Ojus Thomas Lee ◽  
G. J. Akash ◽  
S. D. Madhu Kumar ◽  
Priya Chandran

Sign in / Sign up

Export Citation Format

Share Document