Virtualized Resource Image Storage System Based on Data Deduplication Techniques

Author(s):  
Tianwei Wang ◽  
Meihong Yang ◽  
Ying Guo ◽  
Jibin Wang
2015 ◽  
Vol 713-715 ◽  
pp. 1448-1451
Author(s):  
Lin Lu ◽  
Yan Feng Zhang ◽  
Xiao Feng Li

The high-altitude missile and other special application occasions have requirements on image storage system, such as small size, high storage speed, low temperature resistance, etc. Commonly used image storage system in the market cannot meet such requirement. In the paper, real-time image storage system solutions on missile based on FPGA should be proposed. The system mainly consists of acquisition module and memory reading module. The whole system adopts FPGA as main control chip for mainly completing real-time decoding and acquisition on one path of PAL format video images, reading and writing of NandFlash chipset, erasure, bad block management and so on. The solution has passed various environmental tests with stable performance, large data storage capacity and easy expansion, which has been used in engineering practice.


Author(s):  
Anil Kumar G. ◽  
Shantala C. P.

Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems.


2018 ◽  
Vol 10 (2) ◽  
pp. 70-89 ◽  
Author(s):  
Jun Li ◽  
Mengshu Hou

This article describes how in order to reduce the amount of data, deduplication technology is introduced in the cloud storage. Adopting this technology, the duplicated data can be eliminated, users can conserve the storage requirement. However, deduplication technology also increases the data unavailability. To solve this problem, the authors propose a method to improve data availability in the deduplication storage system. It is based on the data chunk reference count and access frequency, and increases redundant information for the data chunks, to ensure data availability and minimize storage overhead. Extensive experiments are conducted to evaluate effectiveness of the improved method. WFD, CDC, and sliding block deduplication technology are used for comparison. The experimental results show that the proposed method can achieve higher data availability than the conventional method and increase little storage overhead.


2019 ◽  
Vol 30 (04) ◽  
pp. 551-570 ◽  
Author(s):  
Wenjuan Meng ◽  
Jianhua Ge ◽  
Tao Jiang

A cloud storage system which incorporates the deletion and deduplication functionalities will have both security and efficiency advantages over exiting solutions which provide only one of them. However, the security models of secure data deletion and data deduplication functionalities are not compatible with each other, which will cause security and efficiency vulnerability under coercive adversaries. To solve these security and efficiency challenges, we define and construct a scheme, whose security relies on the proper erasure of keys in the wrapped key tree and periodical update of the deduplication encryption keys. Moreover, we enhance the efficiency of the proposed scheme by introducing incremental data update, where only the changed part is encrypted/decrypted and uploaded/downloaded in data updating. Further security analysis shows that the proposed scheme is secure against coercive attack. Finally, the practical implementation shows that our scheme is performance efficient in computation, storage and communication for both the cloud storage server and users.


1986 ◽  
Author(s):  
R. Heu ◽  
J. Hol zkamp ◽  
J. Tiemann
Keyword(s):  

IJARCCE ◽  
2017 ◽  
Vol 6 (4) ◽  
pp. 316-323
Author(s):  
Bhos Komal ◽  
Ingale Karuna ◽  
Hattikatti Susmita ◽  
Jadhav Sachin ◽  
Mirajkar SS ◽  
...  

Cloud computing, an efficient technology that utilizes huge amount of data file storage with security. However, the content owner does not controlling data access for unauthorized clients and does not control data storage and usage of data. Some previous approaches data access control to help data de-duplication concurrently for cloud storage system. Encrypted data for cloud storage is not effectively handled by current industrial de-duplication solutions. The deduplication is unguarded from brute-force attacks and fails in supporting control of data access .An efficient data confining technique that eliminates redundant data’s multiple copies which is commonly used is Data-Deduplication. It reduces the space needed to store these data and thus bandwidth is saved. An efficient content discovery and preserving De-duplication (ECDPD) algorithm that detects client file range and block range of de-duplication in storing data files in the cloud storage system was proposed to overpower the above problems.Data access control is supported by ECDPD actively. Based on Experimental evaluations, proposed ECDPD method reduces 3.802 milliseconds of DUT (Data Uploading Time) and 3.318 milliseconds of DDT (Data Downloading Time) compared than existing approaches


2009 ◽  
Author(s):  
Yu-feng Li ◽  
Rong-kun Xue ◽  
Fei Liang

Sign in / Sign up

Export Citation Format

Share Document