Two phase enhancing replica selection in cloud storage system

Author(s):  
Meng Xue ◽  
Jianjing Shen ◽  
Xiaofeng Guo
2015 ◽  
Vol 15 (6) ◽  
pp. 113-121
Author(s):  
Fan Lin ◽  
Jianbin Xiahou ◽  
Qihua Huang

Abstract In replication management under multi-datacenter cloud storage environments, the problem of a replica being inconsistent across multiple datacenters must be solved. Focusing on data management strategies under multiple datacenters, this paper presents a design of a HDFS-based two Cascading Master-Slave Storage System (2CMSSS), which simplifies the research work of the replication management strategies under multi-datacenter cloud storage environments. On this basis a two-phase locking maintenance strategy for replica consistency is presented to validate and fix the problem of replica inconsistency across multiple datacenters. According to the experiment simulation, this strategy can ensure strong data consistency and maintain low latency for users to access data.


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Wenbin Yao ◽  
Pengdi Ye ◽  
Xiaoyong Li

Security and privacy issues present a strong barrier for users to adapt to cloud storage systems. In this paper, a new algorithm for data splitting called EPPA is presented to strengthen the confidentiality of data by two-phase process. In EPPA, data object is organized to be several Rubik’s cubes executed for several rounds transformation at the first phase. In every round, chaotic logistic maps generate pseudorandom sequences to cover the plaintext by executing Exclusive-OR operation to form the cipher. Then logistic map is used to create rotation policies to scramble data information based on Rubik’s cube transformation. At the second phase, all cubes are unfolded and combined together as a cross-shaped cube, which will be partitioned into a few data fragments to guarantee that every fragment does not contain continuous bytes. These fragments are stored on randomly chosen servers within cloud environment. Analyses and experiments show that this approach is efficient and useable for the confidentiality of user data in cloud storage system.


Author(s):  
Jiangjiang Wu ◽  
Cong Liu ◽  
Jun Ma ◽  
Yong Cheng ◽  
Jiangchun Ren ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document