S-CDA: A Smart Cloud Disk Allocation Approach in Cloud Block Storage System

Author(s):  
Hua Wang ◽  
Yang Yang ◽  
Ping Huang ◽  
Yu Zhang ◽  
Ke Zhou ◽  
...  
2021 ◽  
Author(s):  
Myoungwon Oh ◽  
Jiwoong Park ◽  
Sung Kyu Park ◽  
Adel Choi ◽  
Jongyoul Lee ◽  
...  
Keyword(s):  

2019 ◽  
Vol 7 (1) ◽  
pp. 7-11
Author(s):  
Faza Abdani Auni Robbi ◽  
Agung Budi Prasetijo ◽  
Eko Didik Widianto

The growth of data requires better performance in the storage system. This study aims to analyze the comparison of block storage performance of Ceph and ZFS running in virtual environments. Tests were conducted to measure their performances, including IOPS, CPU usage, throughput, OLTP Database, replication time, and data integrity. Testing was done using 2 node servers with a standard configuration of the storage system. Server virtualization uses Proxmox on each node. ZFS has a higher performance of reading and writing operation than Ceph in IOPS, CPU usage, throughput, OLTP and data replication duration, except the CPU usage in writing operation. The test results are expected to be a reference in the selection of storage systems for data center applications.


2019 ◽  
pp. 25-30
Author(s):  
Vadim Shevtsov ◽  
Evgeny Abramov

Today, Storage Area Network and Cloud Storage are the common Storage System. Storage Area Network includes NAS, SAN, DAS systems. Cloud Storage includes object storage, file storage, block storage. Storage Area Network is an important technology because it may give a lot of data volume with a high recovery chance and secure access, work and central management with data. Cloud Storage has many advantages: data mobility, teamwork, stability, scalability, quick start. The main threats include destruction, theft, corruption, unauthentication, replacement, blocking. Storage Area Network components (architecture elements, protocols, interfaces, hardware, system software, exploitation) have a lot of vulnerabilities. Cloud Storage may be attacked by software, functional elements, clients, hypervisor, management systems. A lot of companies design storage solutions: DropBox, QNAP, WD, DELL, SEAGATE.


Author(s):  
Kehe Wu ◽  
Long Chen ◽  
Yi Li

With the popularity of Cloud Computing, people become incresingly concern about security problems, especially the data security, which has become the biggest obstacle for the development of Cloud Computing. In order to protect confidentiality and integrity of user data in Cloud Computing, this paper firstly studies the relevant research works in fields of trusted computing and Cloud Computing data protection and secondly introduces the concept of trusted into Cloud Computing data protection, presents the concept of Trusted Virtual Block Storage Device (TVBSD) and designs the Trusted Cloud Computing Virtual Storage System (TCCVSS). And then, the key technologies such as isolation, block device encryption and two-way authentication are expounded in this paper. Finally, the result of experiments shows that the system and the related technologies can not only effectively ensure the security of user data, but also control the consequent performance overhead in a proper range.


Author(s):  
Y. Kokubo ◽  
W. H. Hardy ◽  
J. Dance ◽  
K. Jones

A color coded digital image processing is accomplished by using JEM100CX TEM SCAN and ORTEC’s LSI-11 computer based multi-channel analyzer (EEDS-II-System III) for image analysis and display. Color coding of the recorded image enables enhanced visualization of the image using mathematical techniques such as compression, gray scale expansion, gamma-processing, filtering, etc., without subjecting the sample to further electron beam irradiation once images have been stored in the memory.The powerful combination between a scanning electron microscope and computer is starting to be widely used 1) - 4) for the purpose of image processing and particle analysis. Especially, in scanning electron microscopy it is possible to get all information resulting from the interactions between the electron beam and specimen materials, by using different detectors for signals such as secondary electron, backscattered electrons, elastic scattered electrons, inelastic scattered electrons, un-scattered electrons, X-rays, etc., each of which contains specific information arising from their physical origin, study of a wide range of effects becomes possible.


Sign in / Sign up

Export Citation Format

Share Document