Node Storage Optimization in Cloud

2013 ◽  
Vol 811 ◽  
pp. 520-524
Author(s):  
Zhu Min Chen

With the growing demand for mass data storage, cloud storage has become an inevitable trend of the development of the storage. In order to improve the efficiency and stability of cloud storage system, this paper presents an optimization algorithm based on cloud storage. Node idle zone and node resource usage view is divided, while integrating node and global scheduling method, which can improve the cost-effective and stability of cloud storage system.

2014 ◽  
Vol 496-500 ◽  
pp. 1812-1816 ◽  
Author(s):  
Hong Xia Mao

In this paper, an extensible system prototype of cloud storage is designed. Considering the load balance of cloud storage system, an improved data storage strategy based on consistent hashing algorithm is proposed in this paper. The strategy adopts virtual nodes to storage data and real–time monitoring of load rate of each storage node to adjust load balancing of the whole storage system. In the improved strategy, the priority is introduced into the storage system to rapidly improve the utilization rate of the new storage nodes. The strategy can effectively optimize the performance of the whole storage system, and improve the overall effect of the load balancing.


2014 ◽  
Vol 556-562 ◽  
pp. 6179-6183
Author(s):  
Zhi Gang Chai ◽  
Ming Zhao ◽  
Xiao Yu

With the rapid development of information technology, the extensive use of cloud computing promotes technological change in the IT industry. The use of cloud storage industry is also one solution to the problem of an amount of data storing, which is traditionally large, and unimaginably redundant. The use of cloud computing in the storage system connects the user's data with network clients via the Internet. That is to say, it not only solves a lot of data storage space requirements in request, but also greatly reduces the cost of the storage system. But in the application of cloud storage, there are also many problems to be solved, even to some extent which has hindered the development of cloud storage. Among these issues, the most concerning one is cloud storage security. The following passages discuss the problem and propose a solution to it.


2014 ◽  
Vol 926-930 ◽  
pp. 2462-2465 ◽  
Author(s):  
Hui Xiang Zhou ◽  
Qiao Yan Wen

In order to solve the problem of growing massive of data in sensor network, we propose a new scheme of data storage for sensor network based on HDFS which is a cloud-based storage platform, it effectively alleviate the pressure of mass data storage on sensor network, and improved the scalability of storage system and part of the enhanced the data storage security on sensor network. And this scheme is based on cloud storage platform, storage the data which collected by sensors to each data node using a distributed architecture solution, and keep multiple copies of data in order to maintain its high reliability of data. As reducing the pressure of data storage, but also protects the security of stored data as shown by security analysis.


2014 ◽  
Vol 556-562 ◽  
pp. 6241-6245 ◽  
Author(s):  
Kai Guo ◽  
Peng Yan Shen ◽  
Ming Zhong Xiao

In this paper, we present UBackup, which describes an easy way to build a private cloud storage system with high-efficient and high-disaster-tolerance. UBackup client enables file-level de-duplication by using a file fingerprint check. The utilization of compressed erasure code algorithm ensures data security and cuts down the cost. A space utilization rate variance minimizing algorithm is used on index server to balance system load. We present the system architecture of UBackup and its components, and we have implemented a proof-of-concept prototype of UBackup. By conducting performance evaluation in a public Internet, experimental results demonstrate the efficiency of the system.


Cloud computing, an efficient technology that utilizes huge amount of data file storage with security. However, the content owner does not controlling data access for unauthorized clients and does not control data storage and usage of data. Some previous approaches data access control to help data de-duplication concurrently for cloud storage system. Encrypted data for cloud storage is not effectively handled by current industrial de-duplication solutions. The deduplication is unguarded from brute-force attacks and fails in supporting control of data access .An efficient data confining technique that eliminates redundant data’s multiple copies which is commonly used is Data-Deduplication. It reduces the space needed to store these data and thus bandwidth is saved. An efficient content discovery and preserving De-duplication (ECDPD) algorithm that detects client file range and block range of de-duplication in storing data files in the cloud storage system was proposed to overpower the above problems.Data access control is supported by ECDPD actively. Based on Experimental evaluations, proposed ECDPD method reduces 3.802 milliseconds of DUT (Data Uploading Time) and 3.318 milliseconds of DDT (Data Downloading Time) compared than existing approaches


2018 ◽  
pp. 65-83
Author(s):  
Mingzhong Wang ◽  
Don Kerr

With the features of mobility, reality augmentation, and context sensitivity, wearable devices are widely deployed into various domains. However, the sensitivity of collected data makes security and privacy protection one of the first priority in the advancement of wearable technologies. This chapter provides a study on encryption-based confidentiality protection for data storage systems in wearable platforms. The chapter first conducts a review to storage solutions in consumer wearable products and explores a two-tier, local flash memory and remote cloud storage, storage system in wearable platforms. Then encryption-based confidentiality protection and implementation methods for both flash memory and remote cloud storage are summarized. According to the interaction and integration of these two components, a categorization of confidential storage systems in wearable platforms is proposed. In addition, the benefits and selection criteria for each category are also discussed.


Author(s):  
Mingzhong Wang ◽  
Don Kerr

With the features of mobility, reality augmentation, and context sensitivity, wearable devices are widely deployed into various domains. However, the sensitivity of collected data makes security and privacy protection one of the first priority in the advancement of wearable technologies. This chapter provides a study on encryption-based confidentiality protection for data storage systems in wearable platforms. The chapter first conducts a review to storage solutions in consumer wearable products and explores a two-tier, local flash memory and remote cloud storage, storage system in wearable platforms. Then encryption-based confidentiality protection and implementation methods for both flash memory and remote cloud storage are summarized. According to the interaction and integration of these two components, a categorization of confidential storage systems in wearable platforms is proposed. In addition, the benefits and selection criteria for each category are also discussed.


2018 ◽  
Vol 2018 ◽  
pp. 1-17
Author(s):  
Qing Liao ◽  
Haoyu Tan ◽  
Wuman Luo ◽  
Ye Ding

The value of large amount of location-based mobile data has received wide attention in many research fields including human behavior analysis, urban transportation planning, and various location-based services. Nowadays, both scientific and industrial communities are encouraged to collect as much location-based mobile data as possible, which brings two challenges: (1) how to efficiently process the queries of big location-based mobile data and (2) how to reduce the cost of storage services, because it is too expensive to store several exact data replicas for fault-tolerance. So far, several dedicated storage systems have been proposed to address these issues. However, they do not work well when the ranges of queries vary widely. In this work, we design a storage system based on diverse replica scheme which not only can improve the query processing efficiency but also can reduce the cost of storage space. To the best of our knowledge, this is the first work to investigate the data storage and processing in the context of big location-based mobile data. Specifically, we conduct in-depth theoretical and empirical analysis of the trade-offs between different spatial-temporal partitioning and data encoding schemes. Moreover, we propose an effective approach to select an appropriate set of diverse replicas, which is optimized for the expected query loads while conforming to the given storage space budget. The experiment results show that using diverse replicas can significantly improve the overall query performance and the proposed algorithms for the replica selection problem are both effective and efficient.


2013 ◽  
Vol 756-759 ◽  
pp. 1275-1279
Author(s):  
Lin Na Huang ◽  
Feng Hua Liu

Cloud storage of high performance is the basic condition for cloud computing. This article introduces the concept and advantage of cloud storage, discusses the infrastructure of cloud storage system as well as the architecture of cloud data storage, researches the details about the design of Distributed File System within cloud data storage, at the same time, puts forward different developing strategies for the enterprises according to the different roles that the enterprises are acting as during the developing process of cloud computing.


2013 ◽  
Vol 748 ◽  
pp. 1059-1064
Author(s):  
Hai Ping Si ◽  
Yang Qiao

At the rate data related to crop germplasm resources is growing rapidly, it's not surprising that the study of new storage technology is also growing in popularity. Cloud storage, due to its own advantages including cost, frequency of access, protection, and availability, has been one of the hot buzzwords of the past couple of years. Based on the analysis of the definition and characters of cloud storage, and combined with the characteristics of crop germplasm resources data and databases, this paper discussed the internal cloud storage architecture for crop germplasm resources data, detailed the level of structure diagram, access methods, storage scalability and availability. The study on the new storage architecture gives the model for building easy extension, management and safety of crop germplasm resources data storage system.


Sign in / Sign up

Export Citation Format

Share Document