file storage
Recently Published Documents


TOTAL DOCUMENTS

286
(FIVE YEARS 130)

H-INDEX

10
(FIVE YEARS 3)

Author(s):  
Er. Krishan Kumar ◽  
Shipra

This research revolves around understanding the Cloud Storage Services offered by world's most famous Cloud Provider Amazon Web Services (AWS). We will be covering major Cloud Storage Services like EBS, S3 and EFS. But first let’s understand more about AWS. We should use these end-of-life services as a per-project and keep in mind the key benefits of these end-to-end services. Amazon EBS brings the highest end-to-end prices available with block for level of Amazon Elastic Compute Cloud (EC2) instances. Saves data to file system stored after EC2 status closure. Amazon EFS provides portable file storage, also designed for EC2. It can be used as a standard data source for any application or load that works in most cases. Using the EFS file system, you can configure file system installation settings. The main difference between EBS and EFS is that EBS is only accessible from a single EC2 state in your specific AWS region, while EFS allows you to mount a file system in multiple regions and scenarios.


2021 ◽  
Vol 2131 (2) ◽  
pp. 022104
Author(s):  
Qixin Zhang

Abstract We believe that isomorphic encryption technology can provide strong technical support for users’ privacy protection in a distributed computing environment. There are three types of quasi-homomorphism encryption methods: partial homomorphism encryption, shallow homomorphism encryption, and full homomorphism encryption. homomorphism encryption methods have important applications for ciphertext data computing in distributed computing environments, such as secure cloud computing, fee computing, and remote file storage ciphertext retrieval. It is pointed out that the construction of the homomorphism encryption method is still in the theoretical stage and cannot be used for real high-density data calculation problems. How to design (natural) isomorphic encryption schemes according to algebraic systems is still a challenging research. This question discusses the problem of Learning With Rounding (LWR). Based on the difficulty of LWR, multiple IDs, and attribute categories, a fully homomorphism encryption method corresponding to an ID is proposed. In this paper, in order to reflect the effectiveness of the proposed method, we propose a homomorphism encryption technology based on the password search attribute.


Author(s):  
Reymon M Santiañez ◽  
Benedict M Sollano

The goal of this study was to create the Local Area Network Based Archiving System, a cross-platform development system for electronic information storage, security, preservation, and retention. The system incorporates capabilities such as data storage for long-term preservation and retrieval, file searching and retrieval, security features such as user account information system and account access privilege levels, and an email-like messaging system. The researchers developed the Local Area Network Based Archiving System using the Agile Software Development Methodology to keep up with the stakeholders' ever-changing needs. After each iteration of the work cycle, this methodology employs a process of frequent feedback. Features are added or refined in each iteration to ensure that the study meets its goals and expectations. The developed system received an overall average weighted mean of 4.53 in the evaluation summary, which is considered excellent. The strongest point of the system, according to the respondents' responses, was its content, which received the highest average mean among the five major categories in the system evaluation. The system's mobile responsiveness was a huge plus, as it considerably aided accessibility. The system should also be deployed, according to the respondents, because it will provide a powerful answer to the ongoing challenges with storing, managing, securing, and retrieving electronic files. As a result, the researchers concluded that a Local Area Network Based Archiving System is required for the efficient operation of an electronic  file storage system. Having centralized electronic file storage and retrieval system not only saves time and money in the long run but also allows for disaster recovery and business continuity.


2021 ◽  
Vol 4 (1) ◽  
pp. 102-113
Author(s):  
Sugiati Sugiati

This study aims to implement the curriculum by utilizing information and communication technology during the pandemic which in the process is distance learning. Teachers without face-to-face with students are expected to continue to maximize the learning process and maintain the quality of graduates by utilizing technology. The curriculum which is used as the spirit of education in schools is expected to be a reference for future learning progress. Whether or not the process is progressing or not, the success or failure of the process all depends on the curriculum developed by the school. This implementation must involve all stakeholders by preparing the readiness of the infrastructure and human resources owned by the infrastructure readiness teachers, at least the government procures funds for infrastructure facilities such as computers, internet connections, while for the readiness of teacher human resources, schools hold training on the use of MO365 from the Surabaya City Education Office and Google account suite. learn ID from the Ministry of Education and Culture. The implementation includes, the preparation of 1 curriculum documents using the D-One application, the preparation of lesson plans without printing or paperless, for file storage also using Google Drive or One Drive, preparing questions using office forms, vicon learning using Zoom Meet, Teams Meet, and Google. meet, entry of grades using an online report card application, besides that the school also has a website, Instagram, YouTube for publication of school activities. The school minimizes if there are obstacles related to the implementation of the IT-based curriculum by completing multimedia facilities and providing training to teachers in IT skills. The results of the implementation of the IT-based curriculum show that the achievement of the curriculum targets is above 80% as evidenced by the learning outcomes of students, as well as responses from school activities that have been published through the school's website, Instagram and YouTube.


Computers ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 142
Author(s):  
Obadah Hammoud ◽  
Ivan Tarkhanov ◽  
Artyom Kosmarski

This paper investigates the problem of distributed storage of electronic documents (both metadata and files) in decentralized blockchain-based b2b systems (DApps). The need to reduce the cost of implementing such systems and the insufficient elaboration of the issue of storing big data in DLT are considered. An approach for building such systems is proposed, which allows optimizing the size of the required storage (by using Erasure coding) and simultaneously providing secure data storage in geographically distributed systems of a company, or within a consortium of companies. The novelty of this solution is that we are the first who combine enterprise DLT with distributed file storage, in which the availability of files is controlled. The results of our experiment demonstrate that the speed of the described DApp is comparable to known b2c torrent projects, and subsequently justify the choice of Hyperledger Fabric and Ethereum Enterprise for its use. Obtained test results show that public blockchain networks are not suitable for creating such a b2b system. The proposed system solves the main challenges of distributed data storage by grouping data into clusters and managing them with a load balancer, while preventing data tempering using a blockchain network. The considered DApps storage methodology easily scales horizontally in terms of distributed file storage and can be deployed on cloud computing technologies, while minimizing the required storage space. We compare this approach with known methods of file storage in distributed systems, including central storage, torrents, IPFS, and Storj. The reliability of this approach is calculated and the result is compared to traditional solutions based on full backup.


2021 ◽  
Author(s):  
Hemang Subramanian ◽  
Susmitha Subramanian

BACKGROUND Recent advancements in digital pathology resulting from advances in imaging and digitization have increased the convenience and usability of pathology for disease diagnosis, especially in oncology, urology, and gastro-enteric diagnosis. However, despite the possibilities to include low-cost diagnosis and viable telemedicine, remote diagnosis potential, digital pathology is not yet accessible due to expensive storage, data security requirements, and network bandwidth limitations to transfer high-resolution images and associated data. The increase in storage, transmission and security complexity concerning data collection and diagnosis makes it even more challenging to use artificial intelligence algorithms for machine-assisted disease diagnosis. We design and prototype a digital pathology system that uses blockchain-based smart contracts using the Non-fungible Token standard and the Inter-Planetary File System (IPFS) for data storage. Our design remediates shortcomings in the existing digital pathology systems infrastructure, which is centralized. The proposed design is extendable to other fields of medicine that require high-fidelity image and data storage. Our solution is implemented in data systems that can improve access, quality of care and reduce the cost of access to specialized pathological diagnosis, reducing cycle times for diagnosis. OBJECTIVE The study's main objectives are to highlight the issues in digital pathology and suggest a software architecture-based blockchain and IPFS create a low-cost data storage and transmission technology. METHODS We use the design science research method (DSRM) consisting of six stages to inform our design overall. We innovate over existing public-private designs for blockchains but using a two-layered approach that separates actual file storage from meta-data and data persistence. RESULTS Here, we identify key challenges to adopting digital pathology, including challenges concerning long-term storage, the transmission of information, etc. Next, using accepted frameworks in non-fungible token-based intelligent contracts and recent innovations in distributed secure storage, we propose a decentralized, secure, and privacy-preserving digital pathology system. Our design and prototype implementation using Solidity, web3.js, Ethereum, and node.js help us address several challenges facing digital pathology. We demonstrate how our solution that combines non-fungible token (NFT) smart contract standard with persistent decentralized file storage to solve most of the challenges of digital pathology and sets the stage for reducing costs and improving patient care and speed of diagnosis. CONCLUSIONS We identify technical limitations that increase costs and reduce mass adoption of digital pathology. We present several design innovations by using standards in NFT decentralized storage to prototype a system. We also present implementation details of a unique security architecture for a digital pathology system. We illustrate how this design can overcome privacy, security, network-based storage, and data transmission limitations. We illustrate how improving these factors sets the stage for improving data quality and standardized application of machine learning and Artificial Intelligence to such data CLINICALTRIAL Not applicable


Author(s):  
Omoruyi Osemwegie ◽  
Samuel John ◽  
Adewale Adeyinka ◽  
Etinosa Noma-Osaghae ◽  
Kennedy Okokpujie

Overlay networks are not a new field or area of study. This domain of computing will someday drive P2P systems in various application areas such as block-chain, energy trading, video multicasting, and distributed file storage. This study highlights the two widely known methods of routing information employed in one of such overlay networks called chord. In this study, simulations of both routing modes (iterative and recursive) and their variations under no-churn (leaving and joining of nodes) and churn conditions was carried out. The routing parameter (successor list size) was varied for each of the routing techniques in a simulation study. The results obtained show that semi recursive routing gives a better routing performance under churn scenarios.


2021 ◽  
Vol 14 (2) ◽  
pp. 99
Author(s):  
Dewa Ayu Indah Cahya Dewi ◽  
I Made Oka Widyantara

Through image compression, can save bandwidth usage on telecommunication networks, accelerate image file sending time and can save memory in image file storage. Technique to reduce image size through compression techniques is needed. Image compression is one of the image processing techniques performed on digital images with the aim of reducing the redundancy of the data contained in the image so that it can be stored or transmitted efficiently. This research analyzed the results of image compression and measure the error level of the image compression results. The analysis to be carried out is in the form of an analysis of JPEG compression techniques with various types of images. The method of measuring the compression results uses the MSE and PSNR methods. Meanwhile, to determine the percentage level of compression using the compression ratio calculation. The average ratio for JPEG compression was 0.08605, the compression rate was 91.39%. The average compression ratio for the DWT method was 0.133090833, the compression rate was 86.69%. The average compression ratio of the SVD method was 0.101938833 and the compression rate was 89.80%.


Sign in / Sign up

Export Citation Format

Share Document