期刊文献+

支持连续数据保护的云备份系统架构设计 被引量:7

Design of cloud backup system architecture supporting continuous data protection
在线阅读 下载PDF
导出
摘要 为了解决目前云备份系统恢复目标时间点不连续以及恢复粒度太粗的问题,将连续数据保护技术应用到云备份系统中,提出了一种支持连续数据保护的云备份系统。本系统能够提供秒级的连续恢复时间点,且数据块级别的备份层次能够屏蔽异构平台,具有更广泛的应用前景。系统以私有云为架构基础,部署在防火墙内部,对数据安全有很高的保障。 In order to solve the current problems that the recovery time of cloud storage backup system is not continuous and the recovery granularity is too thick, this paper presents a cloud storage backup system with continuous data protection, by applying continuous data protection technology to cloud backup technology. This system that can provide second-level continuous recovery time points and block-level backup for screening heterogeneous platforms, would be used in broad range. In addition, the system, which is deployed inside the firewall, can greatly safeguard the data security due to its private cloud structure.
出处 《计算机工程与应用》 CSCD 2012年第1期90-93,共4页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)重大项目(No.2009AA01A404)
关键词 连续数据保护 云备份 虚拟化 元数据服务器 重复数据删除 日志卷 continuous data protection cloud backup virtualization metadata server deduplication log volume
  • 相关文献

参考文献8

  • 1李君鹏,周宇.基于云存储的在线备份服务创新[J].华南金融电脑,2010,18(3):35-37. 被引量:3
  • 2崔晓帆CDP持续数据保护技术的发展分析[EB/OL].(2009-10-14).http://www.soft6.com/tech/15/158417.html.
  • 3黄英.连续数据保护系统多种方案的研究与实现[D].西安:西北工业大学,2009.
  • 4wchangeg云存储两大架构分类TCS与LCA架构技术分析[EB/OL].(2010-08-13).http://www.cnw.com.cn/storage-Technology/htm2010/20100813_203904_2.shtml.
  • 5Ghemawat S,Gobioff H,Leung S T.The Google file system[C]// SOSP.New York:ACM,2003 : 19-33.
  • 6敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:118
  • 7张峰.CDP未来发展的两个途径[N].网络世界,2007-11-05(26).
  • 8Schwarz S J T,Long D D E,Clasas:a key-store for the cloud[C]// 2010 18th Annual IEEE/ACM International Symposium, Florida, 2010.

二级参考文献42

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献119

同被引文献29

引证文献7

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部