期刊文献+

移动终端云存储技术研究 被引量:3

Research on the mobile terminal cloud storage technology
在线阅读 下载PDF
导出
摘要 通过分析HDFS和Dynamo,该文引入动态一致性哈希算法,对不同对象组实现分类处理,根据各个存储节点的存储代价综合调度,选择最优存储节点实现移动终端云存储访问。经仿真实验验证:云存储系统的多副本机制能够有效提高系统效率,当移动终端发出请求时,选择最近的副本能够有效节省时间。 By analysis of HDFS and Dynamo, in this paper, one dynamic consistency Hashing algo-rithm is introduced to classify and deal with different object groups. According to the comprehensive dis-patching of storage cost of each storage node, the optimal storage node is selected to realize the mobile terminal cloud storage access. The simulated experiment shows that the multi-copy mechanism of cloud storage system can effectively improve the efficiency of the system and, when the mobile terminal makes a request, the most recent copy can be selected to save time.
作者 王辉 唐俊勇
出处 《工业仪表与自动化装置》 2017年第5期104-107,共4页 Industrial Instrumentation & Automation
基金 西安工业大学校长基金"局域网络技术与组网工程专业核心课程建设"(XGYXJJ-0528)
关键词 云存储 HDFS DYNAMO 动态一致性哈希算法 多副本机制 cloud storage HDFS Dynamo dynamic consistent Hashing algorithm multi - copy mechanism
  • 相关文献

参考文献3

二级参考文献50

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:368
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1120

同被引文献26

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部