scispace - formally typeset
Journal ArticleDOI

Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes

Reads0
Chats0
TLDR
The index name servers (INS) are proposed to manage not only file storage, data de-duplication, optimized node selection, and server load balancing, but also file compression, chunk matching, real-time feedback control, IP information, and busy level index monitoring.
Abstract
File distribution and storage in a cloud storage environment is usually handled by storage device providers or physical storage devices rented from third parties. Files can be integrated into useful resources that users are then able to access via centralized management and virtualization. Nevertheless, when the number of files continues to increase, the condition of every storage node cannot be guaranteed by the manager. High volumes of files will result in wasted hardware resources, increased control complexity of the data center, and a less efficient cloud storage system. Therefore, in order to reduce workloads due to duplicate files, we propose the index name servers (INS) to manage not only file storage, data de-duplication, optimized node selection, and server load balancing, but also file compression, chunk matching, real-time feedback control, IP information, and busy level index monitoring. To manage and optimize the storage nodes based on the client-side transmission status by our proposed INS, all nodes must elicit optimal performance and offer suitable resources to clients. In this way, not only can the performance of the storage system be improved, but the files can also be reasonably distributed, decreasing the workload of the storage nodes.

read more

Citations
More filters
Journal ArticleDOI

Deduplication on Encrypted Big Data in Cloud

TL;DR: This paper proposes a scheme to deduplicate encrypted data stored in cloud based on ownership challenge and proxy re-encryption that integrates cloud data dedUplication with access control and evaluates its performance based on extensive analysis and computer simulations.
Journal ArticleDOI

Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data

TL;DR: Experimental results reveal that the proposed approach can reliably pre-alarm security risk events, substantially reduce storage space of recorded video and significantly speed up the evidence video retrieval associated with specific suspects.
Journal ArticleDOI

Heterogeneous Data Storage Management with Deduplication in Cloud Computing

TL;DR: A heterogeneous data storage management scheme, which flexibly offers both deduplication management and access control at the same time across multiple Cloud Service Providers (CSPs) and is evaluated with security analysis, comparison and implementation.
Journal ArticleDOI

Workload balancing and adaptive resource management for the swift storage system on cloud

TL;DR: This paper proposes a framework of workload balancing and resource management for Swift, a widely used and typical distributed storage system on cloud, and designs workload monitoring and analysis algorithms for discovering overloaded and underloaded nodes in the cluster.
Journal ArticleDOI

A Self-Provisioning Mechanism in OpenStack for IoT Devices.

TL;DR: A plug-and-play mechanism for an Internet of Things (IoT) device to instantiate a Software as a Service (SaaS) application in a private cloud, built up with OpenStack is introduced.
References
More filters
Journal ArticleDOI

Multimedia traffic security architecture for the internet of things

TL;DR: This study is the first to provide general media-aware security architecture by jointly considering the characteristics of multimedia traffic, security service, and the Internet of Things.
Journal ArticleDOI

A survey of DHT security techniques

TL;DR: An overview of techniques reported in the literature for making DHT-based systems resistant to the three most important attacks that can be launched by malicious nodes participating in the DHT: the Sybil attack, the Eclipse attack, and the routing and storage attacks is presented.
Proceedings ArticleDOI

A Cloud Storage Architecture Model for Data-Intensive Applications

TL;DR: A four-layer cloud storage architecture to meet the requirements of data-intensive applications, an efficient and scalable node organization model is introduced to the cloud storage system.
Journal ArticleDOI

A Huffman-Shannon-Fano code

J.B. Connell
TL;DR: A variable-word-length minimum-redundant code is described that has the advantages of both the Huffman and Shannon-Fano codes in that it reduces transmission time, storage space, translation table space, and encoding and decoding times.
Proceedings ArticleDOI

P&P: A Combined Push-Pull Model for Resource Monitoring in Cloud Computing Environment

TL;DR: A user-oriented resource monitoring model named Push&Pull (P&P) for Cloud computing is proposed, which employs both the above two models, and switches the two models intelligently according to users’ requirements and monitored resources’ status.
Related Papers (5)