scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This work makes original contributions by formulating and solving constrained optimization problems to balance the data theft and data corruption probabilities in cloud computing systems subject to co-resident attacks.

32 citations

Proceedings ArticleDOI
Eric W. D. Rozier1, Wendy A. Belluomini1, Veera W. Deenadhayalan1, J. L. Hafner1, KK Rao1, Pin Zhou1 
29 Sep 2009
TL;DR: Results indicate that corruption from UDEs is a significant problem in the absence of protection schemes and that such schemes dramatically decrease the rate of undetected data corruption.
Abstract: Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, UndetectedDisk Errors (UDEs) also known as silent data corruption events, become a real challenge as storage capacity scales. While RAID systems have proven effective in protecting data from traditional disk failures, silent data corruption events remain a significant problem unaddressed by RAID. We present a fault model for UDEs, and a hybrid framework for simulating UDEs in large-scale systems. The framework combines a multi-resolution discrete event simulator with numerical solvers. Our implementation enables us to model arbitrary storage systems and workloads and estimate the rate of undetected data corruptions. We present results for several systems and workloads, from gigascale to petascale. These results indicate that corruption from UDEs is a significant problem in the absence of protection schemes and that such schemes dramatically decrease the rate of undetected data corruption.

32 citations

Journal ArticleDOI
TL;DR: In this article, the impact of supervisory control and data acquisition (SCADA) data corruption on real-time locational marginal price (LMP) in electricity markets is examined.
Abstract: This paper examines the impact of supervisory control and data acquisition (SCADA) data corruption on real-time locational marginal price (LMP) in electricity markets. We present an analytical framework to quantify LMP sensitivity with respect to changes in sensor data. This framework consists of a unified LMP sensitivity matrix subject to sensor data corruption. This sensitivity matrix reflects a coupling among the sensor data, an estimation of the power system states, and the real-time LMP. The proposed framework offers system operators an online tool to: 1) quantify the impact of corrupted data at any sensor on LMP variations at any bus; 2) identify buses with LMPs highly sensitive to data corruption; and 3) find sensors that impact LMP changes significantly and influentially. It also allows system operators to evaluate the impact of SCADA data accuracy on real-time LMP. The results of the proposed sensitivity based analysis are illustrated and verified with IEEE 14-bus and 118-bus systems with both Ex-ante and Ex-post real-time pricing models.

32 citations

Patent
16 Jul 2010
TL;DR: In this paper, a method for reducing data corruption in a wireless power transmission system is presented, where power is transmitted from a primary coil to a secondary coil by induction and the voltage induced on the secondary coils by induction is rectified.
Abstract: An embodiment of the invention provides a method for reducing data corruption in a wireless power transmission system. Power is transmitted from a primary coil to a secondary coil by induction. The voltage induced on the secondary coil by induction is rectified. The change in current supplied to a load configured to be coupled to the wireless power transmission system is limited.

31 citations

07 Oct 2009
TL;DR: Flicker explores a novel and interesting trade-off between energy consumption and hardware correctness, and shows that many mobile applications are naturally tolerant to errors in the non-critical data, and in the vast majority of cases, the errors have little or no impact on the application’s final outcome.
Abstract: Mobile devices are left in sleep mode for long periods of time But even while in sleep mode, the contents of DRAM memory need to be periodically refreshed, which consumes a significant fraction of power in mobile devices This paper introduces Flicker, an application-level technique to reduce refresh power in DRAM memories Flicker enables developers to specify critical and non-critical data in programs and the runtime system allocates this data in separate parts of memory The portion of memory containing critical data is refreshed at the regular refresh-rate, while the portion containing non-critical data is refreshed at substantially lower rates This saves energy at the cost of a modest increase in data corruption in the non-critical data Flicker thus explores a novel and interesting trade-off between energy consumption and hardware correctness We show that many mobile applications are naturally tolerant to errors in the non-critical data, and in the vast majority of cases, the errors have little or no impact on the application’s final outcome We also find that Flicker can save between 20-25% of the power consumed by the memory subsystem in a mobile device, with negligible impact on application performance Flicker is implemented almost entirely in software, and requires only modest changes to the application, operating system and hardware

30 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727