scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2018
TL;DR: This work designs a reputation-aware data fusion mechanism that is capable of defending a data corruption attack and identifying malicious or honest participants based on their reported data in real time, and yields more accurate data prediction in terms of lower data prediction error.
Abstract: Mobile crowdsensing, an emerging sensing paradigm, promotes scalability and reduction in the deployment of specialized sensing devices for large-scale data collection in a decentralized fashion. However, its open structure allows malicious entities to interrupt a system by reporting fabricated or erroneous data, making trust evaluation a highly important issue in mobile crowdsensing applications. The goal of this research is to show that an introduction of a reputation system in the process of correlated sensor-based data fusion will enhance the overall quality of the sensed data. To do so, we design a reputation-aware data fusion mechanism to ensure data integrity. We use Gompertz function in our reputation method to rate the trustworthiness of the data reported by a crowdsensing participant. The proposed mechanism, on one hand, is capable of defending a data corruption attack and identifying malicious or honest participants based on their reported data in real time. On the other hand, this mechanism yields more accurate data prediction in terms of lower data prediction error. We conducted experiments using two different real-world datasets. We compare our correlated data and reputation-aware data prediction (CDR) method with other popular methods, and the results show that our effective method incurs lower data prediction error.

15 citations

Patent
14 Sep 1998
TL;DR: In this article, a system and method for providing detection of the signatures effected by a defective Floppy Diskette Controller (FDC) operates on media independent of files thereon, or on files, independent of the media on which they are stored.
Abstract: A system and method for providing detection of the signatures effected by a defective Floppy Diskette Controller (“FDC”) operates on media independent of files thereon, or on files, independent of the media on which they are stored. Multiple testing strategies incorporate evaluations to detect signatures of data corruption introduced by defective FDCs from long transfer delays, short transfer delays, contiguous storage of logical sectors, or fragmented storage of logical sectors of a file. A false positive filter uses secondary testing of data. Filters remove from consideration those common patterns that properly and naturally occur. These filters rely on indicia demonstrating that primary leading indicators of the presence of an error do not really result from an actual error. The signatures may be detected regardless of subsequent transfer of corrupted files to various media including the media tested.

15 citations

Patent
10 May 2003
TL;DR: In this article, the authors present a method for inserting errors into data to facilitate validation of an error detection algorithm, which consists of receiving a data corruption command for a plurality of bits, determining, from the data corruption commands, a plurality within the plurality of bit fields for data corruption; determining a minimum and maximum number of errors for each of the bit fields, determining a total number of faults to be inserted, inserting the minimum number of violations into each of these bit fields at random locations, and randomly inserting additional errors into the plurality with respect to the maximum errors until the total number
Abstract: In one embodiment, the present invention is directed to a method for inserting errors into data to facilitate validation of an error detection algorithm. The method comprises: receiving a data corruption command for a plurality of bits; determining, from the data corruption command, a plurality of bit fields within the plurality of bits for data corruption; determining a minimum and maximum number of errors for each of the plurality of bit fields; determining a total number of errors to be inserted; inserting the minimum number of errors into each of the plurality of bit fields at random locations; and randomly inserting additional errors into the plurality of bit fields subject to the maximum number of errors until the total number of errors are inserted.

15 citations

Patent
Hideo Sunaga1, Nobuyuki Nemoto1
04 Mar 1999
TL;DR: In this paper, the authors propose a mechanism to keep an adequate distance between read and write address pointers to prevent data corruption and subsequent system disruption from happening by using dual port data buffer storage.
Abstract: An apparatus for resynchronizing data signals by using dual port data buffer storage, which prevents data corruption and subsequent system disruption from happening by employing a mechanism to keep an adequate distance between read and write address pointers. An input unit receives an incoming data stream having a cyclic data structure of N bytes. A data writing unit sequentially writes each data word of the received data stream into a storage unit with a capacity of 2N bytes in synchronization with a first clock. A data reading unit sequentially reads out each data word from the storage unit in synchronization with a second clock. A detection unit tests whether the write and read address pointers have come within a predetermined threshold distance. A relocation unit moves the read address pointer by N bytes to increase the distance between the read and write address pointers, when the detection unit has detected that the write and read address pointers have come within the threshold distance. An outputting unit transmits to an external destination the data words read out by the data reading unit.

15 citations

Patent
29 May 1997
TL;DR: An apparatus for testing the sharing of stored information including a computer-readable storage medium and an information sharing protocol test harness module stored on the computer readable storage medium is described in this paper.
Abstract: An apparatus for testing the sharing of stored information including a computer-readable storage medium and an information sharing protocol test harness module stored on the computer-readable storage medium. The information sharing protocol test harness module executes an information sharing protocol test case on a computer system responsive to a test initiation input. The information sharing protocol test case tests the locking of storage locations to prevent data corruption responsive to being executed.

15 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727