scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
19 Feb 2008
TL;DR: In this article, the authors provide methods and apparatus for preventing data corruption on a storage device by integrating a journaling file system with a cache system to provide both a robust file system integrity and an efficient reading and writing mechanism.
Abstract: The present principles provide methods and apparatus for preventing data corruption on a storage device by integrating a journaling file system with a cache system. To ensure journal accuracy with respect to data that is most likely to affect file system integrity, a method in accordance with an aspect of the present principles includes bypassing the cache when writing (412) such data to a main platter of a storage device. Furthermore, to ensure overall efficiency in reading and writing data, a method in accordance with an aspect of the present principles includes writing (420) to a cache, in addition to writing to the platter (428), data that has a relatively less damaging effect on file system integrity. Thus, aspects of the present principles optimally integrate a cache system with a journaling file system to provide both a robust file system integrity and an efficient reading and writing mechanism.

6 citations

Journal ArticleDOI
01 Jun 2021
TL;DR: Wang et al. as discussed by the authors proposed a robust and auditable distributed data storage (Radds) scheme to support a secure and dependable edge storage in edge computing, which allows to check the integrity of data in distributed edge storage servers and guarantees data repairability in case of data corruption.
Abstract: With the widespread use of Internet-of-Things (IoT) devices, edge computing is becoming a popular technology for processing and storing data distributed at the edge of the networks. However, the new paradigm also faces a major security challenge: how to ensure the reliability and integrity of data in distributed edge storage servers? In this paper, we propose a robust and auditable distributed data storage (Radds) scheme to support a secure and dependable edge storage in edge computing. Firstly, based on homomorphic verifiable authenticator and regenerating code technique, the proposed scheme allows to check the integrity of data in distributed edge storage servers and guarantees data repairability in case of data corruption. Moreover, the server with corrupted data also can be deduced from integrity proofs, and a proxy is introduced for data reparation to release edge nodes from online burden and computation costs. Secondly, the proposed scheme can protect the privacy of original data from the third party auditor by blinding the encoding coefficients with a keyed pseudorandom function. Thirdly, the proposed scheme supports flexible scalability, i.e., dynamic joining and exiting of the edge nodes. Moreover, even if some data are not collected temporarily, they still can be supplemented to the encoded data file by an efficient way and the integrity checking and data reparation can be performed normally. Finally, security analysis and performance evaluation demonstrate that the proposed scheme is secure and highly efficient.

6 citations

Patent
04 Jan 2011
TL;DR: In this paper, the authors propose a system and method that provision at least two (2) receivers in a topology that allows each receiver to acquire wireless communication signals through different diverse antenna fields.
Abstract: The present application includes a system and method that provisions at least two (2) receivers in a topology that allows each receiver to acquire wireless communication signals through different diverse antenna fields. Each receiver acquires the signal, and demodulates, decodes and sends data to the data terminal component. The data terminal component resolves packet alignment issues and selects the best data. This improves system reliability and reduces the system susceptibility to data corruption or loss of data due to signal fading that might occur on a single antenna field. Provisioning a wireless system in this manner reduces the likelihood that the same fading phenomena, resulting from either multipath and/or shadowing affects, impair signal reception causing data dropout or loss of data.

6 citations

Patent
23 Oct 2014
TL;DR: In this paper, a serialization and deserialization module for an elevator installation can be configured to cross check various data inputs and outputs to identify data corruption, component failures, or inconsistencies in data.
Abstract: Safety related information for an elevator installation can be transmitted via a serial connection using serialization and deserialization modules. These serialization and deserialization modules can comprise redundant components, such as processors and interfaces, and can be configured to cross check various data inputs and outputs to identify data corruption, component failures, or inconsistencies in data.

5 citations

Patent
22 May 2001
TL;DR: In this article, the authors present a method for recovering data from user or application errors by selectively target and undo only those transactions that caused data corruption, which has the further advantage of minimizing the number of transactions that are lost after recovery.
Abstract: Most commercial database systems provide a recovery mechanism that is used to restore data integrity in the event of a hardware failure. Many of these systems restore the database from the most recent backup file by rolling forward all transactions from the most recent undamaged transaction log. The present invention discloses a novel system and method for recovering data from user or application errors. Embodiments of the present invention selectively target and undo only those transactions that caused data corruption. In this way, the present invention is able to recover fine-grained database objects such as a table or a row within a table. The present invention has the further advantage of minimizing the number of transactions that are lost after recovery.

5 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727