scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
13 Feb 2006
TL;DR: A data storage system using flash storage maintains a status indicator corresponding to data written into the flash storage as mentioned in this paper, which indicates whether a disruption such as a power disruption or a device disconnection occurred when the data was being written into flash storage.
Abstract: A data storage system using flash storage maintains a status indicator corresponding to data written into the flash storage. The status indictor of the data indicates whether a disruption, such as a power disruption or a device disconnection, occurred when the data was being written into the flash storage. The data storage system determines whether the data may be corrupted based on one or more of the status indictors. The data storage system may make this determination at a selected time or after a power-up of the data storage system. If the data is determined to possibly be corrupted, the data storage system may optionally discard the corrupted data from the flash storage or flag the corrupted data for future removal.

2 citations

01 Jan 2006
TL;DR: The findings confirm anecdotal evidence about data corruption in general practice systems and mandate 'fail safe' strategies in software and user-interface design.
Abstract: Background: Clinical information systems require good quality data if the potential for electronic decision support and population health research and development are to be realised. We examined the quality of data as part of the implementation of an academic community of practice. Objectives: To investigate the quality of data held within a common Australian desktop clinical system with a focus on issues related to data corruption. Methods: A case study design and participatory research approach. Database tables, data elements, linkages and the actual data were examined in a comprehensive approach to assess the integrity of the database architecture and the data. The conceptual framework to examine the quality and errors was based on error sources (input, system, output) and error types. Results: Data corruption was found in the file system. User input errors were most easily identified e.g. developing different but more clinically intuitive processes for patient identification instead of the software systems UR numbers. The errors were most common among 'complex' patients with many disease labels and medications. This, along with the difficulty in explaining some of the errors, suggests that there are elements of system errors at play. Discussion and conclusions: Our findings confirm anecdotal evidence about data corruption in general practice systems. Whilst a certain percentage may acceptable for population health information management, data corruption errors (or similar) are not acceptable for electronic decision support or linkage into wider health networks. For an average practice population of 4,500 patients, an error rate as low as 1% still indicates that up to 45 patients may be at risk. We must aim for 'zero error tolerance'. However, in the meantime, we need to do at least two things: (1) have a ready assessment of the extent of data corruption in existing systems and (2) mandate 'fail safe' strategies in software and user-interface design. Some of the building blocks that need to be in place are a common conceptual framework for errors, using incidence and severity of effect as basic starting points. A systematic approach to the examination and management of data quality in clinical systems through national quality assurance programmes would be beneficial.

2 citations

Patent
31 Mar 2015
TL;DR: In this article, the cache is searched to determine if a valid copy of the corrupted data can be recovered from the cache, and a method for recovering corrupted data or missing data from a cache is provided.
Abstract: Systems and methods for recovering corrupted data or missing data from a cache are provided. When a data corruption is discovered in a storage system, the cache may be searched to determine if a valid copy of the corrupted data can be recovered from the cache.

2 citations

Proceedings ArticleDOI
01 Jun 2017
TL;DR: The enhanced study on cloud data services is presented, the security threats and its requirements to outsource the data to a cloud server are discussed, and the open challenges and current research directions in each category of solution to the data services are presented.
Abstract: Cloud computing is one of the greatest growing field for outsourcing data to cloud server. Among the rapid invention in cloud computing technologies, providing data services to the industry people, enterprises and individual in the cloud environment is a serious issue. Implementing security techniques in the cloud server is very complex task due to tremendous growth in cloud environment. These cloud servers are hosted on internet to perform operation such as read, write, store and organize the data rather than on desktop computer. While processing the data on cloud server under open network, business people faces massive security and privacy risks. The majority of the threat includes data leakage, data corruption and privacy preservation in cloud environments. In recent times, several studies have been proposed to addresses these threats and also provide solutions to enable the protection on the cloud data. In this paper, we present the enhanced study on cloud data services also we discuss the security threats and its requirements to outsource the data to a cloud server. Finally, we present the open challenges and current research directions in each category of solution to the data services.

2 citations

Patent
14 Oct 2015
TL;DR: In this article, a data recovery method and an apparatus for COW type file system is presented, which is used to recover damaged original data in the COWtype file system, which comprises steps of: 1) performing backup on an original data storage medium; 2) scanning the original data medium, to acquire a viable recovery point that is closest to a modification time; and 3) performing data recovery according to the viable recovery points obtained from step 2.
Abstract: The present invention relates to a data recovery method and an apparatus for COW type file system, which are used to recover damaged original data in the COW type file system. The recovery method comprises steps of: 1) performing backup on an original data storage medium; 2) scanning the original data storage medium, to acquire a viable recovery point that is closest to a modification time; and 3) performing data recovery according to the viable recovery point obtained from step 2. Compared to the prior art, a data recovery method with respect to a COW (Copy On Write) type file system provided by the present invention comprises: firstly performing backup to data, and then performing scanning and analysis on metadata (superblock) of the file system, and maximally and completely recovering damaged data caused by subjective or objective factors into available data on the storage medium, thereby avoiding or greatly reducing losses caused by data corruption.

2 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727