scispace - formally typeset
Search or ask a question
Topic

Data Corruption

About: Data Corruption is a research topic. Over the lifetime, 435 publications have been published within this topic receiving 6784 citations.


Papers
More filters
Patent
21 Mar 2019
TL;DR: In this article, data targeted for storage into a drive array is divided into codewords with data and parity symbols, and the symbols of the codeword are randomly distributed across a stripe of the drive array.
Abstract: Data targeted for storage into a drive array is divided into codewords with data and parity symbols. The symbols of the codewords are randomly distributed across a stripe of the drive array. One or more drives affected by data corruption are found based on a probability that a subset of inconsistent codewords intersects the one or more drives.

2 citations

Journal ArticleDOI
01 Aug 2011
TL;DR: The Amulet system is developed that can verify the correctness of stored data proactively and continuously and provide timely notification when corruption is detected, allowing proactive repair of corruption before it impacts users and applications.
Abstract: Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corrupt important sources of data. The dominant practice to deal with data corruption today involves administrators writing ad hoc scripts that run data-integrity tests at the application, database, file-system, and storage levels. This manual approach, apart from being tedious and error-prone, provides no understanding of the potential system unavailability and data loss if a corruption were to occur. We have developed the Amulet system that can verify the correctness of stored data proactively and continuously. This demonstration focuses on the uses of Amulet and its technical innovations: (i) a declarative language for administrators to specify their objectives regarding the detection and repair of data corruption; (ii) optimization and execution algorithms to meet the administrator's objectives robustly and with least cost using pay-as-you-go cloud resources; and (iii) timely notification when corruption is detected, allowing proactive repair of corruption before it impacts users and applications.

2 citations

Book ChapterDOI
08 Jul 2021
TL;DR: In this article, the authors proposed a novel method for using a PoW-based blockchain to ensure data integrity in cloud database management systems, which exploits a Distributed Hash Table and lightweight software agents, which are monitoring changes done to cloud database storage nodes.
Abstract: This paper proposes a novel method for using a PoW-based Blockchain to ensure data integrity in cloud database management systems. The use of cloud platforms for storing data or even hosting databases is incredibly huge, and in many cases, there is no convenient way for a client to check the integrity of the data stored in the cloud database. To solve this, we propose a technique based on an interaction between the cloud platform and a PoW-based Blockchain. This interaction exploits a Distributed Hash Table and lightweight software agents, which are monitoring changes done to cloud database storage nodes. Data update operations are published by the agents as Blockchain log/audit transactions that propagate deep into the Blockchain network until they become immutably and cryptographically protected by it. The proposed method enables the Cloud Provider to manage metadata so that it will be able to easily detect deliberate or accidental corruptions of transactions and to recover the transactions in case such a data corruption incident occurs.

2 citations

Proceedings ArticleDOI
01 Jul 2016
TL;DR: This study proposes “Ticket method” for a remote copy system in 100km distance multi-site environment to avoid data corruption caused by process and communication overtaking and found latency time of Ticket method is 1/3 as that of Sequence Number method.
Abstract: This study proposes "Ticket method" for a remote copy system in 100km distance multi-site environment to avoid data corruption caused by process and communication overtaking. The method notifies failure event occurred in a primary storage device to a secondary storage device using ticket information. Increase of latency and table size for applying Ticket method is little. As a result of evaluation and comparison with traditional Sequence Number method, it was found latency time of Ticket method is 1/3 as that of Sequence Number method.

2 citations

Journal ArticleDOI
TL;DR: This research work is trying to make security data model in secure element of NFC secure against data corruption and eavesdropping using Daffier Hellman.
Abstract: Now a day’s smart phone have Near Field Communication (NFC), which can be used for transferring data, payment trough mobile gateway and automation. With this new contactless technology set to become an important part of our lives, people have some valid and understandable security concerns. NFC is inherently vulnerable to data corruption and eavesdropping attacks. In this research work, we are trying to make security data model in secure element of NFC. Our aim is securing against data corruption and eavesdropping using Daffier Hellman.

2 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
82% related
Software
130.5K papers, 2M citations
81% related
Wireless sensor network
142K papers, 2.4M citations
78% related
Wireless network
122.5K papers, 2.1M citations
77% related
Cluster analysis
146.5K papers, 2.9M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
202121
202025
201927
201827
201727