Delay-Optimized File Retrieval under LT-Based Cloud Storage
نویسندگان
چکیده
منابع مشابه
Policy Based File Assured Deletion with Secure Overlay Cloud Storage
The outsource data backup to third-party cloud storage services so as to reduce data management costs, security concerns arise in terms of ensuring the privacy and integrity of out-sourced data. Design Policy Base a practical, implementable, and readily deployable cloud storage system that focuses on protecting deleted data with Policy Based file secured deletion. Policy Base is built upon stan...
متن کاملSyncCS: A Cloud Storage Based File Synchronization Approach
More and more people begin to own multiple computing devices. File synchronization technologies are needed to effectively manage data which spans multiple devices. However there is not a general standard for file synchronization system. In this paper we propose a file synchronization model based on cloud storage SyncCS. We describe the SyncCS architecture and present a novel twostage file synch...
متن کاملHarmonium: Elastic Cloud Storage via File Motifs
Modern applications expand to fill the space available to them, exploiting local storage to improve performance by caching, prefetching and precomputing data. In virtualized settings, this behavior compromises storage elasticity owing to a rigid contract between the hypervisor and the guest OS: once space is allocated to a virtual disk and used by an application, it cannot be reclaimed by the h...
متن کاملTwo-way File Synchronization Mechanism in Cloud Storage System
In cloud storage system, file synchronization schemes are widely used for efficient use of storage system. It reduces network traffic and processing time extremely. However, there exist several weak point in handling file synchronization for multiple clients. In this paper, to tackle this problem, we propose a bidirectional file synchronization scheme to efficiently deal with file copying betwe...
متن کاملMulti-file proofs of retrievability for cloud storage auditing
Cloud storage allows clients to store a large amount of data with the help of storage service providers (SSPs). Proof-of-retrievability(POR) protocols allow one server to prove to a verifier the availability of data stored by some client. Shacham et al. presented POR protocols based on homomorphic authenticators and proved security of their schemes under a stronger security model, which require...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2017
ISSN: 2168-7161
DOI: 10.1109/tcc.2015.2430347