kBF: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems
نویسندگان
چکیده
منابع مشابه
kBF: a Bloom Filter for Key-Value Storage with an Application on Approximate State
Key-value (k-v) storage has been used as a crucial component for many network applications, such as social networks, online retailing, and cloud computing. Such storage usually provides support for operations on key-value pairs, and can be stored in memory to speed up responses to queries. So far, existing methods have been deterministic: they will faithfully return previously inserted key-valu...
متن کاملBloom Filter Based Metadata Placement And Management In Cloud Computing
As the data storage in this successful cloud era progress towards zeta bytes suitable query mapping structure for efficient data retrieval becomes a major issue. Metadata is an appropriate way to locate and identify the data from these huge storage servers as metadata file holds the information about a file stored in the cloud data servers in order to map the query to the exact location of the ...
متن کاملHierarchical Bloom Filter Trees for Approximate Matching
Bytewise approximate matching algorithms have in recent years shown significant promise in detecting files that are similar at the byte level. This is very useful for digital forensic investigators, who are regularly faced with the problem of searching through a seized device for pertinent data. A common scenario is where an investigator is in possession of a collection of “known-illegal” files...
متن کاملImprecise Minority-Based Full Adder for Approximate Computing Using CNFETs
Nowadays, the portable multimedia electronic devices, which employ signal-processing modules, require power aware structures more than ever. For the applications associating with human senses, approximate arithmetic circuits can be considered to improve performance and power efficiency. On the other hand, scaling has led to some limitations in performance of nanoscale circuits. According...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Cloud Computing
سال: 2017
ISSN: 2168-7161
DOI: 10.1109/tcc.2014.2385063