20,054 Hits in 2.9 sec

Secure Deduplication for Cloud Storage

2015 International Journal of Science and Research (IJSR)  
Secure data deduplication allows cloud storage and service providers to employ data with confidentiality.  ...  Cloud computing provides unlimited storage space, availability, accessibility from anywhere, anytime to individuals. Due to continuously increase in number of users and their data.  ...  Chunk store verifies the correctness of value with key. This should be done to avoid target collision attacks. Along with these three players system considers internal and external adversaries.  ... 
doi:10.21275/v4i12.nov151948 fatcat:lbjh33w4f5bu5jw6hcbjvhai4q

Auditing to Keep Online Storage Services Honest

Mehul A. Shah, Mary Baker, Jeffrey C. Mogul, Ram Swaminathan
2007 USENIX Workshop on Hot Topics in Operating Systems  
We describe approaches and system hooks that support both internal and external auditing of online storage services, describe motivations for service providers and auditors to adopt these approaches, and  ...  Currently, customers cannot make informed decisions about the risk of losing data stored with any particular service provider, reducing their incentive to rely on these services.  ...  Once a system with proper incentives is established, storage services will allow internal audits.  ... 
dblp:conf/hotos/ShahBMS07 fatcat:7f2dd5r7zjfgvpwtkvnusjco4m

Exploring Fingerprinting as External Plagiarism Detection Method - Lab Report for PAN at CLEF 2010

Yurii Palkovskii, Alexei Belov, Irina Muzika
2010 Conference and Labs of the Evaluation Forum  
This application prototype uses fingerprinting and hash search methods to locate similarities between different documents and thus detect plagiarism.  ...  The developed system is a part of the larger application used at Zhytomyr State University as CMS Thesis Storage and comes under the title "Plagiarism Detector Accumulator".  ...  MySQL Database heap storage engine was used as a hash index storage with the windowing applied to mitigate the memory requirements.  ... 
dblp:conf/clef/PalkovskiiBM10 fatcat:37tb3jfxp5bntmchjiow2mshe4

IPFS - the perspective storage infrastructure for scientific data - presentation

2020 Zenodo  
Discussion: CID persistence 28/33 CID is internally persistent identifier for the given data allowing direct hash-based content addressing model.  ...  Discussion: CID persistence 27/33 CID is internally persistent identifier for the given data allowing direct hash-based content addressing model.  ... 
doi:10.5281/zenodo.4742585 fatcat:nwipuj7xs5a6dggzc2jsuztibm

Secure data deduplication

Mark W. Storer, Kevin Greenan, Darrell D.E. Long, Ethan L. Miller
2008 Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS '08  
Thus, combining the space efficiency of deduplication with the secrecy aspects of encryption is problematic.  ...  We have developed a solution that provides both data security and space efficiency in single-server storage and distributed storage systems.  ...  Acknowledgments We thank the members of the Storage Systems Research Center (SSRC) for spirited discussions that helped focus the content of this paper.  ... 
doi:10.1145/1456469.1456471 dblp:conf/storagess/StorerGLM08 fatcat:rvh5akhk7fcz7lh7q4y47btxju

Global identification of storage objects in network attached storage

Iliya Georgiev, Kiril Boyanov, Ivo Georgiev
2004 Proceedings of the 5th international conference on Computer systems and technologies - CompSysTech '04  
For the identification word-wide unique identifiers are generated by double hash transformation based on the Advanced Encryption Standard (Rijndael) with no collisions.  ...  Network attached disk storage is an independent Internet node and provides geographical distribution, mutual identification and exchange of storage objects.  ...  There are two instances of names in the open distributed environment: externally visible and internal (globally unique).  ... 
doi:10.1145/1050330.1050347 fatcat:yhzkg47qercz5kgfcjp2ekabjm

Trust but verify

Aydan R. Yumerefendi, Jeffrey S. Chase
2004 Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11  
We propose a framework for accountable network services, and explore its applicability and limitations.  ...  The foundation of our approach is to preserve digitally signed records of actions and/or internal state snapshots of each service, and use them to detect tampering, verify the consistency of actions and  ...  Thus it should be possible to build an accountable storage service by decorating the tree with hash digests and applying the framework directly.  ... 
doi:10.1145/1133572.1133585 dblp:conf/sigopsE/YumerefendiC04 fatcat:5m5lfyslwndrro4ja2cjoajdsq

Can Flash Memory Help in Model Checking? [chapter]

Jiří Barnat, Luboš Brim, Stefan Edelkamp, Damian Sulewski, Pavel Šimeček
2009 Lecture Notes in Computer Science  
So far, external memory model checking algorithms have been optimized for mechanical hard disks corresponding to the model of Aggarwal and Vitter [1].  ...  We discuss verification algorithms optimized for this model and compare the performance of these algorithms with approaches known from I/O-efficient model checking on mechanical hard disks.  ...  One option that we call merging is to sort the internal hash table wrt. to the external hash function before flushing.  ... 
doi:10.1007/978-3-642-03240-0_14 fatcat:jatfcu7l4zha3eupeb6pqgzbdq

Gradually Improving the Forensic Process

Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl
2015 2015 10th International Conference on Availability, Reliability and Security  
Not only the number of devices increases due to the advancing computerization of everydays life, but also the storage capacity of each and every device raises into multiterabyte storage requirements per  ...  Those external storage devices include two external hard drives with half a terabyte and one terabyte in capacity, and three USB thumb drives from various manufacturers and with different capacities.  ...  respectively tablets, external storage devices like USB thumb drives or external hard drives, and lastly digital cameras.  ... 
doi:10.1109/ares.2015.32 dblp:conf/IEEEares/NeunerMSW15 fatcat:t3ywfiy3gvfrngagsg5et5cbsy

LedgerDB: A Centralized Ledger Database for Universal Audit and Verification

Xinying Yang, Yuan Zhang, Sheng Wang, Benquan Yu, Feifei Li, Yize Li, Wenyuan Yan
2020 Proceedings of the VLDB Endowment  
Hence, we propose LedgerDB on Alibaba Cloud, which is a centralized ledger database with tamper-evidence and non-repudiation features similar to blockchain, and provides strong auditability.  ...  When decentralized architecture is used but not required, system performance is often restricted, resulting in low throughput, high latency, and significant storage overhead.  ...  In summary, ProvenDB provides internal audit similar to QLDB and limited external audit (from large vulnerable time window). Factom.  ... 
dblp:journals/pvldb/YangZWY0LY20 fatcat:pyfkk5lnvrb4zjqvrx3fkbdcdy

Data Deduplication Strategies in Cloud Computing

MD. Jareena Begum, B. Haritha
2020 International Journal of Innovative Science and Research Technology  
The primary preferred position of utilizing distributed storage from the clients' perspective is that they can diminish their consumption in buying and keeping up capacity framework.  ...  on-request and pervasive access to a concentrated pool of configurable assets, for example, systems, applications, and administrations This guarantees the vast majority of undertakings and number of clients externalize  ...  INTRODUCTION  Cloud: It is a technology of distributed data processing through internet technology in which some extensible information resources and limits are given as an assistance to number of external  ... 
doi:10.38124/ijisrt20aug238 fatcat:y4qexwzjjzcgdc5fwysjqx7rou

Dealing with Nonuniformity in Data Centric Storage for Wireless Sensor Networks

Michele Albano, Stefano Chessa, Francesco Nidito, Susanna Pelagatti
2011 IEEE Transactions on Parallel and Distributed Systems  
Recent approaches to data storage rely on Geographic Hash Tables (GHT) for efficient data storage and retrieval.  ...  In-network storage of data in Wireless Sensor Networks (WSNs) is considered a promising alternative to external storage since it contributes to reduce the communication overhead inside the network.  ...  However, the external storage approach is not feasible in applications where the WSN has an intermittent connection with the sink.  ... 
doi:10.1109/tpds.2011.18 fatcat:wurgbsv3zfcu5oekuxszwm3feu

Map vs. Unordered Map: An Analysis on Large Datasets

Akanksha Bindal, Prateek Narang, S. Indu
2015 International Journal of Computer Applications  
In the current scenario, with the transpiring big data explosion, data sets are often too large to fit completely inside the computers´ internal memory.  ...  In this paper two data structures are explored: 1) Map which is implemented as self-balancing binary search trees or more commonly Red Black Trees and 2) Unordered Map which is based on hashing with chaining  ...  A major performance barrier is observed due to the I/O communication constraints between fast internal memory and slower external memory (such as secondary storage devices).  ... 
doi:10.5120/ijca2015906322 fatcat:2o6fghduvzduvlzey4kmjtvuu4

A case for flash memory ssd in enterprise database applications

Sang-Won Lee, Bongki Moon, Chanik Park, Jae-Myung Kim, Sang-Woo Kim
2008 Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08  
steadily expanded into personal computer and enterprise server markets with ever increasing capacity of its storage.  ...  We show empirically that up to more than an order of magnitude improvement can be achieved in transaction processing by replacing magnetic disk with flash memory SSD for transaction log, rollback segments  ...  performance of a hash operation with flash memory SSD.  ... 
doi:10.1145/1376616.1376723 dblp:conf/sigmod/LeeMPKK08 fatcat:2excrpig3rcfrnx3qd7soy5rw4

Practical Batch-Updatable External Hashing with Sorting [chapter]

Hyeontaek Lim, David G. Andersen, Michael Kaminsky
2013 2013 Proceedings of the Fifteenth Workshop on Algorithm Engineering and Experiments (ALENEX)  
This paper presents a practical external hashing scheme that supports fast lookup (7 microseconds) for large datasets (millions to billions of items) with a small memory footprint (2.5 bits/item) and fast  ...  We evaluate our scheme by building an external dictionary on flash-based drives and demonstrate our scheme's high performance, compactness, and practicality.  ...  ECT generates an index with exactly k hash collisions (with an exception of the last block that may contain fewer than k items), and this leads to more efficient use of storage space.  ... 
doi:10.1137/1.9781611972931.15 dblp:conf/alenex/LimAK13 fatcat:iahlzxoxnzdxhe2xw7kccniowm
« Previous Showing results 1 — 15 out of 20,054 results