A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure Deduplication for Cloud Storage
2015
International Journal of Science and Research (IJSR)
Secure data deduplication allows cloud storage and service providers to employ data with confidentiality. ...
Cloud computing provides unlimited storage space, availability, accessibility from anywhere, anytime to individuals. Due to continuously increase in number of users and their data. ...
Chunk store verifies the correctness of value with key. This should be done to avoid target collision attacks. Along with these three players system considers internal and external adversaries. ...
doi:10.21275/v4i12.nov151948
fatcat:lbjh33w4f5bu5jw6hcbjvhai4q
Auditing to Keep Online Storage Services Honest
2007
USENIX Workshop on Hot Topics in Operating Systems
We describe approaches and system hooks that support both internal and external auditing of online storage services, describe motivations for service providers and auditors to adopt these approaches, and ...
Currently, customers cannot make informed decisions about the risk of losing data stored with any particular service provider, reducing their incentive to rely on these services. ...
Once a system with proper incentives is established, storage services will allow internal audits. ...
dblp:conf/hotos/ShahBMS07
fatcat:7f2dd5r7zjfgvpwtkvnusjco4m
Exploring Fingerprinting as External Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
2010
Conference and Labs of the Evaluation Forum
This application prototype uses fingerprinting and hash search methods to locate similarities between different documents and thus detect plagiarism. ...
The developed system is a part of the larger application used at Zhytomyr State University as CMS Thesis Storage and comes under the title "Plagiarism Detector Accumulator". ...
MySQL Database heap storage engine was used as a hash index storage with the windowing applied to mitigate the memory requirements. ...
dblp:conf/clef/PalkovskiiBM10
fatcat:37tb3jfxp5bntmchjiow2mshe4
IPFS - the perspective storage infrastructure for scientific data - presentation
2020
Zenodo
Discussion: CID persistence 28/33 CID is internally persistent identifier for the given data allowing direct hash-based content addressing model. ...
Discussion: CID persistence
27/33 CID is internally persistent identifier for the given data allowing direct hash-based content addressing model. ...
doi:10.5281/zenodo.4742585
fatcat:nwipuj7xs5a6dggzc2jsuztibm
Secure data deduplication
2008
Proceedings of the 4th ACM international workshop on Storage security and survivability - StorageSS '08
Thus, combining the space efficiency of deduplication with the secrecy aspects of encryption is problematic. ...
We have developed a solution that provides both data security and space efficiency in single-server storage and distributed storage systems. ...
Acknowledgments We thank the members of the Storage Systems Research Center (SSRC) for spirited discussions that helped focus the content of this paper. ...
doi:10.1145/1456469.1456471
dblp:conf/storagess/StorerGLM08
fatcat:rvh5akhk7fcz7lh7q4y47btxju
Global identification of storage objects in network attached storage
2004
Proceedings of the 5th international conference on Computer systems and technologies - CompSysTech '04
For the identification word-wide unique identifiers are generated by double hash transformation based on the Advanced Encryption Standard (Rijndael) with no collisions. ...
Network attached disk storage is an independent Internet node and provides geographical distribution, mutual identification and exchange of storage objects. ...
There are two instances of names in the open distributed environment: externally visible and internal (globally unique). ...
doi:10.1145/1050330.1050347
fatcat:yhzkg47qercz5kgfcjp2ekabjm
Trust but verify
2004
Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC - EW11
We propose a framework for accountable network services, and explore its applicability and limitations. ...
The foundation of our approach is to preserve digitally signed records of actions and/or internal state snapshots of each service, and use them to detect tampering, verify the consistency of actions and ...
Thus it should be possible to build an accountable storage service by decorating the tree with hash digests and applying the framework directly. ...
doi:10.1145/1133572.1133585
dblp:conf/sigopsE/YumerefendiC04
fatcat:5m5lfyslwndrro4ja2cjoajdsq
Can Flash Memory Help in Model Checking?
[chapter]
2009
Lecture Notes in Computer Science
So far, external memory model checking algorithms have been optimized for mechanical hard disks corresponding to the model of Aggarwal and Vitter [1]. ...
We discuss verification algorithms optimized for this model and compare the performance of these algorithms with approaches known from I/O-efficient model checking on mechanical hard disks. ...
One option that we call merging is to sort the internal hash table wrt. to the external hash function before flushing. ...
doi:10.1007/978-3-642-03240-0_14
fatcat:jatfcu7l4zha3eupeb6pqgzbdq
Gradually Improving the Forensic Process
2015
2015 10th International Conference on Availability, Reliability and Security
Not only the number of devices increases due to the advancing computerization of everydays life, but also the storage capacity of each and every device raises into multiterabyte storage requirements per ...
Those external storage devices include two external hard drives with half a terabyte and one terabyte in capacity, and three USB thumb drives from various manufacturers and with different capacities. ...
respectively tablets, external storage devices like USB thumb drives or external hard drives, and lastly digital cameras. ...
doi:10.1109/ares.2015.32
dblp:conf/IEEEares/NeunerMSW15
fatcat:t3ywfiy3gvfrngagsg5et5cbsy
LedgerDB: A Centralized Ledger Database for Universal Audit and Verification
2020
Proceedings of the VLDB Endowment
Hence, we propose LedgerDB on Alibaba Cloud, which is a centralized ledger database with tamper-evidence and non-repudiation features similar to blockchain, and provides strong auditability. ...
When decentralized architecture is used but not required, system performance is often restricted, resulting in low throughput, high latency, and significant storage overhead. ...
In summary, ProvenDB provides internal audit similar to QLDB and limited external audit (from large vulnerable time window). Factom. ...
dblp:journals/pvldb/YangZWY0LY20
fatcat:pyfkk5lnvrb4zjqvrx3fkbdcdy
Data Deduplication Strategies in Cloud Computing
2020
International Journal of Innovative Science and Research Technology
The primary preferred position of utilizing distributed storage from the clients' perspective is that they can diminish their consumption in buying and keeping up capacity framework. ...
on-request and pervasive access to a concentrated pool of configurable assets, for example, systems, applications, and administrations This guarantees the vast majority of undertakings and number of clients externalize ...
INTRODUCTION Cloud: It is a technology of distributed data processing through internet technology in which some extensible information resources and limits are given as an assistance to number of external ...
doi:10.38124/ijisrt20aug238
fatcat:y4qexwzjjzcgdc5fwysjqx7rou
Dealing with Nonuniformity in Data Centric Storage for Wireless Sensor Networks
2011
IEEE Transactions on Parallel and Distributed Systems
Recent approaches to data storage rely on Geographic Hash Tables (GHT) for efficient data storage and retrieval. ...
In-network storage of data in Wireless Sensor Networks (WSNs) is considered a promising alternative to external storage since it contributes to reduce the communication overhead inside the network. ...
However, the external storage approach is not feasible in applications where the WSN has an intermittent connection with the sink. ...
doi:10.1109/tpds.2011.18
fatcat:wurgbsv3zfcu5oekuxszwm3feu
Map vs. Unordered Map: An Analysis on Large Datasets
2015
International Journal of Computer Applications
In the current scenario, with the transpiring big data explosion, data sets are often too large to fit completely inside the computers´ internal memory. ...
In this paper two data structures are explored: 1) Map which is implemented as self-balancing binary search trees or more commonly Red Black Trees and 2) Unordered Map which is based on hashing with chaining ...
A major performance barrier is observed due to the I/O communication constraints between fast internal memory and slower external memory (such as secondary storage devices). ...
doi:10.5120/ijca2015906322
fatcat:2o6fghduvzduvlzey4kmjtvuu4
A case for flash memory ssd in enterprise database applications
2008
Proceedings of the 2008 ACM SIGMOD international conference on Management of data - SIGMOD '08
steadily expanded into personal computer and enterprise server markets with ever increasing capacity of its storage. ...
We show empirically that up to more than an order of magnitude improvement can be achieved in transaction processing by replacing magnetic disk with flash memory SSD for transaction log, rollback segments ...
performance of a hash operation with flash memory SSD. ...
doi:10.1145/1376616.1376723
dblp:conf/sigmod/LeeMPKK08
fatcat:2excrpig3rcfrnx3qd7soy5rw4
Practical Batch-Updatable External Hashing with Sorting
[chapter]
2013
2013 Proceedings of the Fifteenth Workshop on Algorithm Engineering and Experiments (ALENEX)
This paper presents a practical external hashing scheme that supports fast lookup (7 microseconds) for large datasets (millions to billions of items) with a small memory footprint (2.5 bits/item) and fast ...
We evaluate our scheme by building an external dictionary on flash-based drives and demonstrate our scheme's high performance, compactness, and practicality. ...
ECT generates an index with exactly k hash collisions (with an exception of the last block that may contain fewer than k items), and this leads to more efficient use of storage space. ...
doi:10.1137/1.9781611972931.15
dblp:conf/alenex/LimAK13
fatcat:iahlzxoxnzdxhe2xw7kccniowm
« Previous
Showing results 1 — 15 out of 20,054 results