91,881 Hits in 6.9 sec

System-managed storage

J. P. Gelb
1989 IBM Systems Journal  
cycles and space via management classes Dynamically view the status of the storage re- source via ISMF Policy establishment.  ...  Under DFSMS, the administra- tor has the responsibility of informing the system of the policies and guidelines by which storage and users should be managed.  ... 
doi:10.1147/sj.281.0077 fatcat:savttuxwljhvzlj3koxo2ncqwm

An Analysis of Hybrid Authentication and Authorization Model for Web Based Application

Harish Baraithiya, RK Pateriya
2017 Journal of Information Technology & Software Engineering  
The website is having many users with different Identity and its Access Management via using authentication and authorization.  ...  An Identify Access Management (IAM) system is very important and trusted source for accessing the website related information.  ...  Cui L [11] PLAN-Joint Policy-and Network-Aware VM Management for Cloud Data Centers To reduce communication cost while adhering to policy constraints.  ... 
doi:10.4172/2165-7866.1000215 fatcat:lyhzdgoxkbfqlgillj7lnuh5vy

Intrusion Detection and Prevention using Lockout policy with ACL on Cloud Computing

D. Narmadha, P. Padmakumari, A. Umamakeswari
2016 Indian Journal of Science and Technology  
Methods: To address this issue, the proposed lockout policy with access control list is applied to prevent the access to illegitimate user without affecting legal users.  ...  Applications The proposed methodology can be applied in signature based analysis and strong user identification.  ...  Authenticated key is used to exchange the important information via the Internet.  ... 
doi:10.17485/ijst/2016/v9i48/107975 fatcat:aie5owy2ovhw3ldlonj2sjn3ma

Designing Framework of Cloud Health Record (CHR) System for Patient Health Information Storage: A New Prophecy

Prakash Kuppuswamy, Shanmuga Sundaram, Rajan John
2020 International Journal of Computer & Software Engineering  
Cloud technology facilitates data storage, that keeps for all time availability of every individual patient information.  ...  In this article, we outlined new prophecy of Cloud based storing system called Cloud Health Record (CHR), we suggest that the new system will help to store huge volume of patient information and it will  ...  Cloud based record management costs by reducing on premise hardware and software management, simplifying monitoring, and reducing the need for extensive capacity planning.  ... 
doi:10.15344/2456-4451/2020/153 fatcat:zvushjnnpfe3bkflwv5obzkrui

Addressing a billion-entries multi-petabyte distributed file system backup problem with cback: from files to objects

Roberto Valverde Cameselle, Hugo Gonzalez Labrador, C. Biscarat, S. Campana, B. Hegner, S. Roiser, C.I. Rovelli, G.A. Stewart
2021 EPJ Web of Conferences  
The backup data is also de-duplicated in blocks and stored as objects in a disk-based S3 cluster in another geographical location on the CERN campus, reducing storage costs and protecting critical data  ...  Daily snapshot-based backups of all our user and project areas along with automatic verification and restores are possible with this the new development.  ...  This would reduce the operational costs (as no action would be needed by the service manager) and improve the user experience.  ... 
doi:10.1051/epjconf/202125102071 fatcat:acpwuja7tvdxrhr4mpztfxd3yi

AIP: a tool for flexible and transparent data management

GuangYan Zhang, JianPing Qiu, JiWu Shu, WeiMin Zheng
2012 Science China Information Sciences  
First, AIP provides centralized policy-based data management for controlling the placement of files in different storage tiers.  ...  In this paper, we present a new data management tool called AIP, which is implemented via the standard data management API, and hence it supports multiple file systems and makes data management operations  ...  They are connected via an Ethernet network. DMServer maintains the management metadata to keep track of states of storage devices and access information of user files.  ... 
doi:10.1007/s11432-011-4466-6 fatcat:m47ej72bh5ehrnhkusbgfa4fpu

Blockchain-Based IoT Access Control System: Towards Security, Lightweight, and Cross-Domain

Shuang Sun, Rong Du, Shudong Chen, Weiwei Li
2021 IEEE Access  
Most IoT devices cannot afford to be a blockchain node due to the high computation and storage loads.  ...  In this paper, we integrate a permissioned blockchain (HLF), an attribute-based access control (ABAC) and an identity-based signature (IBS) to build a security, lightweight, and cross-domain blockchain-based  ...  Finally, The same as the attribute storage experiment, we test the user's policy files' diest storage efficiency via invoking uploadPolicy.  ... 
doi:10.1109/access.2021.3059863 fatcat:6wk4eu57wzdnnkfhnqigydsdyu

ChargeView: An integrated tool for implementing chargeback in IT systems

Sandip Agarwala, Ramani Routray, Sandeep Uttamchandani
2008 NOMS 2008 - 2008 IEEE Network Operations and Management Symposium  
Third, it permits implementation of multiple chargeback policies that fit the organization goals and establishes relationship between the cost and the usage by different users and departments within an  ...  We discuss the prototype implementation of ChargeView and show how it has been used for managing complex systems and storage networks.  ...  for reducing costs.  ... 
doi:10.1109/noms.2008.4575157 dblp:conf/noms/AgarwalaRU08 fatcat:ndvzp2ziwjed5copcqaupqowji

A Study on Recent Trends on Cloud Computing and AttributeBased Datastorage Concepts

Dr. P. Julia Grace, Kousalya Kousalya
2017 International Journal of Engineering Research and Applications  
In this paper, we have studied the recent trends in cloud computing and implemented the concepts -ciphertext-policy attribute based encryption (CP-ABE) scheme with efficient user revocation for cloud storage  ...  To guarantee better security, attribute based encryption (ABE) was proposed and used in cloud storage system already.  ...  Cost Savings: Businesses and organizations can often reduce annual operating costs by using cloud storage; cloud storage costs about 3 cents per gigabyte to store data internally.  ... 
doi:10.9790/9622-0707060104 fatcat:as6tuxspnbe4bpguzpmhihopka

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Jeevitha B., Thriveni J., Venugopal K.
2016 International Journal of Computer Applications  
It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy  ...  Data Storage is main feature that cloud data centres are provided to the companies/organizations to preserve huge data.  ...  CONCLUSION Cloud computing gives many advantages like storage security, increase storage space and reduce storage cost and decreases overheads on cloud, users.  ... 
doi:10.5120/ijca2016912513 fatcat:y2hdci4lkrhkpfwbnykkibvhqi

Analysis of Performance for NAND Flash Based SSDs via Using Host Semantic Information

Jaeho KIM, Jung Kyu PARK
2017 IEICE transactions on information and systems  
The use of flash memory based storage devices is rapidly increasing, and user demands for high performance are also constantly increasing.  ...  Various studies have been conducted to lower the cost of cleaning operations.  ...  In order to minimize cleaning cost, many researches such as hot/cold data classification policies [1] , [2] and buffer management policy [3] through pattern analysis of I/O requests have been conducted  ... 
doi:10.1587/transinf.2017edl8056 fatcat:eekhfbhfx5ghxiqahz4bg3ytcq

A Secure Access Policies Based Data Deduplication System

Mr. S. P. Maniraj
2018 International Journal for Research in Applied Science and Engineering Technology  
Each such copy can be defined based on user access policies, the user will upload the file with access policies and then file type question with answer.  ...  Then same file with different access policies to set the particular file to replace the reference. Applying deduplication to user data to save maintenance cost in HDFS storage system.  ...  Users will access information according to their needs and most users access same information again and again, the cost of computation, application hosting, content storage and delivery is reduced significantly.A  ... 
doi:10.22214/ijraset.2018.4356 fatcat:ft3r7bykivc23e5tdurzfsijea

A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage

S. Nandhini Devi, Mr. S. Rajarajan
2019 Zenodo  
, quality based information partaking, encrypted data sharing and mutual influence Based Privacy Preserving verification set of rules for right to use manage of outsourced information.  ...  The information holder outsources their data in the cloud due to cost lessening and the huge amenities provided by cloud services.  ...  CONCLUSION Common temp key is shared to reduce the information leakage from cloud storage in big data.  ... 
doi:10.5281/zenodo.3589450 fatcat:lvvwajplavacxpp527nlxxcmr4

Study and Implementation of Simple Storage Service on Cloud

Deepinder Kaur
2019 International Journal of Advanced Trends in Computer Science and Engineering  
With traditional computing, the end user needs to purchase server space, has limited access to the storage, and data centers are located locally.  ...  Cloud computing is rapidly growing technology that provides a safer way of storing and sharing information.  ...  Security Rule -Bucket Policy and IAM Policy Bucket Policy Bucket policy is an AWS Identity and Access Management resource-based policy.  ... 
doi:10.30534/ijatcse/2019/4081.62019 fatcat:bj6xd77y4fcctpzbqjlmbnax54

Enhancing Security in Cloud Computing for Third Party Auditor by Self-destruction Mechanism

Muzammil H. Mohammed
2014 Research Journal of Applied Sciences Engineering and Technology  
The main aim study in cloud computing system, large amount of data can be maintained in the cloud storage system and it can be used for application based services for client.  ...  The cloud loaded data can be viewed by authorized user and copy of data can be in tag based data placed in TPA and data privacy can be affected in TPA system.  ...  It is used to reduce the computational cost (Zhang and Feng, 2008) .  ... 
doi:10.19026/rjaset.8.980 fatcat:gnepjduyvfaxpmpppgefo7ggoi
« Previous Showing results 1 — 15 out of 91,881 results