Journal on Communications ›› 2017, Vol. 38 ›› Issue (3): 154-164.doi: 10.11959/j.issn.1000-436x.2017045
• Correspondences • Previous Articles Next Articles
Long-jiang WANG,Yue CHEN,Xin-cheng YAN,Kai-xiang HUANG
Revised:
2016-10-25
Online:
2017-03-01
Published:
2017-04-13
Supported by:
CLC Number:
Long-jiang WANG,Yue CHEN,Xin-cheng YAN,Kai-xiang HUANG. Differential data update scheme on network-coding-based cloud storage system[J]. Journal on Communications, 2017, 38(3): 154-164.
[1] | HASHEM I A T , YAQOOB I , ANUAR N B ,et al. The rise of “big data” on cloud computing:review and open research issues[J]. Information Systems, 2014,47(47): 98-115. |
[2] | JIEHUI J U , JIYI W U , JIANQING F U ,et al. A survey on cloud storage[J]. Journal of Computers, 2011,6(8): 1764-1771. |
[3] | Amazon . What is Amazon S3?[J]. Amazon Simple Storage Service Developer Guide, 2006. |
[4] | LI H . Introducing windows azure[J]. David Chappell & Associates White Paper, 2010. |
[5] | ZAKERINASAB M R , WANG M . DeltaNC:efficient file updates for network-coding-based cloud storage systems[C]// IEEE International Symposium on Modelling,Analysis & Simulation of Computer and Telecommunication Systems. 2013: 360-364. |
[6] | HU Y , LEE P P C , SHUM K W . Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems[C]// IEEE INFOCOM. 2012: 2355-2363. |
[7] | 罗象宏, 舒继武 . 存储系统中的纠删码研究综述[J]. 计算机研究与发展, 2012,49(1): 1-11. |
LUO X H , SHU J W . Summary of research for erasure code in storage system[J]. Journal of Computer Research and Development, 2012,49(1): 1-11. | |
[8] | LI J , LI B . Erasure coding for cloud storage systems:a survey[J]. Tsinghua Science & Technology, 2013,18(3): 259-272. |
[9] | RASHMI K V , SHAH N B , GU D ,et al. A solution to the network challenges of data recovery in erasure-coded distributed storage systems:a study on the facebook warehouse cluster[J]. Usenix Hotstorage, 2013:8. |
[10] | REED I S , SOLOMON G . Polynomial codes over certain finite fields[J]. Journal of the Society for Industrial & Applied Mathematics, 1960,8(2): 300-304. |
[11] | PLANK , JAMES S . A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems[J]. Software—practice & Experience, 1996,27(9): 995-1012. |
[12] | DIMAKIS A G , GODFREY P B , WU Y ,et al. Network coding for distributed storage systems[J]. IEEE Transactions on Information Theory, 2007,56(9): 2000-2008. |
[13] | BLOMER J , KALFANE M , KARP R ,et al. An XOR-based erasure-resilient coding scheme[C]// Proc Acm Sigcomm. 1999. |
[14] | BLAUM M , BRADY J , BRUCK J ,et al. EVENODD:an efficient scheme for tolerating double disk failures in RAID architectures[J]. IEEE Transactions on Computers, 1995,44(2): 192-202. |
[15] | CORBETT P , ENGLISH B , GOEL A ,et al. Row-diagonal parity for double disk failure correction[C]// 3rd USENIX Symposium on File and Storage Technologies (FAST'04), 2014: 1-14. |
[16] | GHEMAWAT S , GOBIOFF H , LEUNG S T . The Google file system[J]. ACM Sigops Operating Systems Review, 2003,37(5): 29-43. |
[17] | DHRUBA B . HDFS architecture guide[Z]. Hadoop, 2008. |
[18] | AHLSWEDE R , CAI N , LI S Y R ,et al. Network information flow[J]. Fundamenta Informaticae, 2006,72(1-3): 167-180. |
[19] | GKANTSIDIS C , RODRIGUEZ P R . Network coding for large scale content distribution[C]// Infocom,Joint Conference of the IEEE Computer & Communications Societies. 2005: 2235-2245. |
[20] | DIMAKIS A G , GODFREY P B , WAINWRIGHT M J ,et al. Network coding for distributed storage systems[C]// IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications. 2007: 2000-2008. |
[21] | DIMAKIS A G , GODFREY P B , WU Y ,et al. Network coding for distributed storage systems[J]. IEEE Transactions on Information Theory, 2010,56(9): 4539-4551. |
[22] | HU Y , YU C M , LI Y K ,et al. NCFS:on the practicality and extensibility of a network-coding-based distributed file system[C]// International Symposium on Network Coding. 2011: 1-6. |
[23] | RASHMI K V , SHAH N B , KUMAR P V . Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction[J]. IEEE Transactions on Information Theory, 2011,57(57): 5227-5239. |
[24] | RASHMI K V , SHAH N B , KUMAR P V ,et al. Explicit construction of optimal exact regenerating codes for distributed storage[C]// 47th Annual Allerton Conference on Communication,Control,and Computing, 2009: 1243-1249. |
[25] | CHEN H C H , HU Y , LEE P P C ,et al. NCCloud:a network-codingbased storage system in a cloud-of-clouds[J]. IEEE Transactions on Computers, 2014,63(1): 31-44. |
[26] | CHESTERFIELD J , RODRIGUEZ P . DeltaCast:efficient file reconciliation in wireless broadcast systems[C]// International Conference on Mobile Systems,Applications,and Services. 2005: 93-106. |
[27] | IRMAK U , MIHAYLOV S , SUEL T . Improved single-round protocols for remote file synchronization[J]. Proceedings-IEEE INFOCOM, 2005,3: 1665-1676. |
[28] | MOHAMMAD R Z , WANG M . An update model for network coding in cloud storage systems[C]// Communication,Control,and Computing. 2012: 1158-1165. |
[29] | ZHANG M , NEMAT A B , BLISS D E . Galois field multiplication system and method:US,US7526518[P]. 2009. |
[30] | RATH N , SZEREDI M ,et al. FUSE[DB]. 2009-10-15. |
[1] | Ke LAI, Jing LEI, Wei LIU, Lei WEN. HARQ scheme for sparse code multiple access based on network coding [J]. Journal on Communications, 2022, 43(9): 57-69. |
[2] | Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA. Data popularity-based encrypted deduplication scheme without third-party servers [J]. Journal on Communications, 2022, 43(8): 17-29. |
[3] | Junyi YANG, Bo LI, Qinyu ZHANG. Resource optimization for UAV relay networks based on physical-layer network coding [J]. Journal on Communications, 2021, 42(9): 12-20. |
[4] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[5] | Jun YIN, Xueqi SHA, Lei WANG, Dengyin ZHANG, Yuwang YANG. Research on linear solvability of network coding based cooperative recovery scheme [J]. Journal on Communications, 2021, 42(5): 216-229. |
[6] | Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher. Dual verifiable cloud storage scheme based on blockchain [J]. Journal on Communications, 2021, 42(12): 192-201. |
[7] | Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI. AONT-and-NTRU-based rekeying scheme for encrypted deduplication [J]. Journal on Communications, 2021, 42(10): 67-80. |
[8] | Baoxing PU,Zhiyi MO. Construction method of double unicast network coding [J]. Journal on Communications, 2020, 41(9): 92-103. |
[9] | Junfeng TIAN,Yanbiao WANG,Xinfeng HE,Juntao ZHANG,Wanhe YANG,Ya’nan PANG. Survey on the causal consistency of data [J]. Journal on Communications, 2020, 41(3): 154-167. |
[10] | Wenlong KE,Yong WANG,Miao YE,Junqi CHEN. Priority differentiated multicast flow scheduling method in Ceph cloud storage network [J]. Journal on Communications, 2020, 41(11): 40-51. |
[11] | Lei SUN,Zhiyuan ZHAO,Jianhua WANG,Zhiqiang ZHU. Attribute-based encryption scheme supporting attribute revocation in cloud storage environment [J]. Journal on Communications, 2019, 40(5): 47-56. |
[12] | Xiangsong ZHANG,Chen LI,Zhenhua LIU. Key-exposure resilient integrity auditing scheme with encrypted data deduplication [J]. Journal on Communications, 2019, 40(4): 95-106. |
[13] | Miaomiao TIAN,Chuang GAO,Jie CHEN. Identity-based cloud storage integrity checking from lattices [J]. Journal on Communications, 2019, 40(4): 128-139. |
[14] | Junfeng TIAN,Mengjia CHAI,Liuling QI. Provable data possession scheme based on public verification and private verification [J]. Journal on Communications, 2019, 40(3): 48-59. |
[15] | Huifang YU,Wen LI. Homomorphic signature schemes for single-source and multi-source network coding [J]. Journal on Communications, 2019, 40(11): 112-121. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|