Journal on Communications ›› 2018, Vol. 39 ›› Issue (4): 21-34.doi: 10.11959/j.issn.1000-436x.2018066
• Papers • Previous Articles Next Articles
Yue CHEN1,Longjiang WANG1,2(),Xincheng YAN1,Xinyue ZHANG1
Revised:
2018-01-27
Online:
2018-04-01
Published:
2018-04-29
Supported by:
CLC Number:
Yue CHEN,Longjiang WANG,Xincheng YAN,Xinyue ZHANG. Mimic storage scheme based on regenerated code[J]. Journal on Communications, 2018, 39(4): 21-34.
[1] | PALANKAR M R , IAMNITCHI A , RIPEANU M ,et al. Amazon S3 for science grids:a viable solution?[C]// The 2008 International Workshop on Data-aware Distributed Computing. 2008: 55-64. |
[2] | CALDER B , WANG J , OGUS A ,et al. Windows azure storage:a highly available cloud storage service with strong consistency[C]// The Twenty-Third ACM Symposium on Operating Systems Principles. 2011: 143-157. |
[3] | MCKUSICK K , QUINLAN S . GFS:evolution on fast-forward[J]. Communications of the ACM, 2010,53(3): 42-49. |
[4] | SHVACHKO K , KUANG H , RADIA S ,et al. The Hadoop distributed file system[C]// MASS Storage Systems and Technologies. 2010: 1-10. |
[5] | 罗象宏, 舒继武 . 存储系统中的纠删码研究综述[J]. 计算机研究与发展, 2012,49(1): 1-11. |
LUO X H , SHU J W . Summary of research for erasure code in storage system[J]. Journal of Computer Research and Development, 2012,49(1): 1-11. | |
[6] | 邬江兴 . 网络空间拟态安全防御[J]. 保密科学技术, 2014(10): 4-10. |
WU J X . Cyber minic security defense[J]. Secrecy Science and Technology, 2014(10): 4-10. | |
[7] | 邬江兴, 张帆, 罗兴国 ,等. 拟态计算与拟态安全防御[J]. 计算机学会通讯, 2015,11(1): 8-14. |
WU J X , ZHANG F , LUO X G ,et al. The meaning and vision of minic computing and minic security defense[J]. Communications of CCF, 2015,11(1): 8-14. | |
[8] | 邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10. |
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10. | |
[9] | 罗兴国, 仝青, 张铮 ,等. 拟态防御技术[J]. 中国工程科学, 2016,18(6): 69-73. |
LUO X G , TONG Q , ZHANG Z ,et al. Mimic defense technology[J]. Engineering Sciences, 2016,18(6): 69-73. | |
[10] | 斯雪明, 王伟, 曾俊杰 ,等. 拟态防御基础理论研究综述[J]. 中国工程科学, 2016,18(6): 62-68. |
SI X M , WANG W , ZENG J J ,et al. A review of the basic theory of mimic defense[J]. Engineering Sciences, 2016,18(6): 62-68. | |
[11] | 庞建民, 张宇嘉, 张铮 ,等. 拟态防御技术结合软件多样化在软件安全产业中的应用[J]. 中国工程科学, 2016,18(6): 74-78. |
PANG J M , ZHANG Y J , ZHANG Z ,et al. Applying a combination of mimic defense and software diversity in the software security industry[J]. Engineering Sciences, 2016,18(6): 74-78. | |
[12] | 邬江兴 . 专题导读—拟态计算与拟态安全防御的原意和愿景[J]. 电信科学, 2014,30(7): 1-7. |
WU J X . Meaning and vision of mimic computing and mimic security defense[J]. Telecommunications Science, 2014,30(7): 1-7. | |
[13] | 吴春明 . 动态网络主动安全防御的若干思考[J]. 中兴通讯技术, 2016(1): 34-37. |
WU C M . Proactive security defense of dynamic network[J]. ZTE Technology Journal, 2016(1): 34-37. | |
[14] | 仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897. |
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897. | |
[15] | 张铮, 马博林, 邬江兴 . Web 服务器拟态防御原理验证系统测试与分析[J]. 信息安全学报, 2017,2(1): 13-28. |
ZHANG Z , MA B L , WU J X . The test and analysis of prototype of mimic defense in web servers[J]. Journal of Cyber Security, 2017,2(1): 13-28. | |
[16] | HU Y , LEE P P C , SHUM K W . Analysis and construction of functional regenerating codes with uncoded repair for distributed storage systems[C]// IEEE INFOCOM. 2012: 2355-2363. |
[17] | TRACEY H , MURIEL M . On randomized network coding[C]// The Annual Allerton Conference on Communication Control and Computing. 2003(3): 11-20. |
[18] | MOSHKOVITZ D . An alternative proof of the schwartz-zippel lemma[J]. Electronic Colloquium on Computational Complexity, 2010,17. |
[19] | PLANK J . S.Jerasure:a libraryin C/C++ facilitating erasure coding for storage applications-version 1.2,UT-CS-08-627[R]. Department of Computer Science,University of Tennessee, 2008. |
[1] | Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU. Design, implementation and formal verification of BGP proxy for mimic router [J]. Journal on Communications, 2023, 44(3): 33-44. |
[2] | Ke LAI, Jing LEI, Wei LIU, Lei WEN. HARQ scheme for sparse code multiple access based on network coding [J]. Journal on Communications, 2022, 43(9): 57-69. |
[3] | Guanxiong HA, Qiaowen JIA, Hang CHEN, Chunfu JIA. Data popularity-based encrypted deduplication scheme without third-party servers [J]. Journal on Communications, 2022, 43(8): 17-29. |
[4] | Dacheng ZHOU, Hongchang CHEN, Guozhen CHENG, Weizhen HE, Ke SHANG, Hongchao HU. Design and implementation of adaptive mimic voting device oriented to persistent connection [J]. Journal on Communications, 2022, 43(6): 71-84. |
[5] | Hongyong JIA, Yunfei PAN, Wenhe LIU, Junjie ZENG, Jianhui ZHANG. Executive dynamic scheduling algorithm based on high-order heterogeneity [J]. Journal on Communications, 2022, 43(3): 233-245. |
[6] | Junyi YANG, Bo LI, Qinyu ZHANG. Resource optimization for UAV relay networks based on physical-layer network coding [J]. Journal on Communications, 2021, 42(9): 12-20. |
[7] | Guangjun LIU, Wangmei GUO, Jinbo XIONG, Ximeng LIU, Changyu DONG. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage [J]. Journal on Communications, 2021, 42(7): 220-230. |
[8] | Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG. Research progress of mimic multi-execution scheduling algorithm [J]. Journal on Communications, 2021, 42(5): 179-190. |
[9] | Jun YIN, Xueqi SHA, Lei WANG, Dengyin ZHANG, Yuwang YANG. Research on linear solvability of network coding based cooperative recovery scheme [J]. Journal on Communications, 2021, 42(5): 216-229. |
[10] | Ting WU, Chengnan HU, Qingnan CHEN, Anbang CHEN, Qiuhua ZHENG. Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition [J]. Journal on Communications, 2021, 42(3): 122-134. |
[11] | Tao FENG, Fanqi KONG, Chunyan LIU, Rong MA, Albettar Maher. Dual verifiable cloud storage scheme based on blockchain [J]. Journal on Communications, 2021, 42(12): 192-201. |
[12] | Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI. AONT-and-NTRU-based rekeying scheme for encrypted deduplication [J]. Journal on Communications, 2021, 42(10): 67-80. |
[13] | Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI. Method against process control-flow hijacking based on mimic defense [J]. Journal on Communications, 2021, 42(1): 37-47. |
[14] | Baoxing PU,Zhiyi MO. Construction method of double unicast network coding [J]. Journal on Communications, 2020, 41(9): 92-103. |
[15] | Shaohu DING,Ning QI,Yiwei GUO. Evaluation of mimic defense strategy based on M-FlipIt game model [J]. Journal on Communications, 2020, 41(7): 186-194. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|