2019
DOI: 10.1007/978-3-030-34914-1_45
|View full text |Cite
|
Sign up to set email alerts
|

A Data Preparation Approach for Cloud Storage Based on Containerized Parallel Patterns

Abstract: In this paper, we present the design, implementation, and evaluation of an efficient data preparation and retrieval approach for cloud storage. The approach includes a deduplication subsystem that indexes the hash of each content to identify duplicated data. As a consequence, avoiding duplicated content reduces reprocessing time during uploads and other costs related to outsource data management tasks. Our proposed data preparation scheme enables organizations to add properties such as security, reliability, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…On the scope of the management of NFRs the main proposals have been focused on security and reliability requirements. End-to-end processing schemes have been proposed to mitigate the lack of control over the data in outsourced environments [85]- [87]. In this type of scheme, data are preprocessed before sending them to the cloud by applying techniques such as encryption to reduce security issues [39], [88], [89], and reliability schemes based on coding and redundancy to face outages [47]- [49], [90] or failures in the cloud [44], [91].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…On the scope of the management of NFRs the main proposals have been focused on security and reliability requirements. End-to-end processing schemes have been proposed to mitigate the lack of control over the data in outsourced environments [85]- [87]. In this type of scheme, data are preprocessed before sending them to the cloud by applying techniques such as encryption to reduce security issues [39], [88], [89], and reliability schemes based on coding and redundancy to face outages [47]- [49], [90] or failures in the cloud [44], [91].…”
Section: Related Workmentioning
confidence: 99%
“…These structures allow users to create different processing structures that can be deployed on any combination of edge, fog, or cloud. Also, continuity schemes [85] simultaneously enforce the continuous delivery of data in each stage of a processing structure and to fulfilling the NFRs for data processed by the blocks of the processing structures.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [10] [11] [12], there is a set of solutions for building efficient and flexible end-to-end cloud storage. Information integrity is preserved based on the IDA implementation embedded in parallel processing patterns.…”
Section: Related Workmentioning
confidence: 99%
“…In these types of infrastructures (any combination of edge, fog, or cloud), the virtual containers ( ) are key to deploy services on each infrastructure [ 11 , 12 , 13 ]. These services provide dataflows from the IoT to the cloud that produce different types of data and information, which proves to be key for organizations to conduct critical decision-making processes [ 14 , 15 , 16 ].…”
Section: Introductionmentioning
confidence: 99%