2013 IEEE 37th Annual Computer Software and Applications Conference Workshops 2013
DOI: 10.1109/compsacw.2013.125
|View full text |Cite
|
Sign up to set email alerts
|

A File-Distribution Approach to Achieve High Availability and Confidentiality for Data Storage on Multi-cloud

Abstract: Cloud services are rapidly increasing. We usually use only one cloud service. However, today costs of using cloud service become lower, so we can use multiple cloud services simultaneously. In these environments, there appear possibilities to improve confidentiality and availability by using multiple hetero cloud services. Based on a "secret sharing scheme," a new approach to attain extremely high confidentiality and high availability at reasonable cost is proposed. With this approach, multiple optimal clouds … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…They proposed a heuristic model for c configuration for efficient use. Furthe distribution approach using a secret shari proposed and evaluated in a homo-multi-cl [12]. A data management approach in this also proposed [13].…”
Section: Related Workmentioning
confidence: 98%
See 3 more Smart Citations
“…They proposed a heuristic model for c configuration for efficient use. Furthe distribution approach using a secret shari proposed and evaluated in a homo-multi-cl [12]. A data management approach in this also proposed [13].…”
Section: Related Workmentioning
confidence: 98%
“…We explained an evaluation in previous work [12] using some of the metrics in a homogeneous-clouds environment. This paper presents an evaluation in a heterogeneous-clouds environment, which is opposite to the homogeneous-clouds environment.…”
Section: Analysis and Evaluationmentioning
confidence: 99%
See 2 more Smart Citations
“…Avoidance of the over-selection of certain volumes is done using the AN T ESELECT ED queue (line [12][13][14]: once a virtual volume is selected, it is queued in AN T ESELECT ED; a storage volume can be a candidate of a selection only if it has not been used recently in previous selections; when AN T ESELECT ED queue contains all the utilized volumes in storing the file, the queue is emptied. The V UT ILIZAT ION queue manages the set of utilized volumes that stores all chunks of a file (line [15][16][17]: if a selected volume has not been previously utilized in storing the file chunk it is queued in V UT ILIZAT ION; k v is the number of utilized volumes in storing the chunks of a single file. After the destination storage volume has been identified the chunk is sent on the storage provided by the public cloud vendor and the transaction is logged in the Chunk Distribution Dictionary residing on the private cloud infrastructure.…”
Section: B the Chunk Distribution Strategymentioning
confidence: 99%