2022
DOI: 10.1109/access.2022.3163729
|View full text |Cite
|
Sign up to set email alerts
|

Concurrent and Robust End-to-End Data Integrity Verification Scheme for Flash-Based Storage Devices

Abstract: The amount of data generated by scientific applications on high-performance computing systems is growing at an ever-increasing pace. Most of the generated data are transferred to storage in remote systems for various purposes such as backup, replication, or analysis. To detect data corruption caused by network or storage failures during data transfer, the receiver system verifies data integrity by comparing the checksum of the data. However, the internal operation of the storage device is not sufficiently inve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…fiber breakage, excessive bending, connectors or splice breakage [169,170]), receiver failure involving a malfunction of the receiver, such as a high data packet reception time [171,172] and data integrity that affect the integrity of the transferred data, degrading the accuracy and reliability of the transmission, and caused by alteration or loss of part of the transmitted data packet [173]. These last are, generally, recognized by the receiver using checksum [174]. The survey has highlighted that failures due to the support medium are more frequent than the other two types.…”
Section: Research Highlightsmentioning
confidence: 99%
“…fiber breakage, excessive bending, connectors or splice breakage [169,170]), receiver failure involving a malfunction of the receiver, such as a high data packet reception time [171,172] and data integrity that affect the integrity of the transferred data, degrading the accuracy and reliability of the transmission, and caused by alteration or loss of part of the transmitted data packet [173]. These last are, generally, recognized by the receiver using checksum [174]. The survey has highlighted that failures due to the support medium are more frequent than the other two types.…”
Section: Research Highlightsmentioning
confidence: 99%