2023
DOI: 10.1109/tsc.2022.3152849
|View full text |Cite
|
Sign up to set email alerts
|

Cost-Effective Data Placement in Edge Storage Systems With Erasure Code

Abstract: Edge computing, as a new computing paradigm, brings cloud computing's computing and storage capacities to network edge for providing low latency services for users. The networked edge servers in a specific area constitute edge storage systems (ESSs), where popular data can be stored to serve the users in the area. The novel ESSs raise many new opportunities as well as unprecedented challenges. Most existing studies of ESSs focus on the storage of data replicas in the system to ensure low data retrieval latency… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…File data is segmented into multiple data chunks before being encoded to generate parity chunks in erasure-coded storage systems [25,26]. The data and parity chunks are then uniformly disseminated across various storage servers.…”
Section: Erasure Codingmentioning
confidence: 99%
“…File data is segmented into multiple data chunks before being encoded to generate parity chunks in erasure-coded storage systems [25,26]. The data and parity chunks are then uniformly disseminated across various storage servers.…”
Section: Erasure Codingmentioning
confidence: 99%
“…This is equivalent to Constraint (3), i.e., all the edge servers covered by data d i should still be covered after deduplication. Constraint (16) specifies the domains of η j and τ j i . It is the same as the constraint for binary variable r j i .…”
Section: E Problem Hardness Proofmentioning
confidence: 99%
“…Therefore, EDD aims to remove duplicate data at the file level rather than the chunk level. In addition, data retrieval between edge servers must not violate the latency constraint -an edge server can only retrieve data from edge servers within its latency limitation, i.e., their nearby edge servers in the ESS [1], [16], [17]. Thus, EDD must ensure that after data deduplication, all the users can still retrieve requested data under the latency constraint.…”
Section: Introductionmentioning
confidence: 99%
“…That is, to determine whether the transaction used for "payment" has been verified by the full node, and to be protected by how much computing power (how many confirmations). Due to the lack of complete transaction records, light nodes cannot verify that a transaction does not exist, and this vulnerability can easily lead to denial of service attacks and double-spending attacks [18]. In addition, light nodes need to randomly link multiple nodes, increasing the probability of connecting with at least one reliable node, but this random link requirement is also vulnerable to network partitioning and sybil attacks.…”
Section: Bitcoin Blockchain Storagementioning
confidence: 99%