• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xu Guangwei, Shi Chunhong, Feng Xiangyang, Luo Xin, Shi Xiujin, Han Songhua, Li Wei. Multi-Replica Cloud Data Storage Based on Hierarchical Network Coding[J]. Journal of Computer Research and Development, 2021, 58(2): 293-304. DOI: 10.7544/issn1000-1239.2021.20200340
Citation: Xu Guangwei, Shi Chunhong, Feng Xiangyang, Luo Xin, Shi Xiujin, Han Songhua, Li Wei. Multi-Replica Cloud Data Storage Based on Hierarchical Network Coding[J]. Journal of Computer Research and Development, 2021, 58(2): 293-304. DOI: 10.7544/issn1000-1239.2021.20200340

Multi-Replica Cloud Data Storage Based on Hierarchical Network Coding

Funds: This work was supported by the National Natural Science Foundation of China (61772018, 61772128), the Natural Science Foundation of Shanghai (19ZR1402000, 17ZR1400200), and the Shanghai Education and Scientific Research Project (C160076).
More Information
  • Published Date: January 31, 2021
  • The rapid development of cloud data storage presents a high demand on the availability of stored data. Currently, the main technique of ensuring data availability is to use erasure coding to calculate coded blocks for the stored data, and then utilize distributed storage to store multiple redundant coded blocks in cloud storage space. Although this data coding technology can ensure the security of stored data and reduce extra storage space, it also causes a large calculation and communication overhead when recovering corrupted data. In this paper a multi-replica generation and corrupted data recovery algorithm is proposed based on hierarchical network coding. The algorithm improves the coding matrix of erasure coding based on hierarchical network coding to form the hierarchical coding (HC). Then multi-replicas which are built based on the cascade of the hierarchical coding forms the coding relationship between each other. In the process of corrupted data recovery, the data encoding information provided by the data owner and the complete data blocks stored by the cloud server are jointly computed to recover the corrupted data blocks, avoiding remote data downloading from the cloud storage space. Theoretical analysis and simulation experiments indicate that the proposed algorithm reduces the communication overhead significantly when recovering corrupted data and improves the availability of stored data under the same storage space.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Huang Zhenjie, Lin Zhiwei. Efficient and Secure Attribute-Based Signatures for General Circuits[J]. Journal of Computer Research and Development, 2023, 60(2): 351-361. DOI: 10.7544/issn1000-1239.202110920
    [3]Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye. Lattice-Based Forward Secure and Certificateless Signature Scheme[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524. DOI: 10.7544/issn1000-1239.2017.20160427
    [4]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [5]Gu Ke, Jia Weijia, Li Chaoliang, Chen Rongyuan. Identity-Based Group Proxy Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(7): 1370-1386.
    [6]Gu Ke, Jia Weijia, Jiang Chunlin. A Group Proxy Signature Scheme Based on Sub-Secret Evolution[J]. Journal of Computer Research and Development, 2012, 49(5): 962-973.
    [7]Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505.
    [8]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [9]Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321.
    [10]Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.
  • Cited by

    Periodical cited type(2)

    1. 武永强,刘正刚. 基于决策树的工业通信网全链路数据异常检测方法. 电子设计工程. 2024(09): 138-141+146 .
    2. 樊娜,李思瑞,邹小敏,高艺丰. 面向VNDN的兴趣包洪泛攻击检测. 计算机系统应用. 2022(12): 41-50 .

    Other cited types(6)

Catalog

    Article views (796) PDF downloads (430) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return