Abstract:
According to the security policy research in distributed data and information storage, considered from the data access patterns, this paper designs a system with new stor...Show MoreMetadata
Abstract:
According to the security policy research in distributed data and information storage, considered from the data access patterns, this paper designs a system with new storage model and query mechanism for distributed platform and big data. This system can provide data sharing integrity check, while giving a hot backup solution, to improve the safety and maintainability of the cluster, and take a viable option for data migration and recovery when the cluster fails.
Date of Conference: 12-14 March 2016
Date Added to IEEE Xplore: 14 July 2016
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Big Data ,
- Storage Systems ,
- Distributed Storage Systems ,
- Information Storage ,
- System Design ,
- Data File ,
- Data Storage ,
- Cloud Computing ,
- User Data ,
- Early Warning ,
- Design Stage ,
- Control Mode ,
- Fault-tolerant ,
- File System ,
- Encrypted Data ,
- Query Data ,
- Data Upload ,
- Logical Process ,
- Specific Storage ,
- Encryption And Decryption ,
- Small Files ,
- XML Format ,
- File Access ,
- Accessible Interface ,
- System Architecture ,
- User Access ,
- Availability Of Methods ,
- Decryption Algorithm ,
- Master Node
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Big Data ,
- Storage Systems ,
- Distributed Storage Systems ,
- Information Storage ,
- System Design ,
- Data File ,
- Data Storage ,
- Cloud Computing ,
- User Data ,
- Early Warning ,
- Design Stage ,
- Control Mode ,
- Fault-tolerant ,
- File System ,
- Encrypted Data ,
- Query Data ,
- Data Upload ,
- Logical Process ,
- Specific Storage ,
- Encryption And Decryption ,
- Small Files ,
- XML Format ,
- File Access ,
- Accessible Interface ,
- System Architecture ,
- User Access ,
- Availability Of Methods ,
- Decryption Algorithm ,
- Master Node
- Author Keywords