Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (4): 1102-1108.DOI: 10.11772/j.issn.1001-9081.2022030477
Special Issue: 数据科学与技术
• Data science and technology • Previous Articles Next Articles
Received:
2022-04-14
Revised:
2022-07-01
Accepted:
2022-07-18
Online:
2023-01-11
Published:
2023-04-10
Contact:
Wei FU
About author:
XIE Zhenjie, born in 1995, M. S. candidate. His research interests include cloud storage, cloud security.
Supported by:
通讯作者:
付伟
作者简介:
谢振杰(1995—),男,湖南湘潭人,硕士研究生,主要研究方向:云存储、云安全;
基金资助:
CLC Number:
Zhenjie XIE, Wei FU. Error replica recovery mechanism for cloud storage based on auditable multiple replicas[J]. Journal of Computer Applications, 2023, 43(4): 1102-1108.
谢振杰, 付伟. 基于可审计多副本的云存储差错副本恢复机制[J]. 《计算机应用》唯一官方网站, 2023, 43(4): 1102-1108.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022030477
带宽/ (Mb·s-1) | m为1的通信开销/ms | m为25的通信开销/ms | m为400的通信开销/ms | m为6 400的通信开销/ms | ||||||
---|---|---|---|---|---|---|---|---|---|---|
p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | ||
1 | 1 392.4 | 760.2 | 444.1 | 4 000.0 | 3 600.0 | 3 400.0 | 51 600.0 | 51 400.0 | 51 300.0 | 819 200.0 |
10 | 1 277.2 | 645.0 | 328.9 | 1 120.0 | 720.0 | 520.0 | 5 520.0 | 5 320.0 | 5 220.0 | 81 920.0 |
100 | 1 265.7 | 633.5 | 317.4 | 832.0 | 432.0 | 232.0 | 912.0 | 712.0 | 612.0 | 8 192.0 |
1 000 | 1 264.5 | 632.3 | 316.2 | 803.2 | 403.2 | 203.2 | 451.2 | 251.2 | 151.2 | 819.2 |
Tab. 1 Communication overhead during error replica recovery
带宽/ (Mb·s-1) | m为1的通信开销/ms | m为25的通信开销/ms | m为400的通信开销/ms | m为6 400的通信开销/ms | ||||||
---|---|---|---|---|---|---|---|---|---|---|
p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | ||
1 | 1 392.4 | 760.2 | 444.1 | 4 000.0 | 3 600.0 | 3 400.0 | 51 600.0 | 51 400.0 | 51 300.0 | 819 200.0 |
10 | 1 277.2 | 645.0 | 328.9 | 1 120.0 | 720.0 | 520.0 | 5 520.0 | 5 320.0 | 5 220.0 | 81 920.0 |
100 | 1 265.7 | 633.5 | 317.4 | 832.0 | 432.0 | 232.0 | 912.0 | 712.0 | 612.0 | 8 192.0 |
1 000 | 1 264.5 | 632.3 | 316.2 | 803.2 | 403.2 | 203.2 | 451.2 | 251.2 | 151.2 | 819.2 |
带宽/ (Mb·s-1) | m为1的通信开销/ms | m为25的通信开销/ms | m为400的通信开销/ms | m为6 400的通信开销/ms | ||||||
---|---|---|---|---|---|---|---|---|---|---|
p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | ||
1 | 8 447.9 | 4 465.0 | 2 827.7 | 8 469.0 | 5 949.0 | 4 913.0 | 53 912.0 | 52 652.0 | 52 134.0 | 820 480.0 |
10 | 8 332.7 | 4 349.8 | 2 712.5 | 5 589.0 | 3 069.0 | 2 033.0 | 7 832.0 | 6 572.0 | 6 054.0 | 83 200.0 |
100 | 8 321.1 | 4 338.3 | 2 700.9 | 5 301.0 | 2 781.0 | 1 745.0 | 3 224.0 | 1 964.0 | 1 446.0 | 9 472.0 |
1 000 | 8 320.0 | 4 337.2 | 2 699.8 | 5 272.2 | 2 752.2 | 1 716.2 | 2 763.2 | 1 503.2 | 985.2 | 2 099.2 |
Tab. 2 Total time cost of error replica recovery
带宽/ (Mb·s-1) | m为1的通信开销/ms | m为25的通信开销/ms | m为400的通信开销/ms | m为6 400的通信开销/ms | ||||||
---|---|---|---|---|---|---|---|---|---|---|
p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | p=2 | p=4 | p=16 | ||
1 | 8 447.9 | 4 465.0 | 2 827.7 | 8 469.0 | 5 949.0 | 4 913.0 | 53 912.0 | 52 652.0 | 52 134.0 | 820 480.0 |
10 | 8 332.7 | 4 349.8 | 2 712.5 | 5 589.0 | 3 069.0 | 2 033.0 | 7 832.0 | 6 572.0 | 6 054.0 | 83 200.0 |
100 | 8 321.1 | 4 338.3 | 2 700.9 | 5 301.0 | 2 781.0 | 1 745.0 | 3 224.0 | 1 964.0 | 1 446.0 | 9 472.0 |
1 000 | 8 320.0 | 4 337.2 | 2 699.8 | 5 272.2 | 2 752.2 | 1 716.2 | 2 763.2 | 1 503.2 | 985.2 | 2 099.2 |
1 | JUELS A, KALISKI B S. PORs: proofs of retrievability for large files[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 584-597. 10.1145/1315245.1315317 |
2 | ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609. 10.1145/1315245.1315318 |
3 | ATENIESE G, BURNS R, CURTMOLA R, et al. Remote data checking using provable data possession[J]. ACM Transactions on Information and System Security, 2011, 14(1): No.12. 10.1145/1952982.1952994 |
4 | CURTMOLA R, KHAN O, BURNS R, et al. MR-PDP: multiple-replica provable data possession[C]// Proceedings of the 28th International Conference on Distributed Computing Systems. Piscataway: IEEE, 2008: 411-420. 10.1109/icdcs.2008.68 |
5 | 付艳艳,张敏,陈开渠,等. 面向云存储的多副本文件完整性验证方案[J]. 计算机研究与发展, 2014, 51(7): 1410-1416. |
FU Y Y, ZHANG M, CHEN K Q, et al. Proofs of data possession of multiple copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416. | |
6 | 田晖,陈羽翔,黄永峰,等. 基于Shamir秘密共享的云端多副本审计[J]. 华中科技大学学报(自然科学版), 2016, 44(3): 77-82. 10.13245/j.hust.160315 |
TIAN H, CHEN Y X, HUANG Y F, et al. Multiple-replica auditing in clouds using Shamir secret sharing[J]. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2016, 44(3): 77-82. 10.13245/j.hust.160315 | |
7 | 李昊宇,张龙军,李庆鹏. 云存储环境的多副本数据完整性验证方案[J]. 中国科技论文, 2017, 12(14): 1659-1663. 10.3969/j.issn.2095-2783.2017.14.017 |
LI H Y, ZHANG L J, LI Q P. Multiple-replica data integrity verification scheme in cloud storage environment[J]. China Sciencepaper, 2017, 12(14): 1659-1663. 10.3969/j.issn.2095-2783.2017.14.017 | |
8 | 边根庆,邵必林,蔡皖东,等. 云环境下支持数据动态更新的多副本数据完整性审计方法研究[J]. 信息网络安全, 2017(10): 22-28. 10.3969/j.issn.1671-1122.2017.10.004 |
BIAN G Q, SHAO B L, CAI W D, et al. Research on multiple-replica integrity auditing method on supporting data dynamic updating in cloud environment[J]. Netinfo Security, 2017(10): 22-28. 10.3969/j.issn.1671-1122.2017.10.004 | |
9 | 李敬伟,朱命冬. 云存储中基于MHT的动态数据完整性验证与恢复方案[J]. 计算机应用研究, 2019, 36(7): 2179-2183, 2194. |
LI J W, ZHU M D. Dynamic data integrity verification and recovery scheme in cloud storage based on MHT[J]. Application Research of Computers, 2019, 36(7): 2179-2183, 2194. | |
10 | 杜瑞忠,石朋亮,田俊峰. 基于DDCT表的多副本完整性审计方案[J]. 电子学报, 2020, 48(1): 164-171. 10.3969/j.issn.0372-2112.2020.01.020 |
DU R Z, SHI P L, TIAN J F. Multi-copy integrity audit scheme based on DDCT table[J]. Acta Electronica Sinica, 2020, 48(1): 164-171. 10.3969/j.issn.0372-2112.2020.01.020 | |
11 | 刘峰,赵俊峰. 基于区块链的云存储数据完整性验证方案[J]. 应用科学学报, 2021, 39(1): 164-173. 10.3969/j.issn.0255-8297.2021.01.014 |
LIU F, ZHAO J F. Cloud storage data integrity verification scheme based on blockchain[J]. Journal of Applied Sciences, 2021, 39(1): 164-173. 10.3969/j.issn.0255-8297.2021.01.014 | |
12 | FU W, XIE Z J, XU J Q. Verifying multiple replica possession with public key segment under public cloud storage environment[J]. Concurrency and Computation: Practice and Experience, 2022, 34(5): No.e6699. 10.1002/cpe.6699 |
13 | 白利芳,祝跃飞,芦斌. 云数据存储安全审计研究及进展[J]. 计算机科学, 2020, 47(10): 290-300. 10.11896/jsjkx.191000111 |
BAI L F, ZHU Y F, LU B. Research and development of data storage security audit in cloud[J]. Computer Science, 2020, 47(10): 290-300. 10.11896/jsjkx.191000111 | |
14 | 刘田甜,李超,胡庆成,等. 云环境下多副本管理综述[J]. 计算机研究与发展, 2011, 48(S3): 254-260. |
LIU T T, LI C, HU Q C, et al. Multiple-replicas management in the cloud environment[J]. Journal of Computer Research and Development, 2011, 48(S3): 254-260. | |
15 | 王岩,汪晋宽. 云存储中动态副本放置机制研究[J]. 计算机工程与科学, 2017, 39(9): 1581-1587. 10.3969/j.issn.1007-130X.2017.09.001 |
WANG Y, WANG J K. A dynamic replication placement mechanism in cloud storage[J]. Computer Engineering and Science, 2017, 39(9): 1581-1587. 10.3969/j.issn.1007-130X.2017.09.001 | |
16 | 吴修国. 云存储系统中基于动态规划的最小开销数据副本布局研究[J]. 计算机工程, 2017, 43(7): 29-37. 10.3969/j.issn.1000-3428.2017.07.005 |
WU X G. Research on minimum cost data replica distribution based on dynamic planning in cloud storage system[J]. Computer Engineering, 2017, 43(7): 29-37. 10.3969/j.issn.1000-3428.2017.07.005 | |
17 | 吴修国,刘翠. 云存储系统中最小开销的数据副本布局转换策略[J].计算机科学, 2019, 46(10): 202-208. 10.11896/jsjkx.180901623 |
WU X G, LIU C. Data replicas distribution transition strategy in cloud storage system[J]. Computer Science, 2019, 46(10): 202-208. 10.11896/jsjkx.180901623 | |
18 | 洪海诚,陈丹伟. 基于RBEC的副本动态存储方法[J]. 计算机科学, 2020, 47(2): 313-319. 10.11896/jsjkx.181102161 |
HONG H C, CHEN D W. Replica dynamic storage based on RBEC[J]. Computer Science, 2020, 47(2): 313-319. 10.11896/jsjkx.181102161 | |
19 | 陈兰香,许力. 云存储服务中可证明数据持有及恢复技术研究[J]. 计算机研究与发展, 2012, 49(S1): 19-25. |
CHEN L X, XU L. Research on provable data possession and recovery technology in cloud storage[J]. Journal of Computer Research and Development, 2012, 49(S1): 19-25. | |
20 | 林建清. 云存储环境下数据完整性检验和出错数据恢复技术研究[D]. 长沙:国防科学技术大学, 2011:37-49. |
LIN J Q. Research on data integrity detection and restoration technology in cloud storage system[D]. Changsha: National University of Defense Technology, 2011:37-49. | |
21 | 樊欲文. 云存储数据完整性检测与数据恢复研究[D]. 重庆:重庆大学, 2016:29-41. |
FAN Y W. Research on cloud data integrity verification and data recovery[D]. Chongqing: Chongqing University, 2016:29-41. | |
22 | 贺秦禄,边根庆,邵必林,等. 一种基于云存储系统的自适应数据碎片恢复优化方法[J]. 北京理工大学学报, 2018, 38(8): 841-847. |
HE Q L, BIAN G Q, SHAO B L, et al. An adaptive defragmentation restore optimization method based on cloud storage system[J]. Transactions of Beijing Institute of Technology, 2018, 38(8): 841-847. | |
23 | 任燕,唐春明. 可公开验证的属性基数据可恢复性证明方案[J]. 计算机应用研究, 2020, 37(2): 544-546. |
REN Y, TANG C M. Attribute-based proof of retrievability with public verifiability[J]. Application Research of Computers, 2020, 37(2): 544-546. | |
24 | 徐光伟,史春红,冯向阳,等. 基于多级网络编码的多副本云数据存储[J]. 计算机研究与发展, 2021, 58(2): 293-304. 10.7544/issn1000-1239.2021.20200340 |
XU G W, SHI C H, FENG X Y, et al. Multi-replica cloud data storage based on hierarchical network coding[J]. Journal of Computer Research and Development, 2021, 58(2): 293-304. 10.7544/issn1000-1239.2021.20200340 | |
25 | 沈刚,陈斌,毛明荣. 基于边缘云协同网络的数据存储容灾备份仿真[J]. 计算机仿真, 2021, 38(5): 380-383, 412. 10.3969/j.issn.1006-9348.2021.05.078 |
SHEN G, CHEN B, MAO M R. Data storage disaster recovery backup simulation based on edge cloud collaborative network[J]. Computer Simulation, 2021, 38(5): 380-383, 412. 10.3969/j.issn.1006-9348.2021.05.078 | |
26 | 徐鹏,孟宇龙,朱群,等. 信息知识库中的数据可用性恢复策略[J]. 国防科技大学学报, 2021, 43(6): 102-107, 134. 10.11887/j.cn.202106013 |
XU P, MENG Y L, ZHU Q, et al. Data availability recovery strategy in information knowledge base[J]. Journal of National University of Defense Technology, 2021, 43(6): 102-107, 134. 10.11887/j.cn.202106013 | |
27 | 卢学远,钱育蓉. 基于内存云的探索式数据恢复策略[J]. 计算机工程与设计, 2019, 40(1): 122-125, 196. |
LU X Y, QIAN Y R. Strategy for data exploring recovery in RAMCloud[J]. Computer Engineering and Design, 2019, 40(1): 122-125, 196. | |
28 | 卢学远,钱育蓉,英昌甜. 基于内存云的自适应数据恢复策略[J]. 东北师大学报(自然科学版), 2020, 52(4): 82-89. |
LU X Y, QIAN Y R, YING C T. The strategy for data self-adaptionrecovery in RAMCloud[J]. Journal of Northeast Normal University (Natural Science Edition), 2020, 52(4): 82-89. | |
29 | 李克成. 基于非对称碎片多云备份恢复系统的研究与实现[D]. 成都:电子科技大学, 2020:1-79. |
LI K C. Research and implementation of asymmetric fragmented multi-cloud backup and recovery system[D]. Chengdu: University of Electronic Science and Technology of China, 2020:1-79. | |
30 | 沈剑,周天祺,曹珍富. 云数据安全保护方法综述[J]. 计算机研究与发展, 2021, 58(10): 2079-2098. 10.7544/issn1000-1239.2021.20210805 |
SHEN J, ZHOU T Q, CAO Z F. Protection methods for cloud data security[J]. Journal of Computer Research and Development, 2021, 58(10): 2079-2098. 10.7544/issn1000-1239.2021.20210805 |
[1] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[2] | Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI. Overview of on-chain and off-chain consistency protection technologies [J]. Journal of Computer Applications, 2024, 44(12): 3658-3668. |
[3] | Xiang LIN, Biao JIN, Weijing YOU, Zhiqiang YAO, Jinbo XIONG. Model integrity verification framework of deep neural network based on fragile fingerprint [J]. Journal of Computer Applications, 2024, 44(11): 3479-3486. |
[4] | Wenshuai SONG, Miaolei DENG, Mimi MA, Haochen LI. Research progress in public-key encryption with keyword search [J]. Journal of Computer Applications, 2023, 43(3): 794-803. |
[5] | Wenyong YUAN, Xiuguang LI, Ruifeng LI, Zhengge YI, Xiaoyuan YANG. Trusted integrity verification scheme of cloud data without bilinear pairings [J]. Journal of Computer Applications, 2022, 42(12): 3769-3774. |
[6] | Jialiang DUAN, Guoming CAI, Kaiyong XU. Memory combined feature classification method based on multiple BP neural networks [J]. Journal of Computer Applications, 2022, 42(1): 178-182. |
[7] | QING Xinyi, CHEN Yuling, ZHOU Zhengqiang, TU Yuanchao, LI Tao. Blockchain storage expansion model based on Chinese remainder theorem [J]. Journal of Computer Applications, 2021, 41(7): 1977-1982. |
[8] | GAO Haoyu, LI Leixiao, LIN Hao, LI Jie, DENG Dan, LI Shaoxu. Research and application progress of blockchain in area of data integrity protection [J]. Journal of Computer Applications, 2021, 41(3): 745-755. |
[9] | LI Xiuyan, LIU Mingxi, SHI Wenbo, DONG Guofang. Efficient dynamic data audit scheme for resource-constrained users [J]. Journal of Computer Applications, 2021, 41(2): 422-432. |
[10] | TANG Xin, ZHOU Linna. Response obfuscation based secure deduplication method for cloud data with resistance against appending chunk attack [J]. Journal of Computer Applications, 2020, 40(4): 1085-1090. |
[11] | Wei FU, Chenyang GU, Qiang GAO. Multi-user sharing ORAM scheme based on attribute encryption [J]. Journal of Computer Applications, 2020, 40(2): 497-502. |
[12] | WANG Zhiheng, XU Yanyan. Design and implementation of fingerprint authentication terminal APP in mobile cloud environment based on TrustZone [J]. Journal of Computer Applications, 2020, 40(11): 3255-3260. |
[13] | ZHANG Hang, LIU Shanzheng, TANG Dan, CAI Hongliang. Erasure code with low recovery-overhead in distributed storage systems [J]. Journal of Computer Applications, 2020, 40(10): 2942-2950. |
[14] | WANG Haiyong, PENG Yao, GUO Kaixuan. CP-ABE access control scheme based on proxy re-encryption in cloud storage [J]. Journal of Computer Applications, 2019, 39(9): 2611-2616. |
[15] | LIU Yudong, WANG Xu'an, TU Guangsheng, WANG Han. Cloud outsourcing data secure auditing protocol throughout whole lifecycle [J]. Journal of Computer Applications, 2019, 39(7): 1954-1958. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||