|
›› 2013,Vol. 28 ›› Issue (6): 1012-1024.doi: 10.1007/s11390-013-1394-5
所属专题: Data Management and Data Mining
• Special Section on Selected Paper from NPC 2011 • 上一篇 下一篇
Yin-Jin Fu1 (付印金), Nong Xiao1, * (肖侬), Member, IEEE, Xiang-Ke Liao2 (廖湘科), Member, IEEE, and Fang Liu1 (刘芳), Member, CCF
Yin-Jin Fu1 (付印金), Nong Xiao1, * (肖侬), Member, IEEE, Xiang-Ke Liao2 (廖湘科), Member, IEEE, and Fang Liu1 (刘芳), Member, CCF
随着个人计算设备存放越来越多的重要信息,针对个人数据的云备份正变得越来越重要。客户端在数据传输前采用数据缩减技术,如重复数据删除、Delta编码和LZ压缩等,消除数据冗余能够有效地节省网络带宽和降低云存储空间。然而,在云备份服务中进行客户端数据缩减将面临缩减效率和数据隐私方面的挑战。本文通过开发个人数据中的应用感知提出了一种安全高效的云备份服务Pangolin。它在客户端使用应用感知的数据缩减技术来加速备份操作,同时将选择加密集成到数据缩减中来保证敏感应用数据的安全性,以降低数据安全风险。最后,对比传统的云备份服务,基于原型实现验证了本文提出的新机制能够将备份窗口缩减到原来的33%~75%,并且敏感应用的安全机制对备份窗口大小的影响可以忽略不计。
[1] Armbrust M, Fox A, Griffith R, Joseph A D, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M. A view of cloud computing. Communications of the ACM, 2010, 53(4): 50-58.[2] Biggar H. Experiencing data de-duplication: Improving efficiency and reducing capacity requirements. White Paper, the Enterprise Strategy Group, Feb. 2007. www.abtechsystems. com/files/pdfs/WP001 04.pdf, Dec. 2012.[3] Ponemon L. The cost of a lost laptop. White Paper, Ponemon Institute, Apr. 2009. http://communities.intel.com/docs/DOC-3076, Dec. 2012.[4] Storer M W, Greenan K, Long D D, Miller E L. Secure data deduplication. In Proc. the 4th StorageSS, Oct. 2008, pp.110.[5] Harnik D, Pinkas B, Shulman-Peleg A. Side channels in cloud services: Deduplication in cloud storage. IEEE Security & Privacy, 2010, 8(6): 40-47.[6] Halevi S, Harnik D, Pinkas B, Shulman-Peleg A. Proofs of ownership in remote storage systems. In Proc. the 18th CCS, Oct. 2011, pp.491-500.[7] Blelloch G E. Introduction to data compression. Technical Report, Computer Science Department, Carnegie Mellon University, Oct. 2001. http://www.cs.cmu.edu/afs/cs/project/pscico-guyb/realworld/www/compression.pdf, Oct. 2013.[8] Douglis F, Iyengar A. Application-specific delta-encoding via resemblance detection. In Proc. the USENIX ATC, Jun. 2003, pp.113-126.[9] Shilane P, Huang M, Wallace G, Hsu W. WAN optimized replication of backup datasets using stream-informed delta compression. ACM Transactions on Storage, 2012, 8(4): Article No. 13.[10] Zhu B, Li K, Patterson H. Avoiding the disk bottleneck in the data domain deduplication file system. In Proc. the 6th FAST, Feb. 2008, pp.269-282.[11] Bois L D, Amatruda R. Backup and recovery: Accelerating efficiency and driving down IT costs using data deduplication. Technical Report, EMC Corporation, Feb. 2010.[12] Shilane P, Wallace G, Huang M, Hsu W. Delta compressed and deduplicated storage using stream-informed locality. In Proc. the 4th HotStorage, June 2012, Article No. 10.[13] Maximizing data efficiency: Benefits of global deduplication. White Paper, NEC, June 2009. http://www.knowledgestorm.com/sol summary 5136573.asp, Dec. 2013.[14] Anderson P, Zhang L. Fast and secure laptop backups with encrypted de-duplication. In Proc. the 24th LISA, Dec. 2010, Article No. 3.[15] Lillibridge M, Eshghi K, Bhagwat D, Deolalikar V, Trezise G, Camble P. Sparse indexing: Large scale, inline deduplication using sampling and locality. In Proc. the 7th FAST, Feb. 2009, pp.111-123.[16] Meister D, Brinkmann A. Multi-level comparison of data deduplication in a backup scenario. In Proc. the SYSTOR, May 2009, Article No. 8.[17] Agrawal N, Bolosky W J, Douceur J R, Lorch J R. A five-year study of file-system metadata. In Proc. the 5th FAST, Feb. 2007, pp.31-45.[18] Bhagwat D, Eshghi K, Long D D, Lillibridge M. Extreme binning: Scalable, parallel deduplication for chunk based file backup. In Proc. the 17th MASCOTS, Sept. 2009, pp.1-9.[19] Tan Y, Jiang H, Feng D, Tian L, Yan Z, Zhou G. SAM: A semantic-aware multi-tiered source de-duplication framework for cloud backup. In Proc. the 39th ICPP, Sept. 2010, pp.614-623.[20] Vrable M, Savage S, Voelker G M. Cumulus: Filesystem backup to the cloud. In Proc. the 7th FAST, Feb. 2009, pp.225-238.[21] MacDonald J. File system support for delta compression[Master's Thesis]. Department of Electrical Engineering and Computer Science, University of California at Berkeley, 2000.[22] Asenjo J C. The advanced encryption standard | Implementation and transition to a new cryptographic benchmark. Network Security, 2002, 2002(7): 7-9.[23] Fu Y, Jiang H, Xiao N, Tian L, Liu F. AA-Dedupe: An application-aware source deduplication approach for cloud backup services in the personal computing environment. In Proc. the IEEE CLUSTER, Sept. 2011, pp.112-120. |
No related articles found! |
|
版权所有 © 《计算机科学技术学报》编辑部 本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn 总访问量: |