Skip to main content

Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Abstract

With the rapid growth of cloud storage center, the cumulative volume of data reaches EB and even ZB from PB. As a result, both network size and the number of storage nodes continue to grow explosively, while the data failure rate is still increasing. Cloud storage centers encode the raw data into erasure codes, to save the system overhead as much as possible meanwhile guarantee the reliability of data. However, the state-of-art erasure codes techniques still rely on a conventional centralized model which results in unaffordable encoding/decoding cost, and thus cannot adapt to the data-intensive processing requirements for distributed cloud storage environments. In the paper, the preservation mechanism of combining erasure code and copy backup is proposed, to improve the reliability of electronic records in cloud storage. This paper focuses on the erasure code archiving of electronic documents and puts forward the ability aware erasure code filing of electronic documents. Moreover, the corresponding implementation algorithm and steps are described.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Xie, L., Wang, J., Ma, L.: Trusting records: findings of team Asia InterPARES. Arch. Sci. Study 2017(4), 8–13 (2017)

    Google Scholar 

  2. Qian, Y.: Study on the long-term preservation standard of trusted electronic records in China. Arch. Sci. Bull. 2014(3), 75–79 (2014)

    Google Scholar 

  3. Ren, Y., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317–323 (2015)

    Google Scholar 

  4. He, D., Kumar, N., Wang, H., Wang, L., Choo, K.: Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314(12), 31–43 (2017)

    MathSciNet  Google Scholar 

  5. Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)

    Article  Google Scholar 

  6. Shen, J., Zhou, T., Chen, X., Li, J., Susilo, W.: Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forensics Secur. (2017). https://doi.org/10.1109/TIFS.2017.2774439

    Article  Google Scholar 

  7. Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12(8), 1874–1884 (2017)

    Article  Google Scholar 

  8. Wei, F., Zhang, R., Ma, C.: A provably secure anonymous two-factor authenticated key exchange protocol for cloud computing. Fundam. Inf. 157(1–2), 201–220 (2018)

    Article  MathSciNet  Google Scholar 

  9. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A., Kim, C.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. Netw. Comput. Appl. 103, 194–204 (2018)

    Article  Google Scholar 

  10. Chao, L.: Research on electronic record migration model in cloud computing environment. Arch. Sci. Bull. 2013(1), 53–56 (2013)

    Google Scholar 

  11. Ren, Y., Shen, J., Liu, D., Wang, J., Kim, J.: Evidential quality preserving of electronic record in cloud storage. J. Internet Technol. 17(6), 1125–1132 (2016)

    Google Scholar 

  12. Fu, Z., Wu, X., Guan, C., Sun, X., Ren, K.: Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans. Inf. Forensics Secur. 11(12), 2706–2716 (2016)

    Article  Google Scholar 

  13. Jiang, H., Fan, M., Wang, X.: Low complexity array codes for random triple failures in distributed storage system. J. Converg. Inf. Technol. 7(23), 247–250 (2012)

    Google Scholar 

  14. Xia, M., Saxena, M., Blaum, M.: A tale of two erasure codes in HDFS. FAST 2015, 213–226 (2015)

    Google Scholar 

  15. Huang, J., Liang, X., Qin, X.: PUSH: a pipeline reconstruction I/O for erasure-coded storage clusters. IEEE Trans. Parallel Distrib. Syst. 26(2), 516–526 (2015)

    Article  Google Scholar 

  16. Huang, J., Zhang, F., Qin, X.: Exploiting redundancies and deferred writes to conserve energy in erasure-coded storage clusters. ACM Trans. Storage 9(2), 1–29 (2013)

    Article  Google Scholar 

  17. Wang, Y., Zhao, Y., Hou, F.: Minimum bandwidth regeneration code of distributed storage system. J. Chin. Comput. Syst. 33(8), 1710–1714 (2012)

    Google Scholar 

  18. Hao, J., Lu, Y., Liu, X., Xia, S.: Survey for regenerating codes for distributed storage. J. Chongqing Univ. Posts Telecommun. (Nat. Sci. Ed.) 25(1), 30–38 (2013)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the NSFC (No. 61772280 and 61702236), Jiangsu Province Natural Science Research Program (BK20130809, BK2012461), the Project of six personnel in Jiangsu Province (2013-WLW-012), the research fund from Jiangsu Technology & Engineering Center of Meteorological Sensor Network in NUIST under Grant (No. KDXG1301), the Changzhou Sci&Tech Program (No. CJ20179027), and the PAPD fund from NUIST. Prof. Xiaorui Zhang is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongjun Ren .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ren, Y., Zhou, L., Liu, Y., Zhang, X. (2018). Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics