Skip to main content
Log in

Rio: a personal storage system in multi-device and cloud

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

A Correction to this article was published on 12 May 2020

This article has been updated

Abstract

With the era of big data coming, whether in computer operating system or mobile operating system, the shortcomings of traditional way of file management become increasingly obvious. For example, data access and data retrieval across devices are very inconvenient. At the same time, storage space in disks and cloud storage services is underutilized. To address these issues, we propose Rio, a personal storage system in multi-device and cloud storage. Cloud storage services, treated as one storage device in Rio, together with shared devices form a storage pool. In Rio, users can store, retrieve and access data through RESTful URI, no matter in which device or cloud services data are stored. Rio also sets up redundant storage in idle space to improve disk storage utilization. In the experiment, we compared Rio with U disk, FTP, Dropbox and other common data sharing methods. Then we tested Rio’s data access performance and system overhead. The results show that Rio increases the accessibility of data greatly and only costs small system overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Change history

  • 12 May 2020

    Dr. Feng Wang���s second affiliation is missing in the original article. Both affiliations are given here.

References

  1. Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787–2805

    Article  Google Scholar 

  2. Botta A, De Donato W, Persico V, Pescap A (2016) Integration of cloud computing and internet of things: a survey. Future Gener Comput Syst 56:684–700

    Article  Google Scholar 

  3. https://github.com/bilelmoussaoui/nautilus-git

  4. https://github.com/linuxmint/nemo

  5. Jones CE, Sivalingam KM, Agrawal P, Chen JC (2001) A survey of energy efficient network protocols for wireless networks. Wirel Netw 7(4):343–358

    Article  Google Scholar 

  6. Dimakis AG, Ramchandran K, Wu Y, Suh C (2011) A survey on network codes for distributed storage. Proc IEEE 99(3):476–489

    Article  Google Scholar 

  7. Schroeder MD (1984) Network file systems. AT&T Tech. J, 63

  8. Lua EK, Crowcroft J, Pias M, Sharma R, Lim S (2005) A survey and comparison of peer-to-peer overlay network schemes. IEEE Commun Surv Tutor 7(2):72–93

    Article  Google Scholar 

  9. http://fortune.com/2016/03/07/dropbox-half-a-billion-users/

  10. Walter C (2005) Kryder’s law. Sci Am 293(2):32–33

    Article  MathSciNet  Google Scholar 

  11. https://zapier.com/blog/organize-files-folders/

  12. Rosenberg J (2010) Interactive connectivity establishment (ICE): a protocol for network address translator (NAT) traversal for offer/answer protocols (No. RFC 5245)

  13. Zheng Z, Sangaiah AK, Wang T (2018) Adaptive communication protocols in flying ad hoc network. IEEE Commun Mag 56(1):136–142

    Article  Google Scholar 

  14. Lin Y, Wang C, Wang J, Dou Z (2016) A novel dynamic spectrum access framework based on reinforcement learning for cognitive radio sensor networks. Sensors 16(10):1675

    Article  Google Scholar 

  15. Love R (2005) Kernel korner: intro to inotify. Linux J 2005(139):8

    Google Scholar 

  16. Cooperstein J, Richter J (1999) Keeping an eye on your NTFS drives: the Windows 2000 Change Journal explained. Microsoft Syst J US Ed 14:17–30

    Google Scholar 

  17. https://www.dropbox.com

  18. https://developers.google.com/drive/api/v2/reference/changes/list

  19. Bettstetter C, Renner C (2000) A comparison of service discovery protocols and implementation of the service location protocol. In: Proceedings of the 6th EUNICE Open European Summer School: Innovative Internet Applications. Twente Netherlands

  20. Akinsiku A, Jadav D (2016) BeaSmart: a beacon enabled smarter workplace. In: Network Operations and Management Symposium (NOMS), 2016 IEEE/IFIP. IEEE, pp 1269–1272

  21. https://nodejs.org

  22. Rescorla E (2000) Http over tls

  23. https://www.npmjs.com/package/node-sspi

  24. https://www.npmjs.com/package/authenticate-pam

  25. https://www.npmjs.com/package/node-ssdp

  26. https://expressjs.com/

  27. Gackenheimer C (2013) Using the file system. In: Node. js Recipes. Apress, Berkeley, pp 51–80

  28. Elonen J, Togias K (2007) NanoHTTPD

  29. https://developer.android.com/reference/android/os/FileObserver

  30. Bellovin S (1994) Firewall-friendly FTP (No. RFC 1579)

  31. https://ipmsg.org/index.html

  32. https://im.qq.com/

  33. Hitz D, Lau J, Malcolm MA (1994) File System Design for an NFS File Server Appliance. In: USENIX winter, vol 94

  34. https://docs.oracle.com/cd/E23824_01/html/821-1448/zfsover-1.html

  35. Mashtizadeh AJ, Bittau A, Huang YF, Mazieres D (2013) Replication, history, and grafting in the ori file system. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles. ACM, pp 151–166

  36. Benet J (2014) IPFS-content addressed, versioned, P2P file system. ArXiv preprint arXiv:1407.3561

  37. Li R Distributed Hash Table

  38. Loeliger J, McCullough M (2012) Version Control with Git: powerful tools and techniques for collaborative software development. O’Reilly Media, Inc., Sebastopol

    Google Scholar 

  39. Mazires D, Kaminsky M, Kaashoek MF, Witchel E (2000) Separating key management from file system security. ACM SIGOPS Oper Syst Rev 34(2):19–20

    Article  Google Scholar 

  40. Lee Y, Song J, Won Y (2018) Improving personal information detection using OCR feature recognition rate. J Supercomput 1–12

  41. Xu Z, Wu L, He D, Khan MK (2017) Security analysis of a publicly verifiable data possession scheme for remote storage. J Supercomput 73(11):4923–4930

    Article  Google Scholar 

  42. Shen J, Zou D, Jin H, Yuan B, Dai W (2015) A domain-divided configurable security model for cloud computing-based telecommunication services. J Supercomput 1–14. Chicago

  43. Rizvi S, Ryoo J, Kissell J, Aiken W, Liu Y (2017) A security evaluation framework for cloud security auditing. J Supercomput 1–23

  44. Bai C, Shi B, Liu F, Sarkis J (2018) Banking credit worthiness: evaluating the complex relationships. Omega

  45. Yang G, Zhang Y, Yang J et al (2016) Automated classification of brain images using wavelet-energy and biogeography-based optimization. Multimed Tools Appl 75(23):15601–15617

    Article  Google Scholar 

  46. Shi B, Meng B, Yang H, Wang J, Shi W (2018) A novel approach for reducing attributes and its application to small enterprise financing ability evaluation. Complexity

  47. Feng L, Shengbin W, Yuan H, Xiaohang Y (2017) On the robust and stable flowshop scheduling under stochastic and dynamic disruptions. IEEE Trans Eng Manag 4(64):539–553

    Google Scholar 

  48. Wang X, Choi TM, Liu H et al (2016) Novel ant colony optimization methods for simplifying solution construction in vehicle routing problems. IEEE Trans Intell Transp Syst 17(11):3132–3141

    Article  Google Scholar 

  49. Wang X, Choi TM, Liu H et al (2018) A novel hybrid ant colony optimization algorithm for emergency transportation problems during post-disaster scenarios. IEEE Trans Syst Man Cybern Syst 48(4):545–556

    Article  Google Scholar 

  50. Chung JY, Joe-Wong C, Ha S, Hong JW, Chiang M (2015) Cyrus: towards client-defined cloud storage. In: Proceedings of the tenth European Conference on Computer Systems 2015 Apr 17. ACM, p 17

  51. https://google.github.io/physical-web/

Download references

Acknowledgements

This project was supported by National Key Technology Research and Development Program of the Ministry of Science and Technology of China (Grant No. 2017YFB0801902).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, F., Wu, Y. & Huang, F. Rio: a personal storage system in multi-device and cloud. J Supercomput 76, 2315–2338 (2020). https://doi.org/10.1007/s11227-018-2501-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-018-2501-8

Keywords

Navigation