Abstract
In cloud storage, the user’s data is no longer locally stored. So the key issue we are facing now is to ensure the reliability and validity of data storage. Due to this problem, erasure codes and token mechanism have been adopted, and then a fault-tolerant method named Ensure Codes token (ECT) has been designed to make sure the correctness of data and rapid position of errors. The result shows that this method can improve the reliability of data storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Chen, Y., Paxson, V., Katz, R.H.: What’s New About Cloud Computing Security? UCB/EECS (May 2010)
Sotto, L.J., Treacy, B.C., McLellan, M.L.: Privacy and Data Security Risks in Cloud Computing. Electronic Commerce & Law Report (February 2010)
Huang, X.: Based the HDFS cloud storage service system. Dalian Maritime University (2010)
Borthakur, D.: HDFS architecture. The Apache Software Foundation (2008)
Flag hearing data backup and recovery and security. China Railway Publishing House, Beijing (2008)
Ghemawat, S., Gobioff, H., Leung, S.-T.: The Google file system. In: Proc. of the 19th ACM SOSP, pp. 29–43. ACM Press, New York (2003)
Amazon Simple Storage Service (S3), http://www.amazon.com/s3
Jia, W., Chen, W.: Based on the information is scattered RS erasure code algorithm. Computer Applications (30), 3197–3200 (2010)
Plank, J.S., Ding, Y.: Note: Correction to the 1997 Tutorial on Reed-Solomon Coding. University of Tennessee. Tech. Rep. CS-03-504 (2003)
Niu, H.: Vandermonde determinant in the determinant calculation. Education Innovation Review (17) (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chen, D., Ping, X. (2013). Research on Data Fault Tolerance Mechanism Based on ECT in Cloud Storage. In: Wang, R., Xiao, F. (eds) Advances in Wireless Sensor Networks. CWSN 2012. Communications in Computer and Information Science, vol 334. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36252-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-36252-1_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36251-4
Online ISBN: 978-3-642-36252-1
eBook Packages: Computer ScienceComputer Science (R0)