Abstract
With the continuous development of the Internet and the popularization of storage devices, network disk storage is increasingly favored by many enterprises and individual users due to its simplicity and convenience. At the same time, With the increase of data stored on the network disk, its data security and reliability also become an important issue. In the research of the secure storage system based on multi-network disk, we propose a block-based file encryption method and a block-based erasure code-based coding method to ensure the security and reliability of data stored in the network disk. Finally, the improved multi-cloud storage-based block erasure coding algorithm is experimentally tested and compared with related experiments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhou, A.Y.: Data intensive computing-challenges of data management techniques. Commun. CCF 5(7), 50–53 (2009)
Sun, X., Ansari, N.: Adaptive avatar handoff in the cloudlet network. IEEE Trans. Cloud Comput. 7(3), 664–676 (2019)
Wang, Y., Wang, X.: Network Big Data: Present and Future. Chinese J. Compt. 36(06), 1125–1138 (2013)
Domingo-Ferrer, J., et al.: Steered microaggregation as a unified primitive to anonymize data sets and data streams. IEEE Trans. Inf. Forensics Secur. 14(12), 3298–3311 (2019)
Chen, Y., et al.: A testing method of the residual information clearance in virtual machine for the cloud operating system, pp. 795–800 (2018)
Storer, M.W., et al.: Pergamum: replacing tape with energy efficient, reliable, disk-based archival storage (2008)
Wu, J., Ping, L., Ge, X.: Cloud storage as the infrastructure of cloud computing. In: 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), pp. 380–383. IEEE (2010)
Luo, Y., et al.: A RAMCloud storage system based on HDFS: architecture, implementation and evaluation. J. Syst. Softw. 86(3), 744–750 (2013)
Jiao, Z., et al.: Transmission technique for huge-data in online storage system. J. Chin. Mini-Micro Comput. Syst. 35(02), 329–333 (2014)
Plank, J.S.: T1: erasure codes for storage applications. In: Proceedings of the 4th USENIX Conference on File and Storage Technologies, pp. 1–74 (2005)
Zhang, J., Guo, X., Fu, X.: AES, encryption algorithm analysis and the application in information security, NETINFO SECURITY, pp. 31–33. 2011(05)
Stevens, M., et al.: Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities. In: Proceedings of the 26th Annual International Conference on Advances in Cryptology, Barcelona, Spain, pp. 1–22. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72540-4_1
Yang, Y., Deng, W., Deng, J.: System Architecture and Key Technology of Network Disk Based on Cloud Storage. Telecommun. Sci. 28(10), 31–33 (2012)
Ao, F., et al.: Designing algorithm on mining frequent patterns in data streams. Comput. Sci., 1–5 (2008)
Yu, G.: Key Technologies for Data Protection in Cloud Computing Environments, Tsinghua University (2014)
Kang, D.J., et al.: Design of system management architecture using remote storage, pp. 1087–1090 (2004)
Cho, H.: Concurrency control for read-only client transactions in broadcast disks. IEICE Trans. Commun. E86B(10), 3114–3122 (2003)
Acknowledgment
The authors thank anonymous reviewers for their valuable comments. This research was supported in part by the Tianjin Natural Science Foundation (16JCYBJC15800) and the Fundamental Research Funds Nankai University(z1a2085588) for the Central Universities.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, D., Lu, Y., Li, X. (2021). Research on Multiple Network Disk Storage. In: Meng, H., Lei, T., Li, M., Li, K., Xiong, N., Wang, L. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 88. Springer, Cham. https://doi.org/10.1007/978-3-030-70665-4_75
Download citation
DOI: https://doi.org/10.1007/978-3-030-70665-4_75
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70664-7
Online ISBN: 978-3-030-70665-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)