Skip to main content

Research on Multiple Network Disk Storage

  • Conference paper
  • First Online:
Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2020)

Abstract

With the continuous development of the Internet and the popularization of storage devices, network disk storage is increasingly favored by many enterprises and individual users due to its simplicity and convenience. At the same time, With the increase of data stored on the network disk, its data security and reliability also become an important issue. In the research of the secure storage system based on multi-network disk, we propose a block-based file encryption method and a block-based erasure code-based coding method to ensure the security and reliability of data stored in the network disk. Finally, the improved multi-cloud storage-based block erasure coding algorithm is experimentally tested and compared with related experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhou, A.Y.: Data intensive computing-challenges of data management techniques. Commun. CCF 5(7), 50–53 (2009)

    Google Scholar 

  2. Sun, X., Ansari, N.: Adaptive avatar handoff in the cloudlet network. IEEE Trans. Cloud Comput. 7(3), 664–676 (2019)

    Article  Google Scholar 

  3. Wang, Y., Wang, X.: Network Big Data: Present and Future. Chinese J. Compt. 36(06), 1125–1138 (2013)

    Google Scholar 

  4. Domingo-Ferrer, J., et al.: Steered microaggregation as a unified primitive to anonymize data sets and data streams. IEEE Trans. Inf. Forensics Secur. 14(12), 3298–3311 (2019)

    Article  Google Scholar 

  5. Chen, Y., et al.: A testing method of the residual information clearance in virtual machine for the cloud operating system, pp. 795–800 (2018)

    Google Scholar 

  6. Storer, M.W., et al.: Pergamum: replacing tape with energy efficient, reliable, disk-based archival storage (2008)

    Google Scholar 

  7. Wu, J., Ping, L., Ge, X.: Cloud storage as the infrastructure of cloud computing. In: 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), pp. 380–383. IEEE (2010)

    Google Scholar 

  8. Luo, Y., et al.: A RAMCloud storage system based on HDFS: architecture, implementation and evaluation. J. Syst. Softw. 86(3), 744–750 (2013)

    Article  Google Scholar 

  9. Jiao, Z., et al.: Transmission technique for huge-data in online storage system. J. Chin. Mini-Micro Comput. Syst. 35(02), 329–333 (2014)

    Google Scholar 

  10. Plank, J.S.: T1: erasure codes for storage applications. In: Proceedings of the 4th USENIX Conference on File and Storage Technologies, pp. 1–74 (2005)

    Google Scholar 

  11. Zhang, J., Guo, X., Fu, X.: AES, encryption algorithm analysis and the application in information security, NETINFO SECURITY, pp. 31–33. 2011(05)

    Google Scholar 

  12. Stevens, M., et al.: Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities. In: Proceedings of the 26th Annual International Conference on Advances in Cryptology, Barcelona, Spain, pp. 1–22. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72540-4_1

  13. Yang, Y., Deng, W., Deng, J.: System Architecture and Key Technology of Network Disk Based on Cloud Storage. Telecommun. Sci. 28(10), 31–33 (2012)

    Google Scholar 

  14. Ao, F., et al.: Designing algorithm on mining frequent patterns in data streams. Comput. Sci., 1–5 (2008)

    Google Scholar 

  15. Yu, G.: Key Technologies for Data Protection in Cloud Computing Environments, Tsinghua University (2014)

    Google Scholar 

  16. Kang, D.J., et al.: Design of system management architecture using remote storage, pp. 1087–1090 (2004)

    Google Scholar 

  17. Cho, H.: Concurrency control for read-only client transactions in broadcast disks. IEICE Trans. Commun. E86B(10), 3114–3122 (2003)

    Google Scholar 

Download references

Acknowledgment

The authors thank anonymous reviewers for their valuable comments. This research was supported in part by the Tianjin Natural Science Foundation (16JCYBJC15800) and the Fundamental Research Funds Nankai University(z1a2085588) for the Central Universities.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xudong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, D., Lu, Y., Li, X. (2021). Research on Multiple Network Disk Storage. In: Meng, H., Lei, T., Li, M., Li, K., Xiong, N., Wang, L. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 88. Springer, Cham. https://doi.org/10.1007/978-3-030-70665-4_75

Download citation

Publish with us

Policies and ethics