Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.12.569

A Study on Data Storage and Recovery in Hadoop Environment  

Kim, Su-Hyun (순천향대학교 컴퓨터학과)
Lee, Im-Yeong (순천향대학교 컴퓨터학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.12, 2013 , pp. 569-576 More about this Journal
Abstract
Cloud computing has been receiving increasing attention recently. Despite this attention, security is the main problem that still needs to be addressed for cloud computing. In general, a cloud computing environment protects data by using distributed servers for data storage. When the amount of data is too high, however, different pieces of a secret key (if used) may be divided among hundreds of distributed servers. Thus, the management of a distributed server may be very difficult simply in terms of its authentication, encryption, and decryption processes, which incur vast overheads. In this paper, we proposed a efficiently data storage and recovery scheme using XOR and RAID in Hadoop environment.
Keywords
HDFS; Distributed Server; XOR; RAID;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Stephen E. Arnold, "The Google Legacy," infonortics, 2005
2 Sanjay Ghemawat , Howard Gobioff , Shun-Tak Leung, "The Google file system," ACM SIGOPS Operating Systems Review, Vol.37 No.5, December, 2003.
3 Who uses Hadoop, http://wiki.apache.org/hadoop/PoweredBy
4 Apache Hadoop, 2009, http://hadoop.apache.org/
5 N. Zhang, J. Jing, and P. Liu, "CLOUD SHREDDER: Removing the laptop on-road data disclosure threat in the cloud computing era," in Proc. IEEE Int. Conf. Security and Privacy Comput. Commun., pp.16-18, Changsha, China, Nov., 2011.
6 Raghu Rmakrishnan, "Sherpa: Cloud Computing of the Third Kind," Data- Intensive Computing Symposium, 2008.
7 Minsu Park, Singhoon Kang and Seungjoo Kim. "Weakness and Improvement of Cloud Shredder." THE JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY, 38(5), pp.401-409, 2013.   과학기술학회마을   DOI   ScienceOn
8 D. Hubbard and M. Sutton, "Top threats to cloud computing," in Cloud Security Alliance, Mar., 2010.
9 Su-Hyun, In-Sik Hong, Im-Yeong Lee, "Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment", CISC-S'12, 23(1), pp.49-52, 2013.
10 Su-Hyun, Im-Yeong Lee, "High-Performance Data Recovery Scheme based on RAID-5 for Distributed Storage Server in Cloud Computing", Proceedings of the conference on Korea Multimedia Society, 16(1), pp.54-57, 2013.
11 Understanding RAID-5 & I/O Processors, eslim. Jun 2003. April 2013