• 제목/요약/키워드: Data storage

검색결과 4,528건 처리시간 0.038초

강우-유출 자료에 의한 Clark 모형의 저류상수 결정 (Determination of the Storage Constant for the Clark Model by based on the Observed Rainfall-Runoff Data)

  • 안태진;최광훈
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2007년도 학술발표회 논문집
    • /
    • pp.1454-1458
    • /
    • 2007
  • The determination of feasible design flood is the most important to control flood damage in river management. Model parameters should be calibrated using observed discharge but due to deficiency of observed data the parameters have been adopted by engineer's empirical sense. Storage constant in the Clark unit hydrograph method mainly affects magnitude of peak flood. This study is to estimate the storage constant based on the observed rainfall-runoff data at the three stage stations in the Imjin river basin and the three stage stations in the Ansung river basin. In this study four methods have been proposed to estimate the storage constant from observed rainfall-runoff data. The HEC-HMS model has been adopted to execute the sensitivity of storage constant. A criteria has been proposed to determine storage constant based on the results of the observed hydrograph and the HEC-HMS model.

  • PDF

Light-weight Preservation of Access Pattern Privacy in Un-trusted Storage

  • Yang, Ka;Zhang, Jinsheng;Zhang, Wensheng;Qiao, Daji
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제2권5호
    • /
    • pp.282-296
    • /
    • 2013
  • With the emergence of cloud computing, more and more sensitive user data are outsourced to remote storage servers. The privacy of users' access pattern to the data should be protected to prevent un-trusted storage servers from inferring users' private information or launching stealthy attacks. Meanwhile, the privacy protection schemes should be efficient as cloud users often use thin client devices to access the data. In this paper, we propose a lightweight scheme to protect the privacy of data access pattern. Comparing with existing state-of-the-art solutions, our scheme incurs less communication and computational overhead, requires significantly less storage space at the user side, while consuming similar storage space at the server. Rigorous proofs and extensive evaluations have been conducted to show that the proposed scheme can hide the data access pattern effectively in the long run after a reasonable number of accesses have been made.

  • PDF

모바일 클라우드 스토리지 서비스에서의 데이터 보안을 위한 데이터 접근 제어 및 보안 키 관리 기법 (A Method for Data Access Control and Key Management in Mobile Cloud Storage Services)

  • 신재복;김윤구;박우람;박찬익
    • 대한임베디드공학회논문지
    • /
    • 제8권6호
    • /
    • pp.303-309
    • /
    • 2013
  • Cloud storage services are used for efficient sharing or synchronizing of user's data across multiple mobile devices. Although cloud storages provide flexibility and scalability in storing data, security issues should be handled. Currently, typical cloud storage services offer data encryption for security purpose but we think such method is not secure enough because managing encryption keys by software and identifying users by simple ID and password are main defectives of current cloud storage services. We propose a secure data access method to cloud storage in mobile environment. Our framework supports hardware-based key management, attestation on the client software integrity, and secure key sharing across the multiple devices. We implemented our prototype using ARM TrustZone and TPM Emulator which is running on secure world of the TrustZone environment.

홀로그래픽 정보 저장장치에서의 간섭 비율 마스크를 이용한 인접 픽셀 간섭의 개선을 위한 연구 (Inter Pixel Interference Reduction using Interference Ratio Mask for Holographic Data Storage)

  • 이재성;임성용;김낙영;김도형;박경수;박노철;양현석;박영필
    • 정보저장시스템학회논문집
    • /
    • 제7권1호
    • /
    • pp.42-46
    • /
    • 2011
  • Holographic Data Storage System (HDSS), one of the next generation data storage devices, is a 2-dimensional page oriented memory system using volume hologram. HDSS has many noise sources such as crosstalk, scattering and inter pixel interference, etc. The noise source is changing intensity of the light used for carrying the data signal in HDSS. The inter pixel interference results in decrease of Signal to Noise Ratio and increase of Bit Error Rate. In order to improve these problems, this paper proposes to compensate the inter pixel interference with simple interference mask.

홀로그래픽 저장장치용 5/8변조 부호의 어긋남 특성 (Characteristics of 5/8 Modulation Code of Misalignments for Holographic Data Storage)

  • 김진영;이재진
    • 정보저장시스템학회논문집
    • /
    • 제6권2호
    • /
    • pp.47-51
    • /
    • 2010
  • We investigate misalignment characteristics of 5/8 modulation code for holographic data storage. The 5/8 modulation code does not have any isolated patterns that is the most unwanted problem for holographic data storage. As the results, the 5/8 modulation code showed a strong side of misalignments, and the code has the best performance among uncoded, 5/9, and 6/8 modulation codes when there are large misalignments.

네트워크 컴퓨팅 기술을 활용한 확장 가능형 빅데이터 스토리지 시스템 개발 (Development of scalable big data storage system using network computing technology)

  • 박정규;박은영
    • 한국정보통신학회논문지
    • /
    • 제23권11호
    • /
    • pp.1330-1336
    • /
    • 2019
  • 4차 혁명시대가 시작됨에 따라 다양한 장비들이 클라우드 기반으로 동작하고 있다. 이와 기기들은 다양한 형태의 데이터 또는 대용량의 멀티미디어 데이터를 계속 생성하고 있다. 이런 상황을 처리하기 위해서는 대용량의 저장장치가 필요하며 또한 저장된 데이터를 처리하고 정확한 정보를 얻기 위해서 빅데이터 기술이 필요하다. 일반적으로 네트워크 환경에서 대용량의 저장장치를 구축하기 위해서는 SAN 또는 NAS 기술이 사용된다. 본 논문에서는 DAS(Direct Attached Storage)의 확장기술인 Network-DAS를 사용하여 대용량 저장장치를 구성하는 방안을 제시한다. 논문에서 제시하는 스토리지 시스템의 확장성과 성능을 검증하기 위해 76개의 하드 디스크를 이용하여 벤치마크 실험을 수행하였다. 실험 결과 제안하는 고성능 대용량 스토리지 시스템의 확장성과 신뢰성을 검증하였다.

Ferroelectric ultra high-density data storage based on scanning nonlinear dielectric microscopy

  • Cho, Ya-Suo;Odagawa, Nozomi;Tanaka, Kenkou;Hiranaga, Yoshiomi
    • 정보저장시스템학회논문집
    • /
    • 제3권2호
    • /
    • pp.94-112
    • /
    • 2007
  • Nano-sized inverted domain dots in ferroelectric materials have potential application in ultrahigh-density rewritable data storage systems. Herein, a data storage system is presented based on scanning non-linear dielectric microscopy and a thin film of ferroelectric single-crystal lithium tantalite. Through domain engineering, we succeeded to form an smallest artificial nano-domain single dot of 5.1 nm in diameter and artificial nano-domain dot-array with a memory density of 10.1 Tbit/$inch^2$ and a bit spacing of 8.0 nm, representing the highest memory density for rewritable data storage reported to date. Sub-nanosecond (500psec) domain switching speed also has been achieved. Next, long term retention characteristic of data with inverted domain dots is investigated by conducting heat treatment test. Obtained life time of inverted dot with the radius of 50nm was 16.9 years at $80^{\circ}C$. Finally, actual information storage with low bit error and high memory density was performed. A bit error ratio of less than $1\times10^{-4}$ was achieved at an areal density of 258 Gbit/inch2. Moreover, actual information storage is demonstrated at a density of 1 Tbit/$inch^2$.

  • PDF

큐잉 네트워크 모델을 적용한 저장용량 분석 시뮬레이션 (Simulation of Storage Capacity Analysis with Queuing Network Models)

  • 김용수
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.221-228
    • /
    • 2005
  • 데이터 저장장치는 서버의 내부나 근처에 있는 것으로 인식되어 왔으나 네트워크 기술의 발달로 저장장치 시스템은 주 전산기와 원거리에 떨어져 존재할 수 있게 되었다. 인터넷 시대에 데이터 량의 폭발적인 증가는 데이터를 저장하는 시스템과 이를 전송하는 시스템의 균형 있는 발전을 요구하고 있으며 SAN(Storage Area Network)이나 NAS(Network Attached Storage)은 이러한 요구를 반영하고 있다. 저장장치로부터 최적의 성능을 도출하기 위해서 복잡한 저장 네트워크의 용량과 한계를 파악하는 것이 중요하다. 파악된 데이터는 성능 조율의 기초가 되고 저장장치의 구매 시점을 결정하는데 사용될 수도 있다. 본 논문에서는 저장 네트워크 시스템의 큐잉 네트워크를 통한 분석적 모델을 제시한 다음, 이의 시뮬레이션하여 분석적 모델이 정당하다는 것을 입증한다.

  • PDF

A Rapid Locating Protocol of Corrupted Data for Cloud Data Storage

  • Xu, Guangwei;Yang, Yanbin;Yan, Cairong;Gan, Yanglan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권10호
    • /
    • pp.4703-4723
    • /
    • 2016
  • The verification of data integrity is an urgent topic in remote data storage environments with the wide deployment of cloud data storage services. Many traditional verification algorithms focus on the block-oriented verification to resolve the dispute of dynamic data integrity between the data owners and the storage service providers. However, these algorithms scarcely pay attention to the data verification charge and the users' verification experience. The users more concern about the availability of accessed files rather than data blocks. Moreover, the data verification charge limits the number of checked data in each verification. Therefore, we propose a mixed verification protocol to verify the data integrity, which rapidly locates the corrupted files by the file-oriented verification, and then identifies the corrupted blocks in these files by the block-oriented verification. Theoretical analysis and simulation results demonstrate that the protocol reduces the cost of the metadata computation and transmission relative to the traditional block-oriented verification at the expense of little cost of additional file-oriented metadata computation and storage at the data owner. Both the opportunity of data extracted and the scope of suspicious data are optimized to improve the verification efficiency under the same verification cost.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권6호
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.