• Title/Summary/Keyword: network storage

Search Result 1,087, Processing Time 0.026 seconds

Adaptive Deadline-aware Scheme (ADAS) for Data Migration between Cloud and Fog Layers

  • Khalid, Adnan;Shahbaz, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1002-1015
    • /
    • 2018
  • The advent of Internet of Things (IoT) and the evident inadequacy of Cloud networks concerning management of numerous end nodes have brought about a shift of paradigm giving birth to Fog computing. Fog computing is an extension of Cloud computing that extends Cloud resources at the edge of the network, closer to the user. Cloud computing has become one of the essential needs of people over the Internet but with the emerging concept of IoT, traditional Clouds seem inadequate. IoT entails extremely low latency and for that, the Cloud servers that are distant and unknown to the user appear to be unsuitable. With the help of Fog computing, the Fog devices installed would be closer to the user that will provide an immediate storage for the frequently needed data. This paper discusses data migration between different storage types especially between Cloud devices and then presents a mechanism to migrate data between Cloud and Fog Layer. We call this mechanism Adaptive Deadline-Aware Scheme (ADAS) for Data migration between Cloud and Fog. We will demonstrate that we can access and process latency sensitive "hot" data through the proposed ADAS more efficiently than with a traditional Cloud setup.

Evaluation of Dynamic Characteristics of Coarse Actuator and Design of a 2-Wire Fine Actuator for Small Form Factor ODD (초소형 광디스크 드라이브용 조동구동기의 동특성 평가 및 2-와이어 미세 구동기의 개발)

  • 박세준;이강녕;이동주;박노철;박영필
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.351-351
    • /
    • 2004
  • For greeting the era of ubiquitous network, data storage devices have been essentially attached to mobile data devices. As a result, the minimization of the storage device has arisen as major interests in the next generation data storage technology. So, there are many researches for the small form factor ODD. In this paper, we propose a pick up that consists of a linear VCM and 2-wire focusing actuator for a small form factor ODD. For the sake of checking performance of the coarse actuator, PID controller is designed. Experiment with controller and DSP board shows its propriety as a fine tracking actuator. And, 2-wire suspension actuator is designed in order to be contained in a coarse actuator and to satisfy the thickness of a PCMCIA type. Through the experiment of designed actuator, It verifies performance as a focusing actuator.

  • PDF

A Security-Enhanced Identity-Based Batch Provable Data Possession Scheme for Big Data Storage

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4576-4598
    • /
    • 2018
  • In big data age, flexible and affordable cloud storage service greatly enhances productivity for enterprises and individuals, but spontaneously has their outsourced data susceptible to integrity breaches. Provable Data Possession (PDP) as a critical technology, could enable data owners to efficiently verify cloud data integrity, without downloading entire copy. To address challenging integrity problem on multiple clouds for multiple owners, an identity-based batch PDP scheme was presented in ProvSec 2016, which attempted to eliminate public key certificate management issue and reduce computation overheads in a secure and batch method. In this paper, we firstly demonstrate this scheme is insecure so that any clouds who have outsourced data deleted or modified, could efficiently pass integrity verification, simply by utilizing two arbitrary block-tag pairs of one data owner. Specifically, malicious clouds are able to fabricate integrity proofs by 1) universally forging valid tags and 2) recovering data owners' private keys. Secondly, to enhance the security, we propose an improved scheme to withstand these attacks, and prove its security with CDH assumption under random oracle model. Finally, based on simulations and overheads analysis, our batch scheme demonstrates better efficiency compared to an identity based multi-cloud PDP with single owner effort.

Design of Korean Data Center for SDO

  • Choi, Seong-Hwan;Hwang, Eun-Mi;Cho, Kyung-Suk;Kim, Yeon-Han;Park, Young-Deuk;Moon, Yong-Jae
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.92.1-92.1
    • /
    • 2011
  • NASA launched Solar Dynamics Observatory (SDO) on February 2011 in order to understand the cause of solar activities and their influences on the Earth and the near-Earth space. KASI is constructing Korean Data Center for SDO based on the letter of agreement between KASI and NASA for space weather research. SDO produces about 1.5 TB a day and its raw data amounts to about 550 TB in a year. Stanford University has been already operating the data center for scientific raw data, but there is a limit to use its data for space weather research and space weather service in real time because of network environment. Korean Data Center for SDO will provide scientific data not only to Korean institutes but also to international space weather societies. KASI has designed the data transfer system by using GLORIAD in order to get higher performance and stability. After the first construction of data transfer system and storage system in this year, we will increase the storage capacity of the data center in phases considering new developments in a storage technology and drop of their prices.

  • PDF

Information Processing in Primate Retinal Ganglion

  • Je, Sung-Kwan;Cho, Jae-Hyun;Kim, Gwang-Baek
    • Journal of information and communication convergence engineering
    • /
    • v.2 no.2
    • /
    • pp.132-137
    • /
    • 2004
  • Most of the current computer vision theories are based on hypotheses that are difficult to apply to the real world, and they simply imitate a coarse form of the human visual system. As a result, they have not been showing satisfying results. In the human visual system, there is a mechanism that processes information due to memory degradation with time and limited storage space. Starting from research on the human visual system, this study analyzes a mechanism that processes input information when information is transferred from the retina to ganglion cells. In this study, a model for the characteristics of ganglion cells in the retina is proposed after considering the structure of the retina and the efficiency of storage space. The MNIST database of handwritten letters is used as data for this research, and ART2 and SOM as recognizers. The results of this study show that the proposed recognition model is not much different from the general recognition model in terms of recognition rate, but the efficiency of storage space can be improved by constructing a mechanism that processes input information.

Related-Key Differential Attacks on CHESS-64

  • Luo, Wei;Guo, Jiansheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3266-3285
    • /
    • 2014
  • With limited computing and storage resources, many network applications of encryption algorithms require low power devices and fast computing components. CHESS-64 is designed by employing simple key scheduling and Data-Dependent operations (DDO) as main cryptographic components. Hardware performance for Field Programmable Gate Arrays (FPGA) and for Application Specific Integrated Circuits (ASIC) proves that CHESS-64 is a very flexible and powerful new cipher. In this paper, the security of CHESS-64 block cipher under related-key differential cryptanalysis is studied. Based on the differential properties of DDOs, we construct two types of related-key differential characteristics with one-bit difference in the master key. To recover 74 bits key, two key recovery algorithms are proposed based on the two types of related-key differential characteristics, and the corresponding data complexity is about $2^{42.9}$ chosen-plaintexts, computing complexity is about $2^{42.9}$ CHESS-64 encryptions, storage complexity is about $2^{26.6}$ bits of storage resources. To break the cipher, an exhaustive attack is implemented to recover the rest 54 bits key. These works demonstrate an effective and general way to attack DDO-based ciphers.

Effect of Modified Starch on Microstructure and Sensory Characteristics of Fish Cake (변성전분이 동결 어묵의 미세구조와 관능적 특성에 미치는 영향)

  • Park, Jin Seok;An, Byoung Kyu;Lee, Woo Jin;Han, Hyeong Gu;In, Jung Jin;Shim, Kil Bo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.54 no.6
    • /
    • pp.861-868
    • /
    • 2021
  • To confirm the influence of modified starch on frozen storage stability, the microstructure and sensory characteristics of fish cakes, called Eomuk in Korea, by using seven varieties of starch, including native starch (NS), physically treated corn starch (MS) and modified starch [treatment with acetate (SA-1, SA-2 and SA-3), hydroxypropyl (HS), and acetylated distarch adipate (ADA)] were evaluated. Scanning electron microscopy (SEM) photographs showed fish cakes with NS had a finer and denser network structure than those made with modified starches. During frozen storage, fish cakes with HS and ADA exhibited a stable structure, as evaluated by porosity and rough surface. The results of the sensory evaluation showed that modified starch, including HS, SA-2 and ADA, increased the taste and firmness of the fish cakes, while NS, MS and the modified starch SA-3 resulted a decrease in the sensory properties during storage. Therefore, HS, SA-2 and ADA are suitable additives to improve the sensory quality of frozen fish cakes.

Request Redirection Method to reduce load for Storage Server based on iSCSI Protocol (Request Redirection 기법을 통한 iSCSI 프로토콜 기반 스토리지 서버의 부하분산 방안 연구)

  • Seo Jawon;Choi Wonil;Yang Yuan;Park Myongsoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.802-804
    • /
    • 2005
  • 유비쿼터스 환경에 대한 관심과 휴대용 컴퓨팅 기기의 보급으로 가까운 미래의 사람들은 언제 어디서나 네트워크를 통해 데이터 접근이 가능하게 될 것이다. 특히 영화나 음악과 같은 멀티미디어 데이터의 폭발적인 증가로 인해 확장성 있는 네트워크 스토리지 시스템의 필요성이 부각되고 있다. SAN(Storage Area Network)은 높은 확장성과 빠른 속도를 제공하여 엔터프라이즈 환경에 적합한 스토리지 네트워크 시스템이다. 최근에 SAN 환경은 SCSI Architecture Model(SAM)의 표준으로 채택된 iSCSI를 이용한 IP기반의 SAN으로 옳겨가고 있다. 본 논문에서는 iSCSI 기반의 IP SAN환경에서 서비스 클라이언트가 증가함에 따라 스토리지 서버의 부하가 커지는 문제를 해결하기 위해 스토리지 디바이스에서 클라이언트로 데이터를 직접 전송하는 방안을 제안한다.

  • PDF

A Fuzzy Multi-Objective Linear Programming Model: A Case Study of an LPG Distribution Network

  • Ozyoruk, Bahar;Donmez, Nilay
    • Industrial Engineering and Management Systems
    • /
    • v.13 no.3
    • /
    • pp.319-329
    • /
    • 2014
  • Supply chain management is a subject that has an increasing importance due to the developments in the global markets and technology. In this paper, a fuzzy multi-objective linear programming model is developed for the supply chain of a company dealing with procurement, storage, filling, and distribution of liquefied petroleum gas (LPG) in Turkey. The model intends to determine the quantities of LPG to be procured, stored, filled to cylinders, and transported between the plants and demand centers for six planning periods. In this model, which aims to minimize both total costs (sum of procurement, storage, filling, and transportation costs) and total transportation distances, demand quantities of the main demand centers and decision maker's aspiration levels about objective functions are fuzzy. After comparing the results obtained from the model with those obtained by using different methods, it is concluded that the proposed method can be applied to real world problems practically and it may be used in this type of problems in order to generate an efficient solution.

Design and Implementation of a Crypto Processor and Its Application to Security System

  • Kim, Ho-Won;Park, Yong-Je;Kim, Moo-Seop
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.313-316
    • /
    • 2002
  • This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used fur various security applications such as storage devices, embedded systems, network routers, etc. The crypto processor consists of a 32-bit RISC processor block and a coprocessor block dedicated to the SEED and triple-DES (data encryption standard) symmetric key crypto (cryptography) algorithms. The crypto processor has been designed and fabricated as a single VLSI chip using 0.5 $\mu\textrm{m}$ CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed. Testing results show that the crypto processor operates correctly at a working frequency of 30MHz and a bandwidth o1240Mbps.

  • PDF