首页    期刊浏览 2024年12月12日 星期四
登录注册

文章基本信息

  • 标题:Efficient Data Storage in Desktop Data-Grid Computing using Real-Time parameters
  • 本地全文:下载
  • 作者:Jose Anand ; R. Janarthanan ; Ponkoodaligam Kannan
  • 期刊名称:International Journal of Computer Science & Technology
  • 印刷版ISSN:2229-4333
  • 电子版ISSN:0976-8491
  • 出版年度:2011
  • 卷号:2
  • 期号:3(Version 2)
  • 出版社:Ayushmaan Technologies
  • 摘要:To protects data against attacks, appropriate security measures have to be taken. This includes analyzing the likelihood of attack and being aware of threatening situations or people. Computer data storage provides one of the core functions of the modern computer that has information retain storage techniques at all levels of the storage hierarchy. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance. Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from crashed devices (server or client). This drives the need for a complete data protection solution that secures data on all common platforms, deploys easily, scales to any size organization and meets strict compliance requirements related to privacy laws and regulations. It helps in ensuring privacy of data and improves availability of the data. Particularly in the paradigm of “Volunteer Computing “ which is a specific type of distributed system , where shared resources (processor or storage) are provided in a volunteer fashion by the clients of the Desktop Data Grid System. The number of PC’s connected to internet is project High-level security is given to the Volunteer Storage Clients (VSC’s) for redundant data storage and the VSC is classified into different levels based on real-time parameters like bandwidth, zero-time shit down and storage capacity. We propose an architecture for the desktop data grids with a centralised server which increases the performance of the system and reduces the complexity of the server. The efficiency of the system not only depends on the security level of the client but also considers the sensitivity of the data being stored in the system. Altogether a simple metric termed Fragmentation Factor (FF) is proposed in this system which considers both the security of the client and the sensitivity of the data. The erasure tornado codes are applied to cope up with unreliable data storage components. The enhanced levels of security can be achieved in the corporate environment by imposing Security Auditing. To ensure the security of the various servers and systems, the security has to be assessed through proper audit tools. For selecting the high priority virtual server for data storage, three factors like bandwidth, availability and storage are analyzed. Implementation was performed by using Java in our laboratory and seen that the efficiency of data storage and security is high than the existing architecture.
  • 关键词:Attacks; Client/server; centralized server; fragmentation factor;grid; login; security; web-based services.
国家哲学社会科学文献中心版权所有