The Architecture Design of Information Dispersed Storage System Based on the RAIC

Article Preview

Abstract:

For the traditional RAID technology, the single controller controls all the disks, once it fails, and it can easily lead to paralysis of the entire storage system, this paper proposes an approach which is the information dispersed storage system architecture model based on the RAIC. The RAIC storage system uses the scattered information and the cloud storage technology, thus it increases the overall storage system reliability, availability and security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1984-1988

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. A. Patterson, G. Gibson, and R. H. Katz, A Case for Redundant Arrays of Inexpensive Disks (RAID), EECS Department, University of California, Berkeley, Tech. Rep. CB/CSD-87-391, December (1987).

Google Scholar

[2] J. S. Plank, The RAID-6 Liberation codes, in Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), February 2008, p.97–110, San José, California, USA.

Google Scholar

[3] R. Seiger, S. Groß, and A. Schill, SecCSIE: A Secure Cloud Storage Integrator for Enterprises, in Appears in: International Workshop on Clouds for Enterprises, September 2011, Luxembourg.

DOI: 10.1109/cec.2011.45

Google Scholar

[4] J. A. Garay, R. Gennaro, C. Jutla, and T. Rabin. Secure distributed storage and retrieval. Theoretical Computer Science, 243(1-2): 363–389, (2000).

DOI: 10.1016/s0304-3975(98)00263-1

Google Scholar

[5] M. O. Rabin, Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance, Journal of ACM, Volume 36, Number 2, pp.335-348, ACM, (1989).

DOI: 10.1145/62044.62050

Google Scholar

[6] J. Bian and R. Seker, JigDFS: A secure distributed file system, in IEEE Symposium on Computational Intelligence in Cyber Security (CICS), April 2009, p.76–82, Nashville, Tennessee, USA.

DOI: 10.1109/cicybs.2009.4925093

Google Scholar