Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Information Security and Technology》 2011-09
Add to Favorite Get Latest Update

Preliminary Study on a Secure,High Reliable P2P Cloud Storage and Backup Model

Wei Dong-ze Lai Xue-jia (Department of Computer Science & Engineering,ShangHai Jiao Tong University ShangHai 200240)  
With the development of information technology,data security and stability become a topic of general interest,this paper will introduce a secure,highly reliable,low-cost model of P2P cloud storage and backup combine the concepts and ideas of cloud,and then we'll give a tentative implementation of this model.
【Fund】: 国家自然科学基金(60773092 61073149);; 高等学校博士学科点专项科研基金(20090073110027);; 省部产学研结合项目(2010B090400045);; 信息网络安全公安部重点实验室开放课题项目(C11603)
【CateGory Index】: TP309.2;TP333
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 TIAN Jing, DAI Ya-Fei (Department of Computer Science and Technology, Peking University, Beijing 100871, China);Study on Durable Peer-to-Peer Storage Techniques[J];Journal of Software;2007-06
2 CHEN Kang1,2,ZHENG Wei-Min1,2 1(Tsinghua National Laboratory for Information Science and Technology,Tsinghua University,Beijing 100084,China) 2(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Cloud Computing:System Instances and Current Research[J];Journal of Software;2009-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 LONG Yin-hui1,LIAO Zi-long2,3(1.College of Water Conservancy and Hydrodectric Power,Hebei University of Engineering,Handan 056021,China; 2.Research Institute of Water Resources for Pastoral Area,The Ministry Of Water Resources,Hohhot 010020,China; 3.The Postgraduate Department,China Institute of Water Resources and Hydropower Research,Beijing 100038,China);Research on the Information System of Pastoral Water Resources based on Cloud Computing[J];Water Sciences and Engineering Technology;2011-05
2 ZHANG Wei-wei;Public Computer Room Construction of Higher Vocational Schools in the Setting of Cloud Computing[J];Journal of Hubei Radio & Television University;2012-07
3 SUN Ming-song1,ZHAO Xiu-na2,SUN Xi-bei3,TIAN Ji-yuan4(1.Network Information Center,Harbin University of Science and Technology,Harbin 150080,China; 2.School of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China; 3.School of Electrical and Electronic Engineering,Harbin University of Science and Technology,Harbin 150080,China; 4.School of Software Engineering,Beijing University of Technology,Beijing 100124,China);Design of Campus Network Live video System Based on Cloud Computing[J];Journal of Harbin University of Science and Technology;2012-01
4 YUAN Ye,SAN Xiao-jiao(Academy of Fundamental and Interdisciplinary Sciences,Harbin Institute of Technology,Harbin 150080,China);Summary for comparison of cloud computing and grid computing[J];Journal of Harbin University of Commerce(Natural Sciences Edition);2012-02
5 ;云计算系统网络管理的探讨[J];Heilongjiang Science and Technology Information;2011-32
6 LI Gong-li,et al(College of Computer and Information,Henan Normal University,Xinxiang 453000,China);Computer Laboratory Construction Based on Cloud Computing[J];Journal of Henan Mechanical and Electrical Engineering College;2011-03
7 Wang Yu Zhao Yue-long Hou Fang(School of Computer Science and Engineering,South China University of Technology,Guangzhou 510006,Guangdong,China);Reliability Analysis of Replica-Based Peer-to-Peer Storage System[J];Journal of South China University of Technology(Natural Science Edition);2011-02
8 Jiang Xiaoping1 Li Chenghua1 Xiang Wen2 Zhang Xinfang2 Yan Haitao3(1 College of Electronics and Information Engineering,South-Central University for Nationalities,Wuhan 430074,China;2 School of Computer Science and Technology,Huazhong University of Science and Technology, Wuhan 430074,China;3 Business Support Center,China Mobile Group Hubei Co.Ltd.,Wuhan 430040,China);Parallel implementing k-means clustering algorithm using MapReduce programming mode[J];Journal of Huazhong University of Science and Technology(Natural Science Edition);2011-S1
9 Wang Lei1,2 Chen Gang1 Lu Zhonghua1(1 Supercomputing Center,Computer Network Information Center,Chinese Academy of Sciences, Beijing 100190,China;2 Graduate University,Chinese Academy of Sciences,Beijing 100190,China);Cloud-based software framework for efficient scientific computing[J];Journal of Huazhong University of Science and Technology(Natural Science Edition);2011-S1
10 Zheng Yihua Nan Kai Yang Deting Dong Kejun(Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China);Realization on conference-oriented cloud collaboration platform[J];Journal of Huazhong University of Science and Technology(Natural Science Edition);2011-S1
China Proceedings of conference Full-text Database 10 Hits
1 Jiefu GUO China Mobile Communications Corporation Liaoning Co.,Ltd.,Shenyang,China;Research of Building Green IT Data Center Based on Cloud Computing Model[A];[C];2011
2 Wang Yunfeng Li Xinke (School of Computer and Information,Hefei University of Technology,Hefei 230009,China);Study of services aggregation method under an environment of cloud services[A];[C];2011
3 Zhang Bailan Yang Xianghong Li Jialong Liu Wei Lin Chuangyan Qiu Zhengneng (Automation School,Beijing University of Posts and Telecommunications,Beijing 100876);Overview on Internet of Things[A];[C];2010
4 WU Teng①②③,XUE Lei③,ZHENG Dong①②③,LIU Xiao-guang①②③ (①School of Information Security Engineering,Shanghai Jiaotong University,Shanghai 200240,China;②Shanghai Key Lab of Information Security Management and Technology Research,Shanghai 200240,China;③School of Information Science and Engineering,Jiangsu Polytechnic University,Changzhou Jiangsu 213016,China);Reliability Analysis and Data Maintenance Optimization of P2P Durable Storage System[A];[C];2009
5 ZHOU Xuan~1,HUANGP u~2 (1 China Mobile Group Zhejiang Co.,Ltd.,Hangzhou,Zhejiang 310000,China; 2 China Mobile Group Zhejiang Co.,Ltd.Wenzhou Branch.,Wenzhou,Zhejiang,325000,China);A Mobile Service Testing System On OMSP latform With Cloud Computing Infrastructure[A];[C];2009
6 Ling TANG Dept.Information Science and Technology,East China University of Political Science and Law,Shanghai,China,201260;Research on Cloud Computing and Security[A];[C];2011
7 Xuehong ZHANG~1,Zhifang LIU~2 1 Department of Computer Science,Tangshan Normal University,Tangshan,China 2 Information Technology Centre,Tangshan Normal University,Tangshan,China;Research and Discussion on Cloud Storage Technology[A];[C];2011
8 Zhao Wei~1 Chen Cheng-shou~2 Li Li-jun~2 (1.School of Information Technology,Jilin Agricultural University,Jilin,Changchun,130118) (2.School of Computer Science & Engineering,Changchun University of Technology,Jilin,Changchun,130012);The Collision Detection Algorithm Based on the MapReduce of Cloud Computing[A];[C];2010
9 Li Jun and Wang Xin (School of Computer Science,Fudan University,Shanghai 200433);Redundancy Maintenance in P2P Storage Networks[A];[C];2008
10 PAN Song-bai ZHANG Yun-yong CHEN Qing-jin WEI Jin-wu (Research Institute of China Unicom,Beijing 100048);Requirements and Policies of Cloud Computing Security[A];[C];2010
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 YU Xiang-zhan, YIN Li-hua (School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China);Slidable dynamic share memory buffer pool[J];Journal of Harbin Institute of Technology;2004-03
2 Wang Dongbin 1 Fang Binxing 2 Yun Xiaochun 11 (Department of Computer Science and Technology,Harbin Institute of Technology,Harbin150001) 2 (National Computer Network and Information System Security Administration Center,Beijing100031);The Research of Intrusion Detection and Recovery System Based on File Integrity Checker[J];Computer Engineering and Applications;2003-31
3 Wang Shupeng Yun Xiaochun Yu Xiangzhan Hu Mingzeng(National Computer Information Content Security Key Laboratory,Harbin Institute of Technology,Harbin150001);The Theory and Analysis of the Key Technique for Disaster Tolerant[J];Computer Engineering and Applications;2004-28
4 Xiang Guangli1,2 Chen Xinmeng2 Ma Jie2 Zhang Junhong2 1(Department of Computer,Hubei Institute of Education,Wuhan 430060) 2(School of Computer Science,Wuhan University,Wuhan 430072);Homomorphic Encryption Scheme in the Range of the Real[J];Computer Engineering and Applications;2005-20
5 ZHANG Yi-zhi1 ZHAO Yi2 TANG Xiao-bin1(Chongqing Three Gorges University,Chongqing 404000,China)1 (Educational Technology Center,Chongqing Jiaotong University,Chongqing 400074,China)2;MD5 Algorithm[J];Computer Science;2008-07
6 WANG Ping,(Transducer National Key Laboratory, Shanghai Institute of Metallurgy of CASShanghai 200050);Realization and Research of LZW Lossless Compression Algorithm[J];Computer Engineering;2002-07
7 CHEN Zengqiang, GUO Jialin, LIU Zhongxin, YUAN Zhuzhi (Department of Automation of Nankai University, Tianjin 300071);Design and Key Technology of the File-transfer System with the Function of Broken-point Continuingly-transferring[J];Computer Engineering;2002-12
8 HE Chen1,CHEN Zhaoxiong2,HUANG Heyan2 (1. Department of Computer Science, Nanjing University of Science & Technology, Nanjing 210094; 2. Research Center of Computer & Language Information Engineering, Chinese Acade my of Sciences, Beijing 100083);Using Lzwx Algorithm to Compress Semi-structured Text in Embedded Internet Systems[J];Computer Engineering;2003-11
9 LIN Xiaozhu, JI Junwei (Beijing Institute of Petrochemical Technology, Beijing 102617);An Improved LZW Compression Algorithm[J];Computer Engineering;2005-14
10 TANG Wei-tong,LIU Xiao-jie,LI Tao,HU Xiao-qin,ZHANG Hong-liang,ZHANG Can (Computer College,Sichuan University,Chengdu 610065);Fast Differential Backup Method[J];Computer Engineering;2008-11
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 SONG Jian Tao, SHA Chao Feng, YANG Zhi Ying, and ZHU Hong (Department of Computer Science and Engineering, Fudan University, Shanghai 200433) (Laboratory for Intelligent Information Processing, Fudan University, Shanghai 200433);Study on Construction and Searching of Semantic Peer-to-Peer Networks[J];Journal of Computer Research and Development;2004-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved