Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 51))

  • 930 Accesses

Abstract

With the fastest growing nature of application migrating to cloud, the problem of choosing the best suitable cloud service for storage is always a challenge. The cloud storage services are majorly paid service and some of them are designed to deal best with specific kinds of data like read only or update only. Some of the services are designed to match small amount of data blocks and some of the services are designed to best match the larger blocks of data. Many of the application uses file storage, rather than RDBMS storage structure on cloud services. The storage hardware, replication and distribution policies are decided and controlled by cloud storage service providers. The storage options are converted and associated with manageable access portals. This access portal demonstrates the user interface view of the storage visualization and usability. In this paper we compare multiple cloud storage services on high textual data loads and implement an algorithm to choose the best cloud storage service based on cost and storage efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kubiatowicz, J., Bindel, D., Chen, Y., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: Oceanstore: an architecture for global-scale persistent storage. In: Proceedings of Ninth International Conference Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190–201 (2000)

    Google Scholar 

  2. Druschel, P., Rowstron, A.: PAST: a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75–80 (2001)

    Google Scholar 

  3. Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., Wattenhofer, R.: Farsite: federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of the Fifth Symposium on Operating System Design and Implementation (OSDI), pp. 1–14 (2002)

    Google Scholar 

  4. Haeberlen, A., Mislove, A., Druschel, P., Glacier: highly durable, decentralized storage despite massive correlated failures. In: Proceedings of Second Symposium on Networked Systems Design and Implementation (NSDI), pp. 143–158 (2005)

    Google Scholar 

  5. Wilcox-O’Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: Proceedings of Fourth ACM Int’l Workshop Storage Security and Survivability (StorageSS), pp. 21–26 (2008)

    Google Scholar 

  6. Lin, H.-Y., Tzeng, W.-G.: A secure decentralized erasure code for distributed network storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)

    Article  Google Scholar 

  7. Brownbridge, D.R., Marshall, L.F., Randell, B.: The newcastle connection or unixes of the world unite! Softw. Pract. Exp. 12(12), 1147–1162 (1982)

    Article  Google Scholar 

  8. Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., Lyon, B.: Design and implementation of the sun network filesystem. In: Proceedings of USENIX Association Conference (1985)

    Google Scholar 

  9. Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of Second USENIX Conference File and Storage Technologies (FAST), pp. 29–42 (2003)

    Google Scholar 

  10. Rhea, S.C., Eaton, P.R., Geels, D., Weatherspoon, H., Zhao, B.Y., Kubiatowicz, J.: Pond: the Oceanstore Prototype. In: Proceedings of Second USENIX Conference File and Storage Technologies (FAST), pp. 1–14 (2003)

    Google Scholar 

  11. Bhagwan, R., Tati, K., Cheng, Y.-C., Savage, S., Voelker, G.M.: Total recall: system support for automated availability management. In: Proceedings of First Symposium. Networked Systems Design and Implementation (NSDI), pp. 337–350 (2004)

    Google Scholar 

  12. Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes. In: Proceedings of Fourth in Symposium Information Processing in Sensor Networks (IPSN), pp. 111–117 (2005)

    Google Scholar 

  13. Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized erasure codes for distributed networked storage. IEEE Trans. Inf. Theory 52(6), 2809–2816 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  14. Mambo, M., Okamoto, E., Proxy cryptosystems: delegation of the power to decrypt ciphertexts. In: IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences, vol. E80-A(1), 54–63 (1997)

    Google Scholar 

  15. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 127–144 (1998)

    Google Scholar 

  16. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  MATH  Google Scholar 

  17. Tang, Q.: Type-based proxy re-encryption and its construction. In: Proceedings of Ninth International Conference on Cryptology in India: Progress in Cryptology (INDOCRYPT), pp. 130–144 (2008)

    Google Scholar 

  18. Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Proceedings of Topics in Cryptology (CT-RSA), pp. 279–294 (2009)

    Google Scholar 

  19. Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography (PKC), pp. 357–376 (2009)

    Google Scholar 

  20. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of 14th ACM Conference on Computer and Communication Security (CCS), pp. 598–609 (2007)

    Google Scholar 

  21. Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of Fourth International Conferences Security and Privacy in Communication Netowrks (SecureComm), pp. 1–10 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to L. Srinivasa Rao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Rao, L.S., Reddy, I.R. (2016). Study and Comparison of Non-traditional Cloud Storage Services for High Load Text Data. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30927-9_30

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30926-2

  • Online ISBN: 978-3-319-30927-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics