Abstract
With the fastest growing nature of application migrating to cloud, the problem of choosing the best suitable cloud service for storage is always a challenge. The cloud storage services are majorly paid service and some of them are designed to deal best with specific kinds of data like read only or update only. Some of the services are designed to match small amount of data blocks and some of the services are designed to best match the larger blocks of data. Many of the application uses file storage, rather than RDBMS storage structure on cloud services. The storage hardware, replication and distribution policies are decided and controlled by cloud storage service providers. The storage options are converted and associated with manageable access portals. This access portal demonstrates the user interface view of the storage visualization and usability. In this paper we compare multiple cloud storage services on high textual data loads and implement an algorithm to choose the best cloud storage service based on cost and storage efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kubiatowicz, J., Bindel, D., Chen, Y., Eaton, P., Geels, D., Gummadi, R., Rhea, S., Weatherspoon, H., Weimer, W., Wells, C., Zhao, B.: Oceanstore: an architecture for global-scale persistent storage. In: Proceedings of Ninth International Conference Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 190–201 (2000)
Druschel, P., Rowstron, A.: PAST: a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the Eighth Workshop Hot Topics in Operating System (HotOS VIII), pp. 75–80 (2001)
Adya, A., Bolosky, W.J., Castro, M., Cermak, G., Chaiken, R., Douceur, J.R., Howell, J., Lorch, J.R., Theimer, M., Wattenhofer, R.: Farsite: federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of the Fifth Symposium on Operating System Design and Implementation (OSDI), pp. 1–14 (2002)
Haeberlen, A., Mislove, A., Druschel, P., Glacier: highly durable, decentralized storage despite massive correlated failures. In: Proceedings of Second Symposium on Networked Systems Design and Implementation (NSDI), pp. 143–158 (2005)
Wilcox-O’Hearn, Z., Warner, B.: Tahoe: the least-authority filesystem. In: Proceedings of Fourth ACM Int’l Workshop Storage Security and Survivability (StorageSS), pp. 21–26 (2008)
Lin, H.-Y., Tzeng, W.-G.: A secure decentralized erasure code for distributed network storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)
Brownbridge, D.R., Marshall, L.F., Randell, B.: The newcastle connection or unixes of the world unite! Softw. Pract. Exp. 12(12), 1147–1162 (1982)
Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., Lyon, B.: Design and implementation of the sun network filesystem. In: Proceedings of USENIX Association Conference (1985)
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: scalable secure file sharing on untrusted storage. In: Proceedings of Second USENIX Conference File and Storage Technologies (FAST), pp. 29–42 (2003)
Rhea, S.C., Eaton, P.R., Geels, D., Weatherspoon, H., Zhao, B.Y., Kubiatowicz, J.: Pond: the Oceanstore Prototype. In: Proceedings of Second USENIX Conference File and Storage Technologies (FAST), pp. 1–14 (2003)
Bhagwan, R., Tati, K., Cheng, Y.-C., Savage, S., Voelker, G.M.: Total recall: system support for automated availability management. In: Proceedings of First Symposium. Networked Systems Design and Implementation (NSDI), pp. 337–350 (2004)
Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes. In: Proceedings of Fourth in Symposium Information Processing in Sensor Networks (IPSN), pp. 111–117 (2005)
Dimakis, A.G., Prabhakaran, V., Ramchandran, K.: Decentralized erasure codes for distributed networked storage. IEEE Trans. Inf. Theory 52(6), 2809–2816 (2006)
Mambo, M., Okamoto, E., Proxy cryptosystems: delegation of the power to decrypt ciphertexts. In: IEICE Transactions on Fundamentals of Electronics, Communication and Computer Sciences, vol. E80-A(1), 54–63 (1997)
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 127–144 (1998)
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Tang, Q.: Type-based proxy re-encryption and its construction. In: Proceedings of Ninth International Conference on Cryptology in India: Progress in Cryptology (INDOCRYPT), pp. 130–144 (2008)
Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Proceedings of Topics in Cryptology (CT-RSA), pp. 279–294 (2009)
Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Proceedings of 12th International Conference on Practice and Theory in Public Key Cryptography (PKC), pp. 357–376 (2009)
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of 14th ACM Conference on Computer and Communication Security (CCS), pp. 598–609 (2007)
Ateniese, G., Pietro, R.D., Mancini, L.V., Tsudik, G.: Scalable and efficient provable data possession. In: Proceedings of Fourth International Conferences Security and Privacy in Communication Netowrks (SecureComm), pp. 1–10 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Rao, L.S., Reddy, I.R. (2016). Study and Comparison of Non-traditional Cloud Storage Services for High Load Text Data. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-30927-9_30
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30926-2
Online ISBN: 978-3-319-30927-9
eBook Packages: EngineeringEngineering (R0)