Abstract
In view of the present inconsistent understanding of the model definition of survivable storage network, a seven-tuple model definition and a kind of architecture of SSS were given, taking the characteristics, such as wide-open style and high intricacy, of the actual network environment into account. In addition, some detailed analysis to the key elements of the model and the modules of the architecture was made separately. Our research can provide guidelines for design and construction of SSS, besides, it can also provide basic methods for evaluating the survivability of a storage system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang C, Ma J (2004) Formalized definition of network system survivability (in Chinese)[J]. Electron Sci Technol 4(175):1–2
Westmark R (2004) A definition for information system survivability. In: Proceedings of the 37th Hawaii international conference on system sciences. Springer–LNCS: IEEE, pp 2086–2096
Knight JC, Sullivan KJ (2000) On the definition of survivability. Technical Report: CS-TR-33-00, Department of Computer Science, University of Virginia, pp 33–48
Knight JC, Strunk EA, Sullivan KJ (2003) Towards a rigorous definition of information system survivability. In: Proceedings of DARPA information survivability conference and exposition, vol 1, Washington, USA, pp 78–89
Yuan D, Zhang Y (2006) Research on definition of network survivability (in Chinese). J Comput Res Develop 43:527
Zhang W (2008) Theory and key technology research on survivability of information (in Chinese). Xidian University, Xi’an, pp 22–24, 27–28, 32–38
Ellison RJ, Fisher DA, Linger RC et al (1999) Survivability: protecting your critical systems. IEEE Internet Comput 3(6):55–63
Joseph Cooley A, Jeremy Mineweaser L, Leslie Servi D et al (2003) Software-based erasure codes for scalable distributed storage. In: Proceedings of the 20th IEEE/11th NASA Goddard conference on mass storage systems and technologies (MSS’03)
Blakley GR (197) Safeguarding cryptographic keys. In: Proceedings of the national computer conference. American Federation of information processing societies proceedings, vol 9, pp 313–317
Shamir A (1979) How to share a secret. Comm ACM 22(11):612–613
Rabin MO (1989) efficient dispersal of information for security, load balancing, and fault tolerance: Harvard Universty, Cambridge, Massachusetts. J Assoc Comput Mach 36(2):335–348
Hayashi D, Miyamoto T, Doi S, Kumagai S (2002) Agents for autonomous distributed secret sharing storage systrem. In: Proceedings of the 2002 international conference on circuit/systems computers and communications, pp 482–485
Yang X, Wang J, Zhong W et al (2011) An image survivable storage scheme based on hyperchaotic. In: Proceeding of ICCSN 2011, EI (00000000000000)
Yang X, Wang J, Chen J, Pan X (2010) A self-renewal hash chain scheme based on fair exchange idea (SRHC-FEI). In: The 3rd IEEE international conference on computer science and information technology (ICCSIT 2010), EI (20104413338326)
Bicakci K, Baykal N (2002) Infinite length hash chains and their applications. In: Proceedings of IEEE 11th international workshops on enabling technologies (WETICE 2002). IEEE Computer Society, Washington, DC, USA, pp 56–61
Zhang H, Zhu Y (2006) A self-renewal hash chain mechanism. Trans Wuhan Univ (Edition: Science) 52(5):596–599
Zhang H, Li X, Ren R (2008) A novel self-renewal hash chain and its implementation. In: IEEE/IFIP international conference on embedded and ubiquitous computing, pp 144–149
Zhang M, Dong B, Yang X (2009) A new self-updating hash chain scheme. In: International conference on computational intelligence and security, IEEE, pp 315–318
Kubiatowicz J, Bindel D, Chen Y et al (2000) OceanStore: an architecture for global-scale persistent storage. In: Proceedings of the ninth international conference on architectural support for programming languages and operating systems (ASPLOS 2000), pp 190–201
Rhea S, Eaton P, Geels D et al (2003) Pond: the OceanStore prototype. In: Proceedings of the 2nd USENIX conference on file and storage technologies
Krings AW, Harrison W, Azadmanesh A et al (2004) Scheduling issues in survivability applications using hybrid fault models. Paral Proc Lett 14(01):6
Lejun Z, Lin G, Wei W et al (2007) The research summarization of technology of network system survivability evaluation and enhancement. Comput Sci 34(8):30–32
Guo Y, Ma J (2005) the analysis of in-abroad research actuality and existing issues for tolerance inbreak. China Inf Secur 07:337
Guo Y (2005) Theory and methods of intrusion tolerance: research and applications. Xidian University, Xi’an, pp 8–9
Chao W (2006) Theory and key technology research on survivable network system. Xidian University, Xi’an, pp 5–7
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer Science+Business Media B.V.
About this paper
Cite this paper
Yang, Xy., Wang, Jj., Chen, Xf. (2012). Research on the Model of the Survivable Storage System (SSS) and Its Architecture. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_42
Download citation
DOI: https://doi.org/10.1007/978-94-007-2792-2_42
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-2791-5
Online ISBN: 978-94-007-2792-2
eBook Packages: EngineeringEngineering (R0)