Skip to main content

Research on the Model of the Survivable Storage System (SSS) and Its Architecture

  • Conference paper
  • First Online:
Computer Science and Convergence

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 114))

  • 1280 Accesses

Abstract

In view of the present inconsistent understanding of the model definition of survivable storage network, a seven-tuple model definition and a kind of architecture of SSS were given, taking the characteristics, such as wide-open style and high intricacy, of the actual network environment into account. In addition, some detailed analysis to the key elements of the model and the modules of the architecture was made separately. Our research can provide guidelines for design and construction of SSS, besides, it can also provide basic methods for evaluating the survivability of a storage system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang C, Ma J (2004) Formalized definition of network system survivability (in Chinese)[J]. Electron Sci Technol 4(175):1–2

    MathSciNet  MATH  Google Scholar 

  2. Westmark R (2004) A definition for information system survivability. In: Proceedings of the 37th Hawaii international conference on system sciences. Springer–LNCS: IEEE, pp 2086–2096

    Google Scholar 

  3. Knight JC, Sullivan KJ (2000) On the definition of survivability. Technical Report: CS-TR-33-00, Department of Computer Science, University of Virginia, pp 33–48

    Google Scholar 

  4. Knight JC, Strunk EA, Sullivan KJ (2003) Towards a rigorous definition of information system survivability. In: Proceedings of DARPA information survivability conference and exposition, vol 1, Washington, USA, pp 78–89

    Google Scholar 

  5. Yuan D, Zhang Y (2006) Research on definition of network survivability (in Chinese). J Comput Res Develop 43:527

    Google Scholar 

  6. Zhang W (2008) Theory and key technology research on survivability of information (in Chinese). Xidian University, Xi’an, pp 22–24, 27–28, 32–38

    Google Scholar 

  7. Ellison RJ, Fisher DA, Linger RC et al (1999) Survivability: protecting your critical systems. IEEE Internet Comput 3(6):55–63

    Article  Google Scholar 

  8. Joseph Cooley A, Jeremy Mineweaser L, Leslie Servi D et al (2003) Software-based erasure codes for scalable distributed storage. In: Proceedings of the 20th IEEE/11th NASA Goddard conference on mass storage systems and technologies (MSS’03)

    Google Scholar 

  9. Blakley GR (197) Safeguarding cryptographic keys. In: Proceedings of the national computer conference. American Federation of information processing societies proceedings, vol 9, pp 313–317

    Google Scholar 

  10. Shamir A (1979) How to share a secret. Comm ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  11. Rabin MO (1989) efficient dispersal of information for security, load balancing, and fault tolerance: Harvard Universty, Cambridge, Massachusetts. J Assoc Comput Mach 36(2):335–348

    Google Scholar 

  12. Hayashi D, Miyamoto T, Doi S, Kumagai S (2002) Agents for autonomous distributed secret sharing storage systrem. In: Proceedings of the 2002 international conference on circuit/systems computers and communications, pp 482–485

    Google Scholar 

  13. Yang X, Wang J, Zhong W et al (2011) An image survivable storage scheme based on hyperchaotic. In: Proceeding of ICCSN 2011, EI (00000000000000)

    Google Scholar 

  14. Yang X, Wang J, Chen J, Pan X (2010) A self-renewal hash chain scheme based on fair exchange idea (SRHC-FEI). In: The 3rd IEEE international conference on computer science and information technology (ICCSIT 2010), EI (20104413338326)

    Google Scholar 

  15. Bicakci K, Baykal N (2002) Infinite length hash chains and their applications. In: Proceedings of IEEE 11th international workshops on enabling technologies (WETICE 2002). IEEE Computer Society, Washington, DC, USA, pp 56–61

    Google Scholar 

  16. Zhang H, Zhu Y (2006) A self-renewal hash chain mechanism. Trans Wuhan Univ (Edition: Science) 52(5):596–599

    Google Scholar 

  17. Zhang H, Li X, Ren R (2008) A novel self-renewal hash chain and its implementation. In: IEEE/IFIP international conference on embedded and ubiquitous computing, pp 144–149

    Google Scholar 

  18. Zhang M, Dong B, Yang X (2009) A new self-updating hash chain scheme. In: International conference on computational intelligence and security, IEEE, pp 315–318

    Google Scholar 

  19. Kubiatowicz J, Bindel D, Chen Y et al (2000) OceanStore: an architecture for global-scale persistent storage. In: Proceedings of the ninth international conference on architectural support for programming languages and operating systems (ASPLOS 2000), pp 190–201

    Google Scholar 

  20. Rhea S, Eaton P, Geels D et al (2003) Pond: the OceanStore prototype. In: Proceedings of the 2nd USENIX conference on file and storage technologies

    Google Scholar 

  21. Krings AW, Harrison W, Azadmanesh A et al (2004) Scheduling issues in survivability applications using hybrid fault models. Paral Proc Lett 14(01):6

    MathSciNet  Google Scholar 

  22. Lejun Z, Lin G, Wei W et al (2007) The research summarization of technology of network system survivability evaluation and enhancement. Comput Sci 34(8):30–32

    Google Scholar 

  23. Guo Y, Ma J (2005) the analysis of in-abroad research actuality and existing issues for tolerance inbreak. China Inf Secur 07:337

    Google Scholar 

  24. Guo Y (2005) Theory and methods of intrusion tolerance: research and applications. Xidian University, Xi’an, pp 8–9

    Google Scholar 

  25. Chao W (2006) Theory and key technology research on survivable network system. Xidian University, Xi’an, pp 5–7

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiao-yuan Yang , Jing-jing Wang or Xiao-feng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Yang, Xy., Wang, Jj., Chen, Xf. (2012). Research on the Model of the Survivable Storage System (SSS) and Its Architecture. In: J. (Jong Hyuk) Park, J., Chao, HC., S. Obaidat, M., Kim, J. (eds) Computer Science and Convergence. Lecture Notes in Electrical Engineering, vol 114. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2792-2_42

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2792-2_42

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2791-5

  • Online ISBN: 978-94-007-2792-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics