期刊文献+

浅析私有云存储技术在数据中心中的应用 被引量:1

Application of private Cloud storage technology in data center
下载PDF
导出
摘要 随着社会的日益发展,云存储技术在数据中心中的应用越来越广泛,人们对于数据与信息的需求日益增大,旧方式的单纯固定化的数据存储方式,在一定程度上已经无法满足当前数据中心信息数据的存储与扩展。具体介绍了数据中心中私有云存储技术的实际使用方法及关键性技术,并结合私有云存储在数据中心中的使用,通过数据迁移技术进行了详细的分析与说明。 With the development of society, the application of Cloud storage technology in data center is becoming more and more popular. For people's demand for data and information is increasing, the old way of data storage is not satisfied. In this paper, we introduce the practical methods and key technologies of private Cloud storage technology in data center, combined with the use of private Cloud storage in the data center.
作者 王策
出处 《微型机与应用》 2015年第22期68-69,72,共3页 Microcomputer & Its Applications
关键词 云存储 数据共享 迁移 Cloud storage data sharing migration
  • 相关文献

参考文献2

二级参考文献37

  • 1ARMBRUST M, STOICA I, ZAHARIA M, et al. A view of cloud computing [C]. Communications of the ACM, 2010,53 (4) :50. 被引量:1
  • 2MELL P, GRANCE T. NIST Special Publication 800-145: The NIST Definition of Cloud Computing [J]. National Institute of Standards and Technology, 2011. 被引量:1
  • 3SION R. TUTORIAL: Secure Data Outsourcing[J]. The 13th International Conference on Management of Data (COMAD 2006), 2006. 被引量:1
  • 4FELDMAN A J, ZELLER W P, FREEDMAN M J, et al. SPORC.. Group collaboration using untrusted cloud resources[C]. Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI'10), 2010. 被引量:1
  • 5RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978: 169-180. 被引量:1
  • 6GENTRY C. Fully homomorphic encryption using ideal lattices[J]. Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC'09, 2009: 169. 被引量:1
  • 7KAMARA S, LAUTER K. Cryptographic Cloud Storage[C]. Financial cryptography and data security,2010. 被引量:1
  • 8WANG C, CAO N, LI J, et al. Secure Ranked Keyword Search over Encrypted Cloud Data [J]. IEEE 30th International Conference on Distributed Computing Systems (ICDCS' 10),2010: 253-262. 被引量:1
  • 9KARAME G O, CAPKUN S, MAURER U. Privacy- preserving outsourcing of brute-force key searches[J]. Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW'll), 2011:101. 被引量:1
  • 10POPA R A, REDFIELD C M S, ZELDOVICH N, et al CryptDB: protecting confidentiality with encrypted query processing[ J ]. Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles-SOSP' 11, 2011:85. 被引量:1

共引文献8

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部