研究生: |
吳秉桓 Wu, Ping Huan |
---|---|
論文名稱: |
混和雲的分析與設計: 實現高可用性、低成本且安全的儲存方法 Analysis and Design of Hybrid Cloud Storage for Achieving better Availability, Security and Cost |
指導教授: |
周志遠
Chou, Jerry |
口試委員: |
李哲榮
Lee, Che Rung 蕭宏章 Hsiao, Hung Chang |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2015 |
畢業學年度: | 103 |
語文別: | 英文 |
論文頁數: | 34 |
中文關鍵詞: | 混和雲儲存系統 、費用 、可用性 、安全性 、抹除碼 |
外文關鍵詞: | hybrid cloud storage, cost, availability, security, erasure code |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
當愈來愈多的資料被產生出來,我們就需要製造更多空間來存放這些資料,在私有雲以及公共雲的出現後,混和雲在這段時間逐漸地活躍起來;在這裡我們將混合雲視為第三種儲存空間的選擇,我們建立了一個混和雲費用計算模組,並發現在適當的設定下,混和雲長期運作下可以達到比私有雲更低的成本;我們同時也建立了一個搭配抹除碼的可用性模組,在這模組之下,混和雲可以在有效減少資料冗餘的情況下,達到更好的可用性以及安全性;最後我們將兩個模組結合起來一起分析,得出混和雲可以同時有利於上述所有條件。
As more and more data generated every moment, more space is needed to store these data. After the appearance of private cloud and public cloud, Hybrid cloud system becomes more and more famous recently. Here we make the hybrid cloud being the third choice for data storage. We build a cost model to prove that with appropriate settings, hybrid cloud has lower cost than private cloud in a long run. We also introduce an availability model with erasure code. With this model, hybrid
cloud can guarantee higher availability and security with lower data redundancy. In the end we combine both models to prove that hybrid cloud is beneficial for all the features.
[1] Amazon s3, 2015. http://aws.amazon.com/s3/?nc2=h_ls.
[2] Availability in amazon s3, 2015. http://aws.amazon.com/tw/s3/sla/.
[3] Availability in microsoft azure, 2015. http://azure.microsoft.com/en-us/
support/legal/sla/.
[4] Microsoft azure, 2015. http://azure.microsoft.com/en-us/.
[5] Pricing in amazon s3, 2015. http://aws.amazon.com/govcloud-us/pricing/
s3/.
[6] Pricing in microsoft azure, 2015. http://azure.microsoft.com/en-us/
pricing/details/storage/.
[7] A. Andreeva, D. Howorth, J.-M. Chandonia, S. E. Brenner, T. J. Hubbard,
C. Chothia, and A. G. Murzin. Data growth and its impact on the scop
database: new developments. Nucleic acids research, 36(suppl 1):D419{D425,
2008.
[8] B. Battles, C. Belleville, S. Grabau, and J. Maurier. Reducing data center
power consumption through ecient storage. Network Appliance, Inc, 2007.
[9] K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity
layer for cloud storage. In Proceedings of the 16th ACM conference on Computer
and communications security, pages 187{198. ACM, 2009.
[10] D. Chen and H. Zhao. Data security and privacy protection issues in cloud
computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
International Conference on, volume 1, pages 647{651. IEEE, 2012.
[11] T. Dillon, C. Wu, and E. Chang. Cloud computing: issues and challenges. In
Advanced Information Networking and Applications (AINA), 2010 24th IEEE
International Conference on, pages 27{33. Ieee, 2010.
[12] D. Dobre, P. Viotti, and M. Vukolic. Hybris: Robust hybrid cloud storage. In
Proceedings of the ACM Symposium on Cloud Computing, pages 1{14. ACM,
2014.
[13] J. Gantz and D. Reinsel. The digital universe in 2020: Big data, bigger digital
shadows, and biggest growth in the far east. IDC iView: IDC Analyze the
Future, 2007:1{16, 2012.
[14] H.-Y. Lin and W.-G. Tzeng. A secure erasure code-based cloud storage system
with secure data forwarding. Parallel and Distributed Systems, IEEE Transac-
tions on, 23(6):995{1003, 2012.
[15] M. Naldi and L. Mastroeni. Economic decision criteria for the migration to
cloud storage. European Journal of Information Systems, 2014.
[16] S. Nepal, C. Friedrich, L. Henry, and S. Chen. A secure storage service in
the hybrid cloud. In Utility and Cloud Computing (UCC), 2011 Fourth IEEE
International Conference on, pages 334{335. IEEE, 2011.
[17] M. Pitkanen, R. Moussa, M. Swany, and T. Niemi. Erasure codes for increasing
the availability of grid data storage. In Telecommunications, 2006. AICT-
ICIW'06. International Conference on Internet and Web Applications and Ser-
vices/Advanced International Conference on, pages 185{185. IEEE, 2006.
[18] K. Ren, C. Wang, and Q. Wang. Security challenges for the public cloud. IEEE
Internet Computing, (1):69{73, 2012.
[19] H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: A
quantitative comparison. In Peer-to-Peer Systems, pages 328{337. Springer,
2002.
[20] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Ecient provable
data possession for hybrid clouds. In Proceedings of the 17th ACM conference
on Computer and communications security, pages 756{758. ACM, 2010.