簡易檢索 / 詳目顯示

研究生: 吳秉桓
Wu, Ping Huan
論文名稱: 混和雲的分析與設計: 實現高可用性、低成本且安全的儲存方法
Analysis and Design of Hybrid Cloud Storage for Achieving better Availability, Security and Cost
指導教授: 周志遠
Chou, Jerry
口試委員: 李哲榮
Lee, Che Rung
蕭宏章
Hsiao, Hung Chang
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2015
畢業學年度: 103
語文別: 英文
論文頁數: 34
中文關鍵詞: 混和雲儲存系統費用可用性安全性抹除碼
外文關鍵詞: hybrid cloud storage, cost, availability, security, erasure code
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 當愈來愈多的資料被產生出來,我們就需要製造更多空間來存放這些資料,在私有雲以及公共雲的出現後,混和雲在這段時間逐漸地活躍起來;在這裡我們將混合雲視為第三種儲存空間的選擇,我們建立了一個混和雲費用計算模組,並發現在適當的設定下,混和雲長期運作下可以達到比私有雲更低的成本;我們同時也建立了一個搭配抹除碼的可用性模組,在這模組之下,混和雲可以在有效減少資料冗餘的情況下,達到更好的可用性以及安全性;最後我們將兩個模組結合起來一起分析,得出混和雲可以同時有利於上述所有條件。


    As more and more data generated every moment, more space is needed to store these data. After the appearance of private cloud and public cloud, Hybrid cloud system becomes more and more famous recently. Here we make the hybrid cloud being the third choice for data storage. We build a cost model to prove that with appropriate settings, hybrid cloud has lower cost than private cloud in a long run. We also introduce an availability model with erasure code. With this model, hybrid
    cloud can guarantee higher availability and security with lower data redundancy. In the end we combine both models to prove that hybrid cloud is beneficial for all the features.

    1 Introduction 4 2 Motivation 6 2.1 Cost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.3 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 3 Hybrid's Cost 11 3.1 Public & private cloud cost . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 Hybrid cloud cost module . . . . . . . . . . . . . . . . . . . . . . . . 14 3.3 Cost model analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3.1 Init Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3.2 Increase Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.3.3 Update Period . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 3.3.4 Unit Price . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.3.5 Prediction Inaccuracy . . . . . . . . . . . . . . . . . . . . . . 19 4 Hybrid's Availability & Security 22 4.1 Hybrid Availability Model . . . . . . . . . . . . . . . . . . . . . . . . 23 4.2 Availability Model Analysis . . . . . . . . . . . . . . . . . . . . . . . 24 4.2.1 Tuning in erasure code . . . . . . . . . . . . . . . . . . . . . . 24 4.2.2 Compare hybrid and private . . . . . . . . . . . . . . . . . . . 25 4.2.3 Availability constraint . . . . . . . . . . . . . . . . . . . . . . 25 5 Overall Analysis 27 6 Related work 30

    [1] Amazon s3, 2015. http://aws.amazon.com/s3/?nc2=h_ls.
    [2] Availability in amazon s3, 2015. http://aws.amazon.com/tw/s3/sla/.
    [3] Availability in microsoft azure, 2015. http://azure.microsoft.com/en-us/
    support/legal/sla/.
    [4] Microsoft azure, 2015. http://azure.microsoft.com/en-us/.
    [5] Pricing in amazon s3, 2015. http://aws.amazon.com/govcloud-us/pricing/
    s3/.
    [6] Pricing in microsoft azure, 2015. http://azure.microsoft.com/en-us/
    pricing/details/storage/.
    [7] A. Andreeva, D. Howorth, J.-M. Chandonia, S. E. Brenner, T. J. Hubbard,
    C. Chothia, and A. G. Murzin. Data growth and its impact on the scop
    database: new developments. Nucleic acids research, 36(suppl 1):D419{D425,
    2008.
    [8] B. Battles, C. Belleville, S. Grabau, and J. Maurier. Reducing data center
    power consumption through ecient storage. Network Appliance, Inc, 2007.
    [9] K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity
    layer for cloud storage. In Proceedings of the 16th ACM conference on Computer
    and communications security, pages 187{198. ACM, 2009.
    [10] D. Chen and H. Zhao. Data security and privacy protection issues in cloud
    computing. In Computer Science and Electronics Engineering (ICCSEE), 2012
    International Conference on, volume 1, pages 647{651. IEEE, 2012.
    [11] T. Dillon, C. Wu, and E. Chang. Cloud computing: issues and challenges. In
    Advanced Information Networking and Applications (AINA), 2010 24th IEEE
    International Conference on, pages 27{33. Ieee, 2010.
    [12] D. Dobre, P. Viotti, and M. Vukolic. Hybris: Robust hybrid cloud storage. In
    Proceedings of the ACM Symposium on Cloud Computing, pages 1{14. ACM,
    2014.
    [13] J. Gantz and D. Reinsel. The digital universe in 2020: Big data, bigger digital
    shadows, and biggest growth in the far east. IDC iView: IDC Analyze the
    Future, 2007:1{16, 2012.
    [14] H.-Y. Lin and W.-G. Tzeng. A secure erasure code-based cloud storage system
    with secure data forwarding. Parallel and Distributed Systems, IEEE Transac-
    tions on, 23(6):995{1003, 2012.
    [15] M. Naldi and L. Mastroeni. Economic decision criteria for the migration to
    cloud storage. European Journal of Information Systems, 2014.
    [16] S. Nepal, C. Friedrich, L. Henry, and S. Chen. A secure storage service in
    the hybrid cloud. In Utility and Cloud Computing (UCC), 2011 Fourth IEEE
    International Conference on, pages 334{335. IEEE, 2011.
    [17] M. Pitkanen, R. Moussa, M. Swany, and T. Niemi. Erasure codes for increasing
    the availability of grid data storage. In Telecommunications, 2006. AICT-
    ICIW'06. International Conference on Internet and Web Applications and Ser-
    vices/Advanced International Conference on, pages 185{185. IEEE, 2006.
    [18] K. Ren, C. Wang, and Q. Wang. Security challenges for the public cloud. IEEE
    Internet Computing, (1):69{73, 2012.
    [19] H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: A
    quantitative comparison. In Peer-to-Peer Systems, pages 328{337. Springer,
    2002.
    [20] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Ecient provable
    data possession for hybrid clouds. In Proceedings of the 17th ACM conference
    on Computer and communications security, pages 756{758. ACM, 2010.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE