Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

This paper presents a novel fountain code-based hybrid P2P and cloud storage system. While most cloud storage systems guarantees data retrievability of high level, they may be vulnerable to data privacy since the stored data may be exposed to others by accident or design. On the other hand, P2P storage system keeps any peer from accessing the whole data by dividing the data into small pieces and distributing them to multiple participating peers, but may degrade data retrievability due to unstable peers. The proposed hybrid storage system attempts to enhance data retrievability and privacy by effectively distributing fountain encoded symbols to cloud server system and participating peers. It is demonstrated that the proposed hybrid storage system achieves the desired level of data retrievability with a short upload time, and enhance privacy by preventing others from reading the contents.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Caceres J, Vaquero LM, RoderoMerino L, Polo A, Hierro JJ (2010) Service scalability over the cloud. Handb Cloud Comput 357–377

  2. Amazon Glacier. Available: http://aws.amazon.com/ec2/reserved-instances/#3. Accessed 18 Oct 2013

  3. Google Drive. Available: http://drive.google.com/. Accessed 18 Oct 2013

  4. Microsoft SkyDrive. Available: http://skydrive.live.com/. Accessed 18 Oct 2013

  5. Baca S (2010) Cloud Computing: What it is and what it can do for you (pp. 1–6). www.globalknowledge.com/. Accessed 18 Oct 2013

  6. Dropbox. Available: http://dropbox.com/. Accessed 18 Oct 2013

  7. Harihara SG, Janakiram B, Chandra MG, Aravind KG, Kadhe S, Balamuralidhar P, Adiga BS (2010) SpreadStore: a LDPC erasure code scheme for distributed storage system. Int Conf Data Storage Data Eng 154–158

  8. Spoor R, Peddemors A (2010) Cloud storage and peer-to-peer storage. [Online]. Available: http://www.surf.nl/binaries/content/assets/surf/en/knowledgebase/2010/EDS-3R+Cloud+and+p2p+storage-v1.1.pdf/. Accessed 18 Oct 2013

  9. iSuppli. Available: http://isuppli.com/. Accessed 18 Oct 2013

  10. Li J, Huang Q (2006) Erasure resilient codes in peer-to-peer storage cloud. IEEE Int Conf Acoust Speech Signal Process 4:4

  11. Gaidioz B, Koblitz B, Santaos N (2007) Exploring high performance distributed file storage using LDPC codes. Parallel Comput 33:264–274

    Article  Google Scholar 

  12. Li J (2006) Adaptive erasure resilient coding in distributed storage. IEEE Int Conf Multimedia Expo 561–564

  13. Rodrigues R, Liskov B (2005) High availability in DHTs: erasure coding vs. replication. Peer-to-Peer Syst IV 3640:226–239

    Article  Google Scholar 

  14. Kim S, Lee S (2009) Rateless erasure resilient codes for content storage and distribution in P2P networks. 11th International Conference on Advanced Communication Technology 1:444–446

  15. Ji W, Jian Z, Tong W, Qian S (2011) Study on redundant strategies in peer to peer cloud storage systems. Appl Math Inf Sci Int J 5-2S:235S–242S

  16. Park S, Moon B, Park M (2004) Design, implementation, and performance analysis of the remote storage system in mobile environment. 2nd International Conference on Information Technology for Application

  17. Hertel CR (2003) Implementing CIFS: the common internet file system. Prentice Hall, Englewood Cliffs

    Google Scholar 

  18. Radkov P, Yin L, Goyal P, Sarkar P, Shenoy P (2004) “A Performance comparison of NFS and iSCSI for IP-networked storage”, 3rd USENIX conference on file and storage technologies. USENIX Assoc 3640:101–114

    Google Scholar 

  19. Cao N, Yu S, Yang Z, Lou W, Hou YT (2012) LT code-based secure and reliable cloud storage service. IEEE INFOCOM 693–701

  20. Blömer J, Kalfane M, Karpinski M Karp R, Luby M, Zuckerman D (1995) An XOR-based erasure-resilient coding scheme. ICSI Technical Report No. TR–950048

  21. Luby M (2002) LT codes. Ann Symp Found Comput Sci 271–280. doi:10.1109/SFCS.2002.1181950. Accessed 18 Oct 2013

  22. Han S, Joo H, Lee D, Song H (2011) An end-to-end virtual path construction system for stable live video streaming over heterogeneous wireless networks. IEEE J Sel Areas Commun 29:1032–1041

    Article  Google Scholar 

  23. Shokrollahi A (2006) Raptor codes. IEEE Trans Inf Theory 52(6):2551–2567. doi:10.1109/TIT.2006.874390. Accessed 18 Oct 2013

  24. Xu Q, Stanković V, Xiong Z (2007) Distributed joint source-channel coding of video using Raptor codes. IEEE J Sel Areas Commun 25:851–861

    Article  Google Scholar 

  25. Ribeiro V, Riedi R, Baraniuk R, Navratil J, Cottrell L (2003) pathChirp: efficient available bandwidth estimation for network paths. Passive and Active Measurement Workshop. doi:10.2172/813038. Accessed 18 Oct 2013

  26. Ntene N, Vuuren JHV (2009) A survey and comparison of guillotine heuristics for the 2D oriented offline strip packing problem. Discret Optim 6:174–188

    Article  MATH  Google Scholar 

  27. Lodi A, Martello S, Monaci M (2002) Two-dimensional packing problems: a survey. Eur J Oper Res 141:241–252

    Article  MathSciNet  MATH  Google Scholar 

  28. Bustamante FE, Qiao Y (2004) Friendships that last: peer lifespan and its role in P2P protocols. Int Work Web Content Caching Distrib 233–246

  29. Stutzbach D, Rejaie R (2006) Understanding churn in peer-to-peer network. The 6th ACM SIGCOMM Conference on Internet Measurement, pp. 189–202

  30. Steiner M, En-Najjary T, Biersack E (2009) Long term study of peer behavior in the KAD DHT. IEEE/ACM Trans Netw 17(6):1371–1384. doi:10.1109/TNET.2008.2009053. Accessed 18 Oct 2013

  31. Leonard D, Yao Z, Rai V, Loguinov D (2007) On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks. IEEE/ACM Trans Networking 15:644–656

    Article  Google Scholar 

  32. Mackay DJC (2005) Fountain codes. IEE Proc Commun 152:1062–1068

    Article  Google Scholar 

  33. Lawler EW, Wood DE (1966) Branch–and–bound method—a survey. Oper Res 14:669–719

    MathSciNet  Google Scholar 

  34. Lunttila T, Lindholm J, Pajukoski K, Tiirola E, Toskala A (2007) EUTRAN uplink performance. Int Symp Wirel Pervasive Comput. doi:10.1109/ISWPC.2007.342658. Accessed 18 Oct 2013

  35. Turner WP, IV, Seader JH, Renaud V, Brill KG (2006) Tier classifications define site infrastructure performance. White Paper, The Uptime Institute

  36. Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. Intell Comput Cogn Inform380–383

  37. Yang Y, Yuan D (2011) A novel cost-effective dynamic data replication strategy for reliability in cloud data centers. IEEE Dependable Auton Secure Comput

  38. OECD Broadband Portal (2012). http://www.oecd.org/sti/ict/broadband. Accessed 18 Oct 2013

Download references

Acknowledgement

This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (NRF-2013R1A1A2006732) and the MSIP (Ministry of Science, ICT & Future Planning), Korea in the ICT R&D Program 2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hwangjun Song.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Park, G.S., Song, H. A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement. Peer-to-Peer Netw. Appl. 9, 299–312 (2016). https://doi.org/10.1007/s12083-015-0337-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0337-z

Keywords

Navigation