2016
DOI: 10.1007/978-3-319-39577-7_13
|View full text |Cite
|
Sign up to set email alerts
|

A Performance Evaluation of Erasure Coding Libraries for Cloud-Based Data Stores

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…In [15], an explicit structure of the first known system (n, k) MDS array code is described where n − k is equal to some constants so that the amount of information needed to reconstruct an erased column is equal to 1/(n − k), matching the lower bound of information theory. Recently, there has been considerable interest in incorporating secrets into erasure codes for distributed storage, such as [33]- [36]. These codes can also be considered as threshold secret sharing schemes.…”
Section: Introductionmentioning
confidence: 99%
“…In [15], an explicit structure of the first known system (n, k) MDS array code is described where n − k is equal to some constants so that the amount of information needed to reconstruct an erased column is equal to 1/(n − k), matching the lower bound of information theory. Recently, there has been considerable interest in incorporating secrets into erasure codes for distributed storage, such as [33]- [36]. These codes can also be considered as threshold secret sharing schemes.…”
Section: Introductionmentioning
confidence: 99%
“…From that point on, the days of a targeted document on the internet are counted. While popular content can rely on the Streisand effect 1 and alternative networks to keep on living a little longer, unpopular content can just disappear off the face of the internet. And when refusing to delete the content also exposes the platform or provider to cyber attacks [124], removing the content seems like the best option to avoid exposure but also reduce their storage costs.…”
Section: Context and Motivationmentioning
confidence: 99%
“…Finally, we look at how storage overhead can be tamed beyond with better compression gains than classic data reduction techniques without sacrificing on performance. [32,34,31] Chapter 4 First and fully functional implementation of STeP [17,141] Chapter 5 Implementation and evaluation of a framework for stackable user-space file systems [207,33] Chapter 6 Integration and evalution of a data deduplication scheme in user-space file system [183] 1.…”
Section: Taming Storage Overhead With Practical and Efficient Data Rementioning
confidence: 99%
See 2 more Smart Citations