2020
DOI: 10.1016/j.jpdc.2020.04.012
|View full text |Cite
|
Sign up to set email alerts
|

Effective replica management for improving reliability and availability in edge-cloud computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 58 publications
(20 citation statements)
references
References 23 publications
0
20
0
Order By: Relevance
“…The suggested data replication techniques and architecture can provide the required levels of data loss tolerance while reducing network bandwidth use and preserving latency performance Li et al [77] Examining effective replica management for improving reliability and availability in an edge-cloud computing environment…”
Section: • Innovation Of the Papermentioning
confidence: 99%
“…The suggested data replication techniques and architecture can provide the required levels of data loss tolerance while reducing network bandwidth use and preserving latency performance Li et al [77] Examining effective replica management for improving reliability and availability in an edge-cloud computing environment…”
Section: • Innovation Of the Papermentioning
confidence: 99%
“…It also uses the intelligent water drop (IWD) algorithm to select the best replica for user requests. In [13], a Markov-based replication method at edge-cloud computing was proposed. A gray Markov chain prediction model calculates the required number of replicas for each block of files.…”
Section: Related Workmentioning
confidence: 99%
“…Replication methods create multiple copies of files and place them near the data requester [6]. Data replication has been widely applied in database management systems (DBMS) [7], distributed database [8], mobile system [9], Data Grid [7], Cloud [10,11], peer-to-peer (p2p) [12], and Fog [13].…”
Section: Introductionmentioning
confidence: 99%
“…Bhamare et al in [18], discussed ML models to improve data security. The concept of distributed computing was discussed because it expands critical traction and virtualized server farms becoming well-known as a practical framework and an answer to enormous business applications [19]. The researchers used an assistance model to solve security threats and protection challenges in distributed computing [20].…”
Section: Related Workmentioning
confidence: 99%