TPBF: Two-Phase Bloom-Filter-Based End-to-End Data Integrity Verification Framework for Object-Based Big Data Transfer Systems
نویسندگان
چکیده
Computational science simulations produce huge volumes of data for scientific research organizations. Often, this is shared by centers distributed geographically storage and analysis. Data corruption in the end-to-end route transmission one major challenges distributing geographically. End-to-end integrity verification therefore critical transmitting such across effectively. Although several techniques currently exist, most have a significant negative influence on rate as well overhead. Therefore, existing are not viable solutions high performance computing environments where it very common to transfer centers. In study, we propose two-phase Bloom-filter-based framework object-based big systems. The proposed solution effectively handles errors reducing memory overhead minimizing impact overall rate. We investigated memory, storage, overheads performance. experimental findings showed that suggested had 5% 10% total usage, respectively. However, observed savings terms requirements, when compared with state-of-the-art solutions.
منابع مشابه
End-to-end Integrity for File-System Data
The MINIX 3 operating system is designed to restart misbehaving or crashed drivers, but currently cannot protect the user’s file-system data. Because the blockdevice stack lacks end-to-end integrity, it is impossible to tell whether data corruption occurred—and, even if we could, there is no means to recover the data lost. Therefore, we have extended MINIX 3’s failureresilience mechanisms with ...
متن کاملEnd-to-end Data Integrity for File Systems: A ZFS Case Study
We present a study of the effects of disk and memory corruption on file system data integrity. Our analysis focuses on Sun’s ZFS, a modern commercial offering with numerous reliability mechanisms. Through careful and thorough fault injection, we show that ZFS is robust to a wide range of disk faults. We further demonstrate that ZFS is less resilient to memory corruption, which can lead to corru...
متن کاملData Optimization Techniques using Bloom Filter in Big Data
Due to the advent of new technologies, devices, and communication means like social networking sites, the amount of data produced by mankind is growing rapidly every year. Traditional computing techniques are not enough to process that much large amount of data. Hadoop is a bunch of technology & have capacity to store large amount of data on Data nodes. Hadoop uses MapReduce algorithm to proces...
متن کاملFault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملFault Identification using end-to-end data by imperialist competitive algorithm
Faults in computer networks may result in millions of dollars in cost. Faults in a network need to be localized and repaired to keep the health of the network. Fault management systems are used to keep today’s complex networks running without significant cost, either by using active techniques or passive techniques. In this paper, we propose a novel approach based on imperialist competitive alg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematics
سال: 2022
ISSN: ['2227-7390']
DOI: https://doi.org/10.3390/math10091591