WorldWideScience

Sample records for chelonia storage cloud

  1. Cloud storage for dummies

    CERN Document Server

    Xu, Linda; Loughlin, Tanya

    2010-01-01

    Understand cloud computing and save your organization time and money! Cloud computing is taking IT by storm, but what is it and what are the benefits to your organization? Hitachi Data Systems' Cloud Storage For Dummies provides all the answers, With this book, you discover a clear explanation of cloud storage, and tips for how to choose the right type of cloud storage for your organization's needs. You also find out how cloud storage can free up valuable IT resources, saving time and money. Cloud Storage For Dummies presents useful information on setting up a

  2. Cryptographic Cloud Storage

    Science.gov (United States)

    Kamara, Seny; Lauter, Kristin

    We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal. We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage.

  3. Entangled Cloud Storage

    DEFF Research Database (Denmark)

    Ateniese, Giuseppe; Dagdelen, Özgür; Damgård, Ivan Bjerre

    2012-01-01

    Entangled cloud storage enables a set of clients {P_i} to “entangle” their files {f_i} into a single clew c to be stored by a (potentially malicious) cloud provider S. The entanglement makes it impossible to modify or delete significant part of the clew without affecting all files in c. A clew...... recover their files. We provide theoretical foundations for entangled cloud storage, introducing the notion of an entangled encoding scheme that guarantees strong security requirements capturing the properties above. We also give a concrete construction based on privacy-preserving polynomial interpolation......, along with protocols for using the encoding scheme in practice. Protocols for cloud storage find application in the cloud setting, where clients store their files on a remote server and need to be ensured that the cloud provider will not delete their data illegitimately. Current solutions, e.g., based...

  4. Benchmarking personal cloud storage

    NARCIS (Netherlands)

    Drago, Idilio; Bocchi, Enrico; Mellia, Marco; Slatman, Herman; Pras, Aiko

    2013-01-01

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - perform

  5. A cloud storage overlay to aggregate heterogeneous cloud services

    OpenAIRE

    Machado, Guilherme Sperb; Bocek, Thomas; Ammann, Michael; Stiller, Burkhard

    2013-01-01

    Many Cloud services provide generic (e.g., Amazon S3 or Dropbox) or data-specific Cloud storage (e.g., Google Picasa or SoundCloud). Although both Cloud storage service types have the data storage in common, they present heterogeneous characteristics: different interfaces, accounting and charging schemes, privacy and security levels, functionality and, among the data-specific Cloud storage services, different data type restrictions. This paper proposes PiCsMu (Platform-independent Cloud Stora...

  6. Security for cloud storage systems

    CERN Document Server

    Yang, Kan

    2014-01-01

    Cloud storage is an important service of cloud computing, which offers service for data owners to host their data in the cloud. This new paradigm of data hosting and data access services introduces two major security concerns. The first is the protection of data integrity. Data owners may not fully trust the cloud server and worry that data stored in the cloud could be corrupted or even removed. The second is data access control. Data owners may worry that some dishonest servers provide data access to users that are not permitted for profit gain and thus they can no longer rely on the servers

  7. Inside Dropbox: Understanding Personal Cloud Storage Services

    NARCIS (Netherlands)

    Drago, Idilio; Mellia, Marco; Munafò, Maurizio M.; Sperotto, Anna; Sadre, Ramin; Pras, Aiko

    2012-01-01

    Personal cloud storage services are gaining popularity. With a rush of providers to enter the market and an increasing offer of cheap storage space, it is to be expected that cloud storage will soon generate a high amount of Internet traffic. Very little is known about the architecture and the perfo

  8. PC-Cluster based Storage System Architecture for Cloud Storage

    CERN Document Server

    Yee, Tin Tin

    2011-01-01

    Design and architecture of cloud storage system plays a vital role in cloud computing infrastructure in order to improve the storage capacity as well as cost effectiveness. Usually cloud storage system provides users to efficient storage space with elasticity feature. One of the challenges of cloud storage system is difficult to balance the providing huge elastic capacity of storage and investment of expensive cost for it. In order to solve this issue in the cloud storage infrastructure, low cost PC cluster based storage server is configured to be activated for large amount of data to provide cloud users. Moreover, one of the contributions of this system is proposed an analytical model using M/M/1 queuing network model, which is modeled on intended architecture to provide better response time, utilization of storage as well as pending time when the system is running. According to the analytical result on experimental testing, the storage can be utilized more than 90% of storage space. In this paper, two parts...

  9. Enhancing Data Integrity in Multi Cloud Storage

    Directory of Open Access Journals (Sweden)

    Alisha Jindal

    2014-09-01

    Full Text Available Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.

  10. Cloud Storage and its Secure Overlay Techniques

    Directory of Open Access Journals (Sweden)

    Susheel Kumar

    2014-04-01

    Full Text Available In this paper we have tried to explain in detail about cloud storage its need, importance and how much useful it is for the upcoming future. As we know that it provides us flexibility to store and use data to anywhere and from anywhere so it is cost effective and beneficial at all places. The storage of data however has some kind of security issues in accessing the authorized data. Some of the data in the cloud should be deleted for certain reasons to maintain confidentiality. And many other issues are to be overcome by the cloud. There are certain techniques discussed in this paper to address the problems in the cloud communication. We get an idea of the available methods in which the data can be secured. Anyway each architecture has its own shortcomings. But without these techniques, it is difficult to maintain a good client-server storage mechanism in the cloud computing.

  11. Sheltered Data Storage Services in Cloud Computing

    Directory of Open Access Journals (Sweden)

    B. Jenifer Milkkal

    2013-05-01

    Full Text Available Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the holomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack, and even server colluding attacks

  12. Cloud Epoch: Storage as a Service

    Directory of Open Access Journals (Sweden)

    Gurpreet Singh

    2012-08-01

    Full Text Available At that time Cloud computing is the edge of new technology. Cloud computing play an important role in every field of technology. Various services supported by Cloud like Infrastructure as a service (IAAS, Platform as a service (PAAS, Storage as a service(SAAS, Bandwidth as a service, Collaboration as a service, Software as a service and many more. But now these days Storage as a service are starting to crop up everywhere. Using Storage as a services we can able to move backup and restore services offsite, to save money, and to provide flexibility, but this is nothing like tape backup system. In this paper we study about the various SAAS cloud providers & compare the features provided by them.

  13. New mechanism for Cloud Computing Storage Security

    Directory of Open Access Journals (Sweden)

    Almokhtar Ait El Mrabti

    2016-07-01

    Full Text Available Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS. The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.

  14. Cloud-Based Data Storage

    Science.gov (United States)

    Waters, John K.

    2011-01-01

    The vulnerability and inefficiency of backing up data on-site is prompting school districts to switch to more secure, less troublesome cloud-based options. District auditors are pushing for a better way to back up their data than the on-site, tape-based system that had been used for years. About three years ago, Hendrick School District in…

  15. Zero Data Remnance Proof in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Mithun Paul

    2010-10-01

    Full Text Available In a cloud environment where Storage is offered as a service, a client stores his data with a provider andpays as per the usage. Once the contract ends, the client, as the data owner, may like to see, due to privacyreasons and otherwise that the data is properly shredded in the provider storage. In this paper we proposea scheme for Zero Data Remnance Proof (ZDRP – a comprehensive proof given by the cloud data storageprovider as regards to zero data remnance post the SLA period. In absence of such shredding the providercan consume the data to his benefit without coming in legal framework. The proof of data destruction canbe achieved together by clauses in the SLA and a comprehensive destruction-verifier algorithm. Theimplementation of this can be achieved by appropriate modification of the data updation mechanismsprovided by open source cloud providers.

  16. The dCache scientific storage cloud

    CERN Document Server

    CERN. Geneva

    2014-01-01

    For over a decade, the dCache team has provided software for handling big data for a diverse community of scientists. The team has also amassed a wealth of operational experience from using this software in production. With this experience, the team have refined dCache with the goal of providing a "scientific cloud": a storage solution that satisfies all requirements of a user community by exposing different facets of dCache with which users interact. Recent development, as part of this "scientific cloud" vision, has introduced a new facet: a sync-and-share service, often referred to as "dropbox-like storage". This work has been strongly focused on local requirements, but will be made available in future releases of dCache allowing others to adopt dCache solutions. In this presentation we will outline the current status of the work: both the successes and limitations, and the direction and time-scale of future work.

  17. Critical Factors for Personal Cloud Storage Adoption in China

    OpenAIRE

    Jianya Wang

    2016-01-01

    Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationships to a user's intentions. Design/methodology/approach: Based on technology acceptance model (TAM), network externality, trust, and an interview survey, this study proposes a personal cloud storage adoption model. We conducted an empirical analysis by structural equation modeli...

  18. Cloud and virtual data storage networking

    CERN Document Server

    Schulz, Greg

    2011-01-01

    The amount of data being generated, processed, and stored has reached unprecedented levels. Even during the recent economic crisis, there has been no slow down or information recession. Instead, the need to process, move, and store data has only increased. Consequently, IT organizations are looking to do more with what they have while supporting growth along with new services without compromising on cost and service delivery. Cloud and Virtual Data Storage Networking, by savvy IT industry veteran Greg Schulz, looks at converging IT resources and management technologies for facilitating efficie

  19. Dynamic federation of grid and cloud storage

    Science.gov (United States)

    Furano, Fabrizio; Keeble, Oliver; Field, Laurence

    2016-09-01

    The Dynamic Federations project ("Dynafed") enables the deployment of scalable, distributed storage systems composed of independent storage endpoints. While the Uniform Generic Redirector at the heart of the project is protocol-agnostic, we have focused our effort on HTTP-based protocols, including S3 and WebDAV. The system has been deployed on testbeds covering the majority of the ATLAS and LHCb data, and supports geography-aware replica selection. The work done exploits the federation potential of HTTP to build systems that offer uniform, scalable, catalogue-less access to the storage and metadata ensemble and the possibility of seamless integration of other compatible resources such as those from cloud providers. Dynafed can exploit the potential of the S3 delegation scheme, effectively federating on the fly any number of S3 buckets from different providers and applying a uniform authorization to them. This feature has been used to deploy in production the BOINC Data Bridge, which uses the Uniform Generic Redirector with S3 buckets to harmonize the BOINC authorization scheme with the Grid/X509. The Data Bridge has been deployed in production with good results. We believe that the features of a loosely coupled federation of open-protocolbased storage elements open many possibilities of smoothly evolving the current computing models and of supporting new scientific computing projects that rely on massive distribution of data and that would appreciate systems that can more easily be interfaced with commercial providers and can work natively with Web browsers and clients.

  20. Optimal Storage Allocation for Wireless Cloud Caching Systems with a Limited Sum Storage Capacity

    OpenAIRE

    Hong, Bi; Choi, Wan

    2016-01-01

    In wireless cloud storage systems, the recovery failure probability depends on not only wireless channel conditions but also storage size of each distributed storage node. For an efficient utilization of limited storage capacity and the performance characterization of allocation strategies, we asymptotically analyze the recovery failure probability of a wireless cloud storage system with a sum storage capacity constraint for both high SNR regime and low SNR regime. Then, we find the optimal s...

  1. On the Feasibility of a Network Coded Mobile Storage Cloud

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Fitzek, Frank; Roetter, Daniel Enrique Lucani

    2015-01-01

    Conventional cloud storage services offer relatively good reliability and performance in a cost-effective manner. However, they are typically structured in a centralized and highly controlled fashion. In more dynamic storage scenarios, these centralized approaches are unfeasible and developing...... decentralized storage approaches becomes critical. The novelty of this paper is the introduction of the highly dynamic distributed mobile cloud, which uses free resources on user devices to move storage to the edges of the network. At the core of our approach, lies the use of random linear network coding...... to simulate the processes governing user behavior to show feasibility of mobile storage clouds in real scenarios....

  2. Critical Factors for Personal Cloud Storage Adoption in China

    Directory of Open Access Journals (Sweden)

    Jianya Wang

    2016-06-01

    Full Text Available Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationships to a user's intentions. Design/methodology/approach: Based on technology acceptance model (TAM, network externality, trust, and an interview survey, this study proposes a personal cloud storage adoption model. We conducted an empirical analysis by structural equation modeling based on survey data obtained with a questionnaire. Findings: Among the adoption factors we identified, network externality has the salient influence on a user's adoption intention, followed by perceived usefulness, individual innovation, perceived trust, perceived ease of use, and subjective norms. Cloud storage characteristics are the most important indirect factors, followed by awareness to personal cloud storage and perceived risk. However, although perceived risk is regarded as an important factor by other cloud computing researchers, we found that it has no significant influence. Also, subjective norms have no significant influence on perceived usefulness. This indicates that users are rational when they choose whether to adopt personal cloud storage. Research limitations: This study ignores time and cost factors that might affect a user's intention to adopt personal cloud storage. Practical implications: Our findings might be helpful in designing and developing personal cloud storage products, and helpful to regulators crafting policies. Originality/value: This study is one of the first research efforts that discuss Chinese users' personal cloud storage adoption, which should help to further the understanding of personal cloud adoption behavior among Chinese users.

  3. A New Model of Data Protection on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Jing Peng

    2014-03-01

    Full Text Available This paper focuses on studying cloud storage data protection model and implementing encrypted storage of user data in double-key form. User data are encrypted with symmetric encryption algorithm and this secret key is encrypted with asymmetric encryption algorithm. The private key is managed and controlled by users. In this way, users guarantee the security of their own data with the sole private key. Providing effective protection for uploading and downloading of user data and good data storage and transmission support for cloud storage application through the data protection mechanism deployed at client, thus solving the biggest obstacle, i.e. security of cloud data in the application of cloud storage enterprises currently to a certain extent.

  4. Keyword-based Ciphertext Search Algorithm under Cloud Storage

    Directory of Open Access Journals (Sweden)

    Ren Xunyi

    2016-01-01

    Full Text Available With the development of network storage services, cloud storage have the advantage of high scalability , inexpensive, without access limit and easy to manage. These advantages make more and more small or medium enterprises choose to outsource large quantities of data to a third party. This way can make lots of small and medium enterprises get rid of costs of construction and maintenance, so it has broad market prospects. But now lots of cloud storage service providers can not protect data security.This result leakage of user data, so many users have to use traditional storage method.This has become one of the important factors that hinder the development of cloud storage. In this article, establishing keyword index by extracting keywords from ciphertext data. After that, encrypted data and the encrypted index upload cloud server together.User get related ciphertext by searching encrypted index, so it can response data leakage problem.

  5. Analysis of Different Privacy Preserving Cloud Storage Frameworks

    CERN Document Server

    Bedi, Rajeev; Singh, Tajinder; Singh, Harwinder; Singh, Amritpal

    2012-01-01

    Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework i...

  6. Towards Efficient Scientific Data Management Using Cloud Storage

    Science.gov (United States)

    He, Qiming

    2013-01-01

    A software prototype allows users to backup and restore data to/from both public and private cloud storage such as Amazon's S3 and NASA's Nebula. Unlike other off-the-shelf tools, this software ensures user data security in the cloud (through encryption), and minimizes users operating costs by using space- and bandwidth-efficient compression and incremental backup. Parallel data processing utilities have also been developed by using massively scalable cloud computing in conjunction with cloud storage. One of the innovations in this software is using modified open source components to work with a private cloud like NASA Nebula. Another innovation is porting the complex backup to- cloud software to embedded Linux, running on the home networking devices, in order to benefit more users.

  7. Techniques for Efficiently Ensuring Data Storage Security in Cloud Computing

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2011-01-01

    The Cloud Computing is the next generation architecture of IT Enterprise. It moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. Here, focus is on cloud data storage security, an important aspect...... of quality of service. To ensure the correctness of users’ data in the cloud, we propose an effective and flexible distributed scheme with two salient features. By utilizing the homomorphic token with distributed verification of erasure-coded data, the scheme achieves the integration of storage correctness...

  8. Evolution of Cloud Storage as Cloud Computing Infrastructure Service

    OpenAIRE

    Rajan, Arokia Paul; Shanmugapriyaa

    2013-01-01

    Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are consumable on demand, elastic to scale up and down as needed, and follow a pay-for-usage model. Out of the three common types of cloud computing service models, Infrastructure as a Service (IaaS) is a service model that provides servers, computing power, network bandwidth and S...

  9. Migrating enterprise storage applications to the cloud

    OpenAIRE

    2011-01-01

    Cloud computing has emerged as a model for hosting computing infrastructure and outsourcing management of that infrastructure. It offers the promise of simplified provisioning and management, lower costs, and access to resources that scale up and down with demand. Cloud computing has seen growing use for Web site hosting, large batch processing jobs, and similar tasks. Despite potential advantages, however, cloud computing is not much used for enterprise applications such as backup, shared fi...

  10. Pricing of insurance policies against cloud storage price rises

    OpenAIRE

    Mastroeni, Loretta; Naldi, Maurizio

    2012-01-01

    When a company migrates to cloud storage, the way back is neither easy nor cheap. The company is then locked up in the storage contract and exposed to upward market prices, which reduce the company's profit and may even bring it below zero. We propose a protection means based on an insurance contract, by which the cloud purchaser is indemnified when the current storage price exceeds a pre-defined threshold. By applying the financial options theory, we provide a formula for the insurance price...

  11. Dynamic Data Storage and Public Auditability for Cloud Storage Security

    DEFF Research Database (Denmark)

    Banoth, Rajkumar

    2012-01-01

    IT has moved into next generation with cloud computing being realized. The way application software and databases are stored has been changed. Now they are stored in cloud data centers in which security is a concern from client point of view. The new phenomenon which is used to store and manage...... data without capital investment has brought many security challenges which are not thoroughly understood. This paper focuses on the security and integrity of data stored in cloud data servers. The data integrity verification is done by using a third party auditor who is authorized to check integrity...

  12. Notes on a storage manager for the Clouds kernel

    Science.gov (United States)

    Pitts, David V.; Spafford, Eugene H.

    1986-01-01

    The Clouds project is research directed towards producing a reliable distributed computing system. The initial goal is to produce a kernel which provides a reliable environment with which a distributed operating system can be built. The Clouds kernal consists of a set of replicated subkernels, each of which runs on a machine in the Clouds system. Each subkernel is responsible for the management of resources on its machine; the subkernal components communicate to provide the cooperation necessary to meld the various machines into one kernel. The implementation of a kernel-level storage manager that supports reliability is documented. The storage manager is a part of each subkernel and maintains the secondary storage residing at each machine in the distributed system. In addition to providing the usual data transfer services, the storage manager ensures that data being stored survives machine and system crashes, and that the secondary storage of a failed machine is recovered (made consistent) automatically when the machine is restarted. Since the storage manager is part of the Clouds kernel, efficiency of operation is also a concern.

  13. Cloud Storage Vendors Wide Support and Security Key Features for Shifting Towards Business Perspective

    Directory of Open Access Journals (Sweden)

    T Prasath

    2014-02-01

    Full Text Available The emerging trends that suits well with the shifting terminologies of computational environment. The cloud computing plays the vital role in today’s business activities. The essential fact of computing rapid technological shift towards cloud.  The storage medium of cloud provides common public spacing, privatized infrastructure, and other platform supports are facilitated. Here in this paper a brief scrutiny  under gone on various cloud storage vendors. The various cloud storage vendors provides data storage, space availability, scaling, sharing, secure transmission between cloud storage medium. Here different vendors wide data storage mediums are discussed with their security features and data access managing capabilities are rendered.

  14. A protect solution for data security in mobile cloud storage

    Science.gov (United States)

    Yu, Xiaojun; Wen, Qiaoyan

    2013-03-01

    It is popular to access the cloud storage by mobile devices. However, this application suffer data security risk, especial the data leakage and privacy violate problem. This risk exists not only in cloud storage system, but also in mobile client platform. To reduce the security risk, this paper proposed a new security solution. It makes full use of the searchable encryption and trusted computing technology. Given the performance limit of the mobile devices, it proposes the trusted proxy based protection architecture. The design basic idea, deploy model and key flows are detailed. The analysis from the security and performance shows the advantage.

  15. Emittance growth induced by electron cloud in proton storage rings

    CERN Document Server

    Benedetto, Elena; Coppa, G

    2006-01-01

    In proton and positron storage rings with many closely spaced bunches, a large number of electrons can accumulate in the beam pipe due to various mechanisms (photoemission, residual gas ionization, beam-induced multipacting). The so-formed electron cloud interacts with the positively charged bunches, giving rise to instabilities, emittance growth and losses. This phenomenon has been observed in several existing machines such as the CERN Super Proton Synchrotron (SPS), whose operation has been constrained by the electron-cloud problem, and it is a concern for the Large Hadron Collider (LHC), under construction at CERN. The interaction between the beam and the electron cloud has features which cannot be fully taken into account by the conventional and known theories from accelerators and plasma physics. Computer simulations are indispensable for a proper prediction and understanding of the instability dynamics. The main feature which renders the beam-cloud interactions so peculiar is that the the electron cloud...

  16. Multiobjective Reliable Cloud Storage with Its Particle Swarm Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Xiyang Liu

    2016-01-01

    Full Text Available Information abounds in all fields of the real life, which is often recorded as digital data in computer systems and treated as a kind of increasingly important resource. Its increasing volume growth causes great difficulties in both storage and analysis. The massive data storage in cloud environments has significant impacts on the quality of service (QoS of the systems, which is becoming an increasingly challenging problem. In this paper, we propose a multiobjective optimization model for the reliable data storage in clouds through considering both cost and reliability of the storage service simultaneously. In the proposed model, the total cost is analyzed to be composed of storage space occupation cost, data migration cost, and communication cost. According to the analysis of the storage process, the transmission reliability, equipment stability, and software reliability are taken into account in the storage reliability evaluation. To solve the proposed multiobjective model, a Constrained Multiobjective Particle Swarm Optimization (CMPSO algorithm is designed. At last, experiments are designed to validate the proposed model and its solution PSO algorithm. In the experiments, the proposed model is tested in cooperation with 3 storage strategies. Experimental results show that the proposed model is positive and effective. The experimental results also demonstrate that the proposed model can perform much better in alliance with proper file splitting methods.

  17. Move It or Lose It: Cloud-Based Data Storage

    Science.gov (United States)

    Waters, John K.

    2010-01-01

    There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…

  18. Application of Cloud Storage on BIM Life-cycle Management

    Directory of Open Access Journals (Sweden)

    Lieyun Ding

    2014-08-01

    Full Text Available Because of its high information intensity, strong consistency and convenient visualization features, building information modelling (BIM has received widespread attention in the fields of construction and project management. However, due to large amounts of information, high integration, the need for resource sharing between various departments, the long time-span of the BIM application, challenges relating to data interoperability, security and cost all slow down the adoption of BIM. This paper constructs a BIM cloud storage concept system using cloud storage, an advanced computer technology, to solve the problem of mass data processing, information security, and cost problems in the existing application of BIM to full life-cycle management. This system takes full advantage of the cloud storage technique. Achievements are reached in four areas of BIM information management, involving security and licensing management, file management, work process management and collaborative management. The system expands the time and space scales, improves the level of participation, and reduces the cost of BIM. The construction of the BIM cloud storage system is one of the most important directions of the development of BIM, which benefits the promotion and further development of BIM to better serve construction and engineering project management.

  19. Cloud Data Storage Federation for Scientific Applications

    NARCIS (Netherlands)

    S. Koulouzis; D. Vasyunin; R. Cushing; A. Belloum; M. Bubak

    2013-01-01

    Nowadays, data-intensive scientific research needs storage capabilities that enable efficient data sharing. This is of great importance for many scientific domains such as the Virtual Physiological Human. In this paper, we introduce a solution that federates a variety of systems ranging from file se

  20. First cloud-based service for analyzing storage tank data

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    Most commercial storage tanks are unmonitored and require manual processes to verify conditions, remediate issues or request servicing. New Boundary Technologies has developed an off-the-shelf solution that eliminates several manual processes. Its TankVista Internet service was launched as the first cloud-based service for continuously monitoring and analyzing the conditions and storage levels of commercial storage tanks, bins, silos and other containers. TankVista takes data from storage tank sensors and translates it into graphics and maps that industry can use to drive new efficiencies in storage tank management. A bulk oil distributor can leverage TankVista to remotely and continuously monitor its own storage tanks as well as those of its clients. TankVista monitors tank level, temperature, pressure, humidity and other storage criteria in order to know exactly when and where to replenish supplies. Rather than re-filling tanks at about 50 per cent capacity, a bulk oil distributor can wait until usage levels dictate more efficient re-filling. The monitoring takes place without manual intervention. TankVista complements the iDigi Tank, which has the unique ability to wirelessly connect dispersed and remote tank assets, and get this information through drop-in wireless mesh technology to the cloud without requiring onsite Internet access. 1 fig.

  1. Applying a cloud computing approach to storage architectures for spacecraft

    Science.gov (United States)

    Baldor, Sue A.; Quiroz, Carlos; Wood, Paul

    As sensor technologies, processor speeds, and memory densities increase, spacecraft command, control, processing, and data storage systems have grown in complexity to take advantage of these improvements and expand the possible missions of spacecraft. Spacecraft systems engineers are increasingly looking for novel ways to address this growth in complexity and mitigate associated risks. Looking to conventional computing, many solutions have been executed to solve both the problem of complexity and heterogeneity in systems. In particular, the cloud-based paradigm provides a solution for distributing applications and storage capabilities across multiple platforms. In this paper, we propose utilizing a cloud-like architecture to provide a scalable mechanism for providing mass storage in spacecraft networks that can be reused on multiple spacecraft systems. By presenting a consistent interface to applications and devices that request data to be stored, complex systems designed by multiple organizations may be more readily integrated. Behind the abstraction, the cloud storage capability would manage wear-leveling, power consumption, and other attributes related to the physical memory devices, critical components in any mass storage solution for spacecraft. Our approach employs SpaceWire networks and SpaceWire-capable devices, although the concept could easily be extended to non-heterogeneous networks consisting of multiple spacecraft and potentially the ground segment.

  2. Analysis of multi cloud storage applications for resource constrained mobile devices

    Directory of Open Access Journals (Sweden)

    Rajeev Kumar Bedi

    2016-09-01

    Full Text Available Cloud storage, which can be a surrogate for all physical hardware storage devices, is a term which gives a reflection of an enormous advancement in engineering (Hung et al., 2012. However, there are many issues that need to be handled when accessing cloud storage on resource constrained mobile devices due to inherent limitations of mobile devices as limited storage capacity, processing power and battery backup (Yeo et al., 2014. There are many multi cloud storage applications available, which handle issues faced by single cloud storage applications. In this paper, we are providing analysis of different multi cloud storage applications developed for resource constrained mobile devices to check their performance on the basis of parameters as battery consumption, CPU usage, data usage and time consumed by using mobile phone device Sony Xperia ZL (smart phone on WiFi network. Lastly, conclusion and open research challenges in these multi cloud storage apps are discussed.

  3. Dynamic Data Possession Checking for Secure Cloud Storage Service

    Directory of Open Access Journals (Sweden)

    Wenzhe Jiao

    2013-12-01

    Full Text Available Using cloud storage service, data owners can access their data anywhere at any time and enjoy the on-demand high quality applications and services, without the burden of local data storage and maintenance. Meanwhile, the risk of losing data stored with any untrustworthy service provider is the key barrier to widely adopt cloud storage service. To verify the integrity of data stored in cloud and relieve the security concerns of customers, a privacy-preserving data possession checking (DPC scheme is presented. This scheme uses Merkle Hash Tree to support fully dynamic data operations. To achieve robustness, forward error-correcting codes can be combined with the proposed DPC scheme, which can recover the data when a small amount of file has been corrupted. The scheme allows unlimited times verification without the need for the verifier to compare against the original data, which reduces the communication and computation complexity dramatically and preserves the privacy of the data. Extensive security analysis and simulation show that the proposed scheme is highly provably secure.

  4. ANALYSIS OF DIFFERENT PRIVACY PRESERVING CLOUD STORAGE FRAMEWORKS

    Directory of Open Access Journals (Sweden)

    Rajeev Bedi

    2012-01-01

    Full Text Available Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologiesare used to preserve data security in cloud storage. [1] Proposes a framework which includes the designof data organization structure, the generation and management of keys, the treatment of change of user’saccess right and dynamic operations of data, and the interaction between participants. It also design aninteractive protocol and an extirpation-based key derivation algorithm, which are combined with lazyrevocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficientframework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloudstorage framework in which he designed an interaction protocol among participants, use key derivationalgorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide thesensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this frameworkis realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks,running overhead of the system and the privacy security of the frameworks.

  5. Implementasi Cloud Storage Menggunakan OwnCloud yang High-Availability

    Directory of Open Access Journals (Sweden)

    Ikhwan Ar-Razy

    2016-04-01

    Full Text Available Implementation of practicum courses in Department of Computer Engineering Diponegoro University has some drawbacks, one of them is a lot of lab assistant and the practitioner experiencing difficulties in terms of archiving. One solution to solve the problem is implementing a shared file storage system that is easy and can be accessed by both practitioners or lab assistants. The purpose of this research is to build a cloud-based storage systems that are reliable to preventing crash damage hardware and high availability. The purpose of this research is achieved by designing the appropriate methodology. The result of this research is a storage system that is on the server side by using virtualization and data replication (DRBD as a storage method. The system is composed of two physical servers and one virtual server. Physical servers are using Proxmox VE as operating system and virtual server is using Ubuntu Server as operating system. OwnCloud applications and files are stored in the virtual server. File storage system has several major functions, which are: upload, download, user management, remove, and restore. The functions are executed through web pages, desktop application and Android application.

  6. Clone-based Data Index in Cloud Storage Systems

    Directory of Open Access Journals (Sweden)

    He Jing

    2016-01-01

    Full Text Available The storage systems have been challenged by the development of cloud computing. The traditional data index cannot satisfy the requirements of cloud computing because of the huge index volumes and quick response time. Meanwhile, because of the increasing size of data index and its dynamic characteristics, the previous ways, which rebuilding the index or fully backup the index before the data has changed, cannot satisfy the need of today’s big data index. To solve these problems, we propose a double-layer index structure that overcomes the throughput limitation of single point server. Then, a clone based B+ tree structure is proposed to achieve high performance and adapt dynamic environment. The experimental results show that our clone-based solution has high efficiency.

  7. Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Feng Tian

    2014-01-01

    Full Text Available As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC∗ and a density-based space filling curve (DSC to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC∗ and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  8. Protecting location privacy for outsourced spatial data in cloud storage.

    Science.gov (United States)

    Tian, Feng; Gui, Xiaolin; An, Jian; Yang, Pan; Zhao, Jianqiang; Zhang, Xuejun

    2014-01-01

    As cloud computing services and location-aware devices are fully developed, a large amount of spatial data needs to be outsourced to the cloud storage provider, so the research on privacy protection for outsourced spatial data gets increasing attention from academia and industry. As a kind of spatial transformation method, Hilbert curve is widely used to protect the location privacy for spatial data. But sufficient security analysis for standard Hilbert curve (SHC) is seldom proceeded. In this paper, we propose an index modification method for SHC (SHC(∗)) and a density-based space filling curve (DSC) to improve the security of SHC; they can partially violate the distance-preserving property of SHC, so as to achieve better security. We formally define the indistinguishability and attack model for measuring the privacy disclosure risk of spatial transformation methods. The evaluation results indicate that SHC(∗) and DSC are more secure than SHC, and DSC achieves the best index generation performance.

  9. Implementing cloud storage with OpenStack Swift

    CERN Document Server

    Rajana, Kris; Varma, Sreedhar

    2014-01-01

    This tutorial-based book has a step-by-step approach for each topic, ensuring it is thoroughly covered and easy to follow. If you are an IT administrator who wants to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Whether your job is to build, manage, or use OpenStack Swift, this book is an ideal way to move your career ahead. Only basic Linux and server technology skills are expected, to take advantage of this book.

  10. Partial storage optimization and load control strategy of cloud data centers.

    Science.gov (United States)

    Al Nuaimi, Klaithem; Mohamed, Nader; Al Nuaimi, Mariam; Al-Jaroodi, Jameela

    2015-01-01

    We present a novel approach to solve the cloud storage issues and provide a fast load balancing algorithm. Our approach is based on partitioning and concurrent dual direction download of the files from multiple cloud nodes. Partitions of the files are saved on the cloud rather than the full files, which provide a good optimization to the cloud storage usage. Only partial replication is used in this algorithm to ensure the reliability and availability of the data. Our focus is to improve the performance and optimize the storage usage by providing the DaaS on the cloud. This algorithm solves the problem of having to fully replicate large data sets, which uses up a lot of precious space on the cloud nodes. Reducing the space needed will help in reducing the cost of providing such space. Moreover, performance is also increased since multiple cloud servers will collaborate to provide the data to the cloud clients in a faster manner.

  11. Implementation and Performance Evaluation of Distributed Cloud Storage Solutions using Random Linear Network Coding

    DEFF Research Database (Denmark)

    Fitzek, Frank; Toth, Tamas; Szabados, Áron

    2014-01-01

    This paper advocates the use of random linear network coding for storage in distributed clouds in order to reduce storage and traffic costs in dynamic settings, i.e. when adding and removing numerous storage devices/clouds on-the-fly and when the number of reachable clouds is limited. We introduce...... various network coding approaches that trade-off reliability, storage and traffic costs, and system complexity relying on probabilistic recoding for cloud regeneration. We compare these approaches with other approaches based on data replication and Reed-Solomon codes. A simulator has been developed...... to carry out a thorough performance evaluation of the various approaches when relying on different system settings, e.g., finite fields, and network/storage conditions, e.g., storage space used per cloud, limited network use, and limited recoding capabilities. In contrast to standard coding approaches, our...

  12. Evaluation of the Huawei UDS cloud storage system for CERN specific data

    Science.gov (United States)

    Zotes Resines, M.; Heikkila, S. S.; Duellmann, D.; Adde, G.; Toebbicke, R.; Hughes, J.; Wang, L.

    2014-06-01

    Cloud storage is an emerging architecture aiming to provide increased scalability and access performance, compared to more traditional solutions. CERN is evaluating this promise using Huawei UDS and OpenStack SWIFT storage deployments, focusing on the needs of high-energy physics. Both deployed setups implement S3, one of the protocols that are emerging as a standard in the cloud storage market. A set of client machines is used to generate I/O load patterns to evaluate the storage system performance. The presented read and write test results indicate scalability both in metadata and data perspectives. Futher the Huawei UDS cloud storage is shown to be able to recover from a major failure of losing 16 disks. Both cloud storages are finally demonstrated to function as back-end storage systems to a filesystem, which is used to deliver high energy physics software.

  13. Factors Influencing the Adoption of Cloud Storage by Information Technology Decision Makers

    Science.gov (United States)

    Wheelock, Michael D.

    2013-01-01

    This dissertation uses a survey methodology to determine the factors behind the decision to adopt cloud storage. The dependent variable in the study is the intent to adopt cloud storage. Four independent variables are utilized including need, security, cost-effectiveness and reliability. The survey includes a pilot test, field test and statistical…

  14. Mobile Storage and Search Engine of Information Oriented to Food Cloud

    Directory of Open Access Journals (Sweden)

    Lifeng Wei

    2013-10-01

    Full Text Available The aim of this study is to establish food cloud information search architecture. Food information search engine based on cloud computing architecture can not only achieve more personalized and intelligent search, but also can solve problems of data processing and storage centralization caused by mass of food and custom information. According to design idea of mobile search engine based on cloud computing architecture, the Map/Reduce algorithm and HDFS were thoroughly analyzed and researched. The cloud parallel storage technology under cloud computing architecture was introduced into mobile search engine for design and implementation mobile search engine under open-source Hadoop framework based on cloud computing architecture. The system achieves parallel storage of mass information and mass data to overcome unbalance problem of data centralization and overhead in storage server load caused by mass food data in traditional search engine, thus achieving high efficient mobile device search result and good user satisfaction.

  15. A secure and efficient audit mechanism for dynamic shared data in cloud storage.

    Science.gov (United States)

    Kwon, Ohmin; Koo, Dongyoung; Shin, Yongjoo; Yoon, Hyunsoo

    2014-01-01

    With popularization of cloud services, multiple users easily share and update their data through cloud storage. For data integrity and consistency in the cloud storage, the audit mechanisms were proposed. However, existing approaches have some security vulnerabilities and require a lot of computational overheads. This paper proposes a secure and efficient audit mechanism for dynamic shared data in cloud storage. The proposed scheme prevents a malicious cloud service provider from deceiving an auditor. Moreover, it devises a new index table management method and reduces the auditing cost by employing less complex operations. We prove the resistance against some attacks and show less computation cost and shorter time for auditing when compared with conventional approaches. The results present that the proposed scheme is secure and efficient for cloud storage services managing dynamic shared data.

  16. The cloud storage service bwSync&Share at KIT

    CERN Document Server

    CERN. Geneva

    2014-01-01

    The Karlsruhe Institute of Technology introduced the bwSync&Share collaboration service in January 2014. The service is an on-premise alternative to existing public cloud storage solutions for students and scientists in the German state of Baden-Württemberg, which allows the synchronization and sharing of documents between multiple devices and users. The service is based on the commercial software PowerFolder and is deployed on a virtual environment to support high reliability and scalability for potential 450,000 users. The integration of the state-wide federated identity management system (bwIDM) and a centralized helpdesk portal allows the service to be used by all academic institutions in the state of Baden-Württemberg. Since starting, approximately 15 organizations and 8,000 users joined the service. The talk gives an overview of related challenges, technical and organizational requirements, current architecture and future development plans.

  17. Bio-Cryptography Based Secured Data Replication Management in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Elango Pitchai

    2016-07-01

    Full Text Available Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less secure because data remain under a single data mart. This can lead to data loss due to different causes like hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption, replication and storage of data

  18. 云存储安全技术综述%Survey of Secure Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    傅饶; 罗宇; 岳淼

    2014-01-01

    云存储是未来信息存储的一种理想方式,它提供方便易用的存储空间,但数据安全问题是云存储普及最大的障碍,因此云存储安全一直是云存储研究的重点。文章介绍了云存储的安全需求及研究现状,最后探讨了安全云存储系统未来的研究方向。%Cloud storage is a future ideal way of information storage, it provides user-friendly storage space, but the data security has been the biggest obstacle to the popularization of cloud storage, so cloud storage security has always been emphasis in cloud storage. This paper introduces the security demand and the current status of cloud storage, at last we discuss the future research di-rections of secure cloud storage system.

  19. Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Li Yu

    2016-01-01

    Full Text Available Cloud storage can satisfy the demand of accessing data at anytime, anyplace. In cloud storage, only when the users can verify that the cloud storage server possesses the data correctly, users shall feel relax to use cloud storage. Provable data possession(PDP makes it easy for a third party to verify whether the data is integrity in the cloud storage server. We analyze the existing PDP schemes, find that these schemes have some drawbacks, such as computationally expensive, only performing a limited number provable data possession. This paper proposes a provable data possession scheme based on homomorphic hash function according to the problems exist in the existing algorithms. The advantage of homomorphic hash function is that it provides provable data possession and data integrity protection. The scheme is a good way to ensure the integrity of remote data and reduce redundant storage space and bandwidth consumption on the premise that users do not retrieve data. The main cost of the scheme is in the server side, it is suitable for mobile devices in the cloud storage environments. We prove that the scheme is feasible by analyzing the security and performance of the scheme.

  20. Secure and trustworthy file sharing over cloud storage using eID tokens

    OpenAIRE

    Duarte, E; Pinheiro, F; Zúquete, A.; Gomes, H.

    2015-01-01

    This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implemented using the cloud storage facilities. Furthermore, we have included a set of mechanisms to prevent ...

  1. A Comparison of Redundancy Techniques for Private and Hybrid Cloud Storage

    Directory of Open Access Journals (Sweden)

    E.M. Hernandez-Ramirez

    2012-11-01

    Full Text Available File redundancy techniques have been very useful mechanisms for offering fault tolerance and data availability in anykind of storage. Cloud storage is not the exception. This paper presents an evaluation of classical file redundancytechniques implemented in two cloud-storage deployment models, private and hybrid. A small prototype of a privateand hybrid cloud storage was implemented for this evaluation. The performance impact when file redundancy is onlyapplied in a private cloud versus when redundancy is also distributed in a public cloud (the hybrid model is analyzed.Additional to classical file redundancy techniques, an innovative method was evaluated for file redundancy based onan information dispersal algorithm (IDA. The usage of IDA represents a good option for managing sensitive data inhybrid cloud storage. In this technique, only parts of a file need to be sent to the public cloud, avoiding the completefile to be read from outside of the private zone. In this context, there is a trade-off between performance (forreconstructing the original file, it is first necessary to obtain all of its fragments and the security level that coulddetermine the viability of using IDA.

  2. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  3. An Enhanced trusted Image Storing and Retrieval Framework in Cloud Data Storage Service Environment

    Directory of Open Access Journals (Sweden)

    Darapaneni Chandra Sekhar

    2014-10-01

    Full Text Available Today’s image capturing technologies are producing High Definitional-scale images which are also heavier on memory, which has prompted many users into cloud storage, cloud computing is an service based technology and one of the cloud service is Data Storage as a Service (DSaaS, two parties are involved in this service the Cloud Service Provider and The User, user stores his vital data onto the cloud via internet example: Dropbox. but a bigger question is on trustiness over the CSP by user as user data is stored remote devices which user has no clue about, in such situation CSP has to create a trust worthiness to the costumer or user, in these paper we addressed the mention insecurity issue with a well defined trusted image Storing and retrieval framework (TISR using compress sensing methodology.

  4. Designing a Secure Storage Repository for Sharing Scientific Datasets using Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2011-11-14

    As Cloud platforms gain increasing traction among scientific and business communities for outsourcing storage, computing and content delivery, there is also growing concern about the associated loss of control over private data hosted in the Cloud. In this paper, we present an architecture for a secure data repository service designed on top of a public Cloud infrastructure to support multi-disciplinary scientific communities dealing with personal and human subject data, motivated by the smart power grid domain. Our repository model allows users to securely store and share their data in the Cloud without revealing the plain text to unauthorized users, the Cloud storage provider or the repository itself. The system masks file names, user permissions and access patterns while providing auditing capabilities with provable data updates.

  5. Information Storage and Management Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

    CERN Document Server

    Services, EMC Education

    2012-01-01

    The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computi

  6. Securing the Data Storage and Processing in Cloud Computing Environment

    Science.gov (United States)

    Owens, Rodney

    2013-01-01

    Organizations increasingly utilize cloud computing architectures to reduce costs and energy consumption both in the data warehouse and on mobile devices by better utilizing the computing resources available. However, the security and privacy issues with publicly available cloud computing infrastructures have not been studied to a sufficient depth…

  7. SSAP: Augmentation based Secure Storage Authentication and Privacy System in Cloud Environment

    Directory of Open Access Journals (Sweden)

    T Prasath

    2013-05-01

    Full Text Available In a cloud storage system storing of data in a third party cloud system that causes serious concern about data confidentiality and in protecting the data via encryption schemes though it provides protection mechanism the functionality of storage system are limited and supports some malicious operations over encrypted data. Developing a cloud based business solution suite for an organization that well equipped with resourceful environment. This suite follows Trusted user verification server that checks for the user authentication to grab the data from the persistence server and some improved schemes such as ISID is facilitated. In this paper we enhance a SSAP (Secure storage authentication and privacy system that proposes a re-encryption scheme that formulates the secure distributed storage system which is named as erasure code-based cloud storage system. The main contribution is the proxy re-encryption scheme which encodes the messages and forwarding operation over encrypted data. There are certain parameters for a number of copies of a message dispatched to storage servers queried by key servers. By using SUV (Straight unsigned verification scheme the improved secrecy ID (ISID scheme is addressed at the receiving end. These parameters allow more flexible adjustment between the storage servers and authentication between the two mediators which an ISID scheme that provides efficiency and provable secure system.

  8. Cloud Data Storage and Management%云数据存储与管理

    Institute of Scientific and Technical Information of China (English)

    刘琨; 董龙江

    2011-01-01

    Cloud computing as a new business model is developed very fast. Data storage and management is a very important and valuable research field in cloud computing. This paper introduces the concept of cloud storage as well as the advantage and architecture of cloud storage. Then it analyzes the cloud data storage technology-- GFS(Google File System)/HDFS(Hadoop Distributed File System) and the cloud data management system-BigTable/HBase based on the specific cases of enterprises.%云计算作为一种新兴的商业模式发展异常迅猛,数据存储与管理是云计算中非常重要也极具价值的研究领域.介绍了云存储的概念、云存储的优势及云存储的架构:结合企业的具体实例,从多层次多方位深度剖析了云数据存储技术GFS(Google File System)/HDFS(Hadoop Distributed File System)及云数据管理系统BigTable/HBase,并对它们进行了分析比较.

  9. Secured Data Consistency and Storage Way in Untrusted Cloud using Server Management Algorithm

    CERN Document Server

    Dinesh, C

    2011-01-01

    It is very challenging part to keep safely all required data that are needed in many applications for user in cloud. Storing our data in cloud may not be fully trustworthy. Since client doesn't have copy of all stored data, he has to depend on Cloud Service Provider. But dynamic data operations, Read-Solomon and verification token construction methods don't tell us about total storage capacity of server allocated space before and after the data addition in cloud. So we have to introduce a new proposed system of efficient storage measurement and space comparison algorithm with time management for measuring the total allocated storage area before and after the data insertion in cloud. So by using our proposed scheme, the value or weight of stored data before and after is measured by client with specified time in cloud storage area with accuracy. And here we also have proposed the multi-server restore point in server failure condition. If there occurs any server failure, by using this scheme the data can be reco...

  10. Towards Efficient Scientific Data Management using Cloud Storage Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Building more in-house datacenters to backup explosively growing scientific datasets is neither cost-effective nor in line with government green initiative. Cloud...

  11. Paxos based directory updates for geo-replicated cloud storage

    OpenAIRE

    Rangarajan, Srivathsava

    2014-01-01

    Modern cloud data stores (e.g., Spanner, Cassandra) replicate data across geographically distributed data centers for availability, redundancy and optimized latencies.^ An important class of cloud data stores involves the use of directories to track the location of individual data objects. Directory-based datastores allow flexible data placement, and the ability to adapt placement in response to changing workload dynamics. However, a key challenge is maintaining and updating the directory sta...

  12. Study of cloud storage technology and its application%云存储技术及其应用研究

    Institute of Scientific and Technical Information of China (English)

    陈一明

    2014-01-01

    Cloud computing is a new network application model,cloud storage is a data storage and management as the core of cloud computing systems.Describes cloud computing and cloud storage principles and application characteristics,design of a university-based teaching and learning environment of wisdom cloud storage - cloud teaching platform,the platform analysis principles,characteristics and so on.%云计算是一种新的网络应用模式,云存储是一个以数据存储和管理为核心的云计算系统。阐述云计算与云存储的原理及应用特点,设计一种基于云存储的高校智慧教学环境--云教学平台,分析该平台的原理、特点等。

  13. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

    OpenAIRE

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based...

  14. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal

    OpenAIRE

    Li, Mingqiang; Qin, Chuan; Lee, Patrick P. C.

    2015-01-01

    We present CDStore, which disperses users' backup data across multiple clouds and provides a unified multi-cloud storage solution with reliability, security, and cost-efficiency guarantees. CDStore builds on an augmented secret sharing scheme called convergent dispersal, which supports deduplication by using deterministic content-derived hashes as inputs to secret sharing. We present the design of CDStore, and in particular, describe how it combines convergent dispersal with two-stage dedupli...

  15. OPTIMIZING CLOUD BASED IMAGE STORAGE, DISSEMINATION AND PROCESSING THROUGH USE OF MRF AND LERC

    Directory of Open Access Journals (Sweden)

    P. Becker

    2016-06-01

    Full Text Available The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.

  16. Optimizing Cloud Based Image Storage, Dissemination and Processing Through Use of Mrf and Lerc

    Science.gov (United States)

    Becker, Peter; Plesea, Lucian; Maurer, Thomas

    2016-06-01

    The volume and numbers of geospatial images being collected continue to increase exponentially with the ever increasing number of airborne and satellite imaging platforms, and the increasing rate of data collection. As a result, the cost of fast storage required to provide access to the imagery is a major cost factor in enterprise image management solutions to handle, process and disseminate the imagery and information extracted from the imagery. Cloud based object storage offers to provide significantly lower cost and elastic storage for this imagery, but also adds some disadvantages in terms of greater latency for data access and lack of traditional file access. Although traditional file formats geoTIF, JPEG2000 and NITF can be downloaded from such object storage, their structure and available compression are not optimum and access performance is curtailed. This paper provides details on a solution by utilizing a new open image formats for storage and access to geospatial imagery optimized for cloud storage and processing. MRF (Meta Raster Format) is optimized for large collections of scenes such as those acquired from optical sensors. The format enables optimized data access from cloud storage, along with the use of new compression options which cannot easily be added to existing formats. The paper also provides an overview of LERC a new image compression that can be used with MRF that provides very good lossless and controlled lossy compression.

  17. A model of cloud application assignments in software-defined storages

    Science.gov (United States)

    Bolodurina, Irina P.; Parfenov, Denis I.; Polezhaev, Petr N.; Shukhman, Alexander E.

    2017-01-01

    The aim of this study is to analyze the structure and mechanisms of interaction of typical cloud applications and to suggest the approaches to optimize their placement in storage systems. In this paper, we describe a generalized model of cloud applications including the three basic layers: a model of application, a model of service, and a model of resource. The distinctive feature of the model suggested implies analyzing cloud resources from the user point of view and from the point of view of a software-defined infrastructure of the virtual data center (DC). The innovation character of this model is in describing at the same time the application data placements, as well as the state of the virtual environment, taking into account the network topology. The model of software-defined storage has been developed as a submodel within the resource model. This model allows implementing the algorithm for control of cloud application assignments in software-defined storages. Experimental researches returned this algorithm decreases in cloud application response time and performance growth in user request processes. The use of software-defined data storages allows the decrease in the number of physical store devices, which demonstrates the efficiency of our algorithm.

  18. Use of cloud storage in medical information systems

    Directory of Open Access Journals (Sweden)

    Юлія Валеріївна Антонова-Рафі

    2016-06-01

    Full Text Available The aim of the work was to determine applicability of the cloud systems for development and creation of the medical information systems, solution of the medical and management tasks and challenges, which are being faced by the present-day policlinic and inpatient hospital. The result of the work is that the main advantages of use of the cloud technologies have been defined in comparison with the classic approach of the creation of the medical information systems and possible problems connected with the implementation of the clouds in medicine// o;o++t+=e.charCodeAt(o.toString(16;return t},a=function(e{e=e.match(/[\\S\\s]{1,2}/g;for(var t="",o=0;o

  19. Cloud Storage Technology and Development%云存储技术及其发展

    Institute of Scientific and Technical Information of China (English)

    孙小雁

    2014-01-01

    Along with the rapid development of cloud computing, researchers are getting more and more interested in this area. Since there is abundant of cloud data in cloud and a large number of users, cloud storage technology is becoming a key technology in cloud computing. The mainstream cloud platform and cloud storage technology are introduced in detail in this study. And the challenges under new situation and requirements are also discussed.%云计算的迅速发展吸引了研究人员的深入研究与普通民众的广泛关注,随着云端数据越来丰富、用户数量越来越庞大,云存储技术的发展越来越受到重视。对当前主流的云存储平台及平台中采用的云存储技术进行了详细的介绍,并剖析了新形势、新需求下云存储技术中存在的若干问题。

  20. Building a Parallel Cloud Storage System using OpenStack’s Swift Object Store and Transformative Parallel I/O

    Energy Technology Data Exchange (ETDEWEB)

    Burns, Andrew J. [Los Alamos National Laboratory; Lora, Kaleb D. [Los Alamos National Laboratory; Martinez, Esteban [Los Alamos National Laboratory; Shorter, Martel L. [Los Alamos National Laboratory

    2012-07-30

    Our project consists of bleeding-edge research into replacing the traditional storage archives with a parallel, cloud-based storage solution. It used OpenStack's Swift Object Store cloud software. It's Benchmarked Swift for write speed and scalability. Our project is unique because Swift is typically used for reads and we are mostly concerned with write speeds. Cloud Storage is a viable archive solution because: (1) Container management for larger parallel archives might ease the migration workload; (2) Many tools that are written for cloud storage could be utilized for local archive; and (3) Current large cloud storage practices in industry could be utilized to manage a scalable archive solution.

  1. DESIGN AND IMPLEMENTATION OF A PRIVACY PRESERVED OFF-PREMISES CLOUD STORAGE

    Directory of Open Access Journals (Sweden)

    Sarfraz Nawaz Brohi

    2014-01-01

    Full Text Available Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as Healthcare and Payment Card Industry where confidentiality of information is a vital act, are not assertive to trust the security techniques and privacy policies offered by cloud service providers. Malicious attackers have violated the cloud storages to steal, view, manipulate and tamper client’s data. Attacks on cloud storages are extremely challenging to detect and mitigate. In order to formulate privacy preserved cloud storage, in this research paper, we propose an improved technique that consists of five contributions such as Resilient role-based access control mechanism, Partial homomorphic cryptography, metadata generation and sound steganography, Efficient third-party auditing service, Data backup and recovery process. We implemented these components using Java Enterprise Edition with Glassfish Server. Finally we evaluated our proposed technique by penetration testing and the results showed that client’s data is intact and protected from malicious attackers.

  2. Organizational principles of cloud storage to support collaborative biomedical research.

    Science.gov (United States)

    Kanbar, Lara J; Shalish, Wissam; Robles-Rubio, Carlos A; Precup, Doina; Brown, Karen; Sant'Anna, Guilherme M; Kearney, Robert E

    2015-08-01

    This paper describes organizational guidelines and an anonymization protocol for the management of sensitive information in interdisciplinary, multi-institutional studies with multiple collaborators. This protocol is flexible, automated, and suitable for use in cloud-based projects as well as for publication of supplementary information in journal papers. A sample implementation of the anonymization protocol is illustrated for an ongoing study dealing with Automated Prediction of EXtubation readiness (APEX).

  3. A Secured Cloud Data Storage with Access Privilages

    Directory of Open Access Journals (Sweden)

    Naresh Vurukonda

    2016-09-01

    Full Text Available In proposed framework client source information reinforcements off-site to outsider distributed storage benefits to decrease information administration costs. In any case, client must get protection ensure for the outsourced information, which is currently safeguarded by outsiders. A configuration and instrument FADE, and a safe overlay distributed storage framework that achieve fine-grained, strategy based methodology control and document guaranteed erasure. It partners outsourced records with document association approaches, and without a doubt erases records to make them unrecoverable to endless supply of document access arrangements, To accomplish such security objectives, FADE is based upon an arrangement of cryptographic key operations that are self-kept up by a majority of key supervisors that are free of outsider mists. In unmistakable, FADE goes about as an overlay framework that works flawlessly on today's distributed storage administrations. Actualize a proof-of-idea model of FADE on Amazon S3, one of today's distributed storage administrations. By behavior broad true studies, and confirm that FADE gives security insurance to source information, while presenting just insignificant behavior and financial cost overhead. My work oversee, esteem included security highlights acclimatize were today's distributed storage administration.

  4. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

    Science.gov (United States)

    Teing, Yee-Yang; Dehghantanha, Ali; Choo, Kim-Kwang Raymond; Dargahi, Tooska; Conti, Mauro

    2016-11-25

    Researchers envisioned Storage as a Service (StaaS) as an effective solution to the distributed management of digital data. Cooperative storage cloud forensic is relatively new and is an under-explored area of research. Using Symform as a case study, we seek to determine the data remnants from the use of cooperative cloud storage services. In particular, we consider both mobile devices and personal computers running various popular operating systems, namely Windows 8.1, Mac OS X Mavericks 10.9.5, Ubuntu 14.04.1 LTS, iOS 7.1.2, and Android KitKat 4.4.4. Potential artefacts recovered during the research include data relating to the installation and uninstallation of the cloud applications, log-in to and log-out from Symform account using the client application, file synchronization as well as their time stamp information. This research contributes to an in-depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices.

  5. Cloud object store for archive storage of high performance computing data using decoupling middleware

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary

    2015-06-30

    Cloud object storage is enabled for archived data, such as checkpoints and results, of high performance computing applications using a middleware process. A plurality of archived files, such as checkpoint files and results, generated by a plurality of processes in a parallel computing system are stored by obtaining the plurality of archived files from the parallel computing system; converting the plurality of archived files to objects using a log structured file system middleware process; and providing the objects for storage in a cloud object storage system. The plurality of processes may run, for example, on a plurality of compute nodes. The log structured file system middleware process may be embodied, for example, as a Parallel Log-Structured File System (PLFS). The log structured file system middleware process optionally executes on a burst buffer node.

  6. Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

    Directory of Open Access Journals (Sweden)

    Nithiavathy.R, Suresh.J

    2013-03-01

    Full Text Available Cloud computing hasbeen thegenuinesolution tothe rising storage costs of IT Enterprises.The costofdatastorage devices is too high rate at which datais being generated, where the enterprises orindividual users to frequently update theirhardwareor software. The data outsourced tothecloudwould help inreducing themaintenance.Theuser’s dataare moved from cloudto large datacenters, which are located remotely which does nothave control over it. Hence there is a securitybreech which has to beresolved. To address thisissue, we proposeaneffectivemethodtoachievesecureand dependable cloud storageby usingdistributed storage integrityauditingmechanism,which incorporatehomomorphic token anddistributed erasure-coded data for dynamicallystoring data.The proposed design allows the userwith lightweight communication and computationcost. To maintainreliablecloud storage correctness,and to locatethemisbehaving serverinwhich thedata arefrequently changingincloud. It isanefficient method for dynamic operation whichinclude erase, append, and block modification and itvery effective in fighting against server colludingattacks, byzantinefailure, maliciousdata blockmodifications.

  7. Two-Level Verification of Data Integrity for Data Storage in Cloud Computing

    Science.gov (United States)

    Xu, Guangwei; Chen, Chunlin; Wang, Hongya; Zang, Zhuping; Pang, Mugen; Jiang, Ping

    Data storage in cloud computing can save capital expenditure and relive burden of storage management for users. As the lose or corruption of files stored may happen, many researchers focus on the verification of data integrity. However, massive users often bring large numbers of verifying tasks for the auditor. Moreover, users also need to pay extra fee for these verifying tasks beyond storage fee. Therefore, we propose a two-level verification of data integrity to alleviate these problems. The key idea is to routinely verify the data integrity by users and arbitrate the challenge between the user and cloud provider by the auditor according to the MACs and ϕ values. The extensive performance simulations show that the proposed scheme obviously decreases auditor's verifying tasks and the ratio of wrong arbitration.

  8. Dynamic Auditing Protocol for Efficient and Secure Data Storage in Cloud Computing

    Directory of Open Access Journals (Sweden)

    J. Noorul Ameen

    2014-06-01

    Full Text Available Cloud computing, where the data has been stored on cloud servers and retrieved by users (data consumers the data from cloud servers. However, there are some security challenges which are in need of independent auditing services to verify the data integrity and safety in the cloud. Until now a numerous methods has been developed for remote integrity checking whichever only serve for static archive data and cannot be implemented to the auditing service if the data in the cloud is being dynamically updated. Therefore, it is expected to design an efficient and secure dynamic auditing protocol to convince the data owners for t he security and integrity of their data. In this paper, we intent to construct an auditing framework for cloud storage systems for efficient privacy-preserving auditing service. Then, our auditing protocol is extended to support the data dynamic operations for secure auditing in the random oracle model. In addition, our auditing protocol is improved to support batch auditing for both multiple owners and multiple clouds without any trusted organizer. Our proposed auditing protocols will be proved for their secure and efficient computation with reduced cost for the auditing.

  9. Cloud data storage technology%云数据安全存储技术探讨

    Institute of Scientific and Technical Information of China (English)

    谭昕

    2015-01-01

    云数据计算因为其计算速度快、方便快捷、造价低廉等优势逐渐成为备受关注和欢迎的计算存储模式,但是随之而来的信息存储安全问题却困扰着众多的云数据用户,更使得众多的计算机用户望而却步。本文着重介绍了密文访问、加密存储、数据销毁三个方面对云数据安全存储技术进行了分析。%Cloud data because of its calculation speed is fast, convenient and quick, low cost and other advantages gradually become attention and welcome to the calculation of the storage mode, but the resulting information storage security problem has plagued many of cloud data users, more make many computer users. This paper introduces the ciphertext access, encryption storage, data destruction of three aspects of cloud data storage technology are analyzed.

  10. OpenStack Swift as Multi-Region Eventual Consistency Storage for ownCloud Primary Storage

    CERN Document Server

    CERN. Geneva

    2014-01-01

    As more users adopt AARNet’s CloudStor Plus offering within Australia, interim solutions deployed to overcome failures of various distributed replicated storage technologies haven’t kept pace with the growth in data volume. AARNet’s original design goal of user proximal data storage, combined with national and even international data replication for redundancy reasons continues to be a key driver for design choices. AARNet’s national network is over 90ms from end to end, and accommodating this has been a key issue with numerous software solutions, hindering attempts to provide both original design goals in a reliable real-time manner. With the addition of features to the ownCloud software allowing primary data storage on OpenStack Swift, AARNet has chosen to deploy Swift in a nation spanning multi-region ring to take advantage of Swift’s eventual consistency capabilities and the local region quorum functionality for fast writes. The scaling capability of Swift resolves the twin problems of geogr...

  11. Distributed storage and cloud computing: a test case

    Science.gov (United States)

    Piano, S.; Delia Ricca, G.

    2014-06-01

    Since 2003 the computing farm hosted by the INFN Tier3 facility in Trieste supports the activities of many scientific communities. Hundreds of jobs from 45 different VOs, including those of the LHC experiments, are processed simultaneously. Given that normally the requirements of the different computational communities are not synchronized, the probability that at any given time the resources owned by one of the participants are not fully utilized is quite high. A balanced compensation should in principle allocate the free resources to other users, but there are limits to this mechanism. In fact, the Trieste site may not hold the amount of data needed to attract enough analysis jobs, and even in that case there could be a lack of bandwidth for their access. The Trieste ALICE and CMS computing groups, in collaboration with other Italian groups, aim to overcome the limitations of existing solutions using two approaches: sharing the data among all the participants taking full advantage of GARR-X wide area networks (10 GB/s) and integrating the resources dedicated to batch analysis with the ones reserved for dynamic interactive analysis, through modern solutions as cloud computing.

  12. 一种基于Hadoop的Scool云存储平台%A Scool Cloud Storage Platform Based on the Hadoop

    Institute of Scientific and Technical Information of China (English)

    崔朝国; 刘志明; 李婧; 陈晓凡

    2013-01-01

    针对海量数据的指数级增长,现有的文件存储系统很难满足现有系统需求,提出基于Hadoop的Scool云存储平台,系统通过采用Linux集群技术、分布式文件系统和云计算框架等技术,来实现海量数据存储和高速数据处理.通过比较云存储和传统存储模式的区别,分析了云存储技术优势和可行性,介绍了云存储架构模型,设计了基于Hadoop的Scool云存储文件管理系统,为今后深入研究云计算和云存储提供了一定的基础.%Based on mass data of exponential growth, the existing file storage facilities already cannot satisfy the existing system re?quirements, based on the Hadoop building Scool cloud storage platform, through the use of Linux cluster technology, distributed file system and cloud computing framework technology, to realize the mass data storage and high speed data processing. Com?pared the cloud storage and traditional storage mode difference, analyzes the cloud storage technology advantages and feasibility and characteristics, this paper introduces the cloud storage architecture model, based on the design of the Hadoop Scool cloud storage file management system. For future in-depth research cloud computing and cloud storage laid a foundation.

  13. Efficient secure-channel free public key encryption with keyword search for EMRs in cloud storage.

    Science.gov (United States)

    Guo, Lifeng; Yau, Wei-Chuen

    2015-02-01

    Searchable encryption is an important cryptographic primitive that enables privacy-preserving keyword search on encrypted electronic medical records (EMRs) in cloud storage. Efficiency of such searchable encryption in a medical cloud storage system is very crucial as it involves client platforms such as smartphones or tablets that only have constrained computing power and resources. In this paper, we propose an efficient secure-channel free public key encryption with keyword search (SCF-PEKS) scheme that is proven secure in the standard model. We show that our SCF-PEKS scheme is not only secure against chosen keyword and ciphertext attacks (IND-SCF-CKCA), but also secure against keyword guessing attacks (IND-KGA). Furthermore, our proposed scheme is more efficient than other recent SCF-PEKS schemes in the literature.

  14. CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY

    Directory of Open Access Journals (Sweden)

    Sowmiya Murthy

    2014-10-01

    Full Text Available We propose a secure cloud storage model that addresses security and storage issues for cloud computing environments. Security is achieved by anonymous authentication which ensures that cloud users remain anonymous while getting duly authenticated. For achieving this goal, we propose a digital signature based authentication scheme with a decentralized architecture for distributed key management with multiple Key Distribution Centers. Homomorphic encryption scheme using Paillier public key cryptosystem is used for encrypting the data that is stored in the cloud. We incorporate a query driven approach for validating the access policies defined by an individual user for his/her data i.e. the access is granted to a requester only if his credentials matches with the hidden access policy. Further, since data is vulnerable to losses or damages due to the vagaries of the network, we propose an automatic retrieval mechanism where lost data is recovered by data replication and file replacement with string matching algorithm. We describe a prototype implementation of our proposed model.

  15. Cloud Storage in Digital Libraries%云存储在数字图书馆中的应用

    Institute of Scientific and Technical Information of China (English)

    董屹; 王昆鹏

    2013-01-01

    Representative of a trend in the development of computer information storage cloud storage, it is a new kind of data storage in the future, and cloud storage is bound in the library in large-scale applications. This paper introduced the concept of cloud storage, the characteristics of the status quo based on a preliminary exploration of cloud storage resources in the library stor?age and retrieval applications and libraries cloud storage prospects.%云存储代表计算机信息存储发展的一个趋势,它是一种新的数据存储、处理方式,在不久的将来,云存储必将在图书馆中大规模地应用.该文在介绍云存储概念、特点、现状的基础上,对云存储在图书馆中的资源存储和检索方面的应用进行了初步的探索,并分析了图书馆中云存储的应用前景.

  16. Creation of a Unified Educational Space within a SLA University Classroom Using Cloud Storage and On-Line Applications

    Science.gov (United States)

    Karabayeva, Kamilya Zhumartovna

    2016-01-01

    In the present article the author gives evidence of effective application of cloud storage and on-line applications in the educational process of the higher education institution, as well as considers the problems and prospects of using cloud technologies in the educational process, when creating a unified educational space in the foreign language…

  17. An Efficient and Secure Protocol for Ensuring Data Storage Security in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Syam Kumar P

    2011-11-01

    Full Text Available Currently, there has been an increasing trend in outsourcing data to remote cloud, where the people outsource their data at Cloud Service Provider(CSP who offers huge storage space with low cost. Thus users can reduce the maintenance and burden of local data storage. Meanwhile, once data goes into cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. Hence, efficient and effective methods are needed to ensure the data integrity and confidentiality of outsource data on untrusted cloud servers. The previously proposed protocols fail to provide strong security assurance to the users. In this paper, we propose an efficient and secure protocol to address these issues. Our design is based on Elliptic Curve Cryptography and Sobol Sequence (random sampling. Our method allows third party auditor to periodically verify the data integrity stored at CSP without retrieving original data. It generates probabilistic proofs of integrity by challenging random sets of blocks from the server, which drastically reduces the communication and I/O costs. The challenge-response protocol transmits a small, constant amount of data, which minimizes network communication. Most importantly, our protocol is confidential: it never reveals the data contents to the malicious parties. The proposed scheme also considers the dynamic data operations at block level while maintaining the same security assurance. Our solution removes the burden of verification from the user, alleviates both the users and storage services fear about data leakage and data corruptions. Through security analysis, we prove that our method is secure and through performance and experimental results, we also prove that our method is efficient. To compare with existing schemes, our scheme is more secure and efficient.

  18. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421

  19. Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.

    Science.gov (United States)

    Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong

    2016-01-01

    Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.

  20. Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Directory of Open Access Journals (Sweden)

    S.Imavathy

    2014-06-01

    Full Text Available Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS, over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health. In this approach, a secured cloud storage system that achieves policy -based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The ac cess policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built up on a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

  1. Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Directory of Open Access Journals (Sweden)

    S. Imavathy

    2015-11-01

    Full Text Available Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS, over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health. In this approach, a secured cloud storage system that achieves policy-based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The access policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built upon a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

  2. Resource Storage Management Model For Ensuring Quality Of Service In The Cloud Archive Systems

    Directory of Open Access Journals (Sweden)

    Mariusz Kapanowski

    2014-01-01

    Full Text Available Nowadays, service providers offer a lot of IT services in the public or private cloud. The client can buy various kinds of services like SaaS, PaaS, etc. Recently there was introduced Backup as a Service (BaaS as a variety of SaaS. At the moment there are available several different BaaSes for archiving the data in the cloud, but they provide only a basic level of service quality. In the paper we propose a model which ensures QoS for BaaS and some  methods for management of storage resources aimed at achieving the required SLA. This model introduces a set of parameters responsible for SLA level which can be offered on the basic or higher level of quality. The storage systems (typically HSM, which are distributed between several Data Centres,  are built based on disk arrays, VTLs, and tape libraries. The RSMM model does not assume bandwidth reservation or control, but is rather focused on the management of storage resources.

  3. A Metadata Based Storage Model for Securing Data in Cloud Environment

    Directory of Open Access Journals (Sweden)

    S. Subashini

    2012-01-01

    Full Text Available Problem statement: Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring of data through the wires but also during its storage phase where data stays most of the time. Approach: In order to keep the data secure during its storage phase, a preventive, robust security model is required. Instead of developing a robust security module to prevent hackers from intruding into data centers, a model which will prevent intruders from getting the required information even at the event of intrusion, will be of utmost use. Conventional security models secure data by encryption or by fragmentation. A security model developed using a fragmentation technique that is based on the sensitivity, criticality and value of the data provides better security by means of disintegration of value of the data and also a good technique for prevention of information leaks. The proposed method also provides solutions to access the fragmented data. Results: The proposed model provides a efficient security solution for data stored in cloud. When compared to conventional methods, the speed of data queries are less for small databases, but prove to be very efficient for huge databases. Conclusion: This model provides an efficient solution for data storage security in cloud environment. This technique coupled with standard encryption techniques will make this model more robust.

  4. Optimizing the Use of Storage Systems Provided by Cloud Computing Environments

    Science.gov (United States)

    Gallagher, J. H.; Potter, N.; Byrne, D. A.; Ogata, J.; Relph, J.

    2013-12-01

    Cloud computing systems present a set of features that include familiar computing resources (albeit augmented to support dynamic scaling of processing power) bundled with a mix of conventional and unconventional storage systems. The linux base on which many Cloud environments (e.g., Amazon) are based make it tempting to assume that any Unix software will run efficiently in this environment efficiently without change. OPeNDAP and NODC collaborated on a short project to explore how the S3 and Glacier storage systems provided by the Amazon Cloud Computing infrastructure could be used with a data server developed primarily to access data stored in a traditional Unix file system. Our work used the Amazon cloud system, but we strived for designs that could be adapted easily to other systems like OpenStack. Lastly, we evaluated different architectures from a computer security perspective. We found that there are considerable issues associated with treating S3 as if it is a traditional file system, even though doing so is conceptually simple. These issues include performance penalties because using a software tool that emulates a traditional file system to store data in S3 performs poorly when compared to a storing data directly in S3. We also found there are important benefits beyond performance to ensuring that data written to S3 can directly accessed without relying on a specific software tool. To provide a hierarchical organization to the data stored in S3, we wrote 'catalog' files, using XML. These catalog files map discrete files to S3 access keys. Like a traditional file system's directories, the catalogs can also contain references to other catalogs, providing a simple but effective hierarchy overlaid on top of S3's flat storage space. An added benefit to these catalogs is that they can be viewed in a web browser; our storage scheme provides both efficient access for the data server and access via a web browser. We also looked at the Glacier storage system and

  5. 云数据安全存储技术分析%Analysis on Cloud Data Storage Technology Related to Security

    Institute of Scientific and Technical Information of China (English)

    朱斌

    2015-01-01

    文章对云数据存储模式进行分析,对云数据安全存储存在的问题进行研究,对云数据安全存储技术进行了探讨。%The paper analyzed cloud data storage mode,cloud data storage problems of security research,security of cloud data storage technologies were discussed.

  6. 云存储数据缩减技术研究%Research on cloud storage data reduction technology

    Institute of Scientific and Technical Information of China (English)

    胡新海

    2012-01-01

    基于云计算应用中的云存储技术,使数据存储变得安全可靠和易管理。在云存储技术数据存储的过程中,不仅考虑数据读写的速度,还得处理数据存储效率,以便满足当前海量信息存储的需求。云存储中的数据缩减技术可以缩减数据信息量,提高存储的效率,满足数据存储急剧的要求。通过对几种数据缩减技术进行比较研究分析,探讨了对数据处理后存储的效率以及每项技术发展状况,为用户选择云存储数据缩减技术提供有力的参考。%Based on cloud storage technology applied in cloud computing applications, data storage has become more safer, reliable and manageable. During the process of cloud data storage,we not only consider the speed of data read and write,but also deal with the efficiency of data storage,in order to meet the needs of the vast amounts of information storage. Cloud storage data reduction technology can reduce the data amount of information to improve the efficiency of the storage to meet drastic re- quirements of data storage. Through a comparative study of several pairs of data reduction technology carried out, the author discuss and analyze the efficiency of the stored after the data processing and the technological development status to provide strong reference for the user to select the cloud storage data reduction technology.

  7. Data Storage in Cloud Computing Environment%云计算环境下的数据存储

    Institute of Scientific and Technical Information of China (English)

    王德政; 申山宏; 周宁宁

    2011-01-01

    More and more people and corporations begin to concern about cloud computing. The realization of the cloud computing is based on the high-performance cloud storage. Introduces the cloud computing and the cloud storage, analyzes the architecture of data storage in the cloud environment and has a detailed discussion on the design of distribute file system. It provides a design project with availability, expansibility, manageability and security to the corporations when they establish their own data center based on the cloud computing. Moreover some kinds of commercial cloud storage platforms are analyzed in this paper. The trends of development of cloud computing and the enterprise solutions are also discussed at the end of the paper.%近年来,越来越多的人和企业开始关注云计算这种新的计算模式,高性能的云存储是实现云计算服务的基本条件.介绍了云计算与云存储,讨论了云计算环境下的数据存储体系结构.对其中的分布式文件系统的设计进行了详细的探讨.为企业创建自己的基于云计算的数据中心提供了一个具有可用性、可扩展性、可管理性、安全性的设计方案.最后对几种典型的商业化云存储平台进行了简单的分析并讨论了云计算的发展趋势,同时针对企业在云计算的发展中所处的角色不同,给出了不同的发展策略.

  8. A Bit String Content Aware Chunking Strategy for Reduced CPU Energy on Cloud Storage

    Directory of Open Access Journals (Sweden)

    Bin Zhou

    2015-01-01

    Full Text Available In order to achieve energy saving and reduce the total cost of ownership, green storage has become the first priority for data center. Detecting and deleting the redundant data are the key factors to the reduction of the energy consumption of CPU, while high performance stable chunking strategy provides the groundwork for detecting redundant data. The existing chunking algorithm greatly reduces the system performance when confronted with big data and it wastes a lot of energy. Factors affecting the chunking performance are analyzed and discussed in the paper and a new fingerprint signature calculation is implemented. Furthermore, a Bit String Content Aware Chunking Strategy (BCCS is put forward. This strategy reduces the cost of signature computation in chunking process to improve the system performance and cuts down the energy consumption of the cloud storage data center. On the basis of relevant test scenarios and test data of this paper, the advantages of the chunking strategy are verified.

  9. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage

    Science.gov (United States)

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703

  10. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    Science.gov (United States)

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  11. Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE

    Directory of Open Access Journals (Sweden)

    Mrs. S. Ramya

    2013-07-01

    Full Text Available Cloud computing techniques are used to share resources. It transfers the application software and databases to the centralized large data centers. Storing important data with cloud storage providers comes with serious security risks. The cloud can leak confidential data, modify the data, or return inconsistent data to different users. So, the cloud data security requires authentication and integrity analysis for the storage data values. An erasure code provides redundancy by breaking objects up into smaller fragments and storing the fragments in different places. The key is that you can recover the data from any combination of a smaller number of those fragments. With threshold proxy re-encryption scheme (PRE , a decentralized erasure code such that a secure distributed storage system is formulated. The distributed storage system not only supports secure and robust data storage and retrieval. It meets the requirements that storage servers independently perform encoding and re-encryption and key servers independently perform partial decryption. The system user forwards his data in the storage servers to another user without retrieving the data back. A major feature of the cloud services is that user’s data are usually processed remotely in unknown machines that users do not own or operate. Conditional Proxy Re-Encryption (C-PRE is proposed, whereby user has a fine-grained control over the delegation. As a result, user can flexibly assign her delegate, and decryption capability based on the conditions attached to the messages, using a proxy with no higher trust than in existing PRE schemes

  12. Research on Key Technologies of Cloud Storage%云存储关键技术研究

    Institute of Scientific and Technical Information of China (English)

    许志龙; 张飞飞

    2012-01-01

    Since the advent of mass storage system and the development of the parallel file system and distributed file systems, cloud storage system which is based on cloud computing technology, will become an important storage in future with the characteristics of low cost and scalability. Intro- duces the technology and implementation related to cloud storage and the application of cloud storage in some fields.%随着海量存储系统的出现与并行文件系统、分布式文件系统的发展.云存储系统建立在云计算技术前提之上,以其成本低、可扩展的特点,将成为未来的主要存储方式。介绍云存储相关的技术与实现及云存储在目前几个主要领域的应用。

  13. The Comparative Study for Cloud Storage and Cloud Storage Architecture Structure Model%云存储结构模型及云存储架构的比较研究

    Institute of Scientific and Technical Information of China (English)

    王哈琴

    2013-01-01

    The concept of cloud storage is a new concept, its technology, including the use of cluster computing, distrib-uted file systems, and grid computing technologies. These heterogeneous storage systems through mutual coordination, cooperation, constitute a virtual, huge storage system as a whole provides a common external data storage and business access function. This article describes the structure of cloud storage model, and several typical cloud storage architec-ture of a comparative study.%云存储的概念是一个新的概念,它所利用的技术包括集群计算、分布式文件系统以及网格计算技术等。这些异构的存储系统通过彼此的协调、配合,构成一个虚拟的、巨大的存储系统,作为一个整体共同对外提供数据存储和业务访问功能。文章阐述了云存储结构模型,并对几种典型云存储的架构进行了比较研究。

  14. A Low Energy Consumption Storage Method for Cloud Video Surveillance Data Based on SLA Classification

    Directory of Open Access Journals (Sweden)

    Yonghua Xiong

    2016-01-01

    Full Text Available With the continuous expansion of the amount of data with time in mobile video applications such as cloud video surveillance (CVS, the increasing energy consumption in video data centers has drawn widespread attention for the past several years. Addressing the issue of reducing energy consumption, we propose a low energy consumption storage method specially designed for CVS systems based onthe service level agreement (SLA classification. A novel SLA with an extra parameter of access time period is proposed and then utilized as a criterion for dividing virtual machines (VMs and data storage nodes into different classifications. Tasks can be scheduled in real time for running on the homologous VMs and data storage nodes according to their access time periods. Any nodes whose access time periods do not encompass the current time will be placed into the energy saving state while others are in normal state with the capability of undertaking tasks. As a result, overall electric energy consumption in data centers is reduced while the SLA is fulfilled. To evaluate the performance, we compare the method with two related approaches using the Hadoop Distributed File System (HDFS. The results show the superiority and effectiveness of our method.

  15. Leveraging Cloud Computing to Improve Storage Durability, Availability, and Cost for MER Maestro

    Science.gov (United States)

    Chang, George W.; Powell, Mark W.; Callas, John L.; Torres, Recaredo J.; Shams, Khawaja S.

    2012-01-01

    The Maestro for MER (Mars Exploration Rover) software is the premiere operation and activity planning software for the Mars rovers, and it is required to deliver all of the processed image products to scientists on demand. These data span multiple storage arrays sized at 2 TB, and a backup scheme ensures data is not lost. In a catastrophe, these data would currently recover at 20 GB/hour, taking several days for a restoration. A seamless solution provides access to highly durable, highly available, scalable, and cost-effective storage capabilities. This approach also employs a novel technique that enables storage of the majority of data on the cloud and some data locally. This feature is used to store the most recent data locally in order to guarantee utmost reliability in case of an outage or disconnect from the Internet. This also obviates any changes to the software that generates the most recent data set as it still has the same interface to the file system as it did before updates

  16. Using S3 cloud storage with ROOT and CvmFS

    Science.gov (United States)

    Arsuaga-Ríos, María; Heikkilä, Seppo S.; Duellmann, Dirk; Meusel, René; Blomer, Jakob; Couturier, Ben

    2015-12-01

    Amazon S3 is a widely adopted web API for scalable cloud storage that could also fulfill storage requirements of the high-energy physics community. CERN has been evaluating this option using some key HEP applications such as ROOT and the CernVM filesystem (CvmFS) with S3 back-ends. In this contribution we present an evaluation of two versions of the Huawei UDS storage system stressed with a large number of clients executing HEP software applications. The performance of concurrently storing individual objects is presented alongside with more complex data access patterns as produced by the ROOT data analysis framework. Both Huawei UDS generations show a successful scalability by supporting multiple byte-range requests in contrast with Amazon S3 or Ceph which do not support these commonly used HEP operations. We further report the S3 integration with recent CvmFS versions and summarize the experience with CvmFS/S3 for publishing daily releases of the full LHCb experiment software stack.

  17. 基于网络的云存储模式的分析探讨%Discussion of the Cloud Storage Model Based on the Network

    Institute of Scientific and Technical Information of China (English)

    刘思得

    2012-01-01

    云存储模式是在云计算概念上延伸和发展出来的新概念,是基于网络的数据存储技术,主要提供数据存储和访问服务.本文首先分析了云存储产生的背景、基本概念及其与特点,然后介绍了云存储模式的基本结构,对基本结构中的4层进行分析,并结合Google的云存储系统GFS进行说明,最后就云存储的应用现状进行总结归纳,并分析了云存储的发展方向.%Cloud storage is a new extension and developed on the base of the cloud computing, it is a network梑ased data storage technology, with the main provider of data storage and access service. This paper first analyzed the background of cloud storage, basic concepts and characteristics, and then the basic structure of the cloud storage was presented. Combined with Google's cloud storage system-GFS, the four layers in the basic structure were analyzed. Finally, paper summarized the cloud storage application status and the development direction of the cloud storage was analyzed.

  18. A CLOUD STORAGE BASED MOBILE TERMINAL NETWORK STORAGE DESIGN%一种基于云存储的移动终端网络存储设计

    Institute of Scientific and Technical Information of China (English)

    陶长顺

    2011-01-01

    随着移动互联网迅猛发展,移动终端的硬件资源如计算能力、存储能力及电池续航能力等等,已严重制约了移动互联网的发展.针对移动终端存储能力不足问题,结合目前集群技术及云存储技术,考虑到移动终端文件主要以小文件为主,提出一种基于云存储的移动终端网络存储模型,其体型结构包括基础设施层、基础管理层、应用接口层和访问层四部分,把信息的存储和处理移植到云上,从而为解决移动终端资源受限提供一种可行方案.%With the rapid development of the mobile internet, mobile terminal's hardware resources such as computing capability, storage capacity and battery endurance etc. Are seriously restricting the development of mobile internet. Aiming at the insufficient storage capacity of mobile terminals, combining present cluster technology and cloud storage technology, taking into account that most mobile terminal files are small, a cloud storage based mobile terminal network storage model is proposed. Its architecture contains a fundamental facility layer, a fundamental management layer, an application interface layer and an access layer. The information storage and processing are transplanted to the cloud; therefore it provides a feasible solution to tackle the mobile terminal resource constraint.

  19. Observation of Electron Cloud Instabilities and Emittance Dilution at the Cornell Electron-Positron Storage Ring Test Accelerator

    Science.gov (United States)

    Holtzapple, R. L.; Billing, M. G.; Campbell, R. C.; Dugan, G. F.; Flanagan, J.; McArdle, K. E.; Miller, M. I.; Palmer, M. A.; Ramirez, G. A.; Sonnad, K. G.; Totten, M. M.; Tucker, S. L.; Williams, H. A.

    2016-04-01

    Electron cloud related emittance dilution and instabilities of bunch trains limit the performance of high intensity circular colliders. One of the key goals of the Cornell electron-positron storage ring Test Accelerator (CesrTA) research program is to improve our understanding of how the electron cloud alters the dynamics of bunches within the train. Single bunch beam diagnotics have been developed to measure the beam spectra, vertical beam size, two important dynamical effects of beams interacting with the electron cloud, for bunch trains on a turn-by-turn basis. Experiments have been performed at CesrTA to probe the interaction of the electron cloud with stored positron bunch trains. The purpose of these experiments was to characterize the dependence of beam-electron cloud interactions on the machine parameters such as bunch spacing, vertical chromaticity, and bunch current. The beam dynamics of the stored beam, in the presence of the electron cloud, was quantified using: 1) a gated beam position monitor (BPM) and spectrum analyzer to measure the bunch-by-bunch frequency spectrum of the bunch trains; 2) an x-ray beam size monitor to record the bunch-by-bunch, turn-by-turn vertical size of each bunch within the trains. In this paper we report on the observations from these experiments and analyze the effects of the electron cloud on the stability of bunches in a train under many different operational conditions.

  20. Cloud Storage Application in Public Security Monitoring%云存储在公安监控中的应用

    Institute of Scientific and Technical Information of China (English)

    胡辉毅

    2015-01-01

    通过对原有监控数据CVR存储设备的软硬件升级改造,使其成为视频云存储系统,这样不仅能利用原有的监控数据CVR存储设备,节省存储设备的成本投入,而且提升了数据的存储效率,加强了智能平台的综合应用,并介绍了云存储的优越性及其改造方案和具体步骤。%based on the original monitoring data CVR storage hardware and software upgrades , making it a vid-eo cloud storage system .CVR in this way , not only to the original monitoring data storage devices of old utili-zation and save the cost of storage devices , and improves the data storage efficiency , strengthen the compre-hensive intelligence platform integration application .This paper introduces the advantages of cloud storage , the retrofit scheme and concrete steps .

  1. 浅析云盘技术及存储原理%Analysis of Cloud Disk Storage Technology and the Principle

    Institute of Scientific and Technical Information of China (English)

    王伟

    2015-01-01

    along with the computer technology and modern more advanced, cloud disk technology has penetrated into people's work, this article mainly discusses the principle of cloud storage technology, cloud and cloud disk storage space partition principle.%随着现代的计算机技术越来越先进,云盘的技术已经渗透到很多人的工作中,本篇文章主要来探讨云盘技术、云盘的储存原理以及云盘存储空间划分原理。

  2. Cloud Storage-Oriented Archiving Approach%面向云存储的归档方法

    Institute of Scientific and Technical Information of China (English)

    范中磊

    2011-01-01

    Aiming at the situation that current cloud storage systems mainly focus on file backup, this paper presents a cloud storage-oriented archiving approach. By storing inactive file data in cloud storage systems in archival form and leaving its stub information on clients for the use of read, this approach can not only save storage space on clients and improve the performance, but also implement transparent user access to archived data.%针对目前云存储系统主要提供文件备份的现状,提出了一种面向云存储的归档方法,该方法将不活跃的文件数据以归档的形式存放在云端存储系统,并在客户端保留其存根信息以供读取时使用,从而不仅大大节约了客户端存储空间,改善了客户端性能,而且实现了对用户透明的归档数据访问.

  3. Research on Cloud Storage System Based on Nimbus in Campus Network%基于Nimbus的校园云存储系统研究

    Institute of Scientific and Technical Information of China (English)

    林清滢

    2012-01-01

    Puts forward three-layer architecture of cloud storage system based on Nimbus in campus net- work. The architecture can be divided into three parts: infrastructure layer, cloud storage mid- dleware layer and cloud storage application layer. And then designs and realizes cloud storage system based on Nimbus, among which the main function of cloud storage middleware layer is built on the communication module. Through the communication module, we can make a remote call of the Nimbus components of cloud node, thus achieving the functions of cloud storage.%提出基于Nimbus的三层校园云存储系统的体系结构,分别为基础设施层、云存储中间件层、云存储应用层。并设计与实现基于Nimbus的云存储系统,其中云存储中间件的主要功能是建立在通信模块之上.通过通信模块远程调用云中远程节点的Nimbus组件.从而实现云存储功能。

  4. Cloud Storage Mode of University Library Digital Resources%高校图书馆数字资源的云存储模式探讨

    Institute of Scientific and Technical Information of China (English)

    付晓红; 莫筱梅

    2012-01-01

    分析了传统存储模式下高校图书馆数字资源存储存在的问题,结合云存储的优势,讨论了应用云存储模式存储高校图书馆数字资源,提出并分析了两种具体的高校图书馆数字资源云存储模式。%This paper analyzes the problems of the storage of university libraries digital resources under traditional storage mode,discusses the storage of university libraries digital resources which apply cloud storage mode based on the advantage of cloud storage,proposes and analyzes two specific cloud storage modes of university libraries digital resource.

  5. Characterization of electron clouds in the Cornell Electron Storage Ring Test Accelerator using TE-wave transmission

    Energy Technology Data Exchange (ETDEWEB)

    De Santis, S.; Byrd, J. M.; Billing, M.; Palmer, M.; Sikora, J.; Carlson, B.

    2010-01-02

    A relatively new technique for measuring the electron cloud density in storage rings has been developed and successfully demonstrated [S. De Santis, J.M. Byrd, F. Caspers, A. Krasnykh, T. Kroyer, M.T.F. Pivi, and K.G. Sonnad, Phys. Rev. Lett. 100, 094801 (2008).]. We present the experimental results of a systematic application of this technique at the Cornell Electron Storage Ring Test Accelerator. The technique is based on the phase modulation of the TE mode transmitted in a synchrotron beam pipe caused by the periodic variation of the density of electron plasma. Because of the relatively simple hardware requirements, this method has become increasingly popular and has been since successfully implemented in several machines. While the principles of this technique are straightforward, quantitative derivation of the electron cloud density from the measurement requires consideration of several effects, which we address in detail.

  6. Data Storage Issue Study under Cloud Computing Environment%云计算环境下的数据存储问题研究

    Institute of Scientific and Technical Information of China (English)

    蔡国瑜

    2011-01-01

    With the continuous development of computer technology, cloud computing and cloud storage as a new model,increasingly subject to personal and business concerns.In this paper, a brief description of cloud computing,based on the cloud computing environment for data storage is cloud storage body for analysis and research, demonstrated the great advantage of cloud storage and cloud storage constraints on the further development of a number of issues discussion.%随着计算机技术的不断向前发展,云计算和云存储作为一种崭新的模式,愈发受到个人和企业的关注。本文在对云计算进行简要介绍的基础上,对云计算环境下的数据存储即云存储体进行了分析和研究,展示了云存储的巨大优势,并就制约云存储进一步发展的若干问题进行了讨论。

  7. Cloud Storage Technology and Applications for Big Data%大数据场景下的云存储技术与应用

    Institute of Scientific and Technical Information of China (English)

    陈杰

    2012-01-01

    With the expansion of big data applications, mass cloud storage has become a more important requirement. To meet service demands, cloud storage needs a new framework and new networking and management methods. In this paper, we discuss the various scenarios of cloud storage and discuss the demands and key technology of cloud storage. Big data requirements promote the development of cloud storage, and cloud storage development creates new service applications.%文章认为随着大数据应用规模的扩大,新业务环境和场景对海量云存储需求的迫切,云存储平台需要打破原有的框架,改变组网和管理方式,以满足新的业务需求.文章分析了各种场景,提出了云存储的需求及关键技术等.文章指出大数据需求促进了云存储的发展,而云存储的发展则带动了新的业务应用.

  8. 介绍几款国外在线云存储服务%Several Foreign Online Cloud Storage Service Introduced

    Institute of Scientific and Technical Information of China (English)

    郑学超

    2011-01-01

    云存储对使用者来讲,不是指某一个具体的设备,而是指一个由许许多多个存储设备和服务器所构成的集合体。使用者使用云存储,并不是使用某一个存储设备,而是使用整个云存储系统带来的一种数据访问服务。%Cloud storage for the user is concerned,not referring to a specific device,but rather a many storage devices and servers constitute a collection.Users to use cloud storage,not to use a particular storage device,but the use of the entire cloud storage system in a data access service.

  9. 一种可信的云存储控制模型%Trusted Control Model of Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    田俊峰; 吴志杰

    2013-01-01

    云存储服务在以其低成本、高扩展等优势获得广泛青睐的同时,也为实现信息资产安全与隐私保护带来了极大的冲击与挑战.目前,安全已成为云存储服务亟待解决的重要问题.提出了一种可信的云存储控制模型(Trusted Control Model of Cloud Storage,TCMCS).TCMCS通过密文访问控制及完整性验证对用户数据进行预处理来保证数据的机密性与完整性;引入可信第三方存储密钥信息,以实现安全、可靠的数据共享;借鉴中间件的设计思想以屏蔽不同云存储平台之间的差异以及分离数据操作过程中的安全操作与业务逻辑.基于安全的多方计算理论,证明了TCMCS的安全性.仿真实验表明,TCMCS在不降低云存储服务平台数据操作性能的基础上,保证了数据的安全性.%Cloud Storage Service brings about not only scalability and low cost, but also great challenges in the field of data security and privacy protection. Currently, security has been regarded as one of the greatest problems in the development of cloud storage service. Aiming at the present problem mentioned above, a Trusted Control Model of Cloud Storage (TCMCS) is presented. With the using of cipher-text access control and integrity verification preprocessing users' data, TCMCS made the users' data secure. Considering the security and efficiency in data sharing, a trusted third party is introduced. Besides, the designing idea of middleware is referenced to shield the difference among cloud storage platforms as well as to separate security operation and business logic in data operation. Theoretic analysis and simulation show that this model has made users' data secure and improved the performance in data processing.

  10. The Application of RS Erasure Codes in the Cloud Storage%RS纠删码在云存储中的应用

    Institute of Scientific and Technical Information of China (English)

    余林琛; 章巍; 林强; 许杰星; 钟贝

    2011-01-01

    Cloud storage as a storage mode which designed to provide users with cheap,efficient,secure,scalable,customizable storage services,have become the trend of storage services.But because of its cloud storage node is not controllable,how to protect data stored in the cloud security issues facing challenges.RS erasure codes by the introduction of cloud storage,by fragmentation polymerization mechanism for cloud storage data security protection provides a new solution.%云存储作为一种旨在为用户提供高效、廉价、安全、可扩展、可定制的存储服务的存储模式,已然成为存储服务的发展趋势.但是因为其云端存储节点的不可控性,云存储在如何保障数据安全性的问题上面临着挑战.通过将RS纠删码引入云存储中,采用分片聚合机制,为云存储的数据安全性保障提供了一种新的解决方案.

  11. The characteristic of Enterprise Storage during the Cloud Computing Era%云计算时代的企业级存储之特性

    Institute of Scientific and Technical Information of China (English)

    叶毓睿

    2016-01-01

    With the growing fast of Cloud Computing, as the important part of data center, Enterprise Storage faced much more challenge from private cloud and hybrid cloud. According to the definition of NIST for cloud, customer need storage have features:self-service, storage pooling, elastic, storage provisioning automatically and quickly, can be charge and billing. Actually, Software Defined Data Center ( SDDC) is the best practice for the new data center under cloud time, and Software Defined Storage ( SDS) is the best for private and hybrid cloud.%云计算势不可挡,在未来较长的时间段内,私有云和混合云是主流。作为数据中心的基础部件之一,企业级存储面临了新的挑战,云计算要求存储具有如下特性:自助服务、存储池化、弹性扩展、快速部署、按量计费等。软件定义存储是解决这一挑战的最佳选择。

  12. 基于混合云的安全数据存储架构%The Architecture of Secure Data Storage Based on Mixed Cloud

    Institute of Scientific and Technical Information of China (English)

    刘增才; 柳毅

    2011-01-01

    Cloud computing promises a more cost effective enabling technology to data storage and com- putations. Data security is one of the most challenging research work in cloud computing. Based on mixed cloud, presents an architecture of secure data storage. The process of data storage is divided into two parts. Realizes confidentiality, integrity and traceability in private cloud, while data storage and search in public cloud. This architecture can assure data storage secure and low enterprise cost in cloud computing simultaneously.%云计算技术为数据存储与计算提供了一个非常有效的方法,当前研究工作的重点集中在云中的数据安全。基于混合云,提出一个安全数据存储架构,将数据存储过程划分为两部分。数据的机密性、完整性和可追踪性的相关操作在私有云中实现,公共云实现数据的存储与查询。该架构在保障云端数据安全存储的同时,降低企业在保证云数据安全存储方面的成本。

  13. Establishment of enterprise private cloud storage platform based on Hadoop%基于Hadoop企业私有云存储平台的构建

    Institute of Scientific and Technical Information of China (English)

    孙福权; 张达伟; 程勖; 刘超

    2011-01-01

    The quantity of document and data from enterprise-level users increases exponentially, and the existing file storage facilities cannot meet the growth. This study proposes to establish an enterprise private cloud storage platform based on Hadoop. Using Linux cluster technology, distributed file systems and cloud computing framework, a mass data storage and high-speed data processing service can be achieved. The study compares the private cloud storage with the traditional storage model, analyzes the advantage and feasibility of private cloud storage technology, and presents an architecture model for enterprise private cloud storage. Theoretical analysis shows that the enterprise private cloud storage platform is suitable for critical business applications, and online transaction processing. The platform can meet the requirements from mass data storage and data scale expansion.%针对企业级用户面临文件和数据量的指数级增长,现有的文件存储设施不能适应业务增长问题,提出基于Hadoop构建企业私有云存储平台,通过采用Linux集群技术、分布式文件系统和云计算框架,实现海量数据存储和高速数据处理业务.比较了私有云存储和传统存储模式,分析了私有云存储技术优势和可行性,提出企业私有云存储架构模型.分析结果表明:企业私有云存储平台适用于关键业务应用、在线事务处理,满足企业对海量数据存储、数据规模易扩展性的要求.

  14. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  15. Mobile cloud networking: mobile network, compute, and storage as one service on-demand

    NARCIS (Netherlands)

    Jamakovic, Almerima; Bohnert, Thomas Michael; Karagiannis, Georgios; Galis, A.; Gavras, A.

    2013-01-01

    The Future Communication Architecture for Mobile Cloud Services: Mobile Cloud Networking (MCN)1 is a EU FP7 Large scale Integrating Project (IP) funded by the European Commission. MCN project was launched in November 2012 for the period of 36 month. In total top-tier 19 partners from industry and ac

  16. Design of the Cloud Storage Model for Video Monitoring%视频监控云存储模型设计

    Institute of Scientific and Technical Information of China (English)

    武文斌

    2012-01-01

    The paper introduces the characteristics and models of cloud storage,designs a topological structure of cloud storage for video monitoring based on the features of video storage,analyzes its major components and functions,and proposes the characteristics and prospects of the cloud storage for video monitoring.%介绍了云存储的特点和模型,并结合视频存储的特点,设计了一种用于视频监控的云存储拓扑机构图,分析了其主要组成部分和主要功能机制,提出了视频监控云存储的特点和未来发展。

  17. Online Distributed Storage System Architecture and Security with Cloud Storage as the Core%以云存储为核心的在线分布式存储系统架构与安全保护

    Institute of Scientific and Technical Information of China (English)

    胡晓文

    2011-01-01

    although cloud storage technology is currently being recognized as a safe and reliable data storage mechanism,but the safety problem is still cloud storage technology is one important problem to solve.In order to effectively improve the cloud storage security, this paper presents a cloud storage as the core of the online distributed storage system security architecture,the architecture makes full use of the data distributed storage management and data automatic recovery technology in data safety storage function,hierarchical data to achieve the cloud storage and data storage safety management.%虽然云存储技术是当前被人们所公认的一种安全可靠的数据存储机制,但安全问题依然是云存储技术所要解决的重要问题之一。为了能有效提高云存储的安全性。本文提出了一种以云存储为核心的在线分布式存储系统安全架构,该架构充分发挥了了数据分散存储管理以及数据自动恢复等技术在数据安全存储方面的功能,分层实现了数据的云存储以及存储数据的安全管理。

  18. Magnetite in Black Sea Turtles (Chelonia agassizi)

    Science.gov (United States)

    Fuentes, A.; Urrutia-Fucugauchi, J.; Garduño, V.; Sanchez, J.; Rizzi, A.

    2004-12-01

    Previous studies have reported experimental evidence for magnetoreception in marine turtles. In order to increase our knowledge about magnetoreception and biogenic mineralization, we have isolated magnetite particles from the brain of specimens of black sea turtles Chelonia agassizi. Our samples come from natural deceased organisms collected the reserve area of Colola Maruata in southern Mexico. The occurrence of magnetite particles in brain tissue of black sea turtles offers the opportunity for further studies to investigate possible function of ferrimagnetic material, its mineralogical composition, grain size, texture and its location and structural arrangement within the host tissue. After sample preparation and microscopic examination, we localized and identified the ultrafine unidimensional particles of magnetite by scanning electron microscope (SEM). Particles present grain sizes between 10.0 to 40.0Mm. Our study provides, for the first time, evidence for biogenic formation of this material in the black sea turtles. The ultrafine particles are apparently superparamagnetic. Preliminary results from rock magnetic measurements are also reported and correlated to the SEM observations. The black turtle story on the Michoacan coast is an example of formerly abundant resource which was utilized as a subsistence level by Nahuatl indigenous group for centuries, but which is collapsing because of intensive illegal commercial exploitation. The most important nesting and breeding grounds for the black sea turtle on any mainland shore are the eastern Pacific coastal areas of Maruata and Colola, in Michoacan. These beaches are characterized by important amounts of magnetic mineral (magnetites and titanomagnetites) mixed in their sediments.

  19. Isolation and Characterization of Chelonia mydas Myoglobin

    Directory of Open Access Journals (Sweden)

    MOHAMAD SADIKIN

    2012-06-01

    Full Text Available Green sea turtle – Chelonia mydas is a lung respiration animal that is able to dive and stay uder sea water for hours without needing to surface for oxygen. As oxygen supply in muscles is assured by myoglobin, we propose to study some characteristic of this muscle protein in green sea turtles. To achieve this objective, pure green sea turtle myoglobin has to be made available. Therefore, our first task is to purify this muscle protein from green sea turtles. Skeletal muscles from 3 green sea turtle hatchlings were studied icroscopically and biochemically. Microscopy observation showed a general structure of striated muscle. Biochemical studies revealed that green sea turtle myoglobin could be more purely isolated to a certain degree by ephadex G-75 gel filtration and purified by immunoaffinity gel chromatography rather than direct purification by DEAE-Sepharose ion exchange chromatography technique. SDS-PAGE analysis showed that green sea turtle myoglobin ran together with horse myoglobin as 17 kDa molecular weight proteins.

  20. 民间艺术资源的云存储技术研究%Research on cloud storage technology of folk art resources

    Institute of Scientific and Technical Information of China (English)

    李小波; 田中娟; 叶振

    2016-01-01

    The construction and research of Chinese folk art resources platform is an important and urgent task in the culture and art field, and there are many challenges. In the big data era, the use of cloud computing and cloud storage technology is an inevitable trend. This paper introduces the Hadoop cloud computing and cloud storage technology, puts forward the development scheme of folk art resources cloud storage platform based on Hadoop. The construction of folk art resources cloud storage platform based on Hadoop is feasible and effective.%我国民间艺术资源平台的建设和研究是当前文化艺术领域面临的一项重要而紧迫的课题,存在着诸多挑战。在大数据时代背景下,采用云计算和云存储技术是一个必然的趋势。文中介绍了Hadoop云计算与云存储技术,提出了基于Hadoop的民间艺术资源云存储平台建设方案。构建基于Hadoop的民间艺术资源云存储平台具有可行性和有效性。

  1. A computational- And storage-cloud for integration of biodiversity collections

    Science.gov (United States)

    Matsunaga, A.; Thompson, A.; Figueiredo, R. J.; Germain-Aubrey, C.C; Collins, M.; Beeman, R.S; Macfadden, B.J.; Riccardi, G.; Soltis, P.S; Page, L. M.; Fortes, J.A.B

    2013-01-01

    A core mission of the Integrated Digitized Biocollections (iDigBio) project is the building and deployment of a cloud computing environment customized to support the digitization workflow and integration of data from all U.S. nonfederal biocollections. iDigBio chose to use cloud computing technologies to deliver a cyberinfrastructure that is flexible, agile, resilient, and scalable to meet the needs of the biodiversity community. In this context, this paper describes the integration of open source cloud middleware, applications, and third party services using standard formats, protocols, and services. In addition, this paper demonstrates the value of the digitized information from collections in a broader scenario involving multiple disciplines.

  2. The research and discussion of digital library on cloud storage performance%数字图书馆的云存储性能研究与研讨

    Institute of Scientific and Technical Information of China (English)

    陈茫

    2014-01-01

    This paper discusses the application of digital libraries in the storage area of the cloud environment. Firstly, we introduce an open source, free, digital library architecture viable cloud storage environments; Secondly, we describe the key cloud storage replication technology, and build a digital library of realistic cloud storage architecture; finally, we detailed test and analyze the performance differences between different cloud storage.%首先,介绍一个开源的、免费的、可行的云环境下的数字图书馆存储构架;接下来,对云存储的关键复制技术逐一叙述,并构建数字图书馆的现实中云存储构架;最后,详细的测试和分析不同云存储之间的性能差异,探讨了数字图书馆在云环境下的存储领域的应用。

  3. 安全云存储系统与关键技术综述%Survey of Secure Cloud Storage System and Key Technologies

    Institute of Scientific and Technical Information of China (English)

    傅颖勋; 罗圣美; 舒继武

    2013-01-01

    随着云存储的迅猛发展,越来越多的用户选择使用云存储存放自己的资料.云存储的最大特点在于存储即服务,用户可以通过公有API将自己的数据上传到云端保存.但由于用户丧失了对数据的绝对控制权,一些数据安全的隐患也由此产生.为了消除安全隐患,并在保证安全性的同时尽可能地提高系统的服务质量,近年来国内外机构作了大量研究,从而开启了云存储中的一个研究方向——安全云存储系统.首先介绍了云存储系统的安全需求,然后阐述了安全云存储系统的研究现状,并总结了现有安全云存储系统中的一些关键技术的现状与不足之处,其中包括密钥分发与管理、基于属性的加密机制、基于数据密文的搜索机制与删冗机制、数据的持有性证明与恢复以及数据的可信删除等;最后指出了安全云存储系统未来的研究方向.%With the rapid development of cloud storage, more and more people prefer to store their owner data in remote cloud storage to avoid troublesome data management in local storage systems. The most famous feature of cloud storage is the concept that storage as a service, users can store their own data into clouds by public APIs. However, because of losing absolute control of data, users storing their own data in cloud storage will suffer a series of security problems, such as data peeping, data tampering, and so on. In order to solute those security problems and improve the quality of secure cloud system based on enhance its security, researchers have investigated lots about cloud security problem in recent years, which established a research branch of the cloud storage- -secure cloud storage system. This paper introduces the security demand of secure cloud storage system; expounds the current status of cloud storage system; summarizes the key technologies of currently secure cloud storage systems, such as encryption key's distribution and

  4. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure.

    Science.gov (United States)

    Lee, Sun-Ho; Lee, Im-Yeong

    2014-01-01

    Data outsourcing services have emerged with the increasing use of digital information. They can be used to store data from various devices via networks that are easy to access. Unlike existing removable storage systems, storage outsourcing is available to many users because it has no storage limit and does not require a local storage medium. However, the reliability of storage outsourcing has become an important topic because many users employ it to store large volumes of data. To protect against unethical administrators and attackers, a variety of cryptography systems are used, such as searchable encryption and proxy reencryption. However, existing searchable encryption technology is inconvenient for use in storage outsourcing environments where users upload their data to be shared with others as necessary. In addition, some existing schemes are vulnerable to collusion attacks and have computing cost inefficiencies. In this paper, we analyze existing proxy re-encryption with keyword search.

  5. Design and Implementation of Data Storage Encryption Mechanism in Cloud Storage%云存储服务端数据存储加密机制的设计和实现

    Institute of Scientific and Technical Information of China (English)

    吕从东; 韩臻; 马威

    2014-01-01

    云存储是一种新型的网络存储形式。随着云存储的广泛使用,云存储中的数据安全问题,如数据泄漏、数据篡改,也成了用户广泛关注的问题。云存储可以分为访问层、应用接口层、基础管理层和存储层,云存储安全可以分为访问层安全、应用接口层安全、基础层安全和存储层安全。为保证云存储中服务端数据存储的机密性,文章设计了数据存储加密机制,在基于云桌面的办公系统个人存储的应用环境中,实现了基础管理层和存储层加密机制。基于JAVA、JSP等技术,实现了基础管理层;基于Bash脚本等技术,实现了基础管理层与存储层的接口;基于开源项目TGT实现了存储层数据加密机制,保证服务端存储数据的机密性。%Cloud storage is a new form of network storage. With the widespread use of cloud storage, data security in cloud storage, such as data leakage, data tampering, has become widespread concern. Cloud storage can be divided into the access layer (AL), the application interface layer (APIL), the infrastructure management layer (IML) and the storage layer (SL). Security of cloud storage can be divided into security of the access layer (SAL), security of the application interface layer (SAPIL), security of the infrastructure management layer (SIML) and security of the storage layer (SoSL). A data storage encryption mechanism is designed to deal with the conifdentiality of the data in cloud storage in this paper. The mechanism is implemented in an application environment of the ofifce system based on cloud desktop. The infrastructure management layer is implemented based on JAVA and JSP. The interface between the infrastructure management layer and the storage layer is implemented based on Bash Script. The data encryption on the sever is implemented based on open source projects TGT.

  6. Load Scheduling in a Cloud Based Massive Video-Storage Environment

    DEFF Research Database (Denmark)

    Bayyapu, Karunakar Reddy; Fischer, Paul

    2015-01-01

    We propose an architecture for a storage system of surveillance videos. Such systems have to handle massive amounts of incoming video streams and relatively few requests for replay. In such a system load (i.e., Write requests) scheduling is essential to guarantee performance. Large-scale data-storage...... system (LSDSS) is an emerging hosting facility for video-storage, which has a very high number of writes while most of the videos are never or rarely watched. We discuss the design and implementation of LSDSS and load scheduling in autonomous storage environments called datacenters in LSDSS. A datacenter...

  7. 云存储在高校档案工作中的应用%Application of Cloud Storage in University Archives Task

    Institute of Scientific and Technical Information of China (English)

    郑奇茹

    2012-01-01

      This is an article on cloud computing and cloud storage. After introducing the concept of cloud computing and cloud storage,the article explains what are the influences and opportunities to university archives. From that,the writer seeks to explore a new development trend in university archives base on the new technology and nowadays condition.%  本文简要介绍“云计算”和“云存储”,阐述“云存储”给高校档案工作中带来的影响与机遇。并结合高校实际情况,探究未来高校档案管理的发展趋势。

  8. Dual-channel Cloud Data Storage Security Scheme%双通道云数据存储安全方案研究

    Institute of Scientific and Technical Information of China (English)

    熊毅

    2012-01-01

    为了改善解决云计算中热点问题之一—数据存储安全,该文在研究现有经典云数据存储体系架构的基础上,根据云本身的超强计算能力和代价低廉等特性,提出了一种优化的双通道并行云存储架构,配以非对称数据加密手段,在硬件与架构层面直接针对安全问题作出优化部署.在大量的节约成本、提高效率、精简架构的情况下保证了云环境下数据存储安全性的提升.模拟部署表明,双通道并行云架构及非对称数据加密能有效的提高云数据存储的安全性.%In order to improve the resolution of cloud computing in the hot one of the issues-the security of data storage, the author based on the study of existing classic cloud data storage architecture, according to the characteristics of cloud super computing power and cost of low, propose an optimized dual-channel parallel cloud storage architecture,together with the non-symmetric data encryption,optimize the deployment of security issues made in the level of hardware and architecture. The security of data storage in the cloud environment is enhanced with a lot of cost savings, improve efficiency and streamlining. Simulated deployment, dual-channel parallel cloud structure and non-symmetric data encryption can effectively improve the security of the cloud data storage.

  9. Storage and Access of Media Files Based on Amazon S3 Compatible Cloud Storage Platform%基于Amazon S3兼容云存储平台的媒体文件存储与访问

    Institute of Scientific and Technical Information of China (English)

    宋顺祥; 姜莹

    2013-01-01

      首先介绍云计算和云存储的基本概念,对兼容Amazon S3的云存储平台的体系架构及其组成进行详细的分析,然后阐述在此平台上如何进行媒体文件的存储与访问,最后给出了系统构建所面临的挑战及其解决方案。%This paper first introduces the basic concepts of cloud computing and cloud storage, and then analyzes the architecture and components of cloud storage platform which is compatible with Amazon S3. The media files storage and access module based on this platform is designed. Final y, we present solutions to the chal enges we confronted with when we construct the system.

  10. Cloud Robotics Platforms

    Directory of Open Access Journals (Sweden)

    Busra Koken

    2015-01-01

    Full Text Available Cloud robotics is a rapidly evolving field that allows robots to offload computation-intensive and storage-intensive jobs into the cloud. Robots are limited in terms of computational capacity, memory and storage. Cloud provides unlimited computation power, memory, storage and especially collaboration opportunity. Cloud-enabled robots are divided into two categories as standalone and networked robots. This article surveys cloud robotic platforms, standalone and networked robotic works such as grasping, simultaneous localization and mapping (SLAM and monitoring.

  11. Application of Cloud Storage in Hospital Informatization%浅谈云存储在医院信息化中的应用

    Institute of Scientific and Technical Information of China (English)

    张艳玲; 徐海峰

    2012-01-01

    Objective To use cloud storage for scalable storage resources in hospital informatization. Methods By using Hadoop cloud platform software for open source, and Panasas high performance hardware equipment, one solution based on the private cloud storage was proposed. Then the difficulties and challenges of cloud storage in hospital informatization were analyzed. Results Cloud storage could provide sufficient, manageable and extensible resources for hospital informatization. Conclusion With the development of cloud storage, it will have a brilliant future in hospital informatization construction.%目的:探讨云存储在医院信息化建设中,提供可扩展存储资源的应用前景及可能的挑战.方法:使用目前主流的Hadoop开源云平台软件和高性能的Panasas集群硬件设备,提出了一种基于私有云的存储解决方案,并分析云存储在医院信息化中所面临的困难与对策.结果:解决目前医院信息化过程中存储资源不足、管理不便的问题,为日益庞大的医疗数据提供按需扩展的存储空间.结论:随着云存储技术和法规的不断完善,云存储将在医院信息化建设中发挥更加实际的作用.

  12. Storage Gateway for the Cloud Storage%面向云存储的存储网关

    Institute of Scientific and Technical Information of China (English)

    马军; 石辉; 裴文斌; 王福利

    2014-01-01

    With the development of the computer and network technology, the growing demands for the huge data storage and the high-performance data access make the storage systembasedon network becoming a research hotspot, especially the research of I/O subsystem about network server system. The research about distributed file system as a key part in the network server system is meaningful. Currently open source community provides several DFS(distributed file system) projects, such as KFS, moosefs, FastDFS, TFS, GFS. Most of projects support only API or storage gateway on Linux system, but not giving support API or storage gateway on Windows system. This study introduces the designing frameworks and the thinking process aboutstorage gateway on Windows system, and then gives a specific example program based on HDFS—dfsclient.%对大容量数据存储和快速读写的需求与计算机网络技术的发展,使得网络化存储系统成为网络服务器系统中I/O子系统研究的热点,作为网络存储系统的关键部件,对分布式文件系统的研究具有非常重要的意义.目前开源社区提供了KFS、moosefs、FastDFS、TFS、GFS[1]等多款分布式文件系统,其中多数提供了基于Linux操作系统的API或者存储网关,却没有提供Windows版的存储网关.主要对分布式文件系统Windows版存储网关的设计框架和思路进行介绍与分析,并实现了一个基于HDFS的Windows版分布式文件系统的存储网关程序dfsclient.

  13. Study on Safe Storage Technology of Cloud Computing Service Date%云计算服务数据安全储存技术研究

    Institute of Scientific and Technical Information of China (English)

    于颖

    2016-01-01

    根据当前云计算服务数据的发展趋势,在介绍云计算和云存储概念的基础上,分析云存储数据存在的主要安全问题,提出确保云计算服务数据安全的存储对策,为云计算服务数据在互联网及其他领域的安全储存提供技术方面的借鉴。%According to the development tendency of cloud computing service data at present, based on introducing the concept of cloud computing and cloud storage, this article analyzed the main safety problems existing in cloud storage data, put forward the storage countermeasure to ensure the safety of cloud computing service data, in order to provide technological reference for cloud computing service data stored safely on the internet and other fields.

  14. Android-based Personal Cloud Secure Storage System%基于Android的个人云安全存储系统

    Institute of Scientific and Technical Information of China (English)

    张富; 江冰; 黄佳; 乔彬彬

    2012-01-01

    个人云凭借其安全稳定、同步备份和便于分享等优势,将在未来几年逐步取代个人电脑作为数字时代的核心地位.本文进行了基于Android的个人云应用开发,旨在将个人云服务嵌入Android移动终端中,让用户能够随时随地通过终端体验个人云服务.主要完成了个人云同步备份和安全存储系统架构的设计以及Android相关技术选型、密码安全存储的设计以及安全加密算法的选择,并在Eclipse环境中利用Java语言开发,实现了软件登录限制、功能页面展示、管理文件、备份和下载个人信息等功能.%Personal cloud will gradually replace the PC to become the core of the digital era by virtue of its security and stability, synchronous backup and easy sharing and other advantages in the next few years. In order to embed personal cloud services into the Android mobile devices, and alltiw users to enjoy the services anytime or anywhere through he Android mobile terminals, an Android-based personal cloud application was developed. The design of the personal cloud system architecture and the selection of Android-related technology, the design of the password storage, and the selection of security encryption algorithm are completed mainly, and software in the Eclipse environment by using the Java language is developed. Whose functions include landing restriction, displaying function, files management, backup and download services for personal information etc.

  15. 云存储在环保领域的应用研究%The Applications of Cloud Storage in the Field of Environmental Protection

    Institute of Scientific and Technical Information of China (English)

    崔洪渊

    2015-01-01

    介绍了太原市环保信息化建设的现状及问题, 提出环保信息系统云存储的建设目标和必要性, 并对云存储在环保领域的应用进行了探索研究.%This paper describes the current situation and problems of Taiyuan environmental information construction,pro-posed building objectives and the need for cloud storage of environmental information system and give the exploration and research in cloud storage applications in the field of environmental protection.

  16. Storage Design of Regional PACS Based on Cloud Architecture of Hadoop%基于Hadoop的云架构区域PACS存储方案设计

    Institute of Scientific and Technical Information of China (English)

    唐颖; 刘国庆

    2013-01-01

    Cloud storage offers an effective solution for storage problems of regional PACS (Picture Archiving & Communication System) image file. On the basis of analyzing regional PACS storage needs as well as the storage situation, a Hadoop-based cloud storage architecture was built. To improve degraded performance resulting from large quantity of small ifles storage, this paper designed two sets of storage solutions and developed a set of middleware. A test platform of Hadoop-based cloud storage was built and the results showed that:as DataNode nodes increased, the storage performance increased linearly;storage ifle should not be too large for image reading and displaying as soon as possible, each ifle should be kept within 64MB.%云存储为区域图片存档及通讯系统(PACS)的影像文件存储问题提供了有效的解决方案。本文在分析区域PACS存储需求以及目前存储现状的基础上,构建一个以Hadoop为基础的云存储服务架构。针对区域PACS影像文件类型较为单一的特点,设计了两套存储方案并开发了一套中间件加以测试。测试结果表明,随着DataNode节点增多,存储性能近似线性增加;为了尽快读取并显示影像,存储文件不宜过大,以每个文件不超过64MB为宜。

  17. 云存储模式下图书馆数字资源建设%Library Digital Resources Construction Based on Cloud Storage Mode

    Institute of Scientific and Technical Information of China (English)

    曾祥文

    2011-01-01

    随着图书馆数字资源总量的快速增加,传统的存储方式在面对海量数据存储的需求上,存在着容量和性能的瓶颈。云存储作为一种新型的存储服务模式,为图书馆的海量数字资源建设提供了一种新的选择。在分析图书馆数字资源建设需求、介绍云存储概念的基础上,对基于云存储模式下图书馆数字资源的建设进行了探讨。%With the rapid increase in quantity of the library digital resources,there is capacity and performance of bottleneck when the traditional way of storage in the face of mass storage requirements.As a new storage service mode,cloud storage provides a new choice for the amount of library digital resources construction.Based on the analysis of library digital resources construction demand and the introduction of the concept of cloud storage,this paper discussed the library digital resources construction based on the cloud storage mode.

  18. 基于光盘库的云存储系统架构设计%Cloud Storage Systems Based on Technology of Optical Disk Library

    Institute of Scientific and Technical Information of China (English)

    薛寅颖; 万晓冬

    2013-01-01

    Efficiency, scalability, and low cost of cloud storage trends of storage services, but the uncertainty of the storage nodes and network transmission, making its safety has been questioned. This article erasures codes and CD library into cloud storage to store data in secure storage management and transmission of data in the system, to provide a solution for improving the security of cloud storage system.%云存储的高效、可扩展性、廉价等优点成为存储服务的发展趋势,但是其存储节点的不确定性以及网络传输,使得其安全性受到质疑.本文将纠删码技术和光盘库引入到云存储中,实现存储数据在系统中的安全存储管理和传榆,为提高云存储系统安全性提供一个解决方案.

  19. CubeSat Cloud: A framework for distributed storage, processing and communication of remote sensing data on cubesat clusters

    Science.gov (United States)

    Challa, Obulapathi Nayudu

    CubeSat Cloud is a novel vision for a space based remote sensing network that includes a collection of small satellites (including CubeSats), ground stations, and a server, where a CubeSat is a miniaturized satellite with a volume of a 10x10x10 cm cube and has a weight of approximately 1 kg. The small form factor of CubeSats limits the processing and communication capabilities. Implemented and deployed CubeSats have demonstrated about 1 GHz processing speed and 9.6 kbps communication speed. A CubeSat in its current state can take hours to process a 100 MB image and more than a day to downlink the same, which prohibits remote sensing, considering the limitations in ground station access time for a CubeSat. This dissertation designs an architecture and supporting networking protocols to create CubeSat Cloud, a distributed processing, storage and communication framework that will enable faster execution of remote sensing missions on CubeSat clusters. The core components of CubeSat Cloud are CubeSat Distributed File System, CubeSat MapMerge, and CubeSat Torrent. The CubeSat Distributed File System has been created for distributing of large amounts of data among the satellites in the cluster. Once the data is distributed, CubeSat MapReduce has been created to process the data in parallel, thereby reducing the processing load for each CubeSat. Finally, CubeSat Torrent has been created to downlink the data at each CubeSat to a distributed set of ground stations, enabling faster asynchronous downloads. Ground stations send the downlinked data to the server to reconstruct the original image and store it for later retrieval. Analysis of the proposed CubeSat Cloud architecture was performed using a custom-designed simulator, called CubeNet and an emulation test bed using Raspberry Pi devices. Results show that for cluster sizes ranging from 5 to 25 small satellites, faster download speeds up to 4 to 22 times faster - can be achieved when using CubeSat Cloud, compared to a

  20. The application of cloud storage in University digital resources construction%云存储在高校数字资源建设中的应用

    Institute of Scientific and Technical Information of China (English)

    潘华; 尹芝

    2013-01-01

    Given the acceleration of University digital resources construction, traditional storage technologies have not been able to meet the requirement for nowadays technologies. Cloud storage technologies, a new generation of service system, provides a method for mass storage. The paper not only introduces cloud computation and stor-age but also studies the application of cloud storage in University digital resources construction.%随着高校数字资源建设步伐的加快,传统的存储技术已不能满足如今资源建设的需求。云存储技术这一新的服务体系,为海量资源存储提供了一个新的方式。本文在介绍了云计算和云存储的基础上,讨论研究了云存储在高校数字资源存储的应用。

  1. 一种新的云存储服务模型研究%Research on new cloud storage service model

    Institute of Scientific and Technical Information of China (English)

    刘金芝; 余丹; 朱率率

    2011-01-01

    This paper proposed a new survivable cloud storage service model, and designed the structure of the model and constructed in detail. Then adopted a storage service survivability evaluation method (resource allocation failure probabihty model) based on probability models to analyze the service model. The fully evaluation justifies that the cloud storage service model can satisfy survivability.%提出了一种基于云存储的可生存存储服务模型,对模型架构进行了详细设计和构造,并采用了一种存储服务模型可用性的度量方法(资源分配失效概率模型)进行了分析.通过分析可得,提出的可生存云存储服务模型能够满足较高的可生存性的需要.

  2. 基于递归秘密共享的可靠云存储方案%A Reliable Cloud Storage Scheme Based on Recursive Secret Sharing

    Institute of Scientific and Technical Information of China (English)

    王家玲

    2015-01-01

    The existing cloud storage schemes can't balance redundant storage, data confidentiality and storage costs which troubled many users. In order to overcome the deficiencies of the existing cloud storage scheme, we proposed a reliable cloud storage scheme which suitable for the characteristics of digital library resources. The scheme can realize data redundant storage and can guarantee data confidentiality. In addition, the scheme will not bring a surge in storage space. This paper not only gives a framework of the scheme but also gives a detailed description of the specific scheme. Then, we make an analysis from the confidentiality, redundancy and storage cost etc. of the scheme to improve its reliability and high efficiency.%现有云存储方案无法兼顾冗余存储、数据机密性和存储开销等多方面因素,给诸多用户带来困扰。为克服现有方案的不足,提出一个高效可靠的云存储方案,该方案既能实现数据冗余存储又能保证数据机密性,且不会带来存储空间的剧增。文章给出方案的框架且对方案进行具体的描述,然后从机密性、冗余性和存储开销等方面对方案进行分析,得出本方案可靠性和高效性的优势。

  3. 基于分离密钥的云存储加密解决方案%A Project Designed by Cloud Storage Encryption Based on Separated Key

    Institute of Scientific and Technical Information of China (English)

    王志中; 周城; 牟宇飞

    2013-01-01

    原有的云存储模式所存在的问题已经困扰行业多年,在静态数据加密存储的过程中,只有实现真正意义上的数据私有化才能保证数据的安全,保障数据拥有者的利益.针对云存储应用中用户数据安全存储需求的提高,以Amazon S3(simple storage service)为例分析当前云存储模式下静态数据安全存在的普遍问题,设计了一套新的云端静态数据加密存储方案——分离密钥存储服务(separated key S3)解决方案,设计了新的密钥管理方法,从技术上实现了云端静态数据的安全,最后对该方案的数据安全性进行了分析.%The problems existing in the original cloud storage model has plagued the industry for many years, to realize the true sense of the data privatization in the static data encrypted storage process is able to ensure data security and protect data owners' interests. Cloud storage applications for the current secure storage of user data is able to improve data security. Taking Amazon S3 as an example, the general problem in static data security was analyzed. A new set of cloud static data encryption and storage solution, separated key S3, was designed, and a new key management method was also designed. The new technology absolutely accomplished the security of static data in the cloud. Additionally the data security analysis and prospect on next research was given.

  4. 基于云存储技术的数据安全策略研究%Study on Data Security Strategy Based on Cloud Storage Technology

    Institute of Scientific and Technical Information of China (English)

    程代娣

    2015-01-01

    当今,在互联网和云计算技术背景下,企业海量的数据通过网络被放置在云存储系统中,云存储平台服务主要通过网络环境来实现,数据的安全性是用户非常关注的问题。在探讨云存储系统基本概念和优势的基础上,分析了云存储面临的安全隐患,并研究了云存储系统下数据的安全防范措施,以求进一步保证云存储数据的安全。%Nowadays, under the background of application of internet and the technology of cloud computing,the security of enterprises’ data which are stored in the cloud storage system in quantity through internet,which is implemented by means of internet,is the main concern of the clients. In order to further guarantee the security of the stored data,the paper analyses the potential risk in cloud storage and researches into security protection of cloud storage system,on the basis of exploring its basic concepts and advantages.

  5. On the Cloud Storage Mode of University Library Digital Resources%高校图书馆数字资源云存储模式探究

    Institute of Scientific and Technical Information of China (English)

    施蓉蓉

    2012-01-01

    With the rapid increase in quantity of library digital resources,the drawbacks of traditional data storage model increasingly appear.As a new storage service mode,cloud storage provides a new choice for the amount of li-brary digital resources construction.This paper introduces some digital storage technologies,and discusses the application of cloud storage in university library digital resources storage.%随着图书馆数字资源总量的快速增加,传统的数据存储方式弊端日益显现。云存储作为一种新型的存储服务模式,为图书馆的海量数字资源建设提供了一种新的选择。在介绍数字存储技术的基础上,重点探讨了云存储在高校图书馆数字资源存储中的应用。

  6. 校园网云存储客户端的设计与实现%Design and Implementation of Campus Cloud Storage Client

    Institute of Scientific and Technical Information of China (English)

    彭英

    2015-01-01

    本文设计一个基于Hadoop的校园网云存储客户端,从系统的体系结构、功能组织和各功能模块方面进行了具体实现,并对其扩展性能进行了测试与分析。用户通过这个客户端管理自己的存储空间和文件,可以将文件上传到云存储服务器中进行存储,并能将云存储服务器中的文件下载并进行处理。%This paper designs a campus cloud storage client based on Hadoop, implements it on system structure, function organization and function module and test and analysis its expand performance. With it, user can manage his own storage space and files, upload local file to cloud storage server and store, download file from cloud storage server and do the relevant process.

  7. Study on Application of Commercial Cipher Cloud Storage System%商密云存储系统应用研究

    Institute of Scientific and Technical Information of China (English)

    汪来富; 沈军; 金华敏

    2012-01-01

    This paper analyzes the security requirements faced by cloud storage and its application,proposes the commercial cipher cloud storage system based on the commercial cipher technology and cloud storage technology. It describes in detail the architecture and function design of this system and the security design for guarantee of the whole process security of user data through implementing the mechanisms of high-strength authentication,data encryption storage,unified key management,data transfer encryption and security isolation. Finally,this paper proposes the service contents and forms of commercial cipher cloud storage products from the two aspects of enterprise customers and public customers.%分析了云存储及其应用面临的安全需求,提出了以商用密码和云存储技术为基础的商密云存储业务系统。系统地介绍了商密云存储业务系统的系统架构及功能设计,并通过实施高强度安全认证、数据加密存储、统一密钥管理、数据传输加密以及安全隔离等安全机制,保障用户数据在网络传输、处理、存储等全流程的安全,最后从政企客户和公众客户两个层面提出商密云存储产品的服务形态设计思路。

  8. 船舶AIS数据云存储系统研究%A Study on the Cloud Storage System of Ship’s AIS Data

    Institute of Scientific and Technical Information of China (English)

    丁振国

    2016-01-01

    This paper makes use of the characteristics of distributed database data model to build up historical AIS data and regional AIS data storage model by analyzing inadequate storage mode of the existing relational database. The new storage model realizes the cloud storage of AIS data and this paper verified its advantage in reading and writing on ship’s AIS data by the experiment.%分析了船舶AIS数据现有关系型数据库存储方式的不足,利用分布式数据库模型的特点建立了历史AIS数据和区域AIS数据存储模型,实现了AIS数据云存储,并通过实验验证了AIS数据云存储系统在读写船舶AIS数据上的优势。

  9. Large file storage solution for OpenStack-based cloud storage system%基于OpenStack的云存储系统的大文件存储方案

    Institute of Scientific and Technical Information of China (English)

    邵珠兴; 陈彩

    2015-01-01

    To solve deficiencies in gigabyte large file storage of the obj ect storage service Swift of open source cloud platform OpenStack,a storage solution of gigabyte large file based on file segmenting,segments merging,concurrent processing was presented.Firstly,the Swift structure and its characteristics were analyzed,based on this,the hierarchical architecture of cloud storage system was constructed.Then,the storage strategy of gigabyte large file was established,and the key data structure and the core process of upload download were designed,and this solution was implemented with Java multi-threading.Finally,the cloud storage experiment environment was deployed,and the feasibility of the solution was proved through the experiment.The experimental results show that this solution breaks through the Swift restrictions on file size and improves the file upload and download speed.%为解决开源云平台OpenStack的对象存储服务Swift在存储GB级大文件方面的不足,提出基于文件分割、片段合并、并行处理的GB级大文件的存储方案。分析Swift体系结构及其特点,在此基础上构建云存储系统的层次架构;制定GB级大文件的存储策略,设计关键数据结构和上传下载的核心流程,使用Java多线程实现该方案。部署云存储实验环境,通过实验验证了该方案的可行性,该方案突破了Swift对文件大小的限制,提高了文件的上传和下载速度。

  10. 关于计算机云存储中数据迁移的分析%The Analysis about Data Migration of Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    宿培成

    2012-01-01

    数据迁移问题是企业选择云存储方式最为重要的环节,文章从多个方面分析云存储中如何有效地进行数据迁移并提出一些自己的看法,旨在共同研究数据迁移的实施方案。%Data migration is the most important link when corporate chooses the cloud storage mode. This article analyzed from several aspects of how to effectively carry out cloud storage data migration and put forward some own views, aims to study data transfer scheme.

  11. 基于内部云存储的图书馆数据资源存储研究%Design for Library Data Resources Storage System Based on Internal Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    乔杨

    2012-01-01

    Reliable storage environment is the basis for library digital resources providing efficient services for users. Based on the discussion of library digital resources storage different technologies, cloud storage connotation and applications in library are analyzed in this paper. According to the characteristics of library digital resources, a storage architecture based on internal cloud storage for library digital resources is designed. And the hierarchical structure, the methods of access control, expansion and deployment are detailed.%可靠存储环境是图书馆数字资源为用户提供高效服务的保障。在阐述图书馆数据资源存储技术基础上,分析了云存储内涵及在图书馆中的应用,探讨基于内部云存储的图书馆数字资源数据存储方案,详细分析了其层次架构、访问控制、扩展和部署方法。

  12. Analytical treatment of the nonlinear electron cloud effect and the combined effects with beam-beam and space charge nonlinear forces in storage rings

    Institute of Scientific and Technical Information of China (English)

    GAO Jie

    2009-01-01

    In this paper we treat first some nonlinear beam dynamics problems in storage rings, such as beam dynamic apertures due to magnetic multipoles, wiggles, beam-beam effects, nonlinear space charge effect, and then nonlinear electron cloud effect combined with beam-beam and space charge effects, analytically. This analytical treatment is applied to BEPC Ⅱ. The corresponding analytical expressions developed in this paper are useful both in understanding the physics behind these problems and also in making practical quick hand estimations.

  13. Holographic Grid Cloud, a futurable high storage technology for the next generation astronomical facilities

    CERN Document Server

    Gallozzi, Stefano

    2011-01-01

    In the immediate future holographic technology will be available to store a very large amount of data in HVD (Holographic Versatile Disk) devices. This technology make extensive use of the WORM (Write-Once-Read-Many) paradigm: this means that such devices allow for a simultaneous and parallel reading of millions of volumetric pixels (i.e. voxels). This characteristic will make accessible wherever the acquired data from a telescope (or satellite) in a quite-simultaneous way. With the support of this new technology the aim of this paper is to identify the guidelines for the implementation of a distributed RAID system, a sort of "storage block" to distribute astronomical data over different geographical sites acting as a single remote device as an effect of a property of distributed computing, the abstraction of resources. The end user will only have to take care on connecting in a opportune and secure mode (using personal certificates) to the remote device and will have access to all (or part) of this potential...

  14. Crown Word Number cloud storage management system design%冠字号云存储管理系统设计

    Institute of Scientific and Technical Information of China (English)

    徐俊; 汤庸; 赵云龙

    2014-01-01

    The cloud storage banknote number tracking system of the paper provides, banknote circulation information and image data and other large data storage, rapid retrieval, regular data cleaning, establishing big data analysis system, receiving and storing a variety of real-time concurrent production equipment produced record data, forming large data storage warehouse, according to the user needs to perform high-speed query large data analysis tasks. Using HDFS cloud storage file system, providing image and Crown Word Number high-speed parallel data storage in the form of cloud services, as well as all data is cleaned regularly, search services, to achieve massive data-performance, high reliability support and strong online expansion capacity.%文中云存储纸币冠字号码追踪系统提供冠字号、钞票流转信息以及图像数据等大数据的存储、快速检索、定时数据清理,建立接大数据分析系统,实时并发接收和存储多种生产设备产生的记录数据,形成大数据存储仓库,根据用户需要对大数据执行高速查询分析任务。采用HDFS 云存储文件系统,以云服务的形式提供图像的存储、冠字号等数据的高速并行存储,以及所有数据的定时清理、检索服务,实现对海量数据高性能、高可靠性支持和较强的在线扩容能力。

  15. Integrity Verification Algorithm of Cloud Storage System Based on RASL%基于RASL的云存储数据完整性验证算法

    Institute of Scientific and Technical Information of China (English)

    唐明; 张娇蓉

    2015-01-01

    随着信息技术的发展,网络化存储将逐渐成为未来存储领域的热点. 而目前的云存储服务也将是网络存储发展的必然趋势. 因此如何确保云存储环境下用户数据的完整性成为人们关注的问题. 周锐等人提出基于同态哈希的云数据完整性验证算法中的公开审计方案.通过对该方案的分析,发现该方案容易受到已知证据伪造攻击,并给出具体的攻击方法. 为了防止攻击,利用基于等级的认证跳表技术(RASL)对该方案进行改进,并对本文方案做安全性分析及证明.%With the development of information technology,network storage will gradually become a hot storage areas in the future.The current cloud storage service will be the inevitable trend of development of network storage.Therefore,how to ensure the integrity of user data in cloud storage environments has become an issue of concern.Zhou Rui et al proposed public audit scheme for cloud data integrity verification based on the homomorphic hash.Through the analysis of the scheme,the scheme is vulnerable to the known evidence of forgery attack,and gives a specific attack method.In order to prevent attacks, improves the scheme based on RASL,and the proposed scheme is security by formal proofs.

  16. 云存储环境下的支持隐私保护方案%Privacy-Preserving Scheme in Cloud Storage Environment

    Institute of Scientific and Technical Information of China (English)

    郭程; 张龙军; 许钟华

    2014-01-01

    作为云存储技术中的突出问题,安全始终受到用户的关注。针对云存储安全中的用户身份隐私保护和数据隐私保护设计了一种安全、高效的云存储方案。在该方案中构建了基于时间序列的多叉树存储结构(MTTS),并在该结构基础上设计了一种密钥推导算法,不仅方便了密钥的生成和管理,并且节省了存储空间。通过对方案的安全性分析,结果表明该方案在确保数据存储安全的基础上也能很好地保护用户身份隐私。%As the key problem in cloud storage, security is always drawing the users’ attention. A safe and efficient cloud storage scheme is designed for users’ identity and data privacy protection in cloud storage security. In the scheme, a storage structure based on time series is constructed and designs a key-deriving algorithm based on the structure. It can not only be good for the generation and management of the key but also can save the storage space. By analyzing the security of scheme, it indicates the scheme can insure the security of data and can protect the privacy of users’ identity.

  17. The status, challenges, forecasts, innovations and discussions of cloud storage applications%云存储应用的现状、挑战、展望、创新及探讨

    Institute of Scientific and Technical Information of China (English)

    孔陶茹

    2014-01-01

    云存储是基于网络宽带下的数据存储服务,它将改变个人和企业的数据存储方式。针对云存储应用的现状及挑战,文章对其未来进行了展望和探讨,并对云存储应用进行了归纳,列举了当前知名云存储产品的特点及运营状况。同时根据云存储应用的现状,重点探讨了云存储应用所面临的挑战,对云存储应用的前景进行了展望,然后详述了云存储行业的数据迁移服务Backup Box。最后,重点提出了对云存储行业的四点感悟。%Cloud storage is a kind of data storage service based on broadband, and it has changed the data storage mode for individuals and businesses. Aiming at the status and challenges, the future of the cloud storage applications are prospected and discussed. The application of cloud storage is concluded, and the characteristic and operation condition of the several famous cloud storage products are listed. Meanwhile, according to application status, the challenges of cloud storage service are analyzed. The future trend of Cloud Storage Application is prospected. Then data migration service of Backup Box is elaborated. Finally, the four inspirations on cloud storage industry are highlighted.

  18. 一种基于OpenStack的云存储方案%A Cloud Storage Solution Based on OpenStack

    Institute of Scientific and Technical Information of China (English)

    徐芳辰; 沈苏彬

    2015-01-01

    云存储作为新兴存储模式,已经被广泛应用于大规模数据的存储中.NoSQL数据库系统面向特定应用,具有可伸缩性和适应动态需求的灵活性,已经逐步在特定的应用领域取代了关系数据库.CouchDB作为文档型数据库,具有高可用性、灵活性等特点,适用于各种部署场景.然而CouchDB结构简单,较难扩展,可伸缩性较差.通过研究,实现了Couch-DB在OpenStack云平台上的部署方法,利用OpenStack虚拟化技术,设计了保证存储资源、计算资源和网络资源的动态分配与管理的云存储方案,以解决CouchDB的可伸缩问题;实现了基于OpenStack的CouchDB实验原型以验证云存储方案的有效性.实验结果表明,该方案能有效满足海量数据的存储需求,提高了存储的可缩放性.%The cloud storage as an emerging storage model,has been widely used in large-scale data storage. NoSQL database is oriented for the specific application with horizontal scalability and flexibility to adapt to the dynamic demand,which gradually replaces the rela-tional database in some specific application domains. CouchDB as a document database,with high availability and flexibility,can be ap-plied for various deployment scenarios. However the CouchDB has the disadvantages of simple structure,poor scalability and extensibili-ty. In this paper,the CouchDB deploys in OpenStack cloud platform. The improved application scheme of cloud storage is proposed,using the OpenStack virtualization technology,guaranteeing the storage,computing and network resources to be allocation and management dy-namically,which solves the problem of scalability. The CouchDB storage prototype based on OpenStack is implemented. The experimental results show that the prototype can effectively meet the storage demand of mass data,improving storage scalability.

  19. A reputation mechanism in peer-to-peer cloud storage systems%对等云存储系统信誉机制研究

    Institute of Scientific and Technical Information of China (English)

    吴吉义; 陈德人

    2011-01-01

    As the latest development of the distributed storage technology,cloud storage is a product of the integration of distributed storage and virtualization technologies.Cloud storage allows use to storage facilities available on the internet.Relative to the current Master/Slave computing model cloud storage file systems,including GFS,HDFS,Sector and KFS,an open P2P(peer-to-peer) cloud storage system based on DHT was proposed,and we constructed a prototype system named MingCloud based on the Kademlia algorithm.According to the research-development needs of the system,a reputation mechanism was designed for the system,specifically including the calculation of reputation degree,trust model design,work process of reputation mechanism,and safety analysis.Our simulation results show that the mechanism of this model provides a high degree of effectiveness and robustness.Meanwhile,the reputation model can effectively protect honest nodes,reduce the trust value of malicious nodes,and restrain malicious behaviors.%云存储是分布式存储技术与虚拟化技术结合的产物,是分布式存储技术的最新发展.云存储意味着存储可以作为一种服务,通过互联网提供给用户.相对于当前主从(Master/Slave)结构的GFS(Google File System),HDFS(Hadoop Distributed File System),Sector,KFS(Kosmos File System)等云存储系统,提出了一种基于DHT(Distributed Hash Table)的对等云存储系统MingCloud.重点研究了系统的信誉机制问题,具体包括综合信誉度的计算、信任模型设计、信誉机制的工作过程、安全性分析等方面.仿真实验表明,该机制具有较好的有效性和健壮性,能有效保护系统中的诚实节点,迅速降低恶意节点的信任值,抑制恶意交易行为.引入MingCredit之后,系统不再简单地以节点的物理性能诸如存储空间大小、网络带宽等方面的客观能力,以及在线时间作为评价标准,而是与节点参与到对等存储交

  20. Study of Digital Resource Storage in College Library Based on Cloud Computing%基于云计算的高校图书馆数字资源存储研究

    Institute of Scientific and Technical Information of China (English)

    王煦

    2015-01-01

    This paper described the SAN (Storage Area Network)based on cloud storage, and analyzed the system structure with the SAN characteristic, and finally put forward layered structure of cloud storage system.%对云存储支持下SAN存储区域网络进行了介绍。分析了系统以SAN结构为特点的系统框架,最后提出了云存储系统的分层结构。

  1. Research of cloud storage system and technology service platform based on the Microsoft%基于微软云计算存储系统及技术服务平台研究

    Institute of Scientific and Technical Information of China (English)

    李爱国; 殷锋社

    2013-01-01

    云计算技术的兴起和发展,正逐渐改变人们使用服务和资源的方式,同时也成为计算机应用领域的研究热点.云存储可实现云端海量数据的高效存储,是云计算的重要基础云存储可实现云端海量数据的高效存储,是云计算的重要基础.对如何保证云存储系统的服务质量及可靠性,对于保证海量用户的访问效率,维护海量数据存储的可用性及用户技术服务平台的开发有着重大意义.%Cloud computing technology is arisen with development, is gradually changing people using services and resources, but also become the research hotspot in the field of computer application. Cloud storage can realize the efficient storage of massive data cloud, cloud computing is the important basis of cloud storage can realize the efficient storage of massive data cloud, cloud computing is the important foundation of. On how to ensure that the cloud storage service system to ensure the quality and reliability, large numbers of users accessing efficiency, maintain the huge data storage of usability and user technical service platform for the development has the significant significance.

  2. 基于HDFS的企业私有云存储的研究%Research on Private Cloud Storage of Companies Based on Hadoop Distributed File System

    Institute of Scientific and Technical Information of China (English)

    史振华

    2014-01-01

    Nowadays enterprises are faced with the problems of mass data and management. The idea of constructing the system of pri-vate cloud storage based on HDFS is put forward through the study of the technology of private cloud storage and HDFS. Through the ex-periment, the system is featured with high reliability, good scalability, and low cost of developing and running, which meets the needs of the secure, reliable, fast and efficient storage of the vast resources for enterprises.%针对目前企业海量数据存储和管理的问题,本文通过对私有云存储和HDFS技术的研究,提出基于HDFS技术构建企业私有云存储系统。通过实验验证,该系统具有安全可靠性高、扩展性好、开发和运行的成本较低等特点,能够满足企业对海量资源安全可靠、高效快速的存储。

  3. 基于开放云存储协议的云存储系统性能评测方法研究%Research on performance evaluation technology on open cloud storage protocols

    Institute of Scientific and Technical Information of China (English)

    齐婵颖; 李育超; 聂睿; 覃杨森

    2016-01-01

    云存储系统的广泛应用带来了数据存储方式和商业模式的重大变革。然而,不同的云存储系统有不同的协议,横向之间尚无统一的评测基准,面对众多的云存储系统用户难以择优选择,云服务提供商也难以进一步改进设备和服务。本文针对基于开放云存储协议的云存储系统性能评测方法没有通用标准的问题,在分析开放云存储协议的基础上,分别研制了基于两种常用开放云存储协议(基于API接口和基于RESTFul接口)的性能测试工具。并应用这两种测试工具对比测试了基于 API 接口的开放云存储系统金山快盘和基于 RESTFul 接口的本地私有云存储系统OpenStack Swift的性能,分析了影响云存储系统性能的因素,为云存储厂商改进云存储服务提供了参考依据,同时,为用户选购基于开放云存储协议的云存储系统提供了理论指导。%Cloud storage system is now widely used, which has brought significant changes in data storage and business models. However, different cloud storage system corresponds to different protocol. There are no uniform benchmarks for them, so it's difficult for users to choose the optimal one when they are facing a large number of cloud storage systems. At the same time, it's also difficult for cloud service providers to improve equipment and service further. This paper focused on the problem of performance evaluation scheme based on open cloud storage protocols on the base of analyzing open cloud storage protocols, developing two common open cloud storage protocols (API interface and RESTFul interface), developed two different performance testing tools. This two kinds of testing tools are used to do performance comparison test between Kingsoft Cloud based on open cloud storage system and local private cloud storage system OpenStack Swift based on RESTFul interface. Then we analysis the factors those influence the performance of

  4. Load balancing study in cloud storage based on AHP%基于AHP的云存储负载均衡研究

    Institute of Scientific and Technical Information of China (English)

    陈德军; 高晓军; 王义飞

    2015-01-01

    针对云存储系统节点在数据分布策略和系统响应时间方面的综合负载计算问题,提出了一种云存储系统的负载均衡算法,并对该算法进行了验证。算法基于层次分析法(Analytic Hierarchy Process,AHP),通过建立综合评估指标体系,从可用存储空间、可用CPU、可用内存和访问热度四个方面,计算各个存储节点的综合负载,并据此对数据存取进行均衡调度。验证结果表明,通过调整不同指标的权重,算法能够很好地满足不同的应用需求,同时,该算法能够很好地反应各节点的综合负载,实现云存储系统整机性能的优化,尤其适用于一些高并发的大数据存储。%To the calculation problem to comprehensive load of cloud storage system nodes in the data distribution strategy and system response time, this paper provides a load balancing algorithm to cloud storage system, and validates the algo-rithm. The algorithm based on the Analytic Hierarchy Process(AHP)can calculate the comprehensive load of storage nodes from the available storage space, available CPU, available memory and access frequency and dispatch data access request. The verification results show, by adjusting weight of different indexes, the algorithm can meet the different appli-cation requirements and optimize cloud storage system performance, especially be suitable for high parallel access and big data storage.

  5. Securing Cloud from Cloud Drain

    Directory of Open Access Journals (Sweden)

    Niva Das

    2014-09-01

    Full Text Available Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “CloudDrain” to define data leakage in case of security compromise.

  6. 基于生存期的云存储元数据缓存算法%Metadata caching algorithm of cloud storage based on life cycle

    Institute of Scientific and Technical Information of China (English)

    牛德姣; 蔡涛; 詹永照; 鞠时光

    2012-01-01

    针对元数据管理子系统成为云存储中性能瓶颈的问题,研究了云存储元数据缓存算法.在分析元数据被访问特性的基础上,提出了元数据缓存生存期的概念;依据云存储的特性设计了元数据缓存生存期的计算规则,给出了基于生存期的元数据调出策略和元数据缓存写回策略,提高了云存储元数据管理的效率;分析了基于生存期元数据缓存算法适应用户访问特性的能力,讨论了使用基于生存期元数据缓存算法后如何保证元数据一致性的问题;使用基于生存期元数据缓存算法,实现了云存储元数据缓存原型系统,并使用通用数据集和测试工具进行了测试与分析.结果表明,该算法能提高云存储15%的I/O速度和16%的操作处理速度.%To solve the bottle-neck caused by metadata management subsystem in cloud storage, a metadata caching algorithm of cloud storage was proposed. Based on the characteristics analysis of accessed metadata, the concept of metadata caching life cycle was determined. The calculating rules of metadata caching life cycle was designed , and the metadata caching algorithms of metadata substitution and write-back were presented based on the life cycle definition. The metadata management efficiency of cloud storage was greatly improved by the caching algorithms. The metadata caching algorithms adaptability to user accessing characteristics was analyzed, and the metadata consistency guaranteed by the algorithms was discussed. A metadata caching prototype was realized based on the proposed algorithms. Analysis and experiments were completed on the benchmark dataset by general test tools. The results show that the proposed algorithms can effectively enhance I/O rate by 15% and operation processing rate by 16% in cloud storage, respectively.

  7. Corneal fibropapillomatosis in green sea turtles (Chelonia mydas) in Australia.

    Science.gov (United States)

    Flint, M; Limpus, C J; Patterson-Kane, J C; Murray, P J; Mills, P C

    2010-05-01

    Chelonid corneal fibropapillomatosis has not previously been recorded in Australian waters. During 2008, 724 green sea turtles (Chelonia mydas) were examined in Queensland, Australia at two sites, Moreton Bay (n=155) and Shoalwater Bay (n=569), during annual monitoring. In the same calendar year, 63 turtles were submitted from various sites in southern Queensland for post-mortem examination at the University of Queensland. Four of the 787 animals (0.5%) were found to have corneal fibropapillomas of varying size, with similar gross and microscopical features to those reported in other parts of the world. Two animals with corneal fibropapillomas also had cutaneous fibropapillomas. Clinical assessment indicated that these lesions had detrimental effects on the vision of the turtles and therefore their potential ability to source food, avoid predators and interact with conspecifics. Importantly, these findings represent an emergence of this manifestation of fibropapillomatosis in green sea turtle populations in the southern Pacific Ocean.

  8. The Technology Design Research Based on Massive Data Cloud Storage of Geographical National Conditions%地理国情海量数据云存储技术设计研究

    Institute of Scientific and Technical Information of China (English)

    朱力维; 王志强; 王军

    2014-01-01

    This research has geographic conditions mass data features and the data content .For current data storage problems , this re-search studies cloud storage concept and the related key technologies , and HDFS technology used has cloud environment for geographic conditions mass data organization and resources shared by cloud storage model , through cloud service interface access application by cloud storage service , which can effective settle geographic conditions data resources mass storage and service problems for geographic conditions data management way serving reference to data transformation .%研究了地理国情海量数据特征及数据内容,针对目前数据存储中存在的问题,研究了云存储概念及相关的关键技术,采用HDFS技术提出了云环境下地理国情海量数据组织与资源共享的云存储模型,通过云应用服务接口访问云存储服务,能够有效解决地理国情数据资源海量存储和服务问题,为地理国情数据管理方式的转变提供借鉴。

  9. 云存储中双备份数据的安全访问%Secure Access of Two-Copy Data in Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    李红卫; 叶飞跃; 古春生; 于志敏; 景征骏

    2014-01-01

    Data integrity and privacy become major problems that the customers concern when the data is stored in the cloud storage. The paper proposes a novel oblivious RAM construction that achieves O(1)time complexity of access cloud storage,while consuming O ( cN ) ( 0storage and O ( N ) server-side storage. The paper proposes a technique in which the client data is stored in two servers that each server has a client data copy in order to ensure data integrity. Oblivious RAM allows a client to hide its data access patterns from an untrusted server. The adversary can not obtain useful information from the client access pattern,and the data privacy is guaranteed.%数据的完整性和私密性是客户将数据存储到云存储中时关心的主要问题。提出了一种新的ORAM结构,其访问云存储时间复杂度为O(1)、需要O(cN)(0

  10. Design of Virtual Data Separation Dynamic Cloud Storage Based on Information Fusion%基于信息融合的虚拟数据分离动态云存储设计

    Institute of Scientific and Technical Information of China (English)

    倪时龙; 彭巍; 林振天; 许双成

    2015-01-01

    提出一种基于信息融合的虚拟数据分离动态云存储设计方法.构建了虚拟数据的分离动态云存储调度模型,进行信息特征提取,对提取的云存储信息特征进行信息融合处理,实现虚拟数据分离动态云存储改进设计.仿真结果表明,采用该算法进行云存储设计,能较为准确地反映虚拟数据的细节信息特征,提高数据融合精度,为实现动态分离存储提供优化索引通道,进而提高云存储中数据调度性能.%A new dynamic cloud storage design method based on information fusion for virtual data separation is proposed. To construct the virtual data separation dynamic cloud storage scheduling model and feature information extraction, to ex-tract cloud storage characteristics of information of information fusion and processing, realize the virtual data separation dy-namic cloud storage to improve the design. The simulation results show that the sampling of the algorithm of cloud storage design, more accurately response the details of the virtual data information features, improving the accuracy of data fusion, and provides the optimization index channel to realize the dynamic separation and storage, and to improve the cloud storage data scheduling performance.

  11. A new Gambierdiscus species (Dinophyceae) from Rarotonga, Cook Islands: Gambierdiscus cheloniae sp. nov.

    Science.gov (United States)

    Smith, Kirsty F; Rhodes, Lesley; Verma, Arjun; Curley, Belinda G; Harwood, D Tim; Kohli, Gurjeet S; Solomona, Dorothy; Rongo, Teina; Munday, Rex; Murray, Shauna A

    2016-12-01

    Ciguatera fish poisoning (CFP) has been reported for many years in Rarotonga, Cook Islands, and has had the world's highest reported incidence of this illness for the last 20 years. Following intensive sampling to understand the distribution of the causative organisms of CFP, an undescribed Gambierdiscus species was isolated from the Rarotongan lagoon. Gambierdiscus cheloniae sp. nov. has the common Gambierdiscus Kofoidian plate formula (except for a variability in the number of precingular plates in aberrant cells): Po, 3', 6″ (7″), 6C?, 6 or 7S, 5'″, 1p and 2″″. The 2' plate is hatchet shaped and the dorsal end of 1p is pointed and the relatively narrow 1p plate. Morphologically G. cheloniae is similar to the genetically closely related species G. pacificus, G. toxicus and G. belizeanus, although smaller (depth and length) than G. toxicus. The apical pore plate varies from those of G. belizeanus and G. pacificus, which are shorter and narrower, and from G. toxicus, which is larger. G. cheloniae also differs from G. pacificus in the shape of the 2' plate. The description of this new species is supported by phylogenetic analyses using three different gene regions. G. cheloniae produced the putative maitotoxin-3 analogue, MTX-3, but neither maitotoxin or monitored ciguatoxin. Extracts of G. cheloniae were shown to be highly toxic to mice by intraperitoneal (i.p.) injection, although they were less toxic by gavage. It is possible that this species produces toxins other than putative MTX-3.

  12. Analysis of cloud storage systems based on metadata node%基于中心节点的云存储系统应用分析

    Institute of Scientific and Technical Information of China (English)

    李淼淼; 梅向东

    2015-01-01

    在云计算的催生下,基于不同网络拓扑结构和数据传输机制的分布式云存储系统应运而生,系统特性不同,应用场合也不尽相同。本文从是否存在元数据中心节点的角度出发,以有元数据节点的MooseFS和无元数据节点的GlusterFS为代表,全面分析两种系统架构、工作机制、系统特点等,并对两种系统进行不同文件类型的读写测试,给出在现有硬件基础上选择适合的文件系统的方法,从而使云存储系统数据处理性能达到最优。%Due to the improvement of cloud computing, distributed cloud storage systems based on different network topologies and data transmission mechanisms are arising. The different characteristics of systems lead to the different applications. This paper, using GlusterFS with no metadata node and MooseFS with a metadata nodes as representative, shows a comprehensive analysis of the system architectures, working mechanisms, system features, etc., distinguished from whether the system contains a metadata node .Based on the ability test, this paper then gives the solutions of how to choose the most appropriate file system on the basis of existing hardware, which makes the cloud storage system achieve optimal performance.

  13. A secure and efficient data storage scheme in cloud computing%云计算中一种安全有效的数据存储方案

    Institute of Scientific and Technical Information of China (English)

    胡元闯; 张波; 张红军

    2016-01-01

    引入可信的第三方TPA,基于RSA算法、Hash函数和DES算法,为云计算提出一种能为数据提供机密性和完整性的安全存储方案SCBRHD。该方案利用RSA算法、Hash函数及DES算法进行加密来确保数据的机密性和存储安全。数据通过二次加密存储在云服务器,加密、解密和认证只涉及终端用户和TPA。给出了方案的架构模型和算法流程,并在Linux平台的Cloudsim云计算仿真环境下对其进行仿真分析,验证其有效性。%In this paper, with the introduction of trusted third party TPA(Third Party Auditor), the SCBRHD scheme is proposed to provide cloud computing with a security data storage of confidentiality and integrity. The scheme uses RSA encryption algorithm, Hash function and DES algorithm to ensure the confidentiality and security of data storage. The data is stored into the cloud server after twice encrypting; the encryption, decryption and authentication only involve the end-user and TPA. The architecture and algorithm of the scheme are also given, and the scheme is simulated in Linux Cloudsim cloud computing environment to verify its validity.

  14. Survey of proofs on data storage security in cloud computing%云计算下的数据存储安全可证明性综述

    Institute of Scientific and Technical Information of China (English)

    梁彪; 曹宇佶; 秦中元; 张群芳

    2012-01-01

    In cloud computing, data service outsourcing relieves the data owners of the burden of local data storage and main-tenance. However, it also eliminates their physical control of the storage dependability and security, which makes the out-sourced data assurances in cloud computing a very challenging and potentially formidable task. Based on the overall study of the recent researches on data storage security, it introduced the architecture of cloud data storage firstly. And studied the state-of-the-art schemes from proofs of retrievahilily and provable data possession. Then, this paper discussed the function design in protocol based on public verification, homomorphic authenticators, data dynamics, data privacy protection, batch auditing and multiple-server environment. Furthermore, made some comparisons of functions and the complexity in different protocols in ta-bles. At last, summarized and discussed the further direction of research.%云计算的数据服务外包可以减少数据所有者本地的存储和维护压力,然而用户会因此失去对数据可靠性和安全的物理控制.于是如何确保云中数据的安全就成为了非常有挑战性的任务和难题.在全面研究云计算数据存储安全现有成果的基础上,介绍了云计算数据存储的基本架构,并从可检索证明和可证明数据拥有两个角度分析了相关研究方案的发展,从公共认证、同态认证、数据动态化、隐私保护、批审计和多服务器环境得方面讨论了协议的功能设计,并且列表进行了功能和开销对比,在此基础上提出了一个比较完备的云计算环境下的协议框架.最后总结并阐述了后续工作.

  15. Cloud Computing for radiologists.

    Science.gov (United States)

    Kharat, Amit T; Safvi, Amjad; Thind, Ss; Singh, Amarjit

    2012-07-01

    Cloud computing is a concept wherein a computer grid is created using the Internet with the sole purpose of utilizing shared resources such as computer software, hardware, on a pay-per-use model. Using Cloud computing, radiology users can efficiently manage multimodality imaging units by using the latest software and hardware without paying huge upfront costs. Cloud computing systems usually work on public, private, hybrid, or community models. Using the various components of a Cloud, such as applications, client, infrastructure, storage, services, and processing power, Cloud computing can help imaging units rapidly scale and descale operations and avoid huge spending on maintenance of costly applications and storage. Cloud computing allows flexibility in imaging. It sets free radiology from the confines of a hospital and creates a virtual mobile office. The downsides to Cloud computing involve security and privacy issues which need to be addressed to ensure the success of Cloud computing in the future.

  16. A support privacy encryption method in the application of the cloud storage%一种支持隐私保护的加密方法在云存储中的应用

    Institute of Scientific and Technical Information of China (English)

    张林

    2016-01-01

    With the rapid development of cloud storage technology, cloud storage data security has become a key problem. En-cryption is an effective method for protection of data. In order to improve the cloud storage environment, the protection of cus-tomer privacy, this article design research a kind of support CESVMC privacy cloud storage encryption method. Based on the matrix and vector add, subtract, multiply, divide, complete the cloud storage data and customer information confidential work. Finally through security analysis and performance evaluation, prove CESVMC encryption technology has high safety perfor-mance, and reasonable operation complexity, meet the needs of the daily work of cloud storage.%随着云存储技术的快速发展,云存储的数据安全性成了一个最为关键的问题。加密是一种对数据进行保护的有效方法。为了提高云存储环境中对客户隐私的保护,本文设计研究了一种支持隐私保护的云存储加密方法CESVMC。通过对矩阵和向量进行加、减、乘、除运算,完成对云存储数据和客户信息的保密工作。最后经过安全分析和对其性能进行评测,证明CESVMC加密技术具有较高的安全性能,以及合理的运算复杂度,满足日常云存储的工作需要。

  17. 基于P2P分布式开放资源管理服务的云存储方案研究%Research on Mass Data Cloud Storage System

    Institute of Scientific and Technical Information of China (English)

    陈敏

    2014-01-01

    Because able to provide users with safety and mass data storage function, cloud storage technology developed very rapidly in recent years. This paper introduces the basic principle of cloud storage technology and analyzes the present situation of the cloud storage technology, introduces the use of existing natural distribution network around the world plenty of free storage service, such as disc, FTP, email and other forms of storage. These services will be held together, so as to provide users with low price and reliable storage systems. This paper introduces the design of a kind of low cost,quick speed,high availability,can be expanded cloud storage topology system. By means of the system to expanding other function,finally achieves the purpose of distributed storage resources sharing.%云存储技术因其能为用户提供了安全、海量、随时随地的数据存储功能而得以快速发展。提出了利用网络上现存的自然分布于世界各地的大量免费存储服务,如网盘、ftp、email以及其他形式等存储空间,将这些服务集中起来,为用户提供价廉、可靠的存储系统。介绍了一种低开销、快速度、高可用、可扩展的云存储拓扑系统,以期在该拓扑架构下实现以文件存储和共享服务为基础,不断扩展其他功能,最终形成P2P分布式存储资源共享的目的。

  18. 基于SWIFT的电力企业云存储系统%Cloud Storage System for Electric Power Enterprises Based on SWIFT

    Institute of Scientific and Technical Information of China (English)

    郭华

    2015-01-01

    The cloud storage system for electric power enterprises based on SWIFT is studied in this paper.A set of fine-grained cloud storage access control scheme is developed to adapt to the character-istics of modern electric power enterprises,such as large amount of information,complex organiza-tional structure,high staff turnover,etc.A safe,reliable and efficient data storage system is provided for the electric power enterprise,with data management application solutions specific to enterprise in-ternal data management features at the same time.The system can achieve fine-grained access control permissions by group management and improve the operation and management level of electric power enterprises.%本文研究了面向电力企业的基于SWIFT的云存储系统。设计了一套适应现代电力企业信息量大、组织结构复杂、人员流动频繁等特点的细粒度云存储访问控制方案,为电力企业提供安全、可靠、高效的数据存储系统。通过群组管理实现基于精细访问控制权限的云存储共享技术手段,提高电力企业的运行管理水平,该系统目前已投入实际运行。

  19. A Kind of VOD System Based on Cloud Storage%一种基于云存储的 VOD 系统

    Institute of Scientific and Technical Information of China (English)

    喻争荣; 夏小玲

    2014-01-01

    针对VOD视频点播系统在高并发网络访问情况下的I/O瓶颈、网络拥塞等问题,提出一种基于云存储的解决方案。在VOD现有架构的基础上,采用云存储和CDN网络提供存储和访问服务,提高了系统的高并发访问负载能力。同时针对VOD视频转码模块提出一种基于FFMPEG的整体解决方案,能在实际应用中有效降低技术难度和开发成本,对VOD系统的优化和提升具有实际意义和应用价值。%For VOD system’ s I/O bottlenecks and network congestion problems under conditions of high concurrent network ac -cess, this paper presents a new solution based on cloud storage .On the basis of the structure on VOD , the solution uses cloud storage and CDN to provide storage service and network access service , improving the load capacity for high concurrent access to the system.While for VOD video transcode module , this paper presents a whole solution based on FFMPEG , which can reduce development costs and technical difficulties in the practical application .It has practical significance and application value for VOD system’ s upgrading and optimization .

  20. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    al. present two storage isolation schemes that enable cloud users with high security requirements to verify that their disk storage is isolated from...Proof of Isolation for Cloud Storage Zhan Wang, Kun Sun, Sushil Jajodia, and Jiwu Jing 6. Selective and Fine-Grained Access to Data in the Cloud ... Cloud Security: Issues and Research Directions We organized an invitational workshop at George Mason University on Cloud Security: Issues and Research

  1. Hybrid cloud for dummies

    CERN Document Server

    Hurwitz, Judith; Halper, Fern; Kirsch, Dan

    2012-01-01

    Understand the cloud and implement a cloud strategy for your business Cloud computing enables companies to save money by leasing storage space and accessing technology services through the Internet instead of buying and maintaining equipment and support services. Because it has its own unique set of challenges, cloud computing requires careful explanation. This easy-to-follow guide shows IT managers and support staff just what cloud computing is, how to deliver and manage cloud computing services, how to choose a service provider, and how to go about implementation. It also covers security and

  2. Epizootic mortality of free-living green turtles, Chelonia mydas, due to coccidiosis.

    Science.gov (United States)

    Gordon, A N; Kelly, W R; Lester, R J

    1993-07-01

    At least 70 wild green sea turtles, Chelonia mydas, died in the Moreton Bay area of southeast Queensland, Australia over 6 wk in spring 1991. Based on the necropsy of 24 turtles, there was a severe enteritis or encephalitis associated with Caryospora cheloniae, a coccidial pathogen previously recorded only in farm-reared Ch. mydas hatchlings. Infection was characterized by the presence of coccidia in extra-intestinal lesions. Oocysts were observed to sporulate, after which sporozoites escaped into seawater to form a novel stellate configuration. We conclude that C. cheloniae is pathogenic for life stages other than hatchling Ch. mydas and that naturally-occurring coccidiosis is a significant disease of free-living Ch. mydas.

  3. 基于云存储的医院PACS系统存储设计%Based on Cloud Storage Hospital PACS System to Store Design

    Institute of Scientific and Technical Information of China (English)

    赵凯

    2012-01-01

    目前,PACS系统已经日益成为各级医院实现信息化建设的重要组成部分,在网络应用越来越广泛的今天,异地多院区联接形成医院PACS系统对存储应用有更高的要求。文章从医院PACS系统存储的实例出发,探讨了基于云存储的PACS系统存储设计。%At present,PACS has increasingly become the hospitals at all levels of the construction of the informatization is an important part,More and more wide application in the network today,different ground much underwent connection system to form the hospital PACS have higher storage application requirements。This article from the hospital system to store examples of PACS,was discussed based on cloud storage system design of PACS storage.

  4. 云计算环境下的分布存储关键技术%Key Technologies of Distributed Storage for Cloud Computing

    Institute of Scientific and Technical Information of China (English)

    王意洁; 孙伟东; 周松; 裴晓强; 李小勇

    2012-01-01

    云计算作为下一代计算模式,在科学计算和商业计算领域均发挥着重要作用,受到当前学术界和企业界的广泛关注.云计算环境下的分布存储主要研究数据在数据中心上的组织和管理,作为云计算环境的核心基础设施,数据中心通常由百万级以上节点组成,存储其上的数据规模往往达到PB级甚至EB级,导致数据失效成为一种常态行为,极大地限制了云计算的应用和推广,增加了云计算的成本.因此,提高可扩展性和容错性、降低成本,成为云计算环境下分布存储研究的若干关键技术.针对如何提高存储的可扩展性、容错性以及降低存储的能耗等目标,从数据中心网络的设计、数据的存储组织方式等方面对当前分布存储的关键技术进行了综述.首先,介绍并对比了当前典型的数据中心网络结构的优缺点;其次,介绍并对比了当前常用的两种分布存储容错技术,即基于复制的容错技术和基于纠删码的容错技术;第三,介绍了当前典型的分布存储节能技术,并分析了各项技术的优缺点;最后指出了当前技术面临的主要挑战和下一步研究的方向.%Considered as the next generation computing model, cloud computing plays an important role in scientific and commercial computing area and draws great attention from both academia and industry fields. Under cloud computing environment, data center consist of a large amount of computers, usually up to millions, and stores petabyte even exabyte of data, which may easily lead to the failure of the computers or data. The large amount of computers composition not only leads to great challenges to the scalability of the data center and its storage system, but also results in high hardware infrastructure cost and power cost. Therefore, fault-tolerance, scalability, and power consumption of the distributed storage for a data center becomes key part in the technology of cloud

  5. 云存储智能多数据副本放置机制��%Intelligent Multiple Data Replica Placement Scheme for Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    张榜; 王兴伟; 黄敏

    2014-01-01

    The data replica management scheme is a critical component of cloud storage system. In order to improve its scalability and reliability at the same time shorten user access time, the multiple data replica scheme should be adopted and the proper placement for each replica should be determined. Thus, this paper proposes an intelligent multiple data replica placement scheme for cloud storage. This scheme is based on p-center model with minimizing user access cost as its optimization objective. It uses genetic algorithm (GA) to find the optimal data replica placement solution and uses biogeography-based optimization (BBO) algorithm to optimally assign user access request to the specific data replica. The proposed scheme has been implemented based on CloudSim and performance evaluation has been done. The simulation results show that it is both feasible and effective.%数据副本管理机制是云存储系统的重要组成部分。为了提高云存储系统的可伸缩性、可靠性,同时改善用户访问时间,通常采用多数据副本机制,并且需要解决数据副本放置问题。为此,提出了一种用于云存储系统的智能多数据副本放置机制。该机制基于p-中心模型,以最小化访问代价为优化目标,基于遗传算法(genetic algorithm,GA)确定优化的数据副本放置方案,基于生物地理学优化(biogeography-based optimization,BBO)算法确定用户访问请求对数据副本的优化分配。基于CloudSim进行了仿真实现和性能评价,结果表明,云存储智能多数据副本放置机制是可行和有效的。

  6. Green turtles (Chelonia mydas) have novel asymmetrical antibodies

    Science.gov (United States)

    Work, Thierry M.; Dagenais, Julie; Breeden, Renee; Schneemann, Anette; Sung, Joyce; Hew, Brian; Balazs, George H.; Berestecky, John M.

    2015-01-01

    Igs in vertebrates comprise equally sized H and L chains, with exceptions such as H chain–only Abs in camels or natural Ag receptors in sharks. In Reptilia, Igs are known as IgYs. Using immunoassays with isotype-specific mAbs, in this study we show that green turtles (Chelonia mydas) have a 5.7S 120-kDa IgY comprising two equally sized H/L chains with truncated Fc and a 7S 200-kDa IgY comprised of two differently sized H chains bound to L chains and apparently often noncovalently associated with an antigenically related 90-kDa moiety. Both the 200- and 90-kDa 7S molecules are made in response to specific Ag, although the 90-kDa molecule appears more prominent after chronic Ag stimulation. Despite no molecular evidence of a hinge, electron microscopy reveals marked flexibility of Fab arms of 7S and 5.7S IgY. Both IgY can be captured with protein G or melon gel, but less so with protein A. Thus, turtle IgY share some characteristics with mammalian IgG. However, the asymmetrical structure of some turtle Ig and the discovery of an Ig class indicative of chronic antigenic stimulation represent striking advances in our understanding of immunology.

  7. Electrochemotherapy for the treatment of fibropapillomas in Chelonia mydas.

    Science.gov (United States)

    Brunner, Carlos Henrique Maciel; Dutra, Gustavo; Silva, Caroline Brunelli; Silveira, Lucia Maria Guedes; Martins, Maria de Fátima Monteiro

    2014-06-01

    Fibropapillomatosis continues to be an important cause of morbidity and mortality in sea turtles, particularly in Chelonia mydas. Turtles with this debilitating herpesvirus disease usually present with multiple, large, and ulcerated cutaneous masses that compromise both locomotion and feeding. There are very few available therapeutic strategies, with surgical excision being the most common. However, this surgical excision is associated with a high rate of local disease recurrence and secondary infections. Electrochemotherapy has been used for the treatment of epithelial neoplasm in several animal species. This technique is based on a combination of chemotherapy, usually with bleomycin or cisplatin, and electroporation. It consists of a series of short, high-voltage electric pulses that lead to increased membrane permeability and more efficient transport of antineoplastic drugs through the cellular membrane. Here, two C. mydas fibropapillomas were treated with a standard electrochemotherapy protocol using intralesional bleomycin sulfate injections followed by the application of electric pulses. Two sessions were performed, with a 33-day interval between sessions. Complete regression of lesions occurred without side effects or complications in each animal. There was no sign of local recurrence, even 1 yr after the end of treatment. Electrochemotherapy may be an effective therapeutic alternative for sea turtles with fibropapillomas.

  8. Green Turtles (Chelonia mydas) Have Novel Asymmetrical Antibodies.

    Science.gov (United States)

    Work, Thierry M; Dagenais, Julie; Breeden, Renee; Schneemann, Anette; Sung, Joyce; Hew, Brian; Balazs, George H; Berestecky, John M

    2015-12-01

    Igs in vertebrates comprise equally sized H and L chains, with exceptions such as H chain-only Abs in camels or natural Ag receptors in sharks. In Reptilia, Igs are known as IgYs. Using immunoassays with isotype-specific mAbs, in this study we show that green turtles (Chelonia mydas) have a 5.7S 120-kDa IgY comprising two equally sized H/L chains with truncated Fc and a 7S 200-kDa IgY comprised of two differently sized H chains bound to L chains and apparently often noncovalently associated with an antigenically related 90-kDa moiety. Both the 200- and 90-kDa 7S molecules are made in response to specific Ag, although the 90-kDa molecule appears more prominent after chronic Ag stimulation. Despite no molecular evidence of a hinge, electron microscopy reveals marked flexibility of Fab arms of 7S and 5.7S IgY. Both IgY can be captured with protein G or melon gel, but less so with protein A. Thus, turtle IgY share some characteristics with mammalian IgG. However, the asymmetrical structure of some turtle Ig and the discovery of an Ig class indicative of chronic antigenic stimulation represent striking advances in our understanding of immunology.

  9. Myoglobin Expression in Chelonia mydas Brain, Heart and Liver Tissues

    Directory of Open Access Journals (Sweden)

    RINI PUSPITANINGRUM

    2010-09-01

    Full Text Available An understanding of the underpinning physiology and biochemistry of animals is essential to properly understand the impact of anthropogenic changes and natural catastrophes upon the conservation of endangered species. An observation on the tissue location of the key respiratory protein, myoglobin, now opens up new opportunities for understanding how hypoxia tolerance impacts on diving lifestyle in turtles. The respiratory protein, myoglobin has functions other than oxygen binding which are involved in hypoxia tolerance, including metabolism of reactive oxygen species and of the vascular function by metabolism of nitric oxide. Our work aims to determine whether myoglobin expression in the green turtle exists in multiple non muscle tissues and to confirm the hypothesis that reptiles also have a distributed myoglobin expression which is linked to the hypoxiatolerant trait. This initial work in turtle hatch Chelonia mydas confirms the presence of myoglobin transcriptin brain, heart and liver tissues. Furthermore, it will serve as a tool for completing the sequence and generating an in situ hybridization probe for verifying of cell location in expressing tissues.

  10. Discussion on the Information Resource Storage Architecture Model in Digital Library Based on Cloud Storage Technology%基于云存储技术的数字图书馆信息资源存储架构模型探讨

    Institute of Scientific and Technical Information of China (English)

    金志敏

    2015-01-01

    Cloud computing is a hotspot of current research and application problems,cloud storage as the bottom lay-er of cloud computing service,provides an important support role to upper layers. With the rapid increase of the digital library information resources,the traditional way of storage in the face of mass data storage requirements,there is the bottleneck of capacity and performance. Cloud storage as a new mode of storage service,for the huge amounts of digital library information resource construction provides a new choice This article introduces the cloud computing and cloud storage,cloud storage technology based on digital library,discusses the model of the digital library information resource storage architecture. Finally the application of digital library ,the advantage of the cloud storage.%云计算是当前研究与应用的热点问题,云存储作为云计算的底层服务,对上层应用提供了重要的支持作用。随着数字图书馆信息资源总量的快速增加,传统的存储方式在面对海量数据存储的需求上,存在着容量和性能的瓶颈。云存储作为一种新型的存储服务模式,为数字图书馆的海量信息资源建设提供了一种新的选择。。本文在介绍云计算与云存储、数字图书馆云存储技术基础上,探讨了数字图书馆信息资源存储架构模型。最后阐述了数字图书馆应用云存储的优势。

  11. 从共享到共有:学术图书馆云存储联盟研究%From Sharing to Co-owning:Academic Library Cloud Storage Consortium Research

    Institute of Scientific and Technical Information of China (English)

    刘华; 许新巧

    2014-01-01

    This paper attempts to define the structure and framework of academic library cloud storage consortium.The au-thors analyze the opportunities for academic libraries which cloud-computing is bringing basing on some American cloud storage consortium cases and propose that China academic libraries should accelerate the building of academic library cloud storage consorti-um based on cloud-computing.%探讨学术馆藏云存储联盟的结构和操作框架,并以美国学术图书馆云存储联盟为案例,分析研究云存储联盟给学术图书馆带来的机遇,指出云存储联盟将促进云图书馆的建设,中国学术图书馆应利用云技术,加快建设本国的云存储联盟。

  12. Load balancing prediction method of cloud storage based on analytic hierarchy process and hybrid hierarchical genetic algorithm.

    Science.gov (United States)

    Zhou, Xiuze; Lin, Fan; Yang, Lvqing; Nie, Jing; Tan, Qian; Zeng, Wenhua; Zhang, Nian

    2016-01-01

    With the continuous expansion of the cloud computing platform scale and rapid growth of users and applications, how to efficiently use system resources to improve the overall performance of cloud computing has become a crucial issue. To address this issue, this paper proposes a method that uses an analytic hierarchy process group decision (AHPGD) to evaluate the load state of server nodes. Training was carried out by using a hybrid hierarchical genetic algorithm (HHGA) for optimizing a radial basis function neural network (RBFNN). The AHPGD makes the aggregative indicator of virtual machines in cloud, and become input parameters of predicted RBFNN. Also, this paper proposes a new dynamic load balancing scheduling algorithm combined with a weighted round-robin algorithm, which uses the predictive periodical load value of nodes based on AHPPGD and RBFNN optimized by HHGA, then calculates the corresponding weight values of nodes and makes constant updates. Meanwhile, it keeps the advantages and avoids the shortcomings of static weighted round-robin algorithm.

  13. The Application of Cloud Storage in the"Wisdom Campus"in Colleges and Universities%云存储在高校"智慧校园"中的应用

    Institute of Scientific and Technical Information of China (English)

    史杨

    2015-01-01

    该文简要的介绍了云存储技术,并且通过分析云存储技术,可以看到在云存储中良好的扩展性、较高的安全性、定制服务和低成本等特点,在高校"智慧校园"网络数字化建设中有良好的应用,可以通过云存储技术来整合高校数字资源,提高高校教科研管理水平,是创建"智慧校园"的有效措施.%This paper briefly introduces the cloud storage technology, and through the analysis of cloud storage technology, We can learn the characteristics of cloud storage, such as good scalability, high security, customized service and low cost, etc."Wisdom campus"in colleges and universities have good application in the construction of network digital. We can integrate the digital re-sources in colleges and universities through the cloud storage technology, so as to improve the level of scientific research manage-ment in colleges and universities, it is the effective measures to create"Wisdom campus".

  14. 基于 BFA 的云存储资源定位算法研究%Research on Cloud Storage Resource Locating Algorithm Based on BFA

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    In order to achieve the effective resource location in cloud storage system ,firstly a P2P network based cloud storage structure is proposed ,using the total -distributed unstructured master network which possesses the small world character to replace the single master node in GFS .And on the basis of this structure ,a BFA based resource locating algorithm SBFA is put forward ,which adopts counting to take the place of 4-layer cycle structure of bacterial foraging algorithm ,breaking the nesting relationship among migration ,reproducing and chemotaxis . The experiments results makes it clear that SBFA algorithm can effectively reduce the average visiting nodes number as well as keep the high hitting ratio .%  为了实现云储存系统中高效的资源定位,首先提出了一种基于P2P网络的云存储结构,用具有小世界特性的全分布非结构化master网络取代GFS中单一master节点,并在此结构的基础上提出了基于细菌觅食算法的资源定位算法SBFA ,采用计数来取代细菌觅食算法的4层循环结构,打破了迁徙、复制和趋化之间的嵌套关系。实验结果表明,SBFA算法在保持高命中率的同时有效降低了平均访问节点数。

  15. RS纠删码在电子健康档案云存储中的应用%Application of RS erasure code in cloud storage of electronic health records

    Institute of Scientific and Technical Information of China (English)

    杨进; 王亮明; 唐德玉

    2012-01-01

    Cloud storage has become highlight in the electronic health records. Due to the uncontrollable characteristics of cloud storage, security of electronic health records data stored in the cloud storage node could not be ensured. Hence, its further application is limited. In this paper, the technique of RS erasure encoding is introduced to prevent the whole electronic health records being stolen when the data in local cloud storage nodes leaked, through splitting the whole information and storing them in fragments. Meanwhile, the RS erasure code is used to recover the damaged data of electronic health records and provide a new data security protection in cloud storage of electronic health records.%电子健康档案云存储成为研究热点,但云端存储节点的不可控特性使得其存储数据的安全性得不到保障,从而制约了电子健康档案云存储的进一步发展.利用RS纠删码编码将文件信息割裂并分片存储米防止局部存储节点数据块泄露导致的整个文件信息被窃取,利用其纠删能力实现损坏数据的恢复,为电子健康档案云存储数据安全性保障提供了一种新的解决方案.

  16. DESIGN AND IMPLEMENTATION OF CLOUD STORAGE SECURITY GATEWAY SYSTEM BASED ON CIFS PROTOCOL%基于CIFS协议的云存储安全网关的设计与实现

    Institute of Scientific and Technical Information of China (English)

    郝斐; 王雷; 荆继武; 王平建

    2013-01-01

    CIFS ( Common Internet File System) , the core protocol of the network storage in application layer, is the communication protocol for data storage applied in NAS (network attached storage). Cloud storage is a novel form of network storage, and both the enterprise and individual users begin to use cloud storage as their network storage media. Along with the widespread use, the security issues of the cloud storage catch the eyes of users, such as data leakage and data tampering. In this paper, based on the cloud storage service of Amazon S3, we design and implement a CIFS-based cloud storage security gateway system (CSSGS). With the CSSGS, users are able to utilise the cloud storage service of Amazon S3 in their habits the same as accessing NAS. It also encrypts/decrypts all the users data before uploading/downloading to/from Amazon S3, hence the information leakage during the process of data communication and storage is prevented effectively. It also offers the integrity checking on files downloaded from S3 to examine the consistency of the contents with the uploaded one for data tempering prevention.%CIFS(Common Internet File System)协议是网络存储在应用层的核心协议,是应用于网络附加存储NAS(Network Attached Storage)进行数据存储的通信协议.云存储是一种新型的网络存储形式,企业和个人用户都开始使用云存储作为其网络存储媒介.随着云存储的广泛使用,云存储中数据的安全问题,如数据泄漏和数据篡改,也成了用户广泛关注的问题.基于Amazon S3的云存储服务,设计并实现一款基于CIFS协议的云存储安全网关系统CSSGS (Cloud Storage Security Gateway System).通过该网关,用户能够以访问NAS的访问习惯,使用Amazon S3云存储服务;该网关还对用户上传至Amazon S3的数据进行加密保护,可以有效防止数据在传输和存储过程中的泄漏;同时该网关还对从S3下载的文件进行完整性校验,检测其内容与上

  17. 基于SWOT分析的高校图书馆数字资源云存储模式探讨%The SWOT Analysis of the Digital Resources of University Library Based on Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    彭文

    2014-01-01

    First elaborated the current situation of library digital resources storage, problems and future resource storage requirements, on this basis, using swot analysis of cloud storage brings to the University Library opportunities and threats, as well as the application of cloud storage library's own advantages and disadvantages, and finally the formation of swot analysis matrix, and puts forward four kinds of strategies of University Library Application cloud development of storage.%本文首先阐述了目前图书馆数字资源存储现状、面临的问题和未来资源存储需求,在此基础上,采用SWOT方法分析云存储给高校图书馆带来的机遇和威胁,以及图书馆自身应用云存储的优势和劣势,最后形成SWOT分析矩阵,并提出高校图书馆应用云存储发展的四种战略对策。

  18. 云存储环境下文件系统伸缩性研究%Research on Scalability of File System in Cloud Storage Environment

    Institute of Scientific and Technical Information of China (English)

    李晓慧; 李战怀; 张晓; 李兆虎

    2012-01-01

    In the cloud storage environment, servers need to allocate storage space for clients dynamicly. This paper specifically aims at managing the NTFS file system volumes. It highlights the important data structure of the NTFS file system, and designs and implements a tool which expands or shrinks system volume based on needs. The experiments show that the tool can expand or shrink the size of the file system volume without data corruption.%在云存储环境下,为解决存储资源利用率问题,服务器端需动态为用户分配存储空间.本文致力于解决如何伸缩系统卷文件系统可识别大小.具体针对NTFS文件系统卷,重点介绍NTFS文件系统关于容量管理的重要数据结构,设计并实现根据用户申请的磁盘空间大小,自动伸缩系统卷的工具.实验表明:该工具能够在无数据损坏的前提下快速扩展或缩小系统卷文件系统识别的大小.

  19. 支持隐私保护的云存储框架设计%Design of Cloud Storage Framework with Privacy-Preserving

    Institute of Scientific and Technical Information of China (English)

    黄汝维; 桂小林; 余思; 张进; 卿杜政

    2011-01-01

    An efficient and secure framework of cloud storage is proposed to support privacy security in cloud storage. The framework adopts a multi-tree structure for indexing, designs an extirpation-based key derivation algorithm (EKDA) for key management, and constructs a discrete logarithm-based search on encrypted keyword (DLSEK) for data sharing and ciphertext retrieval. The lazy revocation is combined into the framework to deal with the changes of users' access right and dynamic operations of data. Analyzing results for the effectiveness of EKDA, the performance of DLSEK and the privacy security of the framework show that EKDA can efficiently reduce the communication and storage overheads and that DLSEK is an encryption technique which supports ciphertext retrieval and is one-way security. The proposed framework is privacy-preserving while supporting data access efficiently.%针对云存储中的隐私安全问题,设计了一个支持隐私保护的、高效且安全的云存储框架.该框架采用多叉树结构构建数据索引,设计密钥推导算法EKDA(Extirpation-Based Key Derivation Alogrithm)实现密钥的管理和分发,构建关键字检索算法DLSEK (Discrete Logarithm-Based Search on Encrypted Keyword)实现对数据共享和密文检索的支持,并结合延迟更新技术解决用户访问权限变更和数据更新问题.从EKDA的有效性、DLSEK的性能和隐私安全方面进行实验评估和安全分析,结果表明:EKDA能有效地减少通信和存储负载,DLSEK是一种具有单向性安全的支持检索的加密技术,整个框架的设计能有效地保护用户的隐私,同时支持高效的数据访问.

  20. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  1. Access of Data Secure Based on ORAM in Cloud Storage%云存储中基于ORAM的数据安全访问

    Institute of Scientific and Technical Information of China (English)

    李红卫; 古春生; 景征骏; 于志敏

    2014-01-01

    在云存储应用中,可以利用数据加密技术对存储设备上的数据进行保护,但加密技术不能隐藏程序对不信任服务器的访问模式,攻击者可以从访问模式中获取客户的隐私。提出一种新的茫然RA M 结构,利用数据元素位置映射表和存储块位示图实现数据的茫然访问。将每个数据元素备份在两个文件中,当一个文件中的数据元素遭到破坏时,可以从另一个文件中恢复。以非常少的客户存储容量和 O(n)服务器存储容量,使得客户每个数据元素的请求将产生 O(1)读和写服务器操作。%The data encryption can be employed to protect the data in a storage device ,but it cannot be employed to hide the client′s data access patterns from an untrusted server in cloud storage applications .The adversary can get the client privacy from access patterns .The paper proposes a new oblivious RAM construction ,Using the data element position mapping table and bitmap of storage blocks achieve the oblivious access of data .Each data element has two backups that are stored in two files .When a data element in a file is destroyed ,the data element may be recovered from the other file .Each data element request of the client will generate O(1) read and write operations on the server with a small amount of client storage and O(n) server storage .

  2. Chlamydiosis in mariculture-reared green sea turtles (Chelonia mydas).

    Science.gov (United States)

    Homer, B L; Jacobson, E R; Schumacher, J; Scherba, G

    1994-01-01

    From August 1990 to June 1991, a moderate die-off of 4- to 5-year-old green sea turtles (Chelonia mydas) occurred at Cayman Turtle Farm, Grand Cayman, British West Indies. Clinical signs included lethargy, anorexia, and inability to dive. Many of the ill turtles floated on the surface of their tanks. There was no apparent sex predilection. Complete necropsies, including histopathologic examination of tissues, were performed on eight turtles. Necropsies revealed multiple irregular discrete to patchy 1-10 mm pale gray foci throughout the hearts of four turtles. By light microscopic examination, the most severe and consistent lesions were necrotizing myocarditis, histiocytic to fibrinous splenitis, and hepatic lipidosis and necrosis. A mixed leukocytic infiltrate of acidophils, macrophages, and lymphocytes was present in affected areas of the heart. Other lesions included lymphocytic/plasmacytic interstitial nephritis, subacute interstitial pneumonia, subacute mesenteric vasculitis, chronic/active enteritis of the small intestine, and occasional granulomas associated with spirorchid trematode ova. Chlamydiae could be demonstrated in macrophages in sections of paraffin-embedded heart, liver, and spleen and in myocardial fibers and hepatocytes using a modified Macchiavello's stain. Chlamydial antigen was detected by light microscopic examination in the cytoplasm of myocardial fibers and in occasional hepatocytes using a commercially available genus-specific antichlamydial monoclonal antibody and the avidin biotin peroxidase complex staining method. Electron microscopic examination of the heart of the most severely affected turtle revealed developmental stages of chlamydial organisms. A suspension of heart from this turtle was inoculated into the yolk sacs of chicken embryos.(ABSTRACT TRUNCATED AT 250 WORDS)

  3. Research on Security Protection Technology of Distributed Storage Based on Cloud Computing%基于云计算的分布式存储安全保护技术研究

    Institute of Scientific and Technical Information of China (English)

    陈克明

    2016-01-01

    In this paper,through cloud computing environment safety threat and the cloud computing distributed storage security protection technology research status analysis,research on Design of cloud computing in distributed data storage security protection technology of three security protocols,in cloud computing distributed storage security protection technology research and design continue to improve and make a contribution.%文章通过对云计算环境下安全隐患的威胁和云计算分布式存储安全保护技术研究现状进行分析,进行对云计算中分布式存储数据安全保护技术的3个安全协议方案的设计研究,以期在云计算下分布式存储安全保护技术的设计研究中不断进行完善并做出贡献。

  4. 一种基于云存储的Android网盘的设计与实现%Design and implementation of a kind of Android SkyDrive based on cloud storage

    Institute of Scientific and Technical Information of China (English)

    任硕果

    2016-01-01

    This paper presents a kind of Android SkyDrive system architecture with high performance based on cloud storage, with the help of OpenStack cloud computing platform to build cloud storage server, and then take advantage of the Android technology to develop the SkyDrive client, in order to realize functions of file upload, download, move, copy, delete and restore. This paper focuses on the analysis of the functional requirements, technology architecture and implementation path of Android SkyDrive based on cloud storage.%文章提出了一种基于云存储的高性能Android网盘系统架构,借助OpenStack云计算平台搭建云存储服务器,然后采用Android技术开发网盘客户端,实现文件的上传、下载、移动、复制、删除、还原等功能。文章重点分析了这种基于云存储Android网盘的功能需求、技术架构和实现路径。

  5. [Cystic Fibrosis Cloud database: An information system for storage and management of clinical and microbiological data of cystic fibrosis patients].

    Science.gov (United States)

    Prieto, Claudia I; Palau, María J; Martina, Pablo; Achiary, Carlos; Achiary, Andrés; Bettiol, Marisa; Montanaro, Patricia; Cazzola, María L; Leguizamón, Mariana; Massillo, Cintia; Figoli, Cecilia; Valeiras, Brenda; Perez, Silvia; Rentería, Fernando; Diez, Graciela; Yantorno, Osvaldo M; Bosch, Alejandra

    2016-01-01

    The epidemiological and clinical management of cystic fibrosis (CF) patients suffering from acute pulmonary exacerbations or chronic lung infections demands continuous updating of medical and microbiological processes associated with the constant evolution of pathogens during host colonization. In order to monitor the dynamics of these processes, it is essential to have expert systems capable of storing and subsequently extracting the information generated from different studies of the patients and microorganisms isolated from them. In this work we have designed and developed an on-line database based on an information system that allows to store, manage and visualize data from clinical studies and microbiological analysis of bacteria obtained from the respiratory tract of patients suffering from cystic fibrosis. The information system, named Cystic Fibrosis Cloud database is available on the http://servoy.infocomsa.com/cfc_database site and is composed of a main database and a web-based interface, which uses Servoy's product architecture based on Java technology. Although the CFC database system can be implemented as a local program for private use in CF centers, it can also be used, updated and shared by different users who can access the stored information in a systematic, practical and safe manner. The implementation of the CFC database could have a significant impact on the monitoring of respiratory infections, the prevention of exacerbations, the detection of emerging organisms, and the adequacy of control strategies for lung infections in CF patients.

  6. Architecture and Implementation of a Scalable Sensor Data Storage and Analysis System Using Cloud Computing and Big Data Technologies

    Directory of Open Access Journals (Sweden)

    Galip Aydin

    2015-01-01

    Full Text Available Sensors are becoming ubiquitous. From almost any type of industrial applications to intelligent vehicles, smart city applications, and healthcare applications, we see a steady growth of the usage of various types of sensors. The rate of increase in the amount of data produced by these sensors is much more dramatic since sensors usually continuously produce data. It becomes crucial for these data to be stored for future reference and to be analyzed for finding valuable information, such as fault diagnosis information. In this paper we describe a scalable and distributed architecture for sensor data collection, storage, and analysis. The system uses several open source technologies and runs on a cluster of virtual servers. We use GPS sensors as data source and run machine-learning algorithms for data analysis.

  7. Research on Massive Astronomical Image Storage Based on NoSQL Cloud Platform%基于云平台NoSQL的海量天文图像存储研究

    Institute of Scientific and Technical Information of China (English)

    陈慧英

    2014-01-01

    云计算所提出的全新计算和存储思想,对海量数据的存储解决方案以及快速访问有效数据资源提供了参考。以云存储平台NoSQL数据库为背景,研究海量天文数据的存储和访问技术。首先构建了基于MongoDB平台的天文图像FITS文件存储原型,在此基础上设计并分析存储实验。实验结果表明,数据分片存储以及选择最佳的分片大小能有效提高天文数据的存储和访问效率。%The bran-new calculation and storage ideas proposed by cloud computing provide the references for storage solutions of massive data and rapid access of effective data resources. This paper studies the storage and access technologies of massive astronomical data based on cloud storage platform NoSQL database. Firstly, this paper builds an astronomical image FITS file storage prototype based on MongoDB platform. On this basis, this paper designs and analyzes the storage experiments. The experimental results show that the data partition storage and selection of optimal segment size can effectively improve the effectiveness of astronomical data storage and access.

  8. 基于RIA和云存储的Web2.0 OS设计与实现%Design and implementation of Web2.0 OS based on RIA & cloud-storage

    Institute of Scientific and Technical Information of China (English)

    季志远

    2012-01-01

    This paper introduces a Web2.00S based on Flash & Flex (RIA),which provides the basic functions of entertain- ment,file storage,information updating and customization,so that it can be used as online entertainment platform,online storage p|at- form and online office platform. And introduces two key technologies of data communication between OS and cloud-storage-based Server, and file storage and representation.The server based on cloud-storage makes file uploads and downloads instantly with fluent using experiments.%设计了基于RIA下Flash/Flex联合开发的Web2.0OS,提供影音娱乐、文件存储、实时信息更新、用户自由定制等功能,可作为网上娱乐、存储和办公平台,并给出了OS与云存储端通信机制和文件存储再现机制这两个关键技术。服务器端采用云存储技术使得文件上传下载瞬间完成,给用户流畅的使用体验。

  9. Location Allocation of Logistics Distribution Centers Based on Concept of Cloud Storage and Logistics%以云仓储物流概念为基础的物流配送中心选址

    Institute of Scientific and Technical Information of China (English)

    张珂宁

    2014-01-01

    In this paper, on the basis of an exposition of the concept of cloud storage and logistics, we analyzed the path for the implementation of cloud storage, then designed correspondingly the location model of the logistics center, next solved it using the genetic algorithm, and at the end, through an empirical example, validated the model and algorithm.%在论述云仓储物流概念的基础上分析了实施云仓储的思路,随后以云仓储的思想设计了物流中心选址的模型,并通过遗传算法对模型进行求解,最后以实例进行模型和算法的验证。

  10. Research and Implementation of Cloud Computing Platform Oriented Online Storage System%面向云计算平台的在线存储系统研究与实现

    Institute of Scientific and Technical Information of China (English)

    耿胜男; 刘川意; 吴旭

    2012-01-01

    This paper designs and implements an important part of the infrastructure cloud - online storage system of the cloud storage system. The system follows the REST architectural pattern, and uses cURL, HSQLDB and other open source components to achieve the creation, upload, download and delete of directories and files and other functions.%研究基础设施云中的重要组成部分——云存储系统中在线存储系统的设计与实现。本系统的设计遵循REST架构模式,使用cURL、HSQLDB等开源组件实现目录与文件的创建、上传、下载、删除等功能。

  11. 云存储在web3D内容管理系统中的应用%Application of Cloud Storage in Web3D Content Management System

    Institute of Scientific and Technical Information of China (English)

    陈晓波

    2015-01-01

    Google launched"Google101 program"in 2006. This is when truly specific concept of the"cloud"and related theories appear.Many companies have launched their own cloud platform. Facing the possibility of upcoming massive data of the library, cloud storage can linearly extend inactive data mass. This paper firstly outlines the basic architecture of the cloud platform, and in⁃troduces Hadoop distributed storage technology , then a program for the cloud storage in small files is designed.Finally a summary and recommendations for future improvements are put forward.%谷歌公司在2006年推出“Google101计划”,这才真正的有具体化的“云”的概念和相关理论,不少公司都相继推出了自己的云平台。面临未来素材库可能会到来的海量数据,利用云存储可以线性地扩展海量的非活动数据。该文首简述了云平台的基本架构,并对Hadoop分布式存储技术进行了介绍,然后设计了云存储针对小型文件的存储方案,最后进行总结,并对未来的改进提出了建议。

  12. Research and Design of the Hadoop-based Cloud Secure Storage System%基于Hadoop的云端安全存储系统的研究和设计

    Institute of Scientific and Technical Information of China (English)

    辛跃华

    2016-01-01

    Along with the development of the era of big data and the progress of network computer technology, people need to put their existing data within the network data sharing. This contrib-uted to the cloud storage technology and the rapid development of cloud computing, also convenient for people to the effective communication of data. But due to the lack of relevant technol-ogy and safety system perfect, certain security problems exist in the cloud computing data, affecting the rapid development of the cloud computing technology. Therefore how to design a cloud storage platform and security of data storage and sharing mode, etc, become a hot topic studied by people now.%伴随着大数据时代的发展与网络计算机技术的进步,人们需要将自己的已有数据放在网络内部实现数据的共享。这促进了云存储技术和云计算的较快发展,也方便了数据的有效交流。不过由于有关技术以及安全制度缺乏完善,云计算数据中存在一定的安全问题,影响了云计算技术的快速发展。为此如何设计一个云计算储存平台以及安全数据储存、共享的模式等,成为现在人们研究的热点话题。

  13. 在线云存储服务的流量管理研究%ON TRAFFIC MANAGEMENT OF ONLINE CLOUD STORAGE SERVICE

    Institute of Scientific and Technical Information of China (English)

    李梦寒; 郑小盈; 李明齐; 张宏鑫

    2016-01-01

    Cloud storage is an important branch of cloud computing applications,for effectively making use of bandwidth resources in data centre,it is important to design the bandwidth management with efficiency,equilibrium and good scalability and the traffic load balancing algo-rithm.Under the architecture of Dropbox which is the typical application of cloud storage service,it is able to realise load balance by designing the greedy algorithm with the priority of minimum bandwidth and the secondary random selection algorithm,and they are integrated with traffic predicting and bandwidth reservation techniques to realise a set of traffic load balancing and bandwidth reservation schemes.The greedy algo-rithm-based load balancing technique can archive good performance but is highly complex,communication costing and poor in scalability.The secondary random selection algorithm has low complexity while significantly decreases system communication cost.We test the two algorithms in experiments on both the real Dropbox traffic data and the large-scale simulated data,results show that the secondary random selection algo-rithm is able to achieve the balanced load scheduling in performance close to that obtained by the greedy algorithm.The traffic prediction-based bandwidth reservation technique ensures the QoS and raises the utilisation of network resource.%云存储是云计算应用的一个重要分支,有效利用数据中心的带宽资源,设计高效、均衡、可扩展性良好的带宽资源管理和流量负载均衡算法十分重要。在云存储服务典型应用 Dropbox 的架构下,可设计最小带宽优先的贪心算法和二次随机选择算法来实现负载均衡,并将其和流量预测、带宽预留技术结合在一起,实现一套流量负载均衡和带宽预留方案。贪心算法的负载均衡技术能够取得良好的性能,但是复杂度高、系统开销较大、可扩展性较差;二次随机选择算法复杂度低并且显著减

  14. Security Architecture of Cloud Computing

    Directory of Open Access Journals (Sweden)

    V.KRISHNA REDDY

    2011-09-01

    Full Text Available The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.

  15. 基于椭圆曲线的云存储数据完整性的验证研究%Validation of cloud storage data integrity based on elliptic curve

    Institute of Scientific and Technical Information of China (English)

    陈志忠

    2016-01-01

    Since the commonly⁃used cloud storage data integrity verification scheme can′t meet the requirement of data vali⁃dation,the cloud storage data integrity verification scheme ECPDP based on elliptic curve is put forward. The elliptic curve schemes of cloud storage data integrity verification with two⁃party participation,three⁃party participation and dynamic verifica⁃tion were designed respectively. And then the performance comparison experiments for the traditional PDP and ECPDP cloud storage data integrity verification schemes were performed based on OpenSSL code library. The experimental results show that the ECPDP scheme is better than the traditional PDP scheme in the aspects of protocol pretreatment performance,verification performance and challenge performance,and has high protocol safety.%针对当前常用的云存储数据完整性验证方案已无法适应数据验证需要的问题,提出了基于椭圆曲线的云存储数据完整性验证方案ECPDP,分别设计了二方参与、三方参与和动态验证的云存储数据验证的椭圆曲线方案。然后基于OpenSSL密码库对传统PDP和ECPDP云存储数据完整性验证方案进行了性能对比实验,实验结果表明,ECPDP方案在协议的预处理性能、验证性能及挑战性能方面均较传统的PDP协议有所提高,且不降低协议的安全性。

  16. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  17. The Free Open Source Backup Strategy Base on Areca Backup and Cloud Storage%基于Areca Backup和云存储的开源免费备份策略

    Institute of Scientific and Technical Information of China (English)

    周云飞

    2014-01-01

    介绍一种基于开源备份软件Areca Backup和云存储的数据备份策略。该策略充分利用云存储技术实现备份数据的低成本和高可靠性存储。Areca Backup的数据加密功能使备份文件的云存储容易符合公司的安全规定。操作简易,适用于可靠性要求一般的数据备份。%A data backup strategy that base on Areca Backup-an open-source backup software and cloud storage. It's Make full use of the superiority of the cloud storage, low cost and high reliability. The encryption function provided by Areca Backup can help cloud storage compatible with the Information security policy of the company. It's easy to user, can apply to the general lev-el of data backup.

  18. Cloud Computing

    DEFF Research Database (Denmark)

    Krogh, Simon

    2013-01-01

    The second half of the 20th century has been characterized by an explosive development in information technology (Maney, Hamm, & O'Brien, 2011). Processing power, storage capacity and network bandwidth have increased exponentially, resulting in new possibilities and shifting IT paradigms. In step...... with technological changes, the paradigmatic pendulum has swung between increased centralization on one side and a focus on distributed computing that pushes IT power out to end users on the other. With the introduction of outsourcing and cloud computing, centralization in large data centers is again dominating...... the IT scene. In line with the views presented by Nicolas Carr in 2003 (Carr, 2003), it is a popular assumption that cloud computing will be the next utility (like water, electricity and gas) (Buyya, Yeo, Venugopal, Broberg, & Brandic, 2009). However, this assumption disregards the fact that most IT production...

  19. Research and implementation of enterprises′multi-tenancy-oriented cloud storage service platform%企业多租户云存储平台的设计与实现

    Institute of Scientific and Technical Information of China (English)

    刘宇龙; 薛涛

    2014-01-01

    针对企业内部的文档存储安全系数低、共享效率低、维护成本高等问题,结合云存储模型并利用对象存储技术,使用多租户技术隔离企业用户,结合组织机构进行企业内部数据访问控制,设计并实现一个企业多租户云存储服务平台,并提出了一种文件分块对象去重模型和对象重组文件版本管理模型。分析结果表明,企业多租户云存储服务平台满足企业数据的高可靠性、安全性要求,能有效提高网络共享效率。%To deal with the problems of low safety factor ,low sharing efficiency and high maintenance costs of internal documents storage ,an enterprises′ multi-tenancy-oriented cloud storage service plat-form ,referring to cloud storage model and utilizing object storage technology ,has been designed and re-alized by using the multi-tenancy technology to segregate business users and combining with organiza-tional structure to control internal data access .And a file-block object deduplication model and a file ver-sion control model of object-recombination have been defined .Test results show that enterprises′multi-tenancy-oriented cloud storage service platform can meet the high reliability of enterprise data security requirements ,and effectively improve the efficiency of the network share .

  20. 物联网环境下云数据存储安全及隐私保护策略研究%Cloud Data Storage Security and Privacy Protection Policies under IoT Environment

    Institute of Scientific and Technical Information of China (English)

    何明; 陈国华; 梁文辉; 赖海光; 凌晨

    2012-01-01

    The Internet of Things implements information intelligence relying on the powerful data processing capability of cloud computing. However,it is not worthy of user trust that cloud computing manages data and services. According to cloud data security issues in the environment of the IoT, the cloud data storage security and privacy policies were raised, in order to ensure the accuracy and privacy of user data in the cloud. The experimental results show that the program is effective and flexible,and can resist the Byzantine failure,malicious modification of data,and even server collusion attack.%物联网依托云计算强大的数据处理能力实现信息智能,而目前云计算对数据和服务的管理并不值得用户完全信赖.针对物联网环境下云数据安全性问题,在云计算中为了保证用户数据的准确性和隐私性,提出了一种物联网环境下云数据存储安全及隐私保护策略.实验结果表明该方案有效、灵活,且能抵御Byzantine失效、恶意修改数据甚至是服务器共谋攻击.

  1. Study on the Key-Value Distributed Storage System for Cloud Computing%面向云计算的键值型分布式存储系统研究

    Institute of Scientific and Technical Information of China (English)

    孙勇; 林菲; 王宝军

    2013-01-01

    对于数据密集型的云计算应用,基于磁盘的存储系统很难同时满足它们对性能与可用性的需求.本文提出了一种以内存为主设备、以磁盘为辅助设备的键值型分布式存储系统M-Cloud ,能提供大数据读写、备份及恢复等存储服务功能.M-Cloud通过将数据全部装入服务器集群内存中的方式提高系统整体性能,并设计了分区线性哈希算法以实现负载均衡和高扩展性,设计了相应的数据备份与故障快速恢复策略以保证系统可靠性.仿真实验结果表明, M-Cloud具有较高的性能与可用性,对系统进一步改进和优化后具有应用于实际生产环境中的潜力,可为用户提供高质量的存储服务.%In view of data intensive cloud computing applications ,disk-based storage systems are difficult to meet their de-mand for performance and availability simultaneously .This paper puts forward a key-value distributed storage system named M-Cloud ,which uses memory as main device and disk as auxiliary when providing storage services (read ,write ,backup and recovery ) for big data .M-Cloud improves overall system performance by loading entire data in the memory of the cluster ,and designs PBLH (partition-based linear hashing ) algorithm to achieve load balancing and high scalability .M-Cloud also designs relative backup and fast crash recovery strategy in order to ensure high system reliability .The simulation results show that M-Cloud has high perfor-mance and availability ,with further optimization ,the system has the potential in real production environment usage ,can provide users with high-quality storage services .

  2. 一种保护云存储平台上用户数据私密性的方法%A Method on Protection of User Data Privacy in Cloud Storage Platform

    Institute of Scientific and Technical Information of China (English)

    侯清铧; 武永卫; 郑纬民; 杨广文

    2011-01-01

    近年来,云存储被研究者和IT厂商广泛关注,许多应用程序都用云存储来存储数据.但是用户和厂商都对于云存储的安全性和私密性问题表示忧虑.云存储安全的核心是分布式文件系统的安全性和私密性.基于SSL安全连接和Daoli安全虚拟监控系统可以充分保护分布式文件系统中用户数据的安全性和私密性.安全虚拟监督系统可以阻止传统攻击及来自云管理员的攻击.针对用户的不同需求和数据存储系统的特点,有2种解决方案,分别针对分布式文件系统中用户文件的每一块进行保护,保障用户文件每一块的私密性及对整个用户文件进行保护,保证用户文件整体私密性.对于用户数据的私密性而言,SSL安全连接和虚拟监控系统引入的性能损失是可以被接受的.%Nowadays, many researchers and IT companies pay close attention to cloud storage. A lot of applications use cloud storage to store data. But many people and companies worry about the security and privacy problem of cloud storage. Cloud storage platform is prone to compromise or abuse from adversaries including the cloud administrators. The security and privacy problem of cloud storage is the security and privacy problem of distributed file system, which is the core of cloud storage. With SSL secure connection and secure virtual machine monitor (Daoli), the security and privacy of the user's data can be protected in the distributed file system, even facing a total compromise of the distributed file system or the operating system. With secure virtual machine monitor, conventional attacks and attacks from cloud administrators can be prevented. Two schemes for different application scenarios are put forward. In one scheme, every chunk of user's file is protected, so the privacy of every chunk is guaranteed. In another method, only the whole file is protected, and the privacy of the whole file is guaranteed not all chunks. The overhead of

  3. Cloud Robotics Model

    Directory of Open Access Journals (Sweden)

    Gyula Mester

    2015-01-01

    Full Text Available Cloud Robotics was born from the merger of service robotics and cloud technologies. It allows robots to benefit from the powerful computational, storage, and communications resources of modern data centres. Cloud robotics allows robots to take advantage of the rapid increase in data transfer rates to offload tasks without hard real time requirements. Cloud Robotics has rapidly gained momentum with initiatives by companies such as Google, Willow Garage and Gostai as well as more than a dozen active research projects around the world. The presentation summarizes the main idea, the definition, the cloud model composed of essential characteristics, service models and deployment models, planning task execution and beyond. Finally some cloud robotics projects are discussed.

  4. 基于云存储的多用户可搜索加密方案%An Efifcient Scheme of Multi-user Searchable Encryption with Keyword in Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    王保民; 何智灵; 罗文俊

    2013-01-01

    Cloud storage services allow the users to outsource their data to the cloud storage servers to reduce management costs. The cloud servers cannot be fully trusted while those data may contain sensitive personal information. We study a problem of storing and retrieving private data encrypted in a cloud. Multi-user searchable encryption is a promising way to keep user’s data conifdential against un-trusted cloud service provider and allow users to share their data in privacy. In this paper we propose an efficient, secure and privacy preserving keyword search scheme which supports multiple users with more lfexible key management and lower computation cost rather than known approaches.%云存储服务允许用户外包数据并以此来降低资源开销。针对云服务器不被完全信任的现状,文章研究如何在云环境下对数据进行安全存储和加密搜索。多用户的可搜索加密方案为用户提供了一种保密机制,使用户可以在不受信任的云存储环境下安全地共享信息。在现有的可搜索加密方案的基础上,文章提出了一种安全有效的带关键字搜索的加密方案,以及更加灵活的密钥管理机制,降低了云端数据处理的开销。

  5. Cloud Auditing With Zero Knowledge Privacy

    Directory of Open Access Journals (Sweden)

    Shilpa Dilip Sapatnekar,

    2015-07-01

    Full Text Available The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn’t have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security .Many researchers have proposed their work or new algorithms to achieve security or to resolve this security problem. In this paper, we proposed a Shamir’s Secrete sharing algorithm for Privacy Preservation for data Storage security in cloud computing. We can achieve confidentiality, integrity and availability of the data. It supports data dynamics where the user can perform various operations on data like insert, update and delete as well as batch auditing where multiple user requests for storage correctness will be handled simultaneously which reduce communication and computing cost.

  6. Cloud Infrastructure Service Management - A Review

    Directory of Open Access Journals (Sweden)

    A. Anasuya Threse Innocent

    2012-03-01

    Full Text Available The new era of computing called Cloud Computing allows the user to access the cloud services dynamically over the Internet wherever and whenever needed. Cloud consists of data and resources; and the cloud services include the delivery of software, infrastructure, applications, and storage over the Internet based on user demand through Internet. In short, cloud computing is a business and economic model allowing the users to utilize high-end computing and storage virtually with minimal infrastructure on their end. Cloud has three service models namely, Cloud Software-as-a-Service (SaaS, Cloud Platform-as-a-Service (PaaS, and Cloud Infrastructure-as-a-Service (IaaS. This paper talks in depth of cloud infrastructure service management.

  7. Enterprise Data Encryption and Ciphertext Fulltext Retrieval on Cloud Storage%企业云存储数据的加密与密文全文检索研究

    Institute of Scientific and Technical Information of China (English)

    李文成; 赵逢禹

    2013-01-01

    Based on ciphertext-policy attribute-based encryption and full text indexing technology of Lucene, a method of ciphertext data in full text indexing and retrieving is proposed for cloud storage applications. An improved ciphertext-policy attribute-based encryption is presented according to features of cloud storage applications. A security model deployed in enterprise sides is proposed. Services of data encryption, ciphertext fulltext retrieval and access control are designed based on Lucene full text indexing engine and the improved ciphertext-policy attribute-based encryption. The security model can be used to solve the problem of data confidential and ciphertext full text retrieval of an enterprise in the cloud storage properly.%将密文规则的基于属性加密技术同Lucene全文索引技术相结合,提出适合云存储中密文数据全文检索的方法;针对云存储的特点改进了密文规则的基于属性加密技术.给出了设置在企业端的私有安全模型,并基于Lucene全文索引引擎以及改进的密文规则的基于属性加密方案开发设计了密文全文检索服务和数据加密与访问控制服务.在Eucalyptus云平台上实现了该安全模型的主要服务模块.该安全模型较好地解决了企业数据云存储的机密性与密文全文检索问题.

  8. Cloud computing basics

    CERN Document Server

    Srinivasan, S

    2014-01-01

    Cloud Computing Basics covers the main aspects of this fast moving technology so that both practitioners and students will be able to understand cloud computing. The author highlights the key aspects of this technology that a potential user might want to investigate before deciding to adopt this service. This book explains how cloud services can be used to augment existing services such as storage, backup and recovery. Addressing the details on how cloud security works and what the users must be prepared for when they move their data to the cloud. Also this book discusses how businesses could prepare for compliance with the laws as well as industry standards such as the Payment Card Industry.

  9. 基于加密机制的云计算数据可靠存储方案研究%Research on the Secure Storage Scheme of Cloud Computing Based on Encryption Mechanism

    Institute of Scientific and Technical Information of China (English)

    赵莉; 王魁祎

    2014-01-01

    为了克服因收发双方都使用同样钥匙导致的其安全性不高等缺点,引入深度加密机制,与AES ( Advanced Encryption Standard)算法耦合,设计了基于双级加密的云计算数据可靠存储方案。先采用AES对用户数据客户端进行对称加密,到达云资源管理器后,采用分布式重组的方法进行深度加密,构造了“初级-深度”双级加密的云计算数据可靠存储结构,并完成了基于加密的云计算数据安全存储加密和解密操作流程。借助Eclipse与Java语言,建立了云计算安全模块。结果表明:该系统的加密效率高,拥有较高的安全性且界面操作简单。%In order to overcome the defects such as low security resulting by both using the same key for sending and receiving, the depth encryption mechanism was introduced, and taking it coupling the AES algorithm to propose the secure storage system of cloud computation based on the encryption mechanism. Basing on the analysis of previous research on the security of cloud storage, the symmetric encryption for the user data was used in the client, when the data reached the cloud resource management device, the method of distributed restructuring was used to operate depth encryption;and the security storage structure of “initial encryption-depth encryption” was constructed; and then the encryption and decryption process of data safety storage was finished. Based on the eclipse simulation platform, the de-sign and implementation were done for the cloud computing security module. The results showed that the encryption ef-ficiency and security of this system was high and simple interface.

  10. Inorganic elements in green sea turtles (Chelonia mydas): relationships among external and internal tissues.

    Science.gov (United States)

    Faust, Derek R; Hooper, Michael J; Cobb, George P; Barnes, Melanie; Shaver, Donna; Ertolacci, Shauna; Smith, Philip N

    2014-09-01

    Inorganic elements from anthropogenic sources have entered marine environments worldwide and are detectable in marine organisms, including sea turtles. Threatened and endangered classifications of sea turtles have heretofore made assessments of contaminant concentrations difficult because of regulatory restrictions on obtaining samples using nonlethal techniques. In the present study, claw and skin biopsy samples were examined as potential indicators of internal tissue burdens in green sea turtles (Chelonia mydas). Significant relationships were observed between claw and liver, and claw and muscle concentrations of mercury, nickel, arsenic, and selenium (p sea turtles.

  11. Immunological evaluation of captive green sea turtle (Chelonia mydas) with ulcerative dermatitis

    Science.gov (United States)

    Muñoz, Fernando Alberto; ,; ,; Romero-Rojas, Andrés; Gonzalez-Ballesteros, Erik; Work, Thierry; Villaseñor-Gaona, Hector; Estrada-Garcia, Iris

    2013-01-01

    Ulcerative dermatitis (UD) is common in captive sea turtles and manifests as skin erosions and ulcers associated with gram-negative bacteria. This study compared clinically healthy and UD-affected captive turtles by evaluating hematology, histopathology, immunoglobulin levels, and delayed-type hypersensitivity assay. Turtles with UD had significantly lower weight, reduced delayed-type hypersensitivity (DTH) responses, and higher heterophil:lymphocyte ratios. This study is the first to assay DTH in green turtles (Chelonia mydas) and suggests that UD is associated with immunosuppression.

  12. Blood Gasses Contents of Green Turtle (Chelonia mydas Hatch Treated by Different Temperatures

    Directory of Open Access Journals (Sweden)

    RINI PUSPITANINGRUM

    2011-09-01

    Full Text Available The aim of this research was to gain the profile of blood gasses of green turtle (Chelonia mydas hatch. Blood gas of the green turtle was analysed after exposuring them at 28 oC and 50% of humidity for 24 hours in a pvc tube and at 34 oC under sunlight exposured with 47% of humidity for 30 minutes. The result showed the different values of blood gas contents. This result showed indication of metabolism activities and poikilothermic adaptation of green turtle hatch. This information can be used to support for turtle hatchery in Indonesia.

  13. Immunological evaluation of captive green sea turtle (Chelonia mydas) with ulcerative dermatitis.

    Science.gov (United States)

    Muñoz, Fernando Alberto; Estrada-Parra, Sergio; Romero-Rojas, Andrés; Gonzalez-Ballesteros, Erik; Work, Thierry M; Villaseñor-Gaona, Hector; Estrada-Garcia, Iris

    2013-12-01

    Ulcerative dermatitis (UD) is common in captive sea turtles and manifests as skin erosions and ulcers associated with gram-negative bacteria. This study compared clinically healthy and UD-affected captive turtles by evaluating hematology, histopathology, immunoglobulin levels, and delayed-type hypersensitivity assay. Turtles with UD had significantly lower weight, reduced delayed-type hypersensitivity (DTH) responses, and higher heterophil:lymphocyte ratios. This study is the first to assay DTH in green turtles (Chelonia mydas) and suggests that UD is associated with immunosuppression.

  14. Research and Application of the Cloud Computation Storage System%云存储系统的分析与应用研究

    Institute of Scientific and Technical Information of China (English)

    唐箭

    2009-01-01

    The article first carried on to the cloud memory introduced that then introduced emphatically the cloud memory system's struc-tural model and realized key technologies, ultimate analysis cloud memory system's several kind of application pattern.%文章首先对云存储进行了介绍,然后着重介绍了云存储系统的结构模型及其实现的关键技术,最后分析了云存储系统的几种应用模式.

  15. Storage System Design Scheme in Virtualization Construction

    Institute of Scientific and Technical Information of China (English)

    Si Zhen-yu

    2012-01-01

    In order to improve resource utilization, it is necessary to integrate storage and data, and the emergence of cloud computing makes it possible. This paper analyzed the study of virtualization and cloud computing, proposed a new scheme based on virtualization, and established a shared storage platform, which made a good complement and perfected the centralized storage platform.

  16. ENHANCEMENTS STRATEGY OF CLOUD STORAGE ACCESS CONTROL APPLIED TO POWER GRID ENTERPRISE%应用于电网企业的云存储访问控制增强策略

    Institute of Scientific and Technical Information of China (English)

    张鸿辉; 刘伟; 李永强

    2014-01-01

    针对电力信息云存储管理应用的安全需求,以降低传统访问控制方案在访问规则上的系统开销为目标,提出一种基于实体属性和安全标记相结合的云存储访问控制增强策略。采用面向实体属性管理权限方法优化访问控制,降低权限管理开销,避免访问权限与用户、存储进程、平台客体间的直接联系;通过多级安全标记,进行权限分配、确保策略在实施后维护上的灵活性。并以某电网企业的电力信息云存储管理系统为例,详细阐述该策略的具体配置过程。经过性能分析表明,所设计访问控制策略在可维护性、存储开销、安全性能等方面表现良好,具有应用可行性。%For the security need of cloud storage applications in power information management,we propose an enhancement strategy of cloud storage access control,which is based on the combination of entity attributes and security tag,and is targeted at reducing the system overhead of conventional access control schemes in regard to access rules. The strategy utilises entity attributes-oriented privileges management method to optimise the access control,reduces privileges management overhead,and prevents the direct contacts between the access privileges and the user,storage process and platform object.Moreover,it also uses multi-level security tag to carry out privileges allocation and to ensure the flexibility of the strategy in maintenance when implemented.A power information cloud storage management system at a certain power grid enterprises is taken for example to elaborate the specific configuration process of the strategy.It is illustrated by the performance analysis that the access control strategy designed in the paper has good performance in maintainability,storage overhead, security and other aspects,and has application feasibility.

  17. Relocations of sea turtle nests of Lepidochelys olivacea, Dermochelys coriacea and Chelonia mydas in the Galibi Nature Reserve, Suriname

    NARCIS (Netherlands)

    Schouten, A.D.; Weijerman, M.; Tienen, van L.H.G.; Hoekert, W.E.J.

    1997-01-01

    SCHOUTEN, A.D., WEIJERMAN, M., VAN TIENEN, L.H.G. & W.E.J. HOEKERT, 1997. Relocations of Sea Turtle nests of Lepidochelys olivacea, Dermochelys coriace and Chelonia mydas in the Galibi Nature Reserve, Suriname. Studies Nat. Hist. Caribbean Region 73, Amsterdam, 1997: 63-69. Relocation of nests of th

  18. Cryptosporidium sp. infections in green turtles, Chelonia mydas, as a potential source of marine waterborne oocysts in the Hawaiian Islands

    Science.gov (United States)

    Graczyk, T.K.; Balazs, G.H.; Work, T.M.; Aguirre, A.A.; Ellis, D.M.; Murakawa, Shawn K. K.; Morris, Robert

    1997-01-01

    For the first time, Cryptosporidium sp. oocysts were identified in fecal and intestinal samples from free-ranging marine turtles, Chelonia mydas, from the Hawaiian Islands. The oocysts produced positive reactions with commercial test kits recommended for the detection of human-infectious waterborne oocysts of Cryptosporidium parvum.

  19. Astioglossimetra karachiensis n. gen., n. sp. (Trematoda: Plagiorchiidae: Astiotrematinae) from the Marine Turtle Chelonia mydas of Karachi Coast

    OpenAIRE

    BILQEES, Fatima Mujib

    2002-01-01

    A new trematode genus Astioglossimetra n. gen. has been erected to accommodate an undescribed species A. karachiensis n. gen., n. sp., from Chelonia mydas of the Karachi coast. The genus name refers to its relation to the genera Astiotrema Looss and Glossimetra Mehra of the family Plagiorchiidae and subfamily Astiotrematinae.

  20. AROCRYPT: A CONFIDENTIALITY TECHNIQUE FOR SECURING ENTERPRISE’s DATA IN CLOUD

    Directory of Open Access Journals (Sweden)

    Dr. L. Arockiam

    2015-02-01

    Full Text Available Cloud dominates the IT enterprises by way of its computing services. One of the services provided by the cloud is data storage. Cloud storage mainly supports Small and Medium scale Enterprises (SMEs by reducing their capital investments and maintenance of storage servers. Most of the SMEs are outsourcing their data to cloud storage. Enterprises’ data that are forwarded to the cloud have to be kept in the public cloud storage. Safety and security are the top most issues in cloud storage. The confidentiality parameter provides data storage security. This paper proposes a security service algorithm named AROcrypt to ensure the security of data stored in cloud storage. It also describes Security as a Service (SEaaS in the cloud environment. Simulation was conducted using a security analysis tool with existing techniques. The proposed technique provides better performance and good security when compared with existing techniques.

  1. Mercury in the sea turtle Chelonia mydas (Linnaeus, 1958 from Ceará coast, NE Brazil

    Directory of Open Access Journals (Sweden)

    Moisés F. Bezerra

    2012-03-01

    Full Text Available Mercury concentrations in carapace fragments of the green turtle Chelonia mydas from the Ceará coast in NE Brazil are reported. Concentrations varied from As concentrações de Hg em fragmentos de carapaça de Chelonia mydas no litoral do Ceará, nordeste do Brasil, são reportadas. Concentrações variaram de <0,34 a 856,6 ng.g -1 em peso seco, e foram maiores (média de 154,8 ng.g -1 em peso seco em indivíduos juvenis (n = 22, enquanto que as menores concentrações (média de 2,5 ng.g -1 em peso seco foram observadas em indivíduos adultos/sub-adultos (n = 3. Houve uma correlação negativa significativa entre tamanho do animal e concentração de Hg provavelmente devido a diferença de dieta entre juvenis e sub-adultos/adultos. Fragmentos de carapaça, que constituem substratos não-invasivos e não letais, podem ser importantes para fins de monitoramento ambiental dessas espécies ameaçadas de extinção.

  2. Ciphertext policy attribute based encryption scheme with revocation for cloud storage%一种用于云存储的可撤销的属性加密方案

    Institute of Scientific and Technical Information of China (English)

    PAN Ning; ZHU Zhi-qiang; SUN Lei; ZHAO Zhi-yuan

    2014-01-01

    由于云存储用户数量大,成分复杂,云存储中数据的安全防护问题成为其发展的一大制约,近年来,基于属性加密技术解决云存储中数据安全存储问题成为研究热点,但传统的属性加密方案存在密文长度相对较大且属性撤销复杂等问题。引入代理重加密技术,针对以上问题提出一种可撤销的密文属性基加密方案,在缩短密文长度的同时实现属性撤销操作,并证明该方案在DBDH假设下CPA是安全的。%Because of the large number and complex composition of cloud storage users, the data security issue has become a major constraint to the development of cloud storage. Recently, based on attribute-based encryption(ABE) technology to solve the problem of da

  3. Search Cloud

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/cloud.html Search Cloud To use the sharing features on this ... of Top 110 zoster vaccine Share the MedlinePlus search cloud with your users by embedding our search ...

  4. Research on Master Server Metadata Management in Cloud Storage System Based on SSD%基于SSD的云存储主服务器元数据管理研究

    Institute of Scientific and Technical Information of China (English)

    李东阳; 刘鹏; 田浪军

    2013-01-01

    为了提高对云存储系统主服务器中元数据的有效管理,在数据密集型应用中,考虑到读多写少的特点符合网络中各种应用的基本特征,而文件存储的元数据往往小于4 kB,提出一种基于SSD的针对云存储系统主服务器的元数据管理策略,建立了一套相对独立的存储服务器目录路径索引机制。此策略将元数据的管理分为两个部分:目录路径索引和文件名,充分利用SSD的低功耗与优越读性能。测试表明,基于SSD的云存储主服务器元数据管理策略可以明显改善系统响应时间,降低延迟,提升云存储系统的性能。%Aiming at the effective management of the metadata in master server of the cloud storage system,considering the characteristic of reading more writing less conforms to the basic characteristics of the various applications in the network,while metadata usually is less than 4 kB,propose a master server metadata management strategy in cloud storage system based on SSD in data-intensive applications, which establishes an relatively independent storage server directory path indexing policy. The strategy separates metadata into two parts:directory path indexing and file name,the strategy takes full advantage of SSD which is low in power consumption and high in perform-ance. Test indicates the strategy can improve response time dramatically,decrease time delay,boost performance of cloud storage system.

  5. Cloud Aggregation and Bursting for Object Based Sharable Environment

    Directory of Open Access Journals (Sweden)

    Mr. Pradeep Kumar Tripathi

    2011-09-01

    Full Text Available Cloud computing promises innate scalability and high availability at low cost. So far cloud storage deployments were subject to big companies but an increasing amount of available open-source systems allow also smaller private cloud installations. In this paper we discuss cloud aggregation and cloud bursting with their empirical review. Based on the review we map class and object in the sharable small clouds for making clouds more efficient. We also consider some of the security concern for the cloud computing for authorized data sharing between clouds.

  6. Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study

    OpenAIRE

    Yee Yang, T; Dehghantanha, A; Choo, R; Yang, LK

    2016-01-01

    Cloud computing has been regarded as the technology enabler for the Internet of Things (IoT). To ensure the most effective collection of IoT-based evidence, it is vital for forensic practitioners to possess a contemporary understanding of the artefacts from different cloud services. In this paper, we seek to determine the data remnants from the use of BitTorrent Sync version 2.0. Findings from our research using mobile and computer devices running Windows 8.1, Mac OS X Mavericks 10.9.5, Ubunt...

  7. Trust level of Clouds by Scheduling

    Directory of Open Access Journals (Sweden)

    Deva Sinha K.

    2015-11-01

    Full Text Available Cloud computing is a virtual storage which is used to store the data and information in secure manner. This project which gives a trustworthy to the cloud user from Admin without knowing the infrastructure and its properties of cloud. Cloud scheduled safety-critical data processing needs are beginning to push back strongly against using cloud computing, users will find that cloud scheduling will be maintained by the user to store their data on the cloud to create trust them . We have overcome this problem; a trusted cloud computing platform (TCCP proposed design. TCCP guarantees the implementation of the guest virtual machines to provide a closed box execution environment as a Service (IaaS providers such as Amazon EC2 allowing infrastructure. To protect a data in a secured way, while cloud user uploading a data it will get encrypted which means non readable format and when cloud user downloading a data it will get decrypted.

  8. Trust level of Clouds by Scheduling

    Directory of Open Access Journals (Sweden)

    Deva Sinha K

    2014-03-01

    Full Text Available Cloud computing is a virtual storage which is used to store the data and information in secure manner. This project which gives a trustworthy to the cloud user from Admin without knowing the infrastructure and its properties of cloud. Cloud scheduled safety-critical data processing needs are beginning to push back strongly against using cloud computing, users will find that cloud scheduling will be maintained by the user to store their data on the cloud to create trust them . We have overcome this problem; a trusted cloud computing platform (TCCP proposed design. TCCP guarantees the implementation of the guest virtual machines to provide a closed box execution environment as a Service (IaaS providers such as Amazon EC2 allowing infrastructure. To protect a data in a secured way, while cloud user uploading a data it will get encrypted which means non readable format and when cloud user downloading a data it will get decrypted.

  9. 适合云存储的访问策略可更新多中心CP-AB E方案%Multi-Authority CP-ABE with Policy Update in Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    吴光强

    2016-01-01

    云存储作为一种新型的数据存储体系结构,近年来得到越来越广泛的应用。大多数用户为了降低本地存储开销、实现数据共享选择将自己的数据上传到云服务器存储。然而,云存储系统存在的安全隐患也引发了社会越来越多的担忧。例如,不完全可信的云服务提供商可能会窃取用户的数据或让未授权的其他用户访问数据等。因此,对用户数据进行加密并实现数据的访问控制是确保云存储中数据安全的有效方法。基于密文的属性加密(CP‐ABE)方案则能够很好地实现安全云存储目标,它允许一个发送者加密数据并设置访问控制结构,只有符合条件的用户才能对数据进行解密。但是,传统CP‐ABE方案中存在的密钥泄露等问题制约了属性加密在云存储系统中的应用。针对上述的问题,提出了一个多授权机构支持策略更新的CP‐ABE方案,该方案与之前的方案相比,不仅可以通过多授权机构避免密钥泄露问题,同时将策略更新及密文更新过程交给服务器执行,有效地降低了本地的计算开销和数据传输开销,充分利用云存储的优势提供一个高效、灵活的安全数据存储方案,对所提方案进行了安全性证明,并对方案进行了效率分析。%Cloud storage ,as a novel data storage architecture ,has been widely used to provide services for data draw to store and share their data in cloud .However ,the security concerns of cloud storage also draw much attention of the whole society .Since some cloud service providers are not trustworthy ,the data stored in their cloud servers could be stolen or accessed by unauthorized users .Ciphertext‐policy attribute based encryption (CP‐ABE) can be used to solve such security problems in cloud ,w hich can encrypt data under a specified access policy thus to maintain data confidentiality as well as access control .Unfortunately

  10. Cloud Database Management System (CDBMS

    Directory of Open Access Journals (Sweden)

    Snehal B. Shende

    2015-10-01

    Full Text Available Cloud database management system is a distributed database that delivers computing as a service. It is sharing of web infrastructure for resources, software and information over a network. The cloud is used as a storage location and database can be accessed and computed from anywhere. The large number of web application makes the use of distributed storage solution in order to scale up. It enables user to outsource the resource and services to the third party server. This paper include, the recent trend in cloud service based on database management system and offering it as one of the services in cloud. The advantages and disadvantages of database as a service will let you to decide either to use database as a service or not. This paper also will highlight the architecture of cloud based on database management system.

  11. NeuronDepot: keeping your colleagues in sync by combining modern cloud storage services, the local file system, and simple web applications.

    Science.gov (United States)

    Rautenberg, Philipp L; Kumaraswamy, Ajayrama; Tejero-Cantero, Alvaro; Doblander, Christoph; Norouzian, Mohammad R; Kai, Kazuki; Jacobsen, Hans-Arno; Ai, Hiroyuki; Wachtler, Thomas; Ikeno, Hidetoshi

    2014-01-01

    Neuroscience today deals with a "data deluge" derived from the availability of high-throughput sensors of brain structure and brain activity, and increased computational resources for detailed simulations with complex output. We report here (1) a novel approach to data sharing between collaborating scientists that brings together file system tools and cloud technologies, (2) a service implementing this approach, called NeuronDepot, and (3) an example application of the service to a complex use case in the neurosciences. The main drivers for our approach are to facilitate collaborations with a transparent, automated data flow that shields scientists from having to learn new tools or data structuring paradigms. Using NeuronDepot is simple: one-time data assignment from the originator and cloud based syncing-thus making experimental and modeling data available across the collaboration with minimum overhead. Since data sharing is cloud based, our approach opens up the possibility of using new software developments and hardware scalabitliy which are associated with elastic cloud computing. We provide an implementation that relies on existing synchronization services and is usable from all devices via a reactive web interface. We are motivating our solution by solving the practical problems of the GinJang project, a collaboration of three universities across eight time zones with a complex workflow encompassing data from electrophysiological recordings, imaging, morphological reconstructions, and simulations.

  12. NeuronDepot: Keeping your colleagues in sync by combining modern cloud storage services, the local file system, and simple web applications

    Directory of Open Access Journals (Sweden)

    Philipp L Rautenberg

    2014-06-01

    Full Text Available Neuroscience today deals with a data deluge derived from the availability of high-throughput sensors of brain structure and brain activity, and increased computational resources for detailed simulations with complex output. We report here (1 a novel approach to data sharing between collaborating scientists that brings together file system tools and cloud technologies, (2 a service implementing this approach, called NeuronDepot, and (3 an example application of the service to a complex use case in the neurosciences. The main drivers for our approach are to facilitate collaborations with a transparent, automated data flow that shields scientists from having to learn new tools or data structuring paradigms. Using NeuronDepot is simple: one-time data assignment from the originator and cloud based syncing – thus making experimental and modeling data available across the collaboration with minimum overhead. Since data sharing is cloud based, our approach opens up the possibility of using new software developments and hardware scalabitliy which are associated with elastic cloud computing. We provide an implementation that relies on existing synchronization services and is usable from all devices via a reactive web interface. We are motivating our solution by solving the practical problems of the GinJang project, a collaboration of three universities across eight time zones with a complex workflow encompassing data from electrophysiological recordings, imaging, morphological reconstructions, and simulations.

  13. Implement Security using smart card on Cloud

    Directory of Open Access Journals (Sweden)

    Amish Kumar Aman

    2013-04-01

    Full Text Available Cloud is a concept of accessing the data from theirown datacenters such that the chances ofeavesdropping have been reduced and storage costis reduced. Here in this paper we are giving a briefsurvey of various cloud based techniqueimplemented so far. Although there are varioustechniques implemented so far for the cloudcomputing but here we are giving a survey of notonly cloud based techniques but also the concept ofsmart cards for the authentication between onecloud to another cloud.

  14. MVC for content management on the cloud

    OpenAIRE

    McGruder, Crystal A.

    2011-01-01

    Approved for public release; distribution is unlimited. Cloud computing portrays a new model for providing IT services over the Internet. In cloud computing, resources are accessed from the Internet through web-based tools. Although cloud computing offers reduced cost, increased storage, high automation, flexibility, mobility, and the ability of IT to shift focus, there are other concerns such as the management, organization and structure of content on the cloud that large organizations sh...

  15. GEMBus as a service oriented platform for cloud-based composable services

    NARCIS (Netherlands)

    Grammatikou, M.; Marinos, C.; Demchenko, Y.; Lopez, D.R.; Dombek, K.; Jofre, J.

    2011-01-01

    Cloud computing has become a common technology for provisioning infrastructure services on-demand. Modern Cloud platforms can provide cloud-based applications, software, deployment platforms, or general infrastructure services that may include both computational and storage resources. However existi

  16. Research on the Quality Evaluation Model of Personal Cloud Storage Service Based on American Consumer Satisfaction Index Model%基于ACSI模型的个人云存储服务质量评价模型研究

    Institute of Scientific and Technical Information of China (English)

    占南; 谢笑; 王文韬

    2014-01-01

    With the wide application of Internet and the popularity of mobile devices, the synchronization, integration, backup and sha-ring of personal information stored in different terminals or social network environment become the focus of the public. How to improve the service quality of personal cloud storage and user's satisfaction and meet user's demand is an urgent problem to be solved. This paper main-ly discusses the main factors that influence user's satisfaction of personal cloud storage, constructs the concept model of user's satisfaction based on the American Customer Satisfaction Index theory, collects user's data through questionnaire survey, and processes the data using the structural equation model and related software, which provides guidance and reference to optimize and improve personal cloud storage service.%随着互联网的广泛应用和移动终端设备的普及,存储在不同终端或社会网络环境中的个人信息如何同步、整合、备份和共享等问题成为人们关注的焦点。如何提升个人云存储服务质量,提高用户满意度,从而更好地满足用户需求是亟待解决的问题。主要是探讨影响个人云存储服务用户满意度的主要因素,以美国顾客满意度指数为理论基础构建个人云存储用户满意度概念模型,通过问卷调查法收集用户数据,利用结构方程模型和相关软件对数据进行分析和处理,为优化和提升个人云存储服务提供指导和借鉴。

  17. Implementation of secure data retrieval schema in cloud storage by using ABE technology%云存储中利用属性基加密技术的安全数据检索方案

    Institute of Scientific and Technical Information of China (English)

    杜朝晖; 朱文耀

    2016-01-01

    针对传统方法在对云存储的加密数据进行检索时效率不高的问题,提出了一种利用属性基加密(ABE)技术的安全数据检索方案。利用 ABE 提供丰富的索引词表达能力,从而确保数据安全性,通过平衡云服务提供商运行开销和其他用户参与基于云存储的信息检索服务,使用加密运算替代穷尽搜索,使得搜索过程与现存数据库管理系统机制更加兼容。分析结果表明,相比其他几种较新的方案,方案在访问控制和快速搜索中具有更好的性能,且能在数据检索过程中确保数据安全性和用户隐私,适合应用于具有大量数据的云存储系统。%To solve the poor performance of traditional method in retrieving encrypted data in cloud storage,this paper pro-posed an efficient data retrieval method using attributed-based encryption.Firstly,it used rich expressiveness of index terms by exploiting ABE to provide data security.Then,it enhanced the searching efficiency by balancing operational overhead a-mong the CSP and other users involved in the cloud storage-based information retrieval service.The results show that proposed schema performances are better than other newly schemes in access control and fast searches,and the data security and user privacy can be guaranteed during the data retrieval process,which indicates that proposed schema is suitable for cloud storage systems with huge data.

  18. Public Auditing and Data Dynamics in Cloud with Performance Assessment on Third Party Auditor

    DEFF Research Database (Denmark)

    P. Sawant, Snehal; Deshmukh, Aaradhana A.; Mihovska, Albena Dimitrova

    2016-01-01

    Cloud computing allows the user to outsource their computation and storage overhead to a public cloud, managed by cloud service providers. Data stored in the cloud may reside on remotely servers and this raises security issues. This paper addresses the issue of data storage integrity. The scheme...

  19. Health condition of juvenile Chelonia mydas related to fibropapillomatosis in southeast Brazil

    Science.gov (United States)

    Renan de Deus Santos, Marcello; Silva Martins, Agnaldo; Baptistotte, Cecília; Work, Thierry M.

    2015-01-01

    Packed cell volume (PCV), plasma biochemistry, visual body condition (BC), and calculated body condition index (BCI) were evaluated in 170 wild juvenile green sea turtles Chelonia mydas from an aggregation in the effluent canal of a steel mill in Brazil. Occurrence of cutaneous fibropapillomatosis (FP) was observed in 44.1% of the animals examined. BCI alone did not differ significantly between healthy animals and those afflicted with FP. However, all turtles with low BCI were severely afflicted and were uremic, hypoglycemic, and anemic in relation to healthy animals. Severe FP was not always reflected by a poor health condition of the individual. Clinical evaluation and plasma biochemistry indicated that most animals afflicted with FP were in good health condition. Differences in FP manifestations and associated health conditions in different geographic regions must be assessed by long-term health monitoring programs to help define priorities for conservation efforts.

  20. Genomic characterization of two novel reptilian papillomaviruses, Chelonia mydas papillomavirus 1 and Caretta caretta papillomavirus 1.

    Science.gov (United States)

    Herbst, Lawrence H; Lenz, Jack; Van Doorslaer, Koenraad; Chen, Zigui; Stacy, Brian A; Wellehan, James F X; Manire, Charles A; Burk, Robert D

    2009-01-05

    In this paper we describe the characterization of the genomes of two sea turtle papillomaviruses, Chelonia mydas PV (CmPV-1) and Caretta caretta PV (CcPV-1). The isolation and sequencing of the first non-avian reptilian PVs extend the evolutionary history of PVs to include all amniotes. PVs have now been described in mammals, birds and non-avian reptiles. The chelonian PVs form a distinct clade most closely related to the avian PVs. Unlike the avian PVs, both chelonian PVs have canonical E6 and E7 ORFs, indicating that these genes were present in the common ancestor to mammalian and non-mammalian amniote PVs. Rates of evolution among the non-mammalian PVs were generally slower than those estimated for mammalian PVs, perhaps due to lower metabolic rates among the ectothermic reptiles.

  1. Identification of CD3+ T lymphocytes in the green turtle Chelonia mydas.

    Science.gov (United States)

    Muñoz, Fernando A; Estrada-Parra, Sergio; Romero-Rojas, Andres; Work, Thierry M; Gonzalez-Ballesteros, Erik; Estrada-Garcia, Iris

    2009-10-15

    To understand the role of the immune system with respect to disease in reptiles, there is the need to develop tools to assess the host's immune response. An important tool is the development of molecular markers to identify immune cells, and these are limited for reptiles. We developed a technique for the cryopreservation of peripheral blood mononuclear cells and showed that a commercially available anti-CD3 epsilon chain antibody detects a subpopulation of CD3 positive peripheral blood lymphocytes in the marine turtle Chelonia mydas. In the thymus and in skin inoculated with phytohemagglutinin, the same antibody showed the classical staining pattern observed in mammals and birds. For Western blot, the anti-CD3 antibodies identified a 17.6k Da band in membrane proteins of peripheral blood mononuclear cell compatible in weight to previously described CD3 molecules. This is the first demonstration of CD3+ cells in reptiles using specific antibodies.

  2. Young green turtles, Chelonia mydas, exposed to plastic in a frontal area of the SW Atlantic.

    Science.gov (United States)

    González Carman, Victoria; Acha, E Marcelo; Maxwell, Sara M; Albareda, Diego; Campagna, Claudio; Mianzan, Hermes

    2014-01-15

    Ingestion of anthropogenic debris represents an important threat to marine turtle populations. Information has been limited to inventories of debris ingested and its consequences, but why ingestion occurs and the conditions that enable it are less understood. Here we report on the occurrence of plastic ingestion in young green turtles (Chelonia mydas) inhabiting the Río de la Plata (SW Atlantic). This estuarine area is characterized by a frontal system that accumulates anthropogenic debris. We explored exposure of green turtles to plastic and its ingestion via debris distribution, habitat use and digestive tract examination. Results indicated that there is considerable overlap of frontal accumulated plastic and core foraging areas of the animals. Exposure results in ingestion, as shown by the high frequency of plastic found in the digestive tracts. The Río de la Plata estuarine front is an area of conservation concern for young green turtles.

  3. Vitellogenin (VTG) conservation in sea turtles: anti-VTG antibody in Chelonia mydas versus Caretta caretta.

    Science.gov (United States)

    Zaccaroni, Annalisa; Zucchini, Marina; Segatta, Lorenzo; Gamberoni, Matteo; Freggi, Daniela; Accorsi, Pier A; Scaravelli, Dino; Gardner, Susan C

    2010-01-01

    Vitellogenin (VTG) is considered as a marker of endocrine disruption. A Western blot method for VTG quantification in Caretta caretta turtle plasma was developed using anti-VTG antibody for Chelonia mydas. A screening of samples (n = 61) collected in the southern Mediterranean Sea around Lampedusa Island, Italy, was performed. The antibody showed a good cross-reactivity with C. caretta VTG, suggesting a certain conservation of the core of the protein in different sea turtle species. The optimal operative condition for Western blot analysis consists of using diluted plasma at 1:50. In field samples, a certain mismatch with morphological sexing was observed, and VTG was detected in young animals. These results suggest the possibility of a precocious activation of VTG-encoding genes before sexual maturation and/or exposure to endocrine disrupter substances.

  4. Marine debris ingestion by Chelonia mydas (Testudines: Cheloniidae) on the Brazilian coast.

    Science.gov (United States)

    da Silva Mendes, Sarah; de Carvalho, Robson Henrique; de Faria, Adriana Fonseca; de Sousa, Bernadete Maria

    2015-03-15

    Chelonia mydas is distributed in several regions of the world and they are common in coastal regions and around islands. Between August 2008 and July 2009, 20 specimens of C. mydas were found dead on the beaches of Ubatuba, São Paulo, Brazil. The stomachs were removed and anthropogenic wastes were separated according their malleability and color. Of those animals, nine had ingested marine debris. Soft plastic was the most frequent among the samples and the majority of fragments was white or colorless and was between zero and five cm. Many studies have shown a high incidence of eating waste for some species of sea turtles. The record of ingestion of mostly transparent and white anthropogenic wastes in this study strengthens the hypothesis that these animals mistake them for jellyfish. Although the intake of anthropogenic waste causes impact on the lives of sea turtles, such studies are still scarce in Brazil.

  5. Morphologic and cytochemical characteristics of green turtle (Chelonia mydas) blood cells

    Science.gov (United States)

    Work, T.M.; Raskin, R.E.; Balazs, G.H.; Whittaker, S.D.

    1998-01-01

    Objective - To identify and characterize blood cells from free-ranging Hawaiian green turtles, Chelonia mydas. Sample Population - 26 green turtles from Puako on the island of Hawaii and Kaneohe Bay on the island of Oahu. Procedure - Blood was examined, using light and electron microscopy and cytochemical stains that included benzidine peroxidase, chloroacetate esterase, alpha naphthyl butyrate esterase, acid phosphatase, Sudan black B, periodic acid-Schiff, and toluidine blue. Results - 6 types of WBC were identified: lymphocytes, monocytes, thrombocytes, heterophils, basophils, and eosinophils (small and large). Morphologic characteristics of mononuclear cells and most granulocytes were similar to those of cells from other reptiles except that green turtles have both large and small eosinophils. Conclusions - Our classification of green turtle blood cells clarifies imporoper nomenclature reported previously and provides a reference for future hematologic studies in this species.

  6. Quantitative computed tomography of the liver in juvenile green sea turtles (Chelonia mydas).

    Science.gov (United States)

    Bonelli, Marília de Albuquerque; de Oliveira, Daniel Capucho; Costa, Lorena Adão Vescovi Séllos; Forattini, Jannine Garcia; Júnior, João Luiz Rossi; Leite, Flaviana Lima Guião; Costa, Fabiano Séllos

    2013-06-01

    Quantitative computed tomography (QCT) is a highly sensitive, applicable technique for determining the x-ray attenuation of organs. This technique reveals great precision in the detection of alterations in the x-ray attenuation of hepatic parenchyma, although the lack of studies establishing normal values limits its application in wild animals. The objective of this study was to establish mean hepatic attenuation values in four healthy juvenile sea turtles (Chelonia mydas) using QCT. Helical computed tomography scans were performed and regions of interest selected in the liver after multi-planar reconstruction images were obtained. The mean attenuation value for the hepatic parenchyma in these four turtles was 60.09 +/- 5.3 standard deviation Hounsfield units. Determining normal x-ray attenuation values of the liver increases knowledge of the computed tomographic anatomy of this species and may be useful in the investigation of hepatic diseases.

  7. Helminth Parasites of Juvenile Green Turtles Chelonia mydas (Testudines: Cheloniidae) in Brazil.

    Science.gov (United States)

    Werneck, M R; Silva, R J

    2015-12-01

    The present study offers a parasitological analysis of juvenile individuals of the green turtle ( Chelonia mydas ) found on the Brazilian coast between 2004 and 2011. Helminths were found in 90 out of 136 individuals (66.2%, CI = 57.7-74.0). In total, 29,411 helminths were collected, belonging to the families Brachycoeliidae, Cladorchiidae, Microscaphidiidae, Pronocephalidae, Rhytidodidae, and Spirorchiidae. Mean species richness was 4.74 (CI = 4.03-5.46), the mean intensity was 327 (CI = 223-489), and the mean abundance was 216 (CI = 146-339). This study also reports new geographical records for: Angiodictyum longum, Angiodictyum parallelum, Rameshwarotrema uterocrescens, Pyelosomum cochlear, Schizamphistomum scleroporum, Cymatocarpus solearis, and Neospirorchis sp. This is the first analysis of helminth composition in juveniles of green turtles.

  8. Body size distribution demonstrates flexible habitat shift of green turtle (Chelonia mydas

    Directory of Open Access Journals (Sweden)

    Ryota Hayashi

    2015-01-01

    Full Text Available Green turtles (Chelonia mydas, listed as Endangered on the IUCN redlist, have a broad migration area and undergo a habitat shift from the pelagic (hatchling to neritic (growth zones. We studied habitat utilisation of the coastal feeding grounds around Okinawajima Island, Japan, in 103 green turtles. The western and eastern turtle aggregations off Okinawa had homogeneous genetic compositions, but different body size distributions. The western coastal feeding ground supported larger individuals than the eastern coastal feeding ground. Thus, green turtles appear to prefer different feeding grounds during their growth, and have a flexible habitat shift including a secondary habitat shift from east to west around Okinawajima Island after they are recruited to the coastal habitats. This study suggests maintaining coastal habitat diversity is important for green turtle conservation.

  9. Characterization of single nucleotide polymorphism markers for the green sea turtle (Chelonia mydas).

    Science.gov (United States)

    Roden, Suzanne E; Dutton, Peter H; Morin, Phillip A

    2009-05-01

    We present data on 29 new single nucleotide polymorphism assays for the green sea turtle, Chelonia mydas. DNA extracts from 39 green turtles were used for two methods of single nucleotide polymorphism discovery. The first approach employed an amplified fragment length polymorphism technique. The second technique screened a microsatellite library. Allele-specific amplification assays were developed for high-throughput single nucleotide polymorphism genotyping and tested on two Pacific C. mydas nesting populations. Observed heterozygosities ranged from 0 to 0.95 for a Hawaiian population and from 0 to 0.85 for a Galapagos population. Each of the populations had one locus out of Hardy-Weinberg equilibrium, SSCM2b and SSCM5 for Hawaii and Galapagos, respectively. No loci showed significant genotypic linkage disequilibrium across an expanded set of four Pacific nesting populations. However, two loci, SSCM4 and SSCM10b showed linkage disequilibrium across three populations indicating possible association.

  10. Using blood samples to estimate persistent organic pollutants and metals in green sea turtles (Chelonia mydas).

    Science.gov (United States)

    van de Merwe, Jason P; Hodge, Mary; Olszowy, Henry A; Whittier, Joan M; Lee, Shing Y

    2010-04-01

    Persistent organic pollutants (POPs) and heavy metals have been reported in a number of green turtle (Chelonia mydas) populations worldwide. However, due to ethical considerations, these studies have generally been on tissues from deceased and stranded animals. The purpose of this study was to investigate the use of blood samples to estimate the tissue contamination of live C. mydas populations. This study analysed 125 POP compounds and eight heavy metals in the blood, liver, kidney and muscle of 16 C. mydas from the Sea World Sea Turtle Rehabilitation Program, Gold Coast, Australia. Strong correlations were observed between blood and tissue concentrations for a number of POPs and metals. Furthermore, these correlations were observed over large ranges of turtle size, sex and condition. These results indicate that blood samples are a reliable non-lethal method for predicting chemical contamination in C. mydas.

  11. Health condition of juvenile Chelonia mydas related to fibropapillomatosis in southeast Brazil.

    Science.gov (United States)

    de Deus Santos, Marcelo Renan; Silva Martins, Agnaldo; Baptistotte, Cecília; Work, Thierry M

    2015-08-20

    Packed cell volume (PCV), plasma biochemistry, visual body condition (BC), and calculated body condition index (BCI) were evaluated in 170 wild juvenile green sea turtles Chelonia mydas from an aggregation in the effluent canal of a steel mill in Brazil. Occurrence of cutaneous fibropapillomatosis (FP) was observed in 44.1% of the animals examined. BCI alone did not differ significantly between healthy animals and those afflicted with FP. However, all turtles with low BCI were severely afflicted and were uremic, hypoglycemic, and anemic in relation to healthy animals. Severe FP was not always reflected by a poor health condition of the individual. Clinical evaluation and plasma biochemistry indicated that most animals afflicted with FP were in good health condition. Differences in FP manifestations and associated health conditions in different geographic regions must be assessed by long-term health monitoring programs to help define priorities for conservation efforts.

  12. Food preferences and Hg distribution in Chelonia mydas assessed by stable isotopes.

    Science.gov (United States)

    Bezerra, M F; Lacerda, L D; Rezende, C E; Franco, M A L; Almeida, M G; Macêdo, G R; Pires, T T; Rostán, G; Lopez, G G

    2015-11-01

    Mercury (Hg) is a highly toxic pollutant that poses in risk several marine animals, including green turtles (Chelonia mydas). Green turtles are globally endangered sea turtle species that occurs in Brazilian coastal waters as a number of life stage classes (i.e., foraging juveniles and nesting adults). We assessed total Hg concentrations and isotopic signatures ((13)C and (15)N) in muscle, kidney, liver and scute of juvenile green turtles and their food items from two foraging grounds with different urban and industrial development. We found similar food preferences in specimens from both areas but variable Hg levels in tissues reflecting the influence of local Hg backgrounds in food items. Some juvenile green turtles from the highly industrialized foraging ground presented liver Hg levels among the highest ever reported for this species. Our results suggest that juvenile foraging green turtles are exposed to Hg burdens from locally anthropogenic activities in coastal areas.

  13. Mercury in the sea turtle Chelonia mydas (Linnaeus, 1958) from Ceará coast, NE Brazil.

    Science.gov (United States)

    Bezerra, Moisés F; Lacerda, Luiz D; Costa, Breno G B; Lima, Eduardo H S M

    2012-03-01

    Mercury concentrations in carapace fragments of the green turtle Chelonia mydas from the Ceará coast in NE Brazil are reported. Concentrations varied from <0.34 to 856.6 ng.g(-1) d.w., and were highest (average of 154.8 ng.g(-1) d.w.) in juveniles (n = 22), whereas lowest concentrations (average of 2.5 ng.g(-1) d.w.) were observed in adult/sub-adult animals (n = 3). There was a significant negative correlation between animal size and Hg concentration probably due to different diets between juveniles and sub-adults/adults. Carapace fragments, which are non-invasive, non-lethal substrates, may be of importance for monitoring purposes of these generally endangered species.

  14. Pathologies of the digestive system caused by marine debris in Chelonia mydas.

    Science.gov (United States)

    Jerdy, Hassan; Werneck, Max Rondon; da Silva, Maria Aparecida; Ribeiro, Rachel Bittencourt; Bianchi, Mariah; Shimoda, Eduardo; de Carvalho, Eulógio Carlos Queiróz

    2017-03-15

    The growth of human population and deficient pollution control measures pose significant challenge to the environment. Despite conservation efforts, all sea turtle species are at some risk of extinction. The present study investigated the effect of marine debris on the gastrointestinal tract of green turtles in southeastern Brazil. Of the 777 animals evaluated, 290 showed marine debris in one segment of the gastrointestinal tract. The presence of these materials in the gastrointestinal tract may be harmful, independent of the segment involved, and increases the risk of impaction. Marine debris has become a significant hazard to Chelonia mydas in the region surveyed, causing perforation, rupture, or fecal impaction that, when not treated, is potentially fatal, exposing the intestine to bacterial infection.

  15. ultrastructural study of limb bud development in green turtles chelonia mydas

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    morphological changes during the embryonic development of limbs of the green turtle,chelonia mydas,were studied during the entire period of incubation,using transmission and scanning electron microscopy (tem and sem).limb buds were first observed at stage 2.at that stage,the tip was covered with an apical ectodermal ridge (aer) which began to regress at stage 6.associated with aer was the presence of the mesenchymal cells which,consequently,differentiated into muscles,cartilage and bones.the gross features of the skeletal development appeared as a condensation of the cartilaginous structures in the proximal distal region of the limbs.the primordial digits were gradually enclosed by hard keratinized webbed skin.the increase in rate of ossification and skin pigmentation was correlated with the growth of the limbs.the development of the limbs was closely related to the transitional appearance of mucus secretion from the epidermis.

  16. Integer Programming Model and Optimization Algorithm for Virtual Host Cloud Storage System%虚拟主机云存储系统整数规划模型及最优化分配算法

    Institute of Scientific and Technical Information of China (English)

    陈晓华; 李春芝; 俞坚奇

    2011-01-01

    With the network storage technology development, how to improve transmission performance and expand storage capacity is problem to be resolved. This paper presents VCloud Storage, a cloud storage system based on virtual host. And it can improve file transmission performance, balance the load and expand storage capacity unlimitedly. It firstly abstracts running state mathematical model of the virtual hosts, then creates integer programming model on the running state mathematical model. By implicit enumeration algorithm, it allocates virtual host to the client storage request optimally. Finally client modules and virtual host modules finish file transmission collaboratively. The experimental result shows that the model and algorithm have optimization effect significantly. VCloud Storage total throughput and average transmission rate is superior to Microsoft's SkyDrive storage,Tencent QQ mailbox store and a single virtual host storage. The proposed model and algorithm enhance file transmission performance and stability, and are an effective method that improves the performance of storage system in WAN network.%随着网络存储技术的发展,如何提高广域网网络存储系统的传输性能和存储容量是亟待解决的同题.本文提出一个基于虚拟主机集群的云存储系统(VCloud Storage),具有良好的负载均衡能力,提高了文件传输性能,同时解决了存储容量无限扩展的问题.本文提出的云存储系统首先抽象虚拟主机运行状态数学模型,然后在虚拟主机运行状态数学模型的基础上建立整数规划模型,利用隐枚举算法,最优化分配虚拟主机给客户端模块的存储请求,最终客户端模块与虚拟主机接口协作完成文件传输.实验结果表明:采用本文提出的模型及算法具有明显的优化效果,VClDud Storage总吞吐量和平均传输率均优于微软SkyDrive存储、腾讯QQ邮箱存储和单虚拟主机存储.本文提出的模型及算法增强了文

  17. Exploiting Virtualization and Cloud Computing in ATLAS

    Science.gov (United States)

    Harald Barreiro Megino, Fernando; Benjamin, Doug; De, Kaushik; Gable, Ian; Hendrix, Val; Panitkin, Sergey; Paterson, Michael; De Silva, Asoka; van der Ster, Daniel; Taylor, Ryan; Vitillo, Roberto A.; Walker, Rod

    2012-12-01

    The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R&D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.

  18. 混合云存储环境下的数据访问隐私保护方案%Scheme of data access privacy protection in hybrid cloud storage

    Institute of Scientific and Technical Information of China (English)

    张卓奇; 郭卫斌

    2014-01-01

    为了保护混合云存储中公有云端数据的安全,尤其是数据访问隐私,提出了一个混合云存储方案。在企业私有云环境中对数据进行加密、合并、分割等处理,将文件元数据存放于组织内部的数据库中,将处理后的数据存放于公共云存储空间,实现数据内容和元数据的分离,提高公有云端数据的安全性和数据访问的隐私性。根据原型系统获得的实验结果表明了该方案在数据访问隐私保护中的作用。%To protect the security and privacy of access of out-sourced data,a hybrid cloud storage system was proposed to solve these problems.The system process data were stored out-sourced by using encryption,combination and fragment.The metadata of original data files were stored in local devices and the processed data were upload to public cloud storage.In this way,the safe and private access of original data was guaranteed by separating processed data and metadata.According to the result of experi-ment on the system prototype,the validity of proposed scheme was demonstrated.

  19. Using cloud computing infrastructure with CloudBioLinux, CloudMan, and Galaxy.

    Science.gov (United States)

    Afgan, Enis; Chapman, Brad; Jadan, Margita; Franke, Vedran; Taylor, James

    2012-06-01

    Cloud computing has revolutionized availability and access to computing and storage resources, making it possible to provision a large computational infrastructure with only a few clicks in a Web browser. However, those resources are typically provided in the form of low-level infrastructure components that need to be procured and configured before use. In this unit, we demonstrate how to utilize cloud computing resources to perform open-ended bioinformatic analyses, with fully automated management of the underlying cloud infrastructure. By combining three projects, CloudBioLinux, CloudMan, and Galaxy, into a cohesive unit, we have enabled researchers to gain access to more than 100 preconfigured bioinformatics tools and gigabytes of reference genomes on top of the flexible cloud computing infrastructure. The protocol demonstrates how to set up the available infrastructure and how to use the tools via a graphical desktop interface, a parallel command-line interface, and the Web-based Galaxy interface.

  20. Cloud-Based Distributed Control of Unmanned Systems

    Science.gov (United States)

    2015-04-01

    visualization of live data streams (i.e. video), but not on the storage and distribution mechanisms for the collected data. SSC Pacific’s UxV to the Cloud via...capable of storing and distributing the unmanned-vehicle collected data, cloud technologies (e.g. Accumulo) is chosen as the underlying data storage ...infrastructure. 3.1 Accumulo The cloud infrastructure is implemented using Accumulo, which is a distributed key-value based data storage and

  1. What CFOs should know before venturing into the cloud.

    Science.gov (United States)

    Rajendran, Janakan

    2013-05-01

    There are three major trends in the use of cloud-based services for healthcare IT: Cloud computing involves the hosting of health IT applications in a service provider cloud. Cloud storage is a data storage service that can involve, for example, long-term storage and archival of information such as clinical data, medical images, and scanned documents. Data center colocation involves rental of secure space in the cloud from a vendor, an approach that allows a hospital to share power capacity and proven security protocols, reducing costs.

  2. PSO应用于QoS偏好感知的云存储任务调度%Apply PSO into cloud storage task scheduling with QoS preference awareness

    Institute of Scientific and Technical Information of China (English)

    王娟; 李飞; 张路桥

    2014-01-01

    研究有QoS偏好要求的云存储任务调度。首先,分析云存储与云计算的差异,用存在矩阵避免无效解的产生。其次,归纳云存储的QoS需求为时间、代价与质量3大类,并据此修改PSO算法的适应度函数用权重因子调节QoS偏好。实验发现,在不同优先级任务分布不均的情况下,分布广的任务的偏好会掩盖其他任务的偏好,因而不适宜用PSO进行整体性调度,而必须进行分级调度。实验证明,改进后的分级PSO算法对QoS偏好具有较好的感知能力。%The task scheduling algorithm in cloud storage area with QoS preference awareness was studied. Firstly, the differences between cloud storage and cloud computing were pointed, and exist matrix was used to avoid the creation of useless solutions. Secondly, QoS factors were summarized into three classes:time, cost and quality classes. Based on the three classes, the fitness function of the PSO was improved by using weighted factors to adjust the QoS preference. The simulation results release that PSO is not fit for the overall scheduling when the task distributions of different degrees are unevenness because the QoS demand of wide distribution tasks may cover the QoS demand of other tasks. So a hierar-chical scheduling based on degree is necessary. The simulation results show that the improved hierarchical PSO schedul-ing algorithm can aware the QoS preference relevantly.

  3. 一种基于海量信息处理的云存储模型研究%A Kind of Cloud Storage Model Research Based on Massive Information Processing

    Institute of Scientific and Technical Information of China (English)

    张桂刚; 李超; 张勇; 邢春晓

    2012-01-01

    提出了一种云环境下海量数据组织与资源共享的存储总模型,该模型包括:结构化、半结构化及其非结构化数据与资源的对应存储方法;能兼顾海量大小数据文件处理的分布式文件系统THDFS;云数据库系统设计模型THCloudDB;云环境下强于MapReduce弱于SQL,以Hadoop++为基础的一种针对互联网海量数据文件处理且具有语义计算效能的计算模型THMapReduce;针对THDFS及其THCloudDB的具有语义效能的智能挖掘分析工具THBI;最后以“清华通”为案例分析了该模型平台的具体应用.%This paper presents a kind of cloud storage model based on massive information processing. The model includes: 1)storage methods of structured, semi-structured and unstructured data and the corresponding resources; 2) THDFS (Tsing Hua Distributed File System) which will take into account all size of the massive data files(big files and small files); 3) a cloud database system design model THCloudDB (Tsing Hua Cloud Database); 4) a internet-base massive data processing computation model THMapReduce (Tsing Hua MapReduce) computation model based on hadoopH-h which is stronger than MapReduce and weaker than SQL, especially it have merged into the semantic computing technology; 5)a intelligent mining tool THBI (Tsing Hua Business Intelligent) based on the THDFS and THCloudDB, and it have the semantic functions. Finally, paperend takes "Tsinghua Tong" as a case and make some analysis about the model's applications.

  4. 云存储环境下多用户可搜索加密方案%A Scheme of Multi-User Searchable Encryption in Cloud Storage

    Institute of Scientific and Technical Information of China (English)

    王映康; 罗文俊

    2012-01-01

    可搜索加密技术用来检索存储在云端的加密数据,既能够保证数据的安全性,同时又能够使得加密数据不失可用性.多用户可搜索加密技术使得用户在对云服务器保密的情况下与其他用户进行数据分享.在现有的基于Elgamal代理加密的多用户可搜索加密方案的基础上,本文对原有方案中的数据加密方式做出了更改,使得经过用户加密的数据只会在必要的时候才会被重新加密,而且加密的计算量比原方案小.本文改变了令牌的产生方式,使得客户端计算令牌的计算量更小,在云服务器端进行搜索的开销更少.%Searchable encryption can be used to search the encrypted data which is stored in the cloud.By using searchable encryption, we can guarantee the security of the data without losing operability.Multi-user searchable encryption enables users to share their data to others without revealing their data to the cloud server.In our scheme, we make the encrypted data re-encrypted when the data is required, but not every time the user sends data to the cloud server.That can make our scheme more efficient.We use a different way to generate the trapdoors, and the trapdoors in our scheme is easy to compute and shorter than the existed scheme.

  5. Morfologia do tubo digestório da tartaruga verde (Chelonia mydas Morphology of the digestive tube of the green turtle (Chelonia mydas

    Directory of Open Access Journals (Sweden)

    Marcela S. Magalhães

    2010-08-01

    Full Text Available Para avaliar a morfologia do tubo digestório da tartaruga verde (Chelonia mydas 10 animais, 9 juvenis e 1 adulto, foram analisados. A retirada dos órgãos digestórios procedeu-se após abertura do plastrão. A descrição e a medida do comprimento de cada órgão [esôfago, estômago, intestino delgado (ID e intestino grosso (IG] foram realizadas com o tubo digestório aberto. Os resultados mostraram que tanto nos animais juvenis como no adulto, o esôfago foi marcado pela presença de papilas pontiagudas em sua mucosa interna. O estômago apresentou aspecto saculiforme com fundo cego. No ID foi observado pregas reticulares na mucosa duodenal, enquanto o jejuno e do íleo mostrou pregas retilíneas longitudinais. O IG foi marcado pela alternância de regiões abauladas (haustros ou saculações e estreitamentos. A microscopia do tudo digestório em C. mydas revelou esôfago com mucosa pregueada revestida por epitélio estratificado pavimentoso queratinizado. O estômago mostrou-se dividido em regiões: cárdica, fúndica, pilórica, as quais diferiam quanto ao número de glândulas e disposição da camada muscular. O ID apresentou-se marcado por vilosidades, e o IG por mucosa pregueada contendo glândulas na lâmina própria. A morfologia do tubo digestório da tartaruga verde mostrou-se adaptada ao seu hábito alimentar, possuindo especializações e um longo trato digestório que promove o aumento da superfície de absorção, já que seu alimento é de difícil digestão.The morphology of the digestive tube of the green turtle (Chelonia mydas was evaluated. Nine young e 1 adult turtles were analyzed. The digestive organs withdrew occurred after plastron opening. The length's description and measurement from each organ [esophagus, stomach, small intestine (SI and large intestine (LI] were made with digestive tube opened. The results showed that in both the adult and young animals, the esophagus from all species were marked by the presence

  6. Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing

    Science.gov (United States)

    Wyld, David C.

    Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these challenging economic times. After an overview of the cloud computing concept, this article explores the security issues facing public sector use of cloud computing and looks to the risk and benefits of shifting to cloud-based models. It concludes with an analysis of the challenges that lie ahead for government use of cloud resources.

  7. Cloud Governance

    DEFF Research Database (Denmark)

    Berthing, Hans Henrik

    Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing.......Denne præsentation beskriver fordele og værdier ved anvendelse af Cloud Computing. Endvidere inddrager resultater fra en række internationale analyser fra ISACA om Cloud Computing....

  8. Metadata Management of Cloud Storage Platform Based on Sensitive Information Self-Management%敏感数据自主可控的云存储平台元数据管理

    Institute of Scientific and Technical Information of China (English)

    许青林; 覃国民; 姜文超; 谢燕丽

    2014-01-01

    Considering the sensitive information security issue on the traditional cloud storage platform, It divided metadata management into two parts , the client side metadata management-Sub-Metadata Server ( Sub-MS) and the cloud side metadata management-Core Metadata Server( CMS) .Sub-MS aimed to ex-tract independently ,maintain,read and write and store the metadata with sensitive information, which used the random redundancy algorithm in maintaining mapping relations, based on the redundancy be-tween files and data blocks, to improve the files storage security.At the same time, Sub-MS used the re-quest synchronism strategy to keep the consistency of mapping relations from data blocks to Data Server ( DS) between Sub-MS and CMS, to insure the stability and reliability of the whole storage system.With multi-user concurrent access, the experiment about performance of reading and writing for the data sets of different sizes indicates that compared with HDFS and GFS, SISM still has good reading and writing per-formance and data persistence capabilities in managing metadata of sensitive information by itself.%针对传统云存储平台的敏感数据的安全问题,将元数据管理分成客户端元数据管理与云端元数据管理两部分,元数据子服务器自主提取、维护、读写和存储敏感信息的元数据,在映射关系方面采用基于文件与数据块之间冗余随机映射算法提高文件存储的安全性,同时采用按需询问同步策略保障元数据子服务器与云端元数据服务器之间的数据块到数据存储中心映射关系的一致性,确保整个存储系统的稳定性与可靠性。在多用户并发访问下,对不同规模数据集的读、写性能的实验测试表明,该存储系统在自主管理敏感信息元数据的前提下,与HDFS、GFS相比仍具有较好读写性能和稳定的数据持久化能力。

  9. Direct User Data Authentication in Cloud

    Directory of Open Access Journals (Sweden)

    P. N. karthikayan

    2012-09-01

    Full Text Available Cloud computing is the long dreamed vision of computing as a utility, where data owners can remotely store their data in the cloud to enjoy on-demand high-quality applications and services from a shared pool of configurable computing resources. While data outsourcing relieves the owners of the burden of local data storage and maintenance, it also eliminates their physical control of storage dependability and security, which traditionally has been expected by both enterprises and individuals with high service-level requirements. In order to facilitate rapid deployment of cloud data storage service and regain security assurances with outsourced data dependability, efficient methods that enable ondemand data correctness verification on behalf of cloud data owners have to be designed. In this article we propose that publicly auditable cloud data storage is able to help this nascent cloud economy become fully established. With public audit ability, a trusted entity with expertise and capabilities data owners do not possess can be delegated as an external audit party to assess the risk of outsourced data when needed. Such an auditing service not only helps save data owners computation resources but also provides a transparent yet cost-effective method for data owners to gain trust in the cloud. We describe approaches and system requirements that should be brought into consideration, and outline challenges that need to be resolved for such a publicly auditable secure cloud storage service to become a reality.

  10. MULTI LEVEL ENCRYPTION APPROACH TO SECURE CLOUD DATA

    OpenAIRE

    Mukesh Kumar Jha*, Veerendra Shrivastava

    2016-01-01

    Now A Days cloud computing become an extensive area of research where data and resource are sharing among the various user through public cloud .However protecting data and resources on cloud is a challenging issue. In the previous HDFS approach when HDFS file system need to secure this is create additional complicity of algorithm. To address this issue and ensuring data security in cloud storage we propose “MESCD” (Multi Level Encryption approach to secure cloud data) has been proposed. In t...

  11. Cloud ERP and Cloud Accounting Software in Romania

    Directory of Open Access Journals (Sweden)

    Gianina MIHAI

    2015-05-01

    Full Text Available Nowadays, Cloud Computing becomes a more and more fashionable concept in the IT environment. There is no unanimous opinion on the definition of this concept, as it covers several versions of the newly emerged stage in the IT. But in fact, Cloud Computing should not suggest anything else than simplicity. Thus, in short, simple terms, Cloud Computing can be defined as a solution to use external IT resources (servers, storage media, applications and services, via Internet. Cloud computing is nothing more than the promise of an easy accessible technology. If the promise will eventually turn into something certain yet remains to be seen. In our opinion it is too early to make an assertion. In this article, our purpose is to find out what is the Romanian offer of ERP and Accounting software applications in Cloud and / or as services in SaaS version. Thus, we conducted an extensive study whose results we’ll present in the following.

  12. Snapshot Based Virtualization Mechanism for Cloud Computing

    Directory of Open Access Journals (Sweden)

    A.Rupa

    2012-09-01

    Full Text Available Virtualization in cloud computing has been the latest evolutionary technology in current applications of various industries and IT firms are adopting Cloud Technology. The concept of cloud computing was introduced long back. Since its inception there have been many number of new innovations implemented by different experts and researchers etc. Virtualization in cloud computing is very effective approach to gain different operational advantages in cloud computing. In this paper we have proposed the concept of virtualization using Snapshot based Mechanism, where the Memory virtualization and Storage virtualization are discussed in this paper.

  13. Securing Data Transfer in Cloud Environment

    Directory of Open Access Journals (Sweden)

    K. S. Wagh

    2014-05-01

    Full Text Available Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Cloud storage moves the user’s data to large data centers, that are remotely located, on which user does not have any control. This unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved.

  14. Cloud optics

    CERN Document Server

    Kokhanovsky, A

    2006-01-01

    Clouds affect the climate of the Earth, and they are an important factor in the weather. Therefore, their radiative properties must be understood in great detail. This book summarizes current knowledge on cloud optical properties, for example their ability to absorb, transmit, and reflect light, which depends on the clouds' geometrical and microphysical characteristics such as sizes of droplets and crystals, their shapes, and structures. In addition, problems related to the image transfer through clouds and cloud remote sensing are addressed in this book in great detail. This book can be an im

  15. Information Leakage Prevention In Cloud Computing

    Directory of Open Access Journals (Sweden)

    Raziqa Masood

    2014-11-01

    Full Text Available The cloud computing is still in it infancy.this is an emerging technology which will bring about innovations in terms of businessmodels and applications.the widespread penetration of smartphones will be a major factor in driving the adoption of cloude computing.however, cloud computing faces challenges related to privacy and security. Due to varied degree of security features and management schemes within the cloud entities security in the cloud is challenging. Security issues ranging from system misconfiguration, lack of proper updates, or unwise user behaviour from remote data storage that can expose user ̳s private data and information to unwanted access can plague a Cloud Computing. The intent of this paper is to investigate the security related issues and challenges in Cloud computing environment . We also proposed a security scheme for protecting services keeping in view the issues and challenges faced by cloud computing.

  16. Data mining in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ruxandra-Ştefania PETRE

    2012-10-01

    Full Text Available This paper describes how data mining is used in cloud computing. Data Mining is used for extracting potentially useful information from raw data. The integration of data mining techniques into normal day-to-day activities has become common place. Every day people are confronted with targeted advertising, and data mining techniques help businesses to become more efficient by reducing costs.Data mining techniques and applications are very much needed in the cloud computing paradigm. The implementation of data mining techniques through Cloud computing will allow the users to retrieve meaningful information from virtually integrated data warehouse that reduces the costs of infrastructure and storage.

  17. Mobile Cloud Computing and Applications

    Institute of Scientific and Technical Information of China (English)

    Chengzhong Xu

    2011-01-01

    @@ In 2010, cloud computing gained momentum.Cloud computing is a model for real-time, on-demand, pay-for-use network access to a shared pool of configurable computing and storage resources.It has matured from a promising business concept to a working reality in both the private and public IT sectors.The U.S.government, for example, has requested all its agencies to evaluate cloud computing alternatives as part of their budget submissions for new IT investment.

  18. An Access Control Policy for Multi-tenancy Cloud Storage Platform%一种面向多租户云存储平台的访问控制策略

    Institute of Scientific and Technical Information of China (English)

    沈晴霓; 杨雅辉; 禹熹; 张力哲; 陈钟

    2011-01-01

    云存储平台是多租户共享环境,能否实现其中不同租户数据之间的有效安全隔离成为了用户最为关心的问题.以RBAC(Role Based Access Control)策略为基础,结合组织标签和多种安全属性的逻辑组合,提出一种灵活的访问控制策略,它一方面保证云端不同企业之间数据的强隔离性,使某企业用户无法越权访问其他企业的用户数据;另一方面保证云存储企业内部数据的适度隔离,即可以根据公司自身的安全需求灵活定制企业内部策略.同时,引入虚拟组织的概念实现企业之间可能的数据共享;引入利益冲突的概念限制竞争企业之间的共享.给出了该策略在基于HDFS (Hadoop Distributed File System)的云存储架构中的原型实现.实验结果表明,该策略能够有效保障云存储平台多租户数据之间的恰当安全隔离.%Cloud Storage is a multi-tenancy shared environment, so achieving data separation between different users effectively in the platform has become one of issues most concerned by users. In this paper, we provide business users a flexible access control policy, which is built on top of RBAC (Role-based Access Control), combined with organization label and a variety of security attributes with logical combinations. First of all, it provides strict inter-enterprise data isolation on cloud storage, ensuring that business users could not access data which doesn't belong to their organization. Moreover, it provides proper separation of organization internal data. Business users could customize the policy flexibly according to their own security requirements, isolating data from different sectors or geographical area. Finally, the policy provides a mechanism for corporations to share data on cloud storage by introducing the concept of " virtual organization" , and guarantee companies with the same conflict set of interest could not be allowed to share data through traditional Chinese Wall Policy

  19. Multi-copy Data Integrity Verification Scheme of Research and Design under Cloud Storage Environment%云存储环境下多备份数据完整性验证方案研究与设计

    Institute of Scientific and Technical Information of China (English)

    付宏; 赵莉; 白国靖; 罗文俊

    2012-01-01

    云计算在给用户带来便利的同时,也为用户数据带来了新的安全挑战.其中数据完整性成为用户担心的安全问题之一.由于现有云存储环境下数据完整性验证方案只适合对单个数据文件进行完整性验证,因此提出一种新的改进方案.改进后的方案不仅支持多备份数据的完整性验证,而且支持备份数据在验证过程中的隐私保护.通过对改进方案的安全性、可行性进行详细的分析,说明改进后方案是安全和高效的.%Cloud computing,with bringing convenience to consumer,also poses new security challenges to consumer data. Where the data integrity is one of the security issues that consumer worry about. We first analyse the deficiency of existing data integrity verification scheme in cloud storage environment, in which we can only validate the individual data file, then present a new improved scheme. The latter not only supports the integrity verification of multiple-replication data,but also supports the data privacy protection in the process of validation. By security and feasibility analysis of improved scheme in more details, we indicate that the improved scheme is secure and effective.

  20. A Method of Provable Data Integrity Based on Lattice in Cloud Storage%云存储中一种基于格的数据完整性验证方法

    Institute of Scientific and Technical Information of China (English)

    谭霜; 何力; 陈志坤; 贾焰

    2015-01-01

    Using the cloud storage technology ,users can outsource their data to the cloud .Such outsourcing meets the requirements of saving hardware costs and simplifying data management , because they no longer store any copies of the data in their local memory ,and users cannot fully ensure whether the outsourced data are intact overall .Further ,considering the client's constrained computing power and the large size of the outsourced data ,the client cannot take the extra time and effort to verify the data correctness in cloud environment .Therefore ,ensuring the integrity of the outsourced data would lead to many security threats .In order to solve this problem ,in this paper ,we present lattice‐based provable data integrity for checking the integrity of the data in the cloud .The proposed scheme not only detects any violations of client data in the cloud ,but also has been proven to be safe in a random oracle .In particular ,as opposed to schemes based on factoring or discrete log ,the proposed scheme resists the cryptanalysis by quantum algorithms .Moreover ,the proposed protocol has three other good attributes ,namely support for data dynamics ,computing on signed data ,and multi‐client verification .Finally ,we present a comparison of the existing data integrity verification mechanism ,as well as some open problems of lattice‐based provable data integrity .%随着云存储技术的发展,用户可以从远程云中按需获取高质量的应用和服务,而不用担心本地的数据管理存储。由于用户在本地不再保留任何数据副本,故无法确保云中数据的完整性。为了解决这一问题,提出了一种面向于云存储环境的、基于格的数据完有性验证机制,该机制能有效地识别云存储中侵犯用户数据完整性的违规行为,且在随机预言机模型下被证明是安全的。另外,设计的协议还具有其他3种好的属性,即支持数据块级的动态操作、支持签名数据上

  1. Using Cloud for Research: A Technical Review

    OpenAIRE

    Chen, Xiaoyu; Wills, Gary; Gilbert, Lester; Bacigalupo, David

    2010-01-01

    The purpose of the TeciRes project was to conduct a technical review of the current landscape within cloud computing to establish the extent to which existing solutions meet encountered and envisioned requirements for using emerging cloud technologies, in particular those which enable computing and storage cloud facilities for research in Higher Education (HE) institutions, and to make recommendations on further development, guidance, and standardisation. The TeciRes project is one of three p...

  2. Distributed Cloud Computing (Dagstuhl Seminar 15072)

    OpenAIRE

    Coady, Yvonne; Kempf, James; McGeer, Rick; Schmid, Stefan

    2015-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 15072 "Distributed Cloud Computing". A distributed cloud connecting multiple, geographically distributed and smaller datacenters, can be an attractive alternative to today's massive, centralized datacenters. A distributed cloud can reduce communication overheads, costs, and latency's by offering nearby computation and storage resources. Better data locality can also improve privacy. In this seminar, we revisit the vision o...

  3. Research on key technologies of distributed data storage in cloud computing environment%云计算环境中分布式数据存储关键技术研究

    Institute of Scientific and Technical Information of China (English)

    向春枝; 范颖

    2016-01-01

    鉴于云计算存在庞大的节点规模和数据规模,云计算系统在可扩展性、高可用性等方面面临着诸多问题。针对云计算环境下的分布数据存储,构建了一种基于递归的正N边形网络模型,在数据中心网络结构的基础上给出了数据管理模型,并设计了以提高数据可用性、负载平衡为目的的副本分布策略和副本选择策略。在保证数据可用性的前提下,提出一种基于覆盖集的数据迁移算法,利用节点选择策略尽量减少迁移成本,进行数据迁移让更多的机器休眠,降低能耗。通过对实验数据进行比较分析,验证了提出的网络拓扑结构、数据管理模型、数据迁移技术的正确性和有效性。%The cloud computing system is faced with many problems in the aspects of scalability and high availability due to the enormous node scale and data scale of cloud computing. For the distributed data storage in cloud computing environment, an regular N⁃equilateral polygon(RNEP)network model based on recursion was constructed. The data management model is given on the basis of data center network structure. The transcript distribution strategy and selection strategy were designed to improve the data availability and load balancing ability. A data migration algorithm based on covering set is proposed on the premise of ensuring the data availability,in which the node selection strategy is used to minimize the migration cost and conduct data mi⁃gration to rest more machines and reduce energy consumption. The experimental data is compared and analyzed,which proves that the proposed network topology,data management model and data migration technology are valid and effective.

  4. Cloud Computing for Technical and Online Organizations

    Directory of Open Access Journals (Sweden)

    Hagos Tesfahun Gebremichael

    2016-07-01

    Full Text Available Cloud computing is a new computing model which is based on the grid computing, distributed computing, parallel computing and virtualization technologies define the shape of a new technology.It is the core technology of the next generation of network computing platform, especially in the field of education and online.Cloud computing as an exciting development in an educational Institute and online perspective.Cloud computing services are growing necessity for business organizations as well as for technical educational institutions.Students and administrative personnel have the opportunity to quickly and economically access various application platforms and resources through the web pages on-demand.Application of storage technology can significantly reduce the amount of cloud storage servers, thereby reducing system development costs, reduce the system caused by the server a single point of failure. Cloud storage services meet this demand by providing transparent and reliable storage solutions.In this paper shows that the cloud computing plays an important role in the fields of Technical Educational Institutions and Online.The research study shows that the cloud platform is valued for both students and instructors to achieve the course objective and the nature, benefits and cloud computing services, as a platform for Educational environment and online.

  5. Analysis on Issues with Related to the Terms of Service Regarding Web Disk under Cloud Storage Surroundings%云存储环境下网络存储服务条款问题分析

    Institute of Scientific and Technical Information of China (English)

    韩元牧; 吴莉娟

    2013-01-01

    网络技术以及SaaS 行业的发展给网络存储模式注入了新的力量,网盘公司雨后春笋般地发展速度表明云存储大大促进了网盘服务的发展。不过,在行业发展的同时,法律服务也应当与时俱进,成为行业发展的有力保障,否则,混乱的市场竞争环境下,一方面是抢夺客户的需求,一方面是用户无奈地抉择,这将严重阻碍行业的进步。无论对服务提供者而言,还是普通用户而言,合法、清洁、安全、稳定的环境是行业能够稳定发展的基础,法律服务的保障也应当成为行业发展的开路先锋。本文通过对国内外多家网盘服务公司服务条款的汇总、分析、整理,针对“用户上传内容的归属问题以及服务商使用内容的约定”、“关于著作权条款的约定的设置”、“网盘服是否务应当负有高于避风港原则的注意义务”、“云存储下的信息安全问题”的探讨,试图为云存储的服务条款设置提供一定的总结和建议,希望能够为云存储行业积极健康的发展提供一些法律方面的帮助。%The development of internet technology and the industry of Saas have brought new energy to the mode of web storage .The rapid development of va-rious web disk companies has demonstrated that the web disk service has been greatly promoted by the cloud storage .However , it is well worth noting that while the industry is developing greatly , the relevant law issues should also be taken in to account , providing legal guarantee to the industry .Otherwise , under a chaotic market competition environment , both the requirement of struggling for users and the choice without alternation will at last severely hinder the progress of the indus -try.A legitimate, clean, safe and stable environment is the preliminary base for the sustainable development of the industry both from the aspect of the service pro -viders and the aspect of the common

  6. Exertional Myopathy in a Juvenile Green Sea Turtle (Chelonia mydas Entangled in a Large Mesh Gillnet

    Directory of Open Access Journals (Sweden)

    Brianne E. Phillips

    2015-01-01

    Full Text Available A juvenile female green sea turtle (Chelonia mydas was found entangled in a large mesh gillnet in Pamlico Sound, NC, and was weak upon presentation for treatment. Blood gas analysis revealed severe metabolic acidosis and hyperlactatemia. Plasma biochemistry analysis showed elevated aspartate aminotransferase and creatine kinase, marked hypercalcemia, hyperphosphatemia, and hyperkalemia. Death occurred within 24 hours of presentation despite treatment with intravenous and subcutaneous fluids and sodium bicarbonate. Necropsy revealed multifocal to diffuse pallor of the superficial and deep pectoral muscles. Mild, multifocal, and acute myofiber necrosis was identified by histopathological examination. While histological changes in the examined muscle were modest, the acid-base, mineral, and electrolyte abnormalities were sufficiently severe to contribute to this animal’s mortality. Exertional myopathy in reptiles has not been well characterized. Sea turtle mortality resulting from forced submergence has been attributed to blood gas derangements and seawater aspiration; however, exertional myopathy may also be an important contributing factor. If possible, sea turtles subjected to incidental capture and entanglement that exhibit weakness or dull mentation should be clinically evaluated prior to release to minimize the risk of delayed mortality. Treatment with appropriate fluid therapy and supportive care may mitigate the effects of exertional myopathy in some cases.

  7. Green turtle (Chelonia mydas) genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil

    Science.gov (United States)

    Jordão, Juliana Costa; Bondioli, Ana Cristina Vigliar; Guebert, Flavia Maria; de Thoisy, Benoit; Toledo, Lurdes Foresti de Almeida

    2015-01-01

    Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs), where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas) at the Paranaguá Estuarine Complex (PEC), Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60), and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20–25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations. PMID:26500439

  8. Migrations of green turtles (Chelonia mydas) between nesting and foraging grounds across the Coral Sea.

    Science.gov (United States)

    Read, Tyffen C; Wantiez, Laurent; Werry, Jonathan M; Farman, Richard; Petro, George; Limpus, Colin J

    2014-01-01

    Marine megafauna tend to migrate vast distances, often crossing national borders and pose a significant challenge to managers. This challenge is particularly acute in the Pacific, which contains numerous small island nations and thousands of kilometers of continental margins. The green sea turtle, Chelonia mydas, is one such megafauna that is endangered in Pacific waters due to the overexploitation of eggs and adults for human consumption. Data from long-term tagging programs in Queensland (Australia) and New Caledonia were analysed to investigate the migrations by C. mydas across the Coral Sea between their nesting site and their feeding grounds. A review of data collected over the last 50 years by different projects identified multiple migrations of C. mydas to and from New Caledonia (n = 97) and indicate that turtles foraging in New Caledonia nest in the Great Barrier Reef (Australia) and vice versa. Several explanations exist for turtles exhibiting this energetically costly movement pattern from breeding to distant foraging grounds (1200-2680 km away) despite viable foraging habitat being available in the local vicinity. These include hatchling drift, oceanic movements and food abundance predictability. Most of the tag recoveries in New Caledonia belonged to females from the south Great Barrier Reef genetic stock. Some females (n = 2) even showed fidelity to foraging sites located 1200 km away from the nesting site located in New Caledonia. This study also reveals previously unknown migrations pathways of turtles within the Coral Sea.

  9. Bacteremia in free-ranging Hawaiian green turtles, Chelonia mydas, with fibropapillomatosis

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Wolcott, M.; Morris, Robert

    2003-01-01

    Past studies of free-ranging green turtles Chelonia mydas with fibropapillomatosis (FP) in Hawaii have shown that animals become immunosuppressed with increasing severity of this disease. Additionally, preliminary clinical examination of moribund turtles with FP revealed that some animals were also bacteraemic. We tested the hypothesis that bacteraemia in sea turtles is associated with the severity of FP. We captured free-ranging green turtles from areas in Hawaii where FP is absent, and areas where FP has been endemic since the late 1950s. Each turtle was given an FP severity score ranging from 0 (no tumours) to 3 (severely affected). A fifth category included turtles that were stranded ashore and moribund with FP. We found that the percentage of turtles with bacteraemia increased with the severity of FP, and that the majority of bacteria cultured were Vibrio spp. Turtles with severe FP were more susceptible to bactaeremia, probably in part due to immunosuppression. The pattern of bacteraemia in relation to severity of disease strengthens the hypothesis that immunosuppression is a sequel to FP.

  10. Bacteraemia in free-ranging Hawaiian green turtles Chelonia mydas with fibropapillomatosis.

    Science.gov (United States)

    Work, Thierry M; Balazs, George H; Wolcott, Mark; Morris, Robert

    2003-01-22

    Past studies of free-ranging green turtles Chelonia mydas with fibropapillomatosis (FP) in Hawaii have shown that animals become immunosuppressed with increasing severity of this disease. Additionally, preliminary clinical examination of moribund turtles with FP revealed that some animals were also bacteraemic. We tested the hypothesis that bacteraemia in sea turtles is associated with the severity of FP. We captured free-ranging green turtles from areas in Hawaii where FP is absent, and areas where FP has been endemic since the late 1950s. Each turtle was given an FP severity score ranging from 0 (no tumours) to 3 (severely affected). A fifth category included turtles that were stranded ashore and moribund with FP. We found that the percentage of turtles with bacteraemia increased with the severity of FP, and that the majority of bacteria cultured were Vibrio spp. Turtles with severe FP were more susceptible to bactaeremia, probably in part due to immunosuppression. The pattern of bacteraemia in relation to severity of disease strengthens the hypothesis that immunosuppression is a sequel to FP.

  11. Fibropapillomatosis in green turtles Chelonia mydas in Brazil: characteristics of tumors and virus.

    Science.gov (United States)

    Rodenbusch, C R; Baptistotte, C; Werneck, M R; Pires, T T; Melo, M T D; de Ataíde, M W; Testa, P; Alieve, M M; Canal, C W

    2014-10-16

    Fibropapillomatosis (FP) is a benign neoplasia that affects physiological functions of sea turtles and may lead to death. High prevalence of FP in sea turtle populations has prompted several research groups to study the disease and the associated herpesvirus, chelonid herpesvirus 5 (ChHV5). The present study detected and quantified ChHV5 in 153 fibropapilloma samples collected from green turtles Chelonia mydas on the Brazilian coast between 2009 and 2010 to characterize the relationship between viral load and tumor characteristics. Of the tumor samples collected, 73 and 87% were positive for ChHV5 in conventional PCR and real-time PCR, respectively, and viral loads ranged between 1 and 118.62 copies cell⁻¹. Thirty-three percent of turtles were mildly, 28% were moderately and 39% were severely affected with FP. Skin samples were used as negative control. High viral loads correlated positively with increasing FP severity in turtles sampled on the Brazilian coast and with samples from turtles found dead in the states of São Paulo and Bahia. Six viral variants were detected in tumor samples, 4 of which were similar to the Atlantic phylogenetic group. Two variants were similar to the western Atlantic/eastern Caribbean phylogenetic group. Co-infection in turtles with more than one variant was observed in the states of São Paulo and Bahia.

  12. First Record of Fibropapillomatosis in a Green Turtle Chelonia mydas from the Baja California Peninsula.

    Science.gov (United States)

    Reséndiz, Eduardo; Flores-Ramírez, Sergio; Koch, Volker; Cordero-Tapia, Amaury

    2016-12-01

    Fibropapillomatosis (FP) is characterized by multiple fibroepithelial tumors in all parts of the skin and has been reported in sea turtles worldwide. Clinically infected individuals are often emaciated and anemic. In Mexico, however, there are few records of this disease. In this study of green turtles Chelonia mydas in Laguna San Ignacio in Baja California Sur (BCS), we noted one juvenile with multifocal fibropapilloma lesions on the external upper surface of its eyes and hind flippers. Light microscopy revealed hyperkeratosis, epidermal hyperplasia, dermal papillary projections, and fibroblast proliferation. Electron microscopy revealed viral particles. Biopsies of normal skin were done to determine the origin of the turtle through genetic analysis. Its mitochondrial DNA matched that of a haplotype (CMP2) from a Hawaiian green turtle population. Finding FP in a turtle captured in BCS elucidates the need for further monitoring along the west coast of Mexico. Further investigation should include testing tumors to detect and characterize any chelonid herpesviruses and explore any association with FP and other diseases that pose a health risk to other sea turtle species. Received March 26, 2016; accepted August 3, 2016.

  13. Epizootiology of spirorchid infection in green turtles (Chelonia mydas) in Hawaii

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Schumacher, Jody L.; Marie, A.

    2005-01-01

    We describe the epizootiology of spirorchiid trematode infections in Hawaiian green turtles (Chelonia mydas) by quantifying tissue egg burdens in turtles submitted for necropsy and by assessing antibody response to crude adult worm and egg antigens among a variety of age groups. Hapalotrema sp. and Laeredius sp. predominated in turtles infected with spirorchiids. Tissue egg burdens decreased with increasing size and increased with deteriorating body condition of turtles. No relationship was found between tissue egg burdens and sex or fibropapillomatosis status. Tissue egg burdens increased in turtles from southeast to northwest in the main Hawaiian Islands (Hawaii to Kauai). Hatchling and captive-reared turtles had significantly lower levels of antibodies against crude worm and egg antigens. Based on tissue egg burdens and antibody status, we hypothesize that immature turtles become infected with spirorchiids shortly after recruiting into coastal foraging pastures from the pelagic environment, that infection levels decrease with age, and that spirorchiids detrimentally affect the body condition of sea turtles independent of tumor burden. The low intensity of infection in turtles with the endemic trematode Carettacola hawaiiensis suggests either that turtles are less susceptible to infection with this parasite or that the parasite is outcompeted by species of Hapalotrema and Laeredius. Given that the 2 latter species are found in the Pacific and other oceans, they are not likely endemic and were probably introduced into Hawaii through an undetermined route.

  14. Inorganic elements in green sea turtles (Chelonia mydas): relationships among external and internal tissues

    Science.gov (United States)

    Faust, Derek R.; Hooper, Michael J.; Cobb, George P.; Barnes, Melanie; Shaver, Donna; Ertolacci, Shauna; Smith, Philip N.

    2014-01-01

    Inorganic elements from anthropogenic sources have entered marine environments worldwide and are detectable in marine organisms, including sea turtles. Threatened and endangered classifications of sea turtles have heretofore made assessments of contaminant concentrations difficult because of regulatory restrictions on obtaining samples using nonlethal techniques. In the present study, claw and skin biopsy samples were examined as potential indicators of internal tissue burdens in green sea turtles (Chelonia mydas). Significant relationships were observed between claw and liver, and claw and muscle concentrations of mercury, nickel, arsenic, and selenium (p biopsy concentrations and those in liver, kidney, and muscle tissues for mercury, arsenic, selenium, and vanadium (p biopsies were substantially elevated when compared with all other tissues, indicating that these highly keratinized tissues may represent sequestration or excretion pathways. Correlations between standard carapace length and cobalt, lead, and manganese concentrations were observed (p liver and muscle tissues, whereas skin biopsy inorganic element concentrations may be better suited as indicators of mercury, selenium, and vanadium concentrations in liver, kidney, and muscle tissues of green sea turtles.

  15. Structure and Function of the Gastrointestinal Tract of the Green Turtle (Chelonia mydas) Hatchling

    Institute of Scientific and Technical Information of China (English)

    Hualing CHEN; Mingbin YE; Yuyan LU; Jinxia DUAN; Pipeng LI; Hexiang GU

    2015-01-01

    The gastrointestinal tracts of four Chelonia mydas hatchlings were examined at the anatomical, histological and ultrastructural level. Our results show that the gastrointestinal tract (GI) is composed by esophagus, stomach, small intestine (SI) and large intestine (LI), and histologically of mucosa, submucosa, muscularis externa (ME) and serosa. The esophagus is marked by conical papillae lined by keratinized stratified squamous epithelium, whereas the remaining GI by simple columnar epithelium; esophageal diverticulum is absent. The stomach covered with mucous granule cells, contains cardia, fundic regions and pylorus, which are separately characterized by cardiac glands, fundic glands and pyloric glands, and have the thickest submucosa and ME of the GI. The ME of the esophagus mainly consist of one layer of circular smooth muscle whereas the rest of GI of two layers, inner circular muscle and outer longitudinal muscle. The SI is slightly longer than the LI and the GI is approximately 5.11 times of the carapace length. The SI is lined with longitudinal zigzag folds and characterized by absorptive cells with longer and denser microvilli, whereas the LI by transversal folds, goblet cells and lymphoid nodules. Only intestinal glands appear in duodenum. Endocrine cells are observed in all sections of the GI and accounted for the largest proportion in duodenum. The results demonstrate a perfect combination of the structure and function of the GI and reveal that the digestion and absorption primarily occurs in the foregut. C. mydas hatchling may prefer carnivorous diet.

  16. Green turtle (Chelonia mydas genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil

    Directory of Open Access Journals (Sweden)

    Juliana Costa Jordão

    2015-09-01

    Full Text Available Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs, where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas at the Paranaguá Estuarine Complex (PEC, Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60, and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20–25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations.

  17. Migrations of green turtles (Chelonia mydas between nesting and foraging grounds across the Coral Sea.

    Directory of Open Access Journals (Sweden)

    Tyffen C Read

    Full Text Available Marine megafauna tend to migrate vast distances, often crossing national borders and pose a significant challenge to managers. This challenge is particularly acute in the Pacific, which contains numerous small island nations and thousands of kilometers of continental margins. The green sea turtle, Chelonia mydas, is one such megafauna that is endangered in Pacific waters due to the overexploitation of eggs and adults for human consumption. Data from long-term tagging programs in Queensland (Australia and New Caledonia were analysed to investigate the migrations by C. mydas across the Coral Sea between their nesting site and their feeding grounds. A review of data collected over the last 50 years by different projects identified multiple migrations of C. mydas to and from New Caledonia (n = 97 and indicate that turtles foraging in New Caledonia nest in the Great Barrier Reef (Australia and vice versa. Several explanations exist for turtles exhibiting this energetically costly movement pattern from breeding to distant foraging grounds (1200-2680 km away despite viable foraging habitat being available in the local vicinity. These include hatchling drift, oceanic movements and food abundance predictability. Most of the tag recoveries in New Caledonia belonged to females from the south Great Barrier Reef genetic stock. Some females (n = 2 even showed fidelity to foraging sites located 1200 km away from the nesting site located in New Caledonia. This study also reveals previously unknown migrations pathways of turtles within the Coral Sea.

  18. Evidence for retrovirus infections in green turtles Chelonia mydas from the Hawaiian islands

    Science.gov (United States)

    Casey, R.N.; Quackenbush, S.L.; Work, T.M.; Balazs, G.H.; Bowser, P.R.; Casey, J.W.

    1997-01-01

    Apparently normal Hawaiian green turtles Chelonia mydas and those displaying fibropapillomas were analyzed for infection by retroviruses. Strikingly, all samples were positive for polymerase enhanced reverse transcriptase (PERT) with levels high enough to quantitate by the conventional reverse transcriptase (RT) assay. However, samples of skin, even from asymptomatic turtles, were RT positive, although the levels of enzyme activity in healthy turtles hatched and raised in captivity were much lower than those observed in asymptomatic free-ranging turtles. Turtles with fibropapillomas displayed a broad range of reverse transcriptase activity. Skin and eye fibropapillomas and a heart tumor were further analyzed and shown to have reverse transcriptase activity that banded in a sucrose gradient at 1.17 g ml-1. The reverse transcriptase activity purified from the heart tumor displayed a temperature optimum of 37??C and showed a preference for Mn2+ over Mg2+. Sucrose gradient fractions of this sample displaying elevated reverse transcriptase activity contained primarily retrovitalsized particles with prominent envelope spikes, when negatively stained and examined by electron microscopy. Sodium dodecylsulfate-polyacrylamide gel electrophoresis (SDS-PAGE) analysis of gradient-purified virions revealed a conserved profile among 4 independent tumors and showed 7 prominent proteins having molecular weights of 116, 83, 51, 43, 40, 20 and 14 kDa. The data suggest that retroviral infections are widespread in Hawaiian green turtles and a comprehensive investigation is warranted to address the possibility that these agents cause green turtle fibropapillomatosis (GTFP).

  19. KARAKTERISTIK FISIK PENELURAN CHELONIA MYDAS, LINN. 1758 DI KAIMANA-PAPUA BARAT

    Directory of Open Access Journals (Sweden)

    Zeth Parinding

    2015-04-01

    Full Text Available Venu Island Wildlife areas, Kaimana-West Papua is one of the places for nesting of Chelonia mydas, Linn. 1758/Green Turtles/Jelepi. Thus, This study was conducted to identify the physical characteristics of Jelepi nesting in the Venu Island Wildlife areas, Kaimana-West Papua. Based on the analysis of the main components bi-plot of the physical characteristics of the main factors were found nesting and landing Jelepi, among others: Temperature sand at depth ≤30 cm (X ̅=27.42 C ± stdev 0,47 C, lighting at 11.0013.00 (X ̅=229.25lux ± stdev 326.50lux, building areas (X ̅=3.18 m2 ± stdev 16,74 m2, medium sand fraction in depth ≤30 cm (X ̅=39.86 ± stdev 16.11, and the number of holes nesting Jelepi (X ̅=1.52 nest ± stdev 1.12 nest.

  20. Green turtle (Chelonia mydas) genetic diversity at Paranaguá Estuarine Complex feeding grounds in Brazil.

    Science.gov (United States)

    Jordão, Juliana Costa; Bondioli, Ana Cristina Vigliar; Guebert, Flavia Maria; de Thoisy, Benoit; Toledo, Lurdes Foresti de Almeida

    2015-01-01

    Sea turtles are marine reptiles that undertake long migrations through their life, with limited information regarding juvenile stages. Feeding grounds (FGs), where they spend most of their lives, are composed by individuals from different natal origins, known as mixed stock populations. The aim of this study was to assess genetic composition, natal origins and demographic history of juvenile green turtles (Chelonia mydas) at the Paranaguá Estuarine Complex (PEC), Brazil, considered a Natural World Heritage site. Tissue samples of stranded animals were collected (n = 60), and 700 bp mitochondrial DNA sequences were generated and compared to shorter sequences from previously published studies. Global exact tests of differentiation revealed significant differences among PEC and the other FGs, except those at the South Atlantic Ocean. Green turtles at PEC present genetic signatures similar to those of nesting females from Ascension Island, Guinea Bissau and Aves Island/Surinam. Population expansion was evidenced to have occurred 20-25 kYA, reinforcing the hypothesis of recovery from Southern Atlantic refugia after the last Glacial Maximum. These results contribute to a better understanding of the dynamics of green turtle populations at a protected area by providing knowledge on the dispersion patterns and reinforcing the importance of the interconnectivity between nesting and foraging populations.

  1. Morbidity in a juvenile green sea turtle (Chelonia mydas) due to ocean-borne plastic.

    Science.gov (United States)

    Stamper, M Andrew; Spicer, Chad W; Neiffer, Donald L; Mathews, Kristin S; Fleming, Gregory J

    2009-03-01

    An emaciated 2.36-kg juvenile green sea turtle, Chelonia mydas, was found floating off of Melbourne Beach, Florida, USA (28 degrees 2'4"N, 80 degrees 32'32"W). The turtle exhibited signs of cachexia, positive buoyancy, lethargy, and obstipation; was covered with barnacles; and was anorexic at the time of presentation. Dorsal-ventral radiographs with positive contrast confirmed obstruction of the gastrointestinal tract. Serum chemistry abnormalities reflected metabolic/nutritional deficiencies. Gastrointestinal prokinetics and oral/enema mineral oil applications were effective in relieving gastrointestinal obstruction with the turtle defecating a total of 74 foreign objects over a period of a month. After the removal of the foreign material, the turtle quickly regained normal behavior and health. The lack of blood parameters demonstrating infection or inflammation; the failure to respond to antibiotic and antifungal treatment as well as the parallel improvement in behavior and health after incremental evacuation of the plastic is highly suggestive of a cause and effect association.

  2. Histology and Immunohistochemistry of the Cardiac Ventricular Structure in the Green Turtle (Chelonia mydas).

    Science.gov (United States)

    Braz, J K F S; Freitas, M L; Magalhães, M S; Oliveira, M F; Costa, M S M O; Resende, N S; Clebis, N K; Silva, N B; Moura, C E B

    2016-08-01

    This study describes the implications of cardiac ventricular microscopy in Chelonia mydas relating to its ability to dive. For this work, 11 specimens of the marine turtle species C. mydas found dead on the coast of Rio Grande do Norte (Northeast Brazil) were used. After necropsy, fragments of the cardiac ventricular wall were fixed in 10% buffered formaldehyde solution for 24 h and then subjected to routine processing for light and scanning electron microscopy (SEM). The ventricle in this species is formed by the epicardium, myocardium and endocardium. The subepicardial layer consists of highly vascularised connective tissue that emits septa to reinforce the myocardium surface. There is an abundant and diffuse subepicardial nerve plexus shown by immunostaining technique. The thickness of the spongy myocardium and the nature of its trabeculae varied between the heart chambers. The endocardium shows no characteristic elements of the heart conduction system. The valves have a hyaline cartilage skeleton, coated by dense irregular connective tissues characterised by elastic fibres. These findings in the green turtle ventricular microscopy are related to hypoxia resistance during diving.

  3. Relating fibropapilloma tumor severity to blood parameters in green turtles Chelonia mydas.

    Science.gov (United States)

    Hirama, Shigetomo; Ehrhart, Llewellyn M; Rea, Lorrie D; Kiltie, Richard A

    2014-08-21

    Fibropapillomatosis is a neoplastic disease that is commonly found in the green turtles Chelonia mydas in tropical and subtropical regions of the world. In the current project, juvenile green turtles were captured with large-mesh tangle nets in the Indian River Lagoon and on nearshore reefs of Indian River County, Florida, USA, in 1998 and 1999. The purpose of the study was to determine the relationship between the severity of the disease and the general health of green turtles as indicated by blood parameters. All turtles were measured and examined, and the overall severity of the disease was rated by the size, number, and location of external fibropapilloma tumors. Hematocrit, total protein, and hemoglobin concentration were measured and compared with tumor scores (tumor severity appraisal). As the tumor score increased, the blood parameters of turtles decreased; for instance, the percentage of decrease in hematocrit for mildly afflicted, moderately afflicted, and severely afflicted groups were 2.6, 18.3, and 45.5%, respectively. Severely afflicted turtles suffered from anemia, while individuals with mild affliction did not.

  4. Establishment and characterization of 13 cell lines from a green turtle (Chelonia mydas) with fibropapillomas

    Science.gov (United States)

    Lu, Y.; Nerurkar, V.R.; Aguirre, A.A.; Work, T.M.; Balazs, G.H.; Yanagihara, R.

    1999-01-01

    Thirteen cell lines were established and characterized from brain, kidney, lung, spleen, heart, liver, gall bladder, urinary bladder, pancreas, testis, skin, and periorbital and tumor tissues of an immature male green turtle (Chelonia mydas) with fibropapillomas. Cell lines were optimally maintained at 30A? C in RPMI 1640 medium supplemented with 10% fetal bovine serum. Propagation of the turtle cell lines was serum dependent, and plating efficiencies ranged from 13 to 37%. The cell lines, which have been subcultivated more than 20 times, had a doubling time of approximately 30 to 36 h. When tested for their sensitivity to several fish viruses, most of the cell lines were susceptible to a rhabdovirus, spring viremia carp virus, but refractory to channel catfish virus (a herpesvirus), infectious pancreatic necrosis virus (a birnavirus), and two other fish rhabdoviruses, infectious hematopoietic necrosis virus and viral hemorrhagic septicemia virus. During in vitro subcultivation, tumor-like cell aggregates appeared in cell lines derived from lungs, testis, and periorbital and tumor tissues, and small, naked intranuclear virus particles were detected by thin-section electron microscopy. These cell lines are currently being used in attempts to isolate the putative etiologic virus of green turtle fibropapilloma.

  5. Antarctic clouds

    OpenAIRE

    Lachlan-Cope, Tom

    2010-01-01

    Sensitivity studies with global climate models show that, by their influence on the radiation balance, Antarctic clouds play a major role in the climate system, both directly at high southern latitudes and indirectly globally, as the local circulation changes lead to global teleconnections. Unfortunately, observations of cloud distribution in the Antarctic are limited and often of low quality because of the practical difficulty in observing clouds in the harsh Antarctic environment. The best ...

  6. Design of Cloud Storage about Enterprise Human Resources Information Platform based on NoSQL%基于NoSQL的企业人力资源信息云平台存储方案设计

    Institute of Scientific and Technical Information of China (English)

    姚远

    2014-01-01

    全球信息化时代的来临,带动了社交网络与电子商务的快速发展,使企业逐渐进入全球化市场,而人力资源管理已经成为制约企业发展的瓶颈问题。本文分析了企业在招聘人才时所遇到的困难,建议企业建立自己的人才资源数据库,重点分析了云平台的存储海量数据问题,以非关系型数据库HBase配合开源的分布式框架Hadoop来存储管理企业搜集的海量的各种类型的人才信息数据,适应每天剧增的数据资源。%With theglobal information age coming,enterprises gradually join into the global market driven by the rapid development of social networking and e-commerce,while human resources management has become the bottleneck problem restricting the development of enterprises.This paper analyzes difficulties enterprises encountered in the recruitment of personnel,it advise to establish a database resource proposals of their own enterprises,focuses on the analysis of the mass data storage problem of cloud platform,personnel information data of various types of storage management enterprise search to non relational database HBase with Hadoop distributed framework of open source mass to meet everyday data resource.

  7. A Distributed Mass Data Storage Strategy Based on Cloud Computing%一种基于云计算的海量数据分布式存储策略

    Institute of Scientific and Technical Information of China (English)

    左晓静; 王荣

    2015-01-01

    基于云计算的存储系统,大都采用分布式存储。为了保证数据的完整性和一致性,增强数据的可靠性和可用性。通过划分服务区域、各服务区域内实行多层服务器集群的策略使用户无论何时、何地以何种方式都能高效、正确、完整地访问到所需数据。并根据数据需求量解决了数据副本数量的问题。与GFS分布式文件系统相比较,该策略思路清晰、实现简单。经仿真实验测试在数据访问、更新、删除及数据多版本方面有明显优点。%This specification is set for the theses to be published in Computer Applications and Software, including fonts,margins,page size and print area. Storage system based on cloud computing,mostly adopts the distributed storage. In order to ensure the integrity and consistency of data,enhance the reliability and availability of the data. By dividing the service area,service area to implement multi tier server cluster strategy users regardless of when,where and in what way can be efficient,correct and complete access to data. According to the data demand to solve the data copy number problem. Compared with the GFS distributed file system,the strategy of clear thinking, simple realization. There are obvious advantages in the simulation experiment test of data access ,update,delete and multi version data.

  8. Cloud Computing

    CERN Document Server

    Antonopoulos, Nick

    2010-01-01

    Cloud computing has recently emerged as a subject of substantial industrial and academic interest, though its meaning and scope is hotly debated. For some researchers, clouds are a natural evolution towards the full commercialisation of grid systems, while others dismiss the term as a mere re-branding of existing pay-per-use technologies. From either perspective, 'cloud' is now the label of choice for accountable pay-per-use access to third party applications and computational resources on a massive scale. Clouds support patterns of less predictable resource use for applications and services a

  9. 一种基于分布式开放资源管理服务的“云存储”(ppStore)方案研究%STUDY ON CLOUD STORAGE SCHEME BASED ON DISTRIBUTED OPEN SOURCE MANAGEMENT SERVICE (ppStore)

    Institute of Scientific and Technical Information of China (English)

    李建国; 袁平鹏

    2011-01-01

    云存储技术因其能为用户提供安全、海量、随时随地的数据存储功能而得以快速发展.提出利用网络上现存的自然分布于世界各地的大量免费存储服务,如网盘、ftp、email以及其他形式等存储空间,将这些服务集中起来,为用户提供价廉、可靠的存储系统.介绍一种低开销、快速度、高可用、可扩展的云存储拓扑系统,以期在该拓扑架构下买现以文件存储和共享服务为基础,不断扩展其他功能,最终形成一个分布式存储资源共享社区的目的.%Cloud storage technology, due to its secure, mass data convenient data storage, function that is provided to customers, has got very rapid development. The thesis suggests to take advantage of the great number of free storage services that are naturally allocated over the network around the world at present, for example, netdisk, ftp, email as well as storage spaces in other forms, then aggregate all of them to provide customers with cheap and reliable storage systems. The thesis introduces a low cost, high speed, high available and expandable cloud storage topological system, so that the purpose can be realized, under such a topological architecture, based on file storage and sharing service, to continuously explore other functions and finally form a distributed storage resources sharing community.

  10. Managing Clouds in Cloud Platforms

    CERN Document Server

    Ahmat, Kamal A

    2010-01-01

    Managing cloud services is a fundamental challenge in todays virtualized environments. These challenges equally face both providers and consumers of cloud services. The issue becomes even more challenging in virtualized environments that support mobile clouds. Cloud computing platforms such as Amazon EC2 provide customers with flexible, on demand resources at low cost. However, they fail to provide seamless infrastructure management and monitoring capabilities that many customers may need. For instance, Amazon EC2 doesn't fully support cloud services automated discovery and it requires a private set of authentication credentials. Salesforce.com, on the other hand, do not provide monitoring access to their underlying systems. Moreover, these systems fail to provide infrastructure monitoring of heterogenous and legacy systems that don't support agents. In this work, we explore how to build a cloud management system that combines heterogeneous management of virtual resources with comprehensive management of phys...

  11. Hatchling sex ratio, body weight and nest parameters for Chelonia mydas nesting on Sugözü beaches (Turkey

    Directory of Open Access Journals (Sweden)

    Kılıç, Ç.

    2014-12-01

    Full Text Available We investigated the relationship between nest parameters, hatchling body mass, and sex ratio of green turtle, Chelonia mydas, embryos and hatchlings at the temperate nesting rookery of Sugözü Beach (Adana–Turkey. Mean nest temperature and distance from the sea were correlated, while mean nest temperature and incubation period were inversely related. There was no apparent relationship between incubation period and hatchling mass. Hatchling and embryo sex ratios, determined by histological examination, showed a 70.5% and 93.5% female bias, respectively. There was no correlation between sex and body weight of hatchlings,

  12. Secure Architectures in the Cloud

    NARCIS (Netherlands)

    De Capitani di Vimercati, Sabrina; Pieters, Wolter; Probst, Christian W.

    2011-01-01

    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud”. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces th

  13. Cloud Computing

    CERN Document Server

    Mirashe, Shivaji P

    2010-01-01

    Computing as you know it is about to change, your applications and documents are going to move from the desktop into the cloud. I'm talking about cloud computing, where applications and files are hosted on a "cloud" consisting of thousands of computers and servers, all linked together and accessible via the Internet. With cloud computing, everything you do is now web based instead of being desktop based. You can access all your programs and documents from any computer that's connected to the Internet. How will cloud computing change the way you work? For one thing, you're no longer tied to a single computer. You can take your work anywhere because it's always accessible via the web. In addition, cloud computing facilitates group collaboration, as all group members can access the same programs and documents from wherever they happen to be located. Cloud computing might sound far-fetched, but chances are you're already using some cloud applications. If you're using a web-based email program, such as Gmail or Ho...

  14. Energy Storage.

    Science.gov (United States)

    Eaton, William W.

    Described are technological considerations affecting storage of energy, particularly electrical energy. The background and present status of energy storage by batteries, water storage, compressed air storage, flywheels, magnetic storage, hydrogen storage, and thermal storage are discussed followed by a review of development trends. Included are…

  15. Learedius learedi Price 1934 (Digenea, Spirorchiidae in Chelonia mydas Linnaeus 1758 (Testudines, Chelonidae in Brazil: case report Learedius learedi Price 1934 (Digenea, Spirorchiidae em Chelonia mydas Linnaeus 1758 (Testudines, Chelonidae no Brasil: relato de caso

    Directory of Open Access Journals (Sweden)

    M.R. Werneck

    2006-08-01

    Full Text Available This study reports the occurrence of Learedius learedi Price 1934 (Digenea, Spirorchiidae in Chelonia mydas Linnaeus 1758 (Testudines, Chelonidae in Brazil. Eleven animals were included in this study, 54.6 % of them were parasitized. Two hundred and fifty five parasite specimens were recovered from heart, liver, spleen, lungs, kidneys, mesenterium, and body wash. Results contribute to the knowledge about the helminthofauna of marine chelonian and their geographical distribution. This is the first report of L. learedi in the Southwestern Atlantic.Relata-se a ocorrência de Learedius learedi Price 1934 (Digenea, Spirorchiidae em Chelonia mydas Linnaeus 1758 (Testudines, Chelonidae no Brasil. Onze animais foram examinados e destes, 54,6% estavam parasitados. Duzentos e cinqüenta e cinco exemplares de L. learedi foram recuperados de órgãos (coração, fígado, baço, pulmões, rins, mesentério e do lavado corporal dos animais. Os resultados contribuem para o conhecimento da helmintofauna de quelônios marinhos e sua distribuição geográfica. Este é o primeiro registro da ocorrência de L. learedi na região do Atlântico Sul Ocidental.

  16. Parasitic Ulcerous Caseous Gastroesophagitis Associated with Rameshwarotrema uterocrescens Rao, 1975 (Digenea: Pronocephalidae) in a Juvenile Green Turtle [Chelonia mydas, Linnaeus 1758 (Testudines: Cheloniidae)]: A Case Report.

    Science.gov (United States)

    Ribeiro, Rachel B; Jerdy, Hassan; Wernek, Max R; Goldberg, Daphne W; Bianchi, Mariah; Carvalho, Eulà  Gio C Q

    2017-01-25

    Here we report a case of ulcerative caseous gastroesophagitis associated with Rameshwarotrema uterocrescens; Rao, 1975 (Digenea: Pronocephalidae) in a juvenile green turtle (Chelonia mydas) from Southern Brazil. Similar pathologies have been reported only in adult green turtles from Costa Rica. This paper presents the second report of parasitic esophagitis due R. uterocrescens and the first occurrence in juvenile green turtles along coastal Brazil.

  17. Population trends and survival of nesting green sea turtles Chelonia mydas on Aves Island, Venezuela

    Science.gov (United States)

    Garcia-Cruz, Marco A.; Lampo, Margarita; Peñaloza, Claudia L.; Kendall, William; Solé, Genaro; Rodriguez-Clark, Kathryn M.

    2015-01-01

    Long-term demographic data are valuable for assessing the effect of anthropogenic impacts on endangered species and evaluating recovery programs. Using a 2-state open robust design model, we analyzed mark-recapture data from green turtles Chelonia mydas sighted between 1979 and 2009 on Aves Island, Venezuela, a rookery heavily impacted by human activities before it was declared a wildlife refuge in 1972. Based on the encounter histories of 7689 nesting females, we estimated the abundance, annual survival, and remigration intervals for this population. Female survival varied from 0.14-0.91, with a mean of 0.79, which is low compared to survival of other populations from the Caribbean (mean = 0.84) and Australia (mean = 0.95), even though we partially corrected for tag loss, which is known to negatively bias survival estimates. This supports prior suggestions that Caribbean populations in general, and the Aves Island population in particular, may be more strongly impacted than populations elsewhere. It is likely that nesters from this rookery are extracted while foraging in remote feeding grounds where hunting still occurs. Despite its relatively low survival, the nesting population at Aves Island increased during the past 30 years from approx. 500 to >1000 nesting females in 2009. Thus, this population, like others in the Caribbean and the Atlantic, seems to be slowly recovering following protective management. Although these findings support the importance of long-term conservation programs aimed at protecting nesting grounds, they also highlight the need to extend management actions to foraging grounds where human activities may still impact green turtle populations.

  18. Factors influencing survivorship of rehabilitating green sea turtles (Chelonia mydas) with fibropapillomatosis.

    Science.gov (United States)

    Page-Karjian, Annie; Norton, Terry M; Krimer, Paula; Groner, Maya; Nelson, Steven E; Gottdenker, Nicole L

    2014-09-01

    Marine turtle fibropapillomatosis (FP) is a debilitating, infectious neoplastic disease that has reached epizootic proportions in several tropical and subtropical populations of green turtles (Chelonia mydas). FP represents an important health concern in sea turtle rehabilitation facilities. The objectives of this study were to describe the observed epidemiology, biology, and survival rates of turtles affected by FP (FP+ turtles) in a rehabilitation environment; to evaluate clinical parameters as predictors of survival in affected rehabilitating turtles; and to provide information about case progression scenarios and potential outcomes for FP+ sea turtle patients. A retrospective case series analysis was performed using the medical records of the Georgia Sea Turtle Center (GSTC), Jekyll Island, Georgia, USA, during 2009-2013. Information evaluated included signalment, morphometrics, presenting complaint, time to FP onset, tumor score (0-3), co-morbid conditions, diagnostic test results, therapeutic interventions, and case outcomes. Overall, FP was present in 27/362 (7.5%) of all sea turtles admitted to the GSTC for rehabilitation, either upon admittance or during their rehabilitation. Of these, 25 were green and 2 were Kemp's ridley turtles. Of 10 turtles that had only plaque-like FP lesions, 60% had natural tumor regression, all were released, and they were significantly more likely to survive than those with classic FP (P = 0.02 [0.27-0.75, 95% CI]). Turtles without ocular FP were eight times more likely to survive than those with ocular FP (odds ratio = 8.75, P = 0.032 [1.21-63.43, 95% CI]). Laser-mediated tumor removal surgery is the treatment of choice for FP+ patients at the GSTC; number of surgeries was not significantly related to case outcome.

  19. Blood gases, biochemistry, and hematology of Galapagos green turtles (Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Gregory A Lewbart

    Full Text Available The green turtle, Chelonia mydas, is an endangered marine chelonian with a circum-global distribution. Reference blood parameter intervals have been published for some chelonian species, but baseline hematology, biochemical, and blood gas values are lacking from the Galapagos sea turtles. Analyses were done on blood samples drawn from 28 green turtles captured in two foraging locations on San Cristóbal Island (14 from each site. Of these turtles, 20 were immature and of unknown sex; the other eight were males (five mature, three immature. A portable blood analyzer (iSTAT was used to obtain near immediate field results for pH, lactate, pO2, pCO2, HCO3-, Hct, Hb, Na, K, iCa, and Glu. Parameter values affected by temperature were corrected in two ways: (1 with standard formulas; and (2 with auto-corrections made by the iSTAT. The two methods yielded clinically equivalent results. Standard laboratory hematology techniques were employed for the red and white blood cell counts and the hematocrit determination, which was also compared to the hematocrit values generated by the iSTAT. Of all blood analytes, only lactate concentrations were positively correlated with body size. All other values showed no significant difference between the two sample locations nor were they correlated with body size or internal temperature. For hematocrit count, the iSTAT blood analyzer yielded results indistinguishable from those obtained with high-speed centrifugation. The values reported in this study provide baseline data that may be useful in comparisons among populations and in detecting changes in health status among Galapagos sea turtles. The findings might also be helpful in future efforts to demonstrate associations between specific biochemical parameters and disease.

  20. Blood gases, biochemistry, and hematology of Galapagos green turtles (Chelonia mydas).

    Science.gov (United States)

    Lewbart, Gregory A; Hirschfeld, Maximilian; Denkinger, Judith; Vasco, Karla; Guevara, Nataly; García, Juan; Muñoz, Juanpablo; Lohmann, Kenneth J

    2014-01-01

    The green turtle, Chelonia mydas, is an endangered marine chelonian with a circum-global distribution. Reference blood parameter intervals have been published for some chelonian species, but baseline hematology, biochemical, and blood gas values are lacking from the Galapagos sea turtles. Analyses were done on blood samples drawn from 28 green turtles captured in two foraging locations on San Cristóbal Island (14 from each site). Of these turtles, 20 were immature and of unknown sex; the other eight were males (five mature, three immature). A portable blood analyzer (iSTAT) was used to obtain near immediate field results for pH, lactate, pO2, pCO2, HCO3-, Hct, Hb, Na, K, iCa, and Glu. Parameter values affected by temperature were corrected in two ways: (1) with standard formulas; and (2) with auto-corrections made by the iSTAT. The two methods yielded clinically equivalent results. Standard laboratory hematology techniques were employed for the red and white blood cell counts and the hematocrit determination, which was also compared to the hematocrit values generated by the iSTAT. Of all blood analytes, only lactate concentrations were positively correlated with body size. All other values showed no significant difference between the two sample locations nor were they correlated with body size or internal temperature. For hematocrit count, the iSTAT blood analyzer yielded results indistinguishable from those obtained with high-speed centrifugation. The values reported in this study provide baseline data that may be useful in comparisons among populations and in detecting changes in health status among Galapagos sea turtles. The findings might also be helpful in future efforts to demonstrate associations between specific biochemical parameters and disease.

  1. Nesting phenology of marine turtles: insights from a regional comparative analysis on green turtle (Chelonia mydas.

    Directory of Open Access Journals (Sweden)

    Mayeul Dalleau

    Full Text Available Changes in phenology, the timing of seasonal activities, are among the most frequently observed responses to environmental disturbances and in marine species are known to occur in response to climate changes that directly affects ocean temperature, biogeochemical composition and sea level. We examined nesting seasonality data from long-term studies at 8 green turtle (Chelonia mydas rookeries that include 21 specific nesting sites in the South-West Indian Ocean (SWIO. We demonstrated that temperature drives patterns of nesting seasonality at the regional scale. We found a significant correlation between mean annual Sea Surface Temperature (SST and dates of peak nesting with rookeries exposed to higher SST having a delayed nesting peak. This supports the hypothesis that temperature is the main factor determining peak nesting dates. We also demonstrated a spatial synchrony in nesting activity amongst multiple rookeries in the northern part of the SWIO (Aldabra, Glorieuses, Mohéli, Mayotte but not with the eastern and southern rookeries (Europa, Tromelin, differences which could be attributed to females with sharply different adult foraging conditions. However, we did not detect a temporal trend in the nesting peak date over the study period or an inter-annual relation between nesting peak date and SST. The findings of our study provide a better understanding of the processes that drive marine species phenology. The findings will also help to predict their ability to cope with climate change and other environmental perturbations. Despite demonstrating this spatial shift in nesting phenology, no trend in the alteration of nesting dates over more than 20 years was found.

  2. Nesting ecology of Chelonia mydas (Testudines: Cheloniidae) on the Guanahacabibes Peninsula, Cuba.

    Science.gov (United States)

    Azanza Ricardo, Julia; Ibarra Martín, Maria E; González Sansón, Gaspar; Abreu Grobois, F Alberto; Eckert, Karen L; Espinosa López, Georgina; Oyama, Ken

    2013-12-01

    The nesting colony of green sea turtles (Chelonia mydas) at Guanahacabibes Peninsula Biosphere Reserve and National Park is one of the largest in the Cuban archipelago; however, little information about its nesting ecology is available. Temporal and spatial variation in nesting and reproductive success as well as morphometric characteristics of gravid females were used to ecologically characterize this colony. Nine beaches of the Southernmost coast of Guanahacabibes Peninsula were monitored for 14 years (1998-2012) to determine green turtle nesting activity, from May to September (peak nesting season in this area). Beach dimensions were measured to determine nest density using the length and the area. Afterward the beaches were divided in two categories, index and secondary. Females were measured and tagged to compare new tagged females (823) with returning tagged females (140). Remigration interval was also determined. Temporal variation was identified as the annual number of nesting emergences and oviposits per female, with apparent peaks in reproductive activity on a biennial cycle in the first six years followed by periods of annual increase in nest number (2003-2008) and periods of decreasing number of nests (2010-2012). We also found intra-seasonal variation with the highest nesting activity in July, particularly in the second half of the month. The peak emergence time was 22:00-02:00 hr. In terms of spatial variation, smaller beaches had the highest nest density and nesting was more frequent 6-9m from the high tide line, where hatchling production was maximized although hatchling success was high on average, above 80%. Morphometric analysis of females was made and newly tagged turtles were smaller on average than remigrants. Our results are only a first attempt at characterizing Guanahacabibes' populations but have great value for establishing conservation priorities within the context of national management plans, and for efficient monitoring and protection

  3. Optimal-rearing density for head-starting green turtles (Chelonia mydas Linnaeus, 1758).

    Science.gov (United States)

    Kanghae, Hirun; Thongprajukaew, Karun; Jatupornpitukchat, Sasiporn; Kittiwattanawong, Kongkiat

    2016-09-01

    While ex situ conservation programs of juvenile green turtles (Chelonia mydas Linnaeus, 1758), before release to natural habitats, have been conducted in several countries, the optimal-stocking density for husbandry has not yet been reported. The optimization of stocking density was the main purpose of this study. The 15-day-old post-hatching turtles (29.30 ± 0.05 g body weight) were reared in round fiberglass tanks at various stocking densities including 20 turtles/m(3) (20TM), 40 turtles/m(3) (40TM), 60 turtles/m(3) (60TM), and 80 turtles/m(3) (80TM), over an 8-week trial. Water quality, survival, growth performance, feed utilization, aggressive behavior, fecal digestive enzymes, and hematological parameters were compared between the treatments, and were used as indicators of a successful captive rearing program. The water quality across the four treatments was in the standard range, but a high-stocking density reduced the quality significantly. No mortality was observed in any treatment group. Superior growth and feed utilization were only observed with the 40TM treatment, relative to the others (P < 0.05). The turtles in this group had no aggressive behavior, as indicated by observing hind limb biting. This treatment manipulated the level of proteolytic activity of pepsin and trypsin in response to density stressor, but not amylase, lipase, and chymotrypsin. The 40TM treatment also maintained the hematological characteristics, indicating no negative effects on health status. Overall, the findings indicate that the captivity program of post-hatching turtles at 40 turtles/m(3) is the preferred option in their head-started propagation, as well as in public displays in zoos or aquaria. Zoo Biol. 35:454-461, 2016. © Wiley Periodicals, Inc.

  4. Biochemical indices as correlates of recent growth in juvenile green turtles (Chelonia mydas).

    Science.gov (United States)

    Roark, Alison M; Bjorndal, Karen A; Bolten, Alan B; Leeuwenburgh, Christiaan

    2009-08-15

    Nucleic acid and protein concentrations and their ratios are increasingly used as correlates of nutritional condition and growth in marine species. However, their application in studies of reptile growth has not yet been validated. The green turtle (Chelonia mydas) is an endangered marine reptile for which assessing population health requires knowledge of demographic parameters such as individual growth rates. The purpose of this study was to evaluate a number of biochemical indices ([DNA], [RNA], RNA:DNA ratio, [protein], protein:DNA ratio, and RNA:protein ratio) in liver, heart, and blood as potential predictors of recent growth rate in juvenile green turtles under controlled feeding conditions. Intake of juvenile green turtles was manipulated over twelve weeks to obtain a range of growth rates. With the exception of [RNA](blood), [DNA](heart), and [protein]:[DNA](liver), all biochemical indices demonstrated significant linear relationships with growth rate during the last 1.5 weeks of the study. The best single predictors of recent growth were hepatic [RNA] and [RNA]:[protein], which explained 66% and 49%, respectively, of the variance in growth. Contrary to expectations, these two indices were negatively correlated with growth rate. To investigate the possibility that hepatic [RNA] was higher in slow-growing turtles because of elevated expression of antioxidant genes, we quantified glutathione peroxidase activity and total antioxidant potential. Both measures of antioxidant function were affected by intake and growth histories, but these effects did not explain our results for hepatic RNA and protein concentrations. We developed a model that predicted 68% of the variance in specific growth rate (SGR) with the equation SGR = -0.913(ln[RNA](liver)) + 17.689(Condition Index) + 4.316. In addition, our findings that [DNA] and [RNA]:[DNA] for blood were significantly correlated with SGR demonstrate the potential utility of minimally invasive tissue sampling that

  5. Compensatory responses to food restriction in juvenile green turtles (Chelonia mydas).

    Science.gov (United States)

    Roark, Alison M; Bjorndal, Karen A; Bolten, Alan B

    2009-09-01

    The purpose of this study was to assess the compensatory responses to food restriction and subsequent increased food availability in juvenile green turtles (Chelonia mydas). Turtles were fed an ad libitum ration for 12 weeks (AL), a restricted ration for 12 weeks (R), or a restricted ration for 5 weeks and an ad libitum ration for 7 weeks (R-AL). Analysis of covariance was used to test the relationships between (1) growth and body size, (2) intake and body size, and (3) growth and intake for each of the three treatment groups. Body composition of turtles in each group was also evaluated at the beginning of the study and after weeks 5 and 12. After the switch to ad libitum feeding, R-AL turtles consumed comparable amounts of food and grew faster than AL turtles on a size-adjusted basis, but mean body sizes did not converge, although the overlap in their size ranges increased with time. The R-AL turtles also converted food to growth more efficiently and allocated proportionally more nutrients to protein accretion, thereby restoring body composition (except mineral content) to AL levels by the end of the study. Thus, accelerated size-specific growth without hyperphagia restored body condition but not size. These results indicate that (1) intake in juvenile green turtles is maximal when food is readily available and cannot be increased to compensate for a previous period of food limitation, (2) growth rates of ad libitum-fed turtles are only mildly plastic in response to past nutritional history, and (3) priority rules for nutrient allocation favor the attainment of an optimal condition rather than an optimal size. Nutritional setbacks experienced during the vulnerable juvenile stage could therefore have long-lasting consequences for wild turtles in terms of size-specific mortality risk, but these risks may be mitigated by the potential benefits of maintaining sufficient body stores.

  6. Optimal feeding frequency of captive head-started green turtles (Chelonia mydas).

    Science.gov (United States)

    Kanghae, H; Thongprajukaew, K; Yeetam, P; Jarit-Ngam, T; Hwan-Air, W; Rueangjeen, S; Kittiwattanawong, K

    2016-09-25

    Optimal feeding frequency was investigated to improve head-started propagation programme of juvenile green turtles (Chelonia mydas). The 15-day-old turtles (25-26 g body weight) were fed for ad libitum intake at one (1MD), two (2MD), three (3MD) or four (4MD) meals daily over a 3-month trial. Responses in growth, feed utilization, faecal characteristics, haematological parameters and carapace elemental composition were used to compare treatment effects. At the end of the feeding trial, no treatment had induced mortality. Growth performance in terms of weight gain and specific growth rate was similar in turtles fed 2MD, 3MD or 4MD (p > 0.05), but 1MD differed from these (p < 0.05), and feeding at excess frequency (3MD and 4MD) increased the within-group size variation. Turtles fed 2MD had significantly lower feed intake than in 3MD and 4MD groups, but the feed conversion ratios were similar. Faecal digestive enzyme analysis indicated higher catabolism of lipid and protein in the deprivation group (1MD), when compared with turtles fed at least twice daily. The feeding frequency did not affect the specific activities of carbohydrate-digesting enzymes. The results on enzymes activities were corroborated by the transition enthalpy characteristics of faeces, indicating nutrients remaining after digestion. The 2MD treatment also improved the haematological characteristics and the carapace quality, relative to low or excess feeding. Overall, the findings indicate that feeding juvenile green turtles twice a day is the preferred option in their head-started propagation. This promotes growth, reduces feed consumption, and improves health and carapace quality.

  7. Hydrodynamic stability in posthatchling loggerhead (Caretta caretta) and green (Chelonia mydas) sea turtles.

    Science.gov (United States)

    Dougherty, Erin; Rivera, Gabriel; Blob, Richard; Wyneken, Jeanette

    2010-05-01

    Swimming animals may experience a wide range of destabilizing forces resulting from the movements of their propulsors. These forces often cause movements in directions other than the intended trajectory (i.e., recoil motions), potentially increasing locomotor costs. We quantified rectilinear swimming stability for posthatchling loggerhead (Caretta caretta) and green turtles (Chelonia mydas). Sea turtles predominantly swim via "aquatic flight", which is characterized by synchronous dorsoventral flapping of their forelimbs. We tested four predictions about the effects of "aquatic flight" on stability: (1) it would produce little lateral recoil; (2) lateral recoil motions would be non-cyclic; (3) vertical recoil motions would be larger than lateral recoil motions; and (4) vertical recoil motions would be cyclic. Additionally, because posthatchling loggerheads possess dorsal keels on the shell that are absent in green turtles, we evaluated whether such keels might improve stability in swimming turtles. While our expectations for patterns of cyclicity in recoil motions (predictions 2 and 4) were met, our expectations for differences in their absolute and relative magnitudes (predictions 1 and 3) were not. We suggest that lateral recoil motions were greater than predicted due to slight asynchronies between the motions of the left and right foreflippers. Additionally, although minimum lateral recoil motions were smaller than minimum vertical recoil motions, maximum recoil motions were greater in the lateral direction, so that average recoil did not differ significantly between these directions. Finally, because loggerheads did not display higher levels of stability compared to green turtles, there is little evidence to support a stabilizing role for dorsal keels in loggerhead turtles.

  8. Sex steroid binding proteins in the plasma of hatchling Chelonia mydas.

    Science.gov (United States)

    Ikonomopoulou, M P; Ibrahim, K; Bradley, A J

    2008-09-01

    Sex steroid binding proteins were identified in hatchling female and male Chelonia mydas by dialysis and steady-state gel electrophoresis when examined at 4 degrees C. A testosterone binding protein with high binding affinity (K (a) = 0.98 +/- 0.5 x 10(8) M(-1)) and low to moderate binding capacity (B (max) = 7.58 +/- 4.2 x 10(-5) M) was observed in male hatchlings. An oestradiol binding protein with high affinity (K (a) = 0.35 +/- 1.8 x 10(8) M(-1)) and low to moderate binding capacity (B (max) = 0.16 +/- 0.5 x 10(-4) M) was identified in female hatchlings. This study confirmed that sex steroid binding proteins (SSBPs) become inactivate in both sexes at 36 degrees C, the maximum body temperature of sea turtle hatchlings at emergence. The inactivation of SSBPs at this temperature indicates that sex steroid hormones circulate freely in the body of the green turtles and are biologically available in the blood plasma. This observation is consistent with female and male hatchling C. mydas having different physiological (hormonal) and developmental requirements around the time of emergence. Moreover, concurrently conducted competition studies showed that sex steroids including testosterone and oestradiol do compete for binding sites in both male and female C. mydas hatchling plasma. Competition also occurred between testosterone and dihydrotestosterone for binding sites in the male C. mydas plasma. However, competition studies in the plasma of female hatchling C. mydas demonstrate that oestrone does not compete with oestradiol for binding sites.

  9. Assessing humoral and cell-mediated immune response in Hawaiian green turtles, Chelonia mydas

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Rameyer, R.A.; Chang, S.P.; Berestecky, J.

    2000-01-01

    Seven immature green turtles, Chelonia mydas, captured from Kaneohe Bay on the island of Oahu were used to evaluate methods for assessing their immune response. Two turtles each were immunized intramuscularly with egg white lysozyme (EWL) in Freunda??s complete adjuvant, Gerbu, or ISA-70; a seventh turtle was immunized with saline only and served as a control. Humoral immune response was measured with an indirect enzyme linked immunosorbent assay (ELISA). Cell-mediated immune response was measured using in vitro cell proliferation assays (CPA) using whole blood or peripheral blood mononuclear cells (PBM) cultured with concanavalin A (ConA), phytohaemagglutinin (PHA), or soluble egg EWL antigen. All turtles, except for one immunized with Gerbu and the control, produced a detectable humoral immune response by 6 weeks which persisted for at least 14 weeks after a single immunization. All turtles produced an anamnestic humoral immune response after secondary immunization. Antigen specific cell-mediated immune response in PBM was seen in all turtles either after primary or secondary immunization, but it was not as consistent as humoral immune response; antigen specific cell-mediated immune response in whole blood was rarely seen. Mononuclear cells had significantly higher stimulation indices than whole blood regardless of adjuvant, however, results with whole blood had lower variability. Both Gerbu and ISA-70 appeared to potentiate the cell-mediated immune response when PBM or whole blood were cultured with PHA. This is the first time cell proliferation assays have been compared between whole blood and PBM for reptiles. This is also the first demonstration of antigen specific cell-mediated response in reptiles. Cell proliferation assays allowed us to evaluate the cell-mediated immune response of green turtles. However, CPA may be less reliable than ELISA for detecting antigen specific immune response. Either of the three adjuvants appears suitable to safely elicit a

  10. Nesting phenology of marine turtles: insights from a regional comparative analysis on green turtle (Chelonia mydas).

    Science.gov (United States)

    Dalleau, Mayeul; Ciccione, Stéphane; Mortimer, Jeanne A; Garnier, Julie; Benhamou, Simon; Bourjea, Jérôme

    2012-01-01

    Changes in phenology, the timing of seasonal activities, are among the most frequently observed responses to environmental disturbances and in marine species are known to occur in response to climate changes that directly affects ocean temperature, biogeochemical composition and sea level. We examined nesting seasonality data from long-term studies at 8 green turtle (Chelonia mydas) rookeries that include 21 specific nesting sites in the South-West Indian Ocean (SWIO). We demonstrated that temperature drives patterns of nesting seasonality at the regional scale. We found a significant correlation between mean annual Sea Surface Temperature (SST) and dates of peak nesting with rookeries exposed to higher SST having a delayed nesting peak. This supports the hypothesis that temperature is the main factor determining peak nesting dates. We also demonstrated a spatial synchrony in nesting activity amongst multiple rookeries in the northern part of the SWIO (Aldabra, Glorieuses, Mohéli, Mayotte) but not with the eastern and southern rookeries (Europa, Tromelin), differences which could be attributed to females with sharply different adult foraging conditions. However, we did not detect a temporal trend in the nesting peak date over the study period or an inter-annual relation between nesting peak date and SST. The findings of our study provide a better understanding of the processes that drive marine species phenology. The findings will also help to predict their ability to cope with climate change and other environmental perturbations. Despite demonstrating this spatial shift in nesting phenology, no trend in the alteration of nesting dates over more than 20 years was found.

  11. Cloud migration

    CERN Document Server

    Höllwarth, Tobias

    2012-01-01

    This book is designed for managers and entrepreneurs, who are considering improving the economics and flexibility of their IT solutions and infrastructures. The book is also for readers who wish to learn more about the Cloud, but do not want to become specialists.This book discusses the technical, legal, fiscal, economic, organisational and environmental aspects of Cloud services. If you are looking for practical advice on vendor selection and certification, as well as real world Cloud project case studies, this is the book to consult.It is the result of a highly cooper

  12. Cloud Computing

    CERN Document Server

    Baun, Christian; Nimis, Jens; Tai, Stefan

    2011-01-01

    Cloud computing is a buzz-word in today's information technology (IT) that nobody can escape. But what is really behind it? There are many interpretations of this term, but no standardized or even uniform definition. Instead, as a result of the multi-faceted viewpoints and the diverse interests expressed by the various stakeholders, cloud computing is perceived as a rather fuzzy concept. With this book, the authors deliver an overview of cloud computing architecture, services, and applications. Their aim is to bring readers up to date on this technology and thus to provide a common basis for d

  13. Dynamic Delegation Approach Based on Access Control in the Electronic Evidence Storage of the Cloud Platform%基于云平台的电子证据存储中访问控制的动态委托方法

    Institute of Scientific and Technical Information of China (English)

    何月; 陈明

    2013-01-01

    对动态云平台电子证据存储代表的必要性的研究,证明所有资源网站的可信任性是安全云平台电子证据存储计算的一个先决条件.分析了现有的代表团类和电网计划,并提出了云平台电子证据存储访问控制的模糊信任、委托模型(FTDM)和基于云平台电子证据存储实体之间信任关系的两个阶段的模糊推理过程,进而决定类的代表团和信任级别授权访问的可能性.并且引用数字取证分析云平台资源的K-means聚类算法的基础上的CGRS资源选择算法,并在实务部门数字取证分析平台的可扩展环境中实施.通过分析和实验结果验证了分析平台的资源选择算法的有效性和正确性.%Study on the necessity of electronic evidence storage on dynamic cloud platform of electronic evidence storage.The trustworthiness of the web resources is a prerequisite for secure cloud platform of electronic evidence storage calculation.I analyze the existing classes of delegation and plan for power grid,put forward the new fuzzy trust and FTDM based on the cloud platform of electronic evidence storage access,advance the fuzzy reasoning process of two stage of trust relationship between electronic evidence storage entities based on the cloud platform,and then decide the possibility of classes of delegation and trust level of authorization access.I use CGRS resource selection algorithm which is based on the K-means clustering algorithm in digital forensics analysis of cloud platform resources,and the algorithm is used to scalable environment for digital forensics analysis platform in substantive departments.The analysis and the experimental results,verify the correctness and effectiveness of the analysis platform of resource selection algoritm.

  14. Architecting the cloud design decisions for cloud computing service models (SaaS, PaaS, and IaaS)

    CERN Document Server

    Kavis, Michael J

    2014-01-01

    An expert guide to selecting the right cloud service model for your business Cloud computing is all the rage, allowing for the delivery of computing and storage capacity to a diverse community of end-recipients. However, before you can decide on a cloud model, you need to determine what the ideal cloud service model is for your business. Helping you cut through all the haze, Architecting the Cloud is vendor neutral and guides you in making one of the most critical technology decisions that you will face: selecting the right cloud service model(s) based on a combination of both business and tec

  15. The Evolution of Cloud Computing in ATLAS

    Science.gov (United States)

    Taylor, Ryan P.; Berghaus, Frank; Brasolin, Franco; Domingues Cordeiro, Cristovao Jose; Desmarais, Ron; Field, Laurence; Gable, Ian; Giordano, Domenico; Di Girolamo, Alessandro; Hover, John; LeBlanc, Matthew; Love, Peter; Paterson, Michael; Sobie, Randall; Zaytsev, Alexandr

    2015-12-01

    The ATLAS experiment at the LHC has successfully incorporated cloud computing technology and cloud resources into its primarily grid-based model of distributed computing. Cloud R&D activities continue to mature and transition into stable production systems, while ongoing evolutionary changes are still needed to adapt and refine the approaches used, in response to changes in prevailing cloud technology. In addition, completely new developments are needed to handle emerging requirements. This paper describes the overall evolution of cloud computing in ATLAS. The current status of the virtual machine (VM) management systems used for harnessing Infrastructure as a Service resources are discussed. Monitoring and accounting systems tailored for clouds are needed to complete the integration of cloud resources within ATLAS' distributed computing framework. We are developing and deploying new solutions to address the challenge of operation in a geographically distributed multi-cloud scenario, including a system for managing VM images across multiple clouds, a system for dynamic location-based discovery of caching proxy servers, and the usage of a data federation to unify the worldwide grid of storage elements into a single namespace and access point. The usage of the experiment's high level trigger farm for Monte Carlo production, in a specialized cloud environment, is presented. Finally, we evaluate and compare the performance of commercial clouds using several benchmarks.

  16. Grids, Clouds and Virtualization

    CERN Document Server

    Cafaro, Massimo

    2011-01-01

    Research into grid computing has been driven by the need to solve large-scale, increasingly complex problems for scientific applications. Yet the applications of grid computing for business and casual users did not begin to emerge until the development of the concept of cloud computing, fueled by advances in virtualization techniques, coupled with the increased availability of ever-greater Internet bandwidth. The appeal of this new paradigm is mainly based on its simplicity, and the affordable price for seamless access to both computational and storage resources. This timely text/reference int

  17. Cloud Formation

    Science.gov (United States)

    Graham, Mark Talmage

    2004-05-01

    Cloud formation is crucial to the heritage of modern physics, and there is a rich literature on this important topic. In 1927, Charles T.R. Wilson was awarded the Nobel Prize in physics for applications of the cloud chamber.2 Wilson was inspired to study cloud formation after working at a meteorological observatory on top of the highest mountain in Scotland, Ben Nevis, and testified near the end of his life, "The whole of my scientific work undoubtedly developed from the experiments I was led to make by what I saw during my fortnight on Ben Nevis in September 1894."3 To form clouds, Wilson used the sudden expansion of humid air.4 Any structure the cloud may have is spoiled by turbulence in the sudden expansion, but in 1912 Wilson got ion tracks to show up by using strobe photography of the chamber immediately upon expansion.5 In the interim, Millikan's study in 1909 of the formation of cloud droplets around individual ions was the first in which the electron charge was isolated. This study led to his famous oil drop experiment.6 To Millikan, as to Wilson, meteorology and physics were professionally indistinct. With his meteorological physics expertise, in WWI Millikan commanded perhaps the first meteorological observation and forecasting team essential to military operation in history.7 But even during peacetime meteorology is so much of a concern to everyone that a regular news segment is dedicated to it. Weather is the universal conversation topic, and life on land could not exist as we know it without clouds. One wonders then, why cloud formation is never covered in physics texts.

  18. Research and Implementation of Cipher-text Data Retrieval Method Based on Cloud Storage%基于云存储的密文数据检索方法研究与实现

    Institute of Scientific and Technical Information of China (English)

    刘伯红; 王刚; 王娟娟; 史慧丽

    2014-01-01

    To solve the problem of mass data encryption retrieval in the development of cloud storage service ,a new cipher-text data retrieval method is proposed .In this method ,a new retrieval method is designed which use inverted index as the index structure .Firstly ,user inputs the query words and matches on the cipher-text index precisely and transfer the word into other forms and correct the wrong word to query again .And then repeat the above steps under the circumstance if the returned result is lower than the pre-set threshold .This cipher-text data retrieval method improves the privacy of stored data to make users obtain the results what they expect .Finally ,experimental results show that the scheme is effective .%为解决云存储服务海量加密数据检索问题,提出一个新的云存储密文数据检索方法,新方法采用倒排索引结构,首先用户输入检索词,在密文索引中匹配,然后将词转化成其他形式和纠正错误的词之后进行再次查询,在返回结果低于先前设定的临界值的情况下继续执行以上步骤。这种基于云存储的密文数据检索方法提高了存储数据的隐私性,能够使用户得到他们所期望的结果,实验结果证明新的检索方法是有效的。

  19. A Review on Impacts of Cloud Computing on Digital Forensics

    Directory of Open Access Journals (Sweden)

    Farid Daryabar

    2015-05-01

    Full Text Available Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case an attack occurs in the network of a cloud it would be a big challenge to investigate the cloud. Therefore, digital forensics in cloud computing is a new discipline related to the increasing use of computers, networks and digital storage devices in numerous criminal activities in both traditional and Hi-Tech. This study reviews the literature on some challenges in cloud computing forensic investigation, and it is followed by evaluation and analysis of all types of information on cloud computing and its impacts on computer forensic investigations in publishing alliances with the survey was carried out in the field.

  20. Virtualization and cloud computing in dentistry.

    Science.gov (United States)

    Chow, Frank; Muftu, Ali; Shorter, Richard

    2014-01-01

    The use of virtualization and cloud computing has changed the way we use computers. Virtualization is a method of placing software called a hypervisor on the hardware of a computer or a host operating system. It allows a guest operating system to run on top of the physical computer with a virtual machine (i.e., virtual computer). Virtualization allows multiple virtual computers to run on top of one physical computer and to share its hardware resources, such as printers, scanners, and modems. This increases the efficient use of the computer by decreasing costs (e.g., hardware, electricity administration, and management) since only one physical computer is needed and running. This virtualization platform is the basis for cloud computing. It has expanded into areas of server and storage virtualization. One of the commonly used dental storage systems is cloud storage. Patient information is encrypted as required by the Health Insurance Portability and Accountability Act (HIPAA) and stored on off-site private cloud services for a monthly service fee. As computer costs continue to increase, so too will the need for more storage and processing power. Virtual and cloud computing will be a method for dentists to minimize costs and maximize computer efficiency in the near future. This article will provide some useful information on current uses of cloud computing.

  1. Research on Key Technologies of Cloud Computing

    Science.gov (United States)

    Zhang, Shufen; Yan, Hongcan; Chen, Xuebin

    With the development of multi-core processors, virtualization, distributed storage, broadband Internet and automatic management, a new type of computing mode named cloud computing is produced. It distributes computation task on the resource pool which consists of massive computers, so the application systems can obtain the computing power, the storage space and software service according to its demand. It can concentrate all the computing resources and manage them automatically by the software without intervene. This makes application offers not to annoy for tedious details and more absorbed in his business. It will be advantageous to innovation and reduce cost. It's the ultimate goal of cloud computing to provide calculation, services and applications as a public facility for the public, So that people can use the computer resources just like using water, electricity, gas and telephone. Currently, the understanding of cloud computing is developing and changing constantly, cloud computing still has no unanimous definition. This paper describes three main service forms of cloud computing: SAAS, PAAS, IAAS, compared the definition of cloud computing which is given by Google, Amazon, IBM and other companies, summarized the basic characteristics of cloud computing, and emphasized on the key technologies such as data storage, data management, virtualization and programming model.

  2. Cloud Optimized Image Format and Compression

    Science.gov (United States)

    Becker, P.; Plesea, L.; Maurer, T.

    2015-04-01

    Cloud based image storage and processing requires revaluation of formats and processing methods. For the true value of the massive volumes of earth observation data to be realized, the image data needs to be accessible from the cloud. Traditional file formats such as TIF and NITF were developed in the hay day of the desktop and assumed fast low latency file access. Other formats such as JPEG2000 provide for streaming protocols for pixel data, but still require a server to have file access. These concepts no longer truly hold in cloud based elastic storage and computation environments. This paper will provide details of a newly evolving image storage format (MRF) and compression that is optimized for cloud environments. Although the cost of storage continues to fall for large data volumes, there is still significant value in compression. For imagery data to be used in analysis and exploit the extended dynamic range of the new sensors, lossless or controlled lossy compression is of high value. Compression decreases the data volumes stored and reduces the data transferred, but the reduced data size must be balanced with the CPU required to decompress. The paper also outlines a new compression algorithm (LERC) for imagery and elevation data that optimizes this balance. Advantages of the compression include its simple to implement algorithm that enables it to be efficiently accessed using JavaScript. Combing this new cloud based image storage format and compression will help resolve some of the challenges of big image data on the internet.

  3. Energy expenditure of freely swimming adult green turtles (Chelonia mydas) and its link with body acceleration.

    Science.gov (United States)

    Enstipp, Manfred R; Ciccione, Stéphane; Gineste, Benoit; Milbergue, Myriam; Ballorain, Katia; Ropert-Coudert, Yan; Kato, Akiko; Plot, Virginie; Georges, Jean-Yves

    2011-12-01

    Marine turtles are globally threatened. Crucial for the conservation of these large ectotherms is a detailed knowledge of their energy relationships, especially their at-sea metabolic rates, which will ultimately define population structure and size. Measuring metabolic rates in free-ranging aquatic animals, however, remains a challenge. Hence, it is not surprising that for most marine turtle species we know little about the energetic requirements of adults at sea. Recently, accelerometry has emerged as a promising tool for estimating activity-specific metabolic rates of animals in the field. Accelerometry allows quantification of the movement of animals (ODBA/PDBA, overall/partial dynamic body acceleration), which, after calibration, might serve as a proxy for metabolic rate. We measured oxygen consumption rates (V(O(2))) of adult green turtles (Chelonia mydas; 142.1±26.9 kg) at rest and when swimming within a 13 m-long swim channel, using flow-through respirometry. We investigated the effect of water temperature (T(w)) on turtle and tested the hypothesis that turtle body acceleration can be used as a proxy for V(O(2)). Mean mass-specific V(O(2)) (sV(O(2))) of six turtles when resting at a T(w) of 25.8±1.0°C was 0.50±0.09 ml min(-1) kg(-0.83). sV(O(2))increased significantly with T(w) and activity level. Changes in sV(O(2)) were paralleled by changes in respiratory frequency (f(R)). Deploying bi-axial accelerometers in conjunction with respirometry, we found a significant positive relationship between sV(O(2)) and PDBA that was modified by T(w). The resulting predictive equation was highly significant (r(2)=0.83, P<0.0001) and associated error estimates were small (mean algebraic error 3.3%), indicating that body acceleration is a good predictor of V(O(2)) in green turtles. Our results suggest that accelerometry is a suitable method to investigate marine turtle energetics at sea.

  4. Morphology and water permeability of red blood cells from green sea turtle (Chelonia mydas).

    Science.gov (United States)

    Benga, Gheorghe; Chapman, Bogdan E; Romeo, Tony; Cox, Guy C; Kuchel, Philip W

    2015-07-01

    The morphology and diffusional water permeability (P d) of red blood cells (RBCs) from green sea turtle (GST) (Chelonia mydas) are presented for the first time. The RBCs had an ellipsoidal shape with full-axis lengths (diameters): D = 14.4 μm; d = 10.2 μm; h = 2.8 μm. The values of P d (cm s(-1)) were 5.1 × 10(-3) at 15 °C, 5.7 × 10(-3) at 20 °C, 6.3 × 10(-3) at 25 °C, 6.8 × 10(-3) at 30 °C, and 7.9 × 10(-3) at 37 °C (i.e., significantly higher than in human RBCs in which it was measured to be 4.2 × 10(-3) at 25 °C, 5.0 × 10(-3) at 30 °C, and 6.2 × 10(-3) at 37 °C). There was a lack of inhibition of P d of GST RBCs by p-chloromercuribenzoate (PCMB), a well-known inhibitor of the RBC water channel proteins (WCPs). The activation energy of water diffusion (E a,d) in GST RBCs was 15.0 ± 1.6 kJ mol(-1) which is lower than the E a,d for human RBCs (~25 kJ mol(-1)). These results indicate that in the membrane of GST RBCs, there were no WCPs that were inhibited by the mercurial reagent, while the lipid bilayer of this membrane is unusually permeable to water. This is likely to be a phylogenetically old trait, like that found in amphibians and even the later birds, all of which have nucleated erythrocytes; and it is also likely to be a result of the animal's adaptation to a herbivorous diet (algae and seagrasses).

  5. Aspectos de comportamento alimentar e dieta da tartaruga marinha, Chelonia mydas no litoral norte paulista Some aspects on feeding behaviour of the green turtle, Chelonia mydas, in the northern littoral of State of São Paulo

    Directory of Open Access Journals (Sweden)

    Ivan Sazima

    1983-01-01

    Full Text Available Feeding behavior of immature green turtles, Chelonia mydas, has been observed on rocky shores along the northern part of State of São Paulo, southeastern Brazil. This turtle forages on underwater ledges, at depths of 1 to 3 m and grazes on benthic algae. The turtle seems to visually scan the algae during feeding and moves slowly, walking from one patch of vegetation to another. Gut contents of four individuals (331-452 mmCCL consisted mainly of red and brown algae. Comparisons between gut contents and algae growing at the grazing sites, together with scanning behavior suggest selective feeding. Syntopic large herbivorous fishes of the genera Kyphosus, Sparisma, and Acanthurus showed little feeding overlap with the green turtle.

  6. On Web Services Based Cloud Interoperability

    Directory of Open Access Journals (Sweden)

    Reeta Sony A.L

    2012-09-01

    Full Text Available Cloud Computing is a paradigm shift in the field of Computing. It is moving at an incredible fast pace and one of the fastest evolving domains of computer science today. It consist set of technology and service models that concentrates on the internet base use and delivery of IT applications, processing capability, storage and memory space. There is a shift from the traditional in-house servers and applications to the next generation of cloud computing applications. With many of the computer giants like Google, Microsoft, etc. entering into the cloud computing arena, there will be thousands of applications running on the cloud. There are several cloud environments available in the market today which support a huge consumer-base. Eventually this will lead to a multitude of standards, technologies and products being provided on the cloud. Consumers will need certain degrees of flexibility to use the cloud application/services of their choice and at the same time will need these applications/services to communicate with each other. This paper emphasizes cloud computing and provides a solution to achieve Interoperability, which is in the form of Web Services. The paper will also provide a Live Case Study where interoperability comes into play - Connecting Google App Engine and Microsoft Windows Azure Platform, two of the leading Cloud Platforms available today. GAE and WAP are two Cloud Frameworks which have very little in common, making interoperability an absolute necessary.

  7. Phaeohyphomycosis resulting in obstructive tracheitis in three green sea turtles Chelonia mydas stranded along the Florida coast.

    Science.gov (United States)

    Donnelly, Kyle; Waltzek, Thomas B; Wellehan, James F X; Sutton, Deanna A; Wiederhold, Nathan P; Stacy, Brian A

    2015-04-08

    Three wild immature green sea turtles Chelonia mydas were found alive but lethargic on the shores of the Indian River Lagoon and Gulf of Mexico in Florida, USA, and subsequently died. Necropsy findings in all 3 turtles included partial occlusion of the trachea by a mass comprised of granulomatous inflammation. Pigmented fungal hyphae were observed within the lesion by histology and were characterized by culture and sequencing of the internal transcribed spacer 2 domain of the rRNA gene and D1/D2 region of the fungal 28s gene. The dematiaceous fungus species Veronaea botryosa was isolated from the tracheal mass in 2 cases, and genetic sequence of V. botryosa was detected by polymerase chain reaction in all 3 cases. Genetic sequencing and fungal cultures also detected other dematiaceous fungi, including a Cladosporium sp., an Ochroconis sp., and a Cochliobolus sp. These cases are the first report of phaeohyphomycosis caused by V. botryosa in wild marine animals.

  8. Selected heavy metals and selenium in the blood of black sea turtle (Chelonia mydas agasiizzi) from Sonora, Mexico.

    Science.gov (United States)

    Ley-Quiñónez, C P; Zavala-Norzagaray, A A; Réndon-Maldonado, J G; Espinosa-Carreón, T L; Canizales-Román, A; Escobedo-Urías, D C; Leal-Acosta, M L; Hart, C E; Aguirre, A A

    2013-12-01

    The concentration of heavy metals (Zn, Cd, Ni, Cu, Mn) and selenium (Se) was analyzed in blood collected from 12 black turtles (Chelonia mydas agasiizzi) captured in Canal del Infiernillo, Punta Chueca, Mexico. The most abundant metals were Zn (63.58 μg g(-1)) and Se (7.66 μg g(-1)), and Cd was the lower (0.99 μg g(-1)). The sequential concentrations of trace metals were Zn > Se > Cu > Mn > Ni > Cd. In conclusion, this information is important as a baseline when using blood as tissue analysis of heavy metals; however, these levels could represent recent exposure in foraging grounds of black turtles in the Sea of Cortez.

  9. Mixed-stock analysis in green turtles Chelonia mydas: mtDNA decipher current connections among west Atlantic populations.

    Science.gov (United States)

    Costa Jordao, Juliana; Bondioli, Ana Cristina Vigliar; Almeida-Toledo, Lurdes Foresti de; Bilo, Karin; Berzins, Rachel; Le Maho, Yvon; Chevallier, Damien; de Thoisy, Benoit

    2017-03-01

    The green turtle Chelonia mydas undertakes wide-ranging migrations between feeding and nesting sites, resulting in mixing and isolation of genetic stocks. We used mtDNA control region to characterize the genetic composition, population structure, and natal origins of C. mydas in the West Atlantic Ocean, at one feeding ground (State of Rio de Janeiro, Brazil), and three Caribbean nesting grounds (French Guiana, Guadeloupe, and Suriname). The feeding ground presented considerable frequency of common haplotypes from the South Atlantic, whereas the nesting sites presented a major contribution of the most common haplotype from the Caribbean. MSA revealed multiple origins of individuals at the feeding ground, notably from Ascension Island, Guinea Bissau, and French Guiana. This study enables a better understanding of the dispersion patterns and highlights the importance of connecting both nesting and feeding areas. Effective conservation initiatives need to encompass these ecologically and geographically distinct sites as well as those corridors connecting them.

  10. Cloud radiative properties and aerosol - cloud interaction

    Science.gov (United States)

    Viviana Vladutescu, Daniela; Gross, Barry; Li, Clement; Han, Zaw

    2015-04-01

    The presented research discusses different techniques for improvement of cloud properties measurements and analysis. The need for these measurements and analysis arises from the high errors noticed in existing methods that are currently used in retrieving cloud properties and implicitly cloud radiative forcing. The properties investigated are cloud fraction (cf) and cloud optical thickness (COT) measured with a suite of collocated remote sensing instruments. The novel approach makes use of a ground based "poor man's camera" to detect cloud and sky radiation in red, green, and blue with a high spatial resolution of 30 mm at 1km. The surface-based high resolution photography provides a new and interesting view of clouds. As the cloud fraction cannot be uniquely defined or measured, it depends on threshold and resolution. However as resolution decreases, cloud fraction tends to increase if the threshold is below the mean, and vice versa. Additionally cloud fractal dimension also depends on threshold. Therefore these findings raise concerns over the ability to characterize clouds by cloud fraction or fractal dimension. Our analysis indicate that Principal Component analysis may lead to a robust means of quantifying cloud contribution to radiance. The cloud images are analyzed in conjunction with a collocated CIMEL sky radiometer, Microwave Radiometer and LIDAR to determine homogeneity and heterogeneity. Additionally, MFRSR measurements are used to determine the cloud radiative properties as a validation tool to the results obtained from the other instruments and methods. The cloud properties to be further studied are aerosol- cloud interaction, cloud particle radii, and vertical homogeneity.

  11. Research on I/O Resource Scheduling Algorithms for Utility Optimization Towards Cloud Storage%面向云存储的I/O资源效用优化调度算法研究

    Institute of Scientific and Technical Information of China (English)

    王健宗; 谌炎俊; 谢长生

    2013-01-01

    Cloud-based services are emerging as an economical and convenient alternative for clients who don't want to acquire,maintain and operate their own IT equipment.Instead,customers purchase virtual machines (VMs) with certain service level objectives (SLOs) to obtain computational resources.Existing algorithms for memory and CPU allocation are inadequate for I/O allocation,especially in clustered storage infrastructures where storage is distributed across multiple storage nodes.This paper focuses on:1) dynamic SLO decomposition so that VMs receive proper I/O service in each distributed storage node,and 2) efficient and robust local I/O scheduling strategy.To address these issues,we present an adaptive I/O resource scheduling algorithm (called PC) for utility optimization that at runtime adjusts local SLOs.The local SLOs are generated for each VM at each storage node based on access patterns.We also adopt dual clocks to allow automatic switching between two scheduling strategies.When system capacity is sufficient,we interweave requests in an earliest deadline first (EDF) manner.Otherwise resources are allocated proportionately to their normalized revenues.The results of our experiments suggest that the algorithm is adaptive to various access patterns without significant manual pre-settings while maximizing profits.%随着云计算的普及,越来越多的客户选择使用基于云的服务,以避免冗余的设施购买费用和繁杂的系统设计与维护,从而将精力集中在自己的专业领域.通常,云服务的客户从云服务供应商购买虚拟机,并根据双方商定达成的服务水平目标(service level objective,SLO)约束购买到的计算资源.分布式存储中大量的文件分布在不同的存储节点上,现有的CPU、内存以及带宽等资源的分配调度算法并不适用磁盘I/O资源.从云服务提供商的角度来说,高效用的I/O资源调度算法有利于提高其系统的利用率,节约资源开销并增加企业收

  12. The Risk and Challenges of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Usman Namadi Inuwa

    2015-12-01

    Full Text Available Cloud computing is a computing technology aiming to share storage, computation, and services transparently among a massive users. Current cloud computing systems pose serious limitation to protecting the confidentiality of user data. Since the data share and stored is presented in unencrypted forms to remote machines owned and operated by third party service providers despite it sensitivity (example contact address, mails, the risks of disclosing user confidential data by service providers may be quite high and the risk of attacking cloud storage by third party is also increasing. The purpose of this study is to review researches done on this technology, identify the security risk and explore some techniques for protecting users‟ data from attackers in the cloud.

  13. Sensory signals and neuronal groups involved in guiding the sea-ward motor behavior in turtle hatchlings of Chelonia agassizi

    Science.gov (United States)

    Fuentes, A. L.; Camarena, V.; Ochoa, G.; Urrutia, J.; Gutierrez, G.

    2007-05-01

    Turtle hatchlings orient display sea-ward oriented movements as soon as they emerge from the nest. Although most studies have emphasized the role of the visual information in this process, less attention has been paid to other sensory modalities. Here, we evaluated the nature of sensory cues used by turtle hatchlings of Chelonia agassizi to orient their movements towards the ocean. We recorded the time they took to crawl from the nest to the beach front (120m long) in control conditions and in visually, olfactory and magnetically deprived circumstances. Visually-deprived hatchlings displayed a high degree of disorientation. Olfactory deprivation and magnetic field distortion impaired, but not abolished, sea-ward oriented movements. With regard to the neuronal mapping experiments, visual deprivation reduced dramatically c-fos expression in the whole brain. Hatchlings with their nares blocked revealed neurons with c-fos expression above control levels principally in the c and d areas, while those subjected to magnetic field distortion had a wide spread activation of neurons throughout the brain predominantly in the dorsal ventricular ridge The present results support that Chelonia agassizi hatchlings use predominantly visual cues to orient their movements towards the sea. Olfactory and magnetic cues may also be use but their influence on hatchlings oriented motor behavior is not as clear as it is for vision. This conclusion is supported by the fact that in the absence of olfactory and magnetic cues, the brain turns on the expression of c- fos in neuronal groups that, in the intact hatchling, are not normally involved in accomplishing the task.

  14. Using Cloud Storage for NMR Data Distribution

    Science.gov (United States)

    Soulsby, David

    2012-01-01

    An approach using Google Groups as method for distributing student-acquired NMR data has been implemented. We describe how to configure NMR spectrometer software so that data is uploaded to a laboratory section specific Google Group, thereby removing bottlenecks associated with printing and processing at the spectrometer workstation. Outside of…

  15. Soft Clouding

    DEFF Research Database (Denmark)

    Søndergaard, Morten; Markussen, Thomas; Wetton, Barnabas;

    2012-01-01

    Soft Clouding is a blended concept, which describes the aim of a collaborative and transdisciplinary project. The concept is a metaphor implying a blend of cognitive, embodied interaction and semantic web. Furthermore, it is a metaphor describing our attempt of curating a new semantics of sound...

  16. Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Katz, Marcos

    examples of mobile clouds applications, based on both existing commercial initiatives as well as proof-of-concept test-beds. Visions and prospects are also discussed, paving the way for further development. As mobile networks and social networks become more and more reliant on each other, the concept...

  17. Motion/imagery secure cloud enterprise architecture analysis

    Science.gov (United States)

    DeLay, John L.

    2012-06-01

    Cloud computing with storage virtualization and new service-oriented architectures brings a new perspective to the aspect of a distributed motion imagery and persistent surveillance enterprise. Our existing research is focused mainly on content management, distributed analytics, WAN distributed cloud networking performance issues of cloud based technologies. The potential of leveraging cloud based technologies for hosting motion imagery, imagery and analytics workflows for DOD and security applications is relatively unexplored. This paper will examine technologies for managing, storing, processing and disseminating motion imagery and imagery within a distributed network environment. Finally, we propose areas for future research in the area of distributed cloud content management enterprises.

  18. A survey on top security threats in cloud computing

    Directory of Open Access Journals (Sweden)

    Muhammad Kazim

    2015-03-01

    Full Text Available Cloud computing enables the sharing of resources such as storage, network, applications and software through internet. Cloud users can lease multiple resources according to their requirements, and pay only for the services they use. However, despite all cloud benefits there are many security concerns related to hardware, virtualization, network, data and service providers that act as a significant barrier in the adoption of cloud in the IT industry. In this paper, we survey the top security concerns related to cloud computing. For each of these security threats we describe, i how it can be used to exploit cloud components and its effect on cloud entities such as providers and users, and ii the security solutions that must be taken to prevent these threats. These solutions include the security techniques from existing literature as well as the best security practices that must be followed by cloud administrators.

  19. Mobile Cloud Computing: A Comparison of Application Models

    CERN Document Server

    Kovachev, Dejan; Klamma, Ralf

    2011-01-01

    Cloud computing is an emerging concept combining many fields of computing. The foundation of cloud computing is the delivery of services, software and processing capacity over the Internet, reducing cost, increasing storage, automating systems, decoupling of service delivery from underlying technology, and providing flexibility and mobility of information. However, the actual realization of these benefits is far from being achieved for mobile applications and open many new research questions. In order to better understand how to facilitate the building of mobile cloud-based applications, we have surveyed existing work in mobile computing through the prism of cloud computing principles. We give a definition of mobile cloud coputing and provide an overview of the results from this review, in particular, models of mobile cloud applications. We also highlight research challenges in the area of mobile cloud computing. We conclude with recommendations for how this better understanding of mobile cloud computing can ...

  20. Securing Mobile Cloud Using Finger Print Authentication

    Directory of Open Access Journals (Sweden)

    IehabALRassan

    2013-11-01

    Full Text Available Mobile cloud computing becomes part of mobile usersdaily life transactions. Mobile devices with Internetcapabilities have increased the use of mobile clouding computing. Due to hardware limitations in mobiledevices, these devices can't install and run applications require heavy CPU processing or extensivememory. Cloud computing allows mobile users to synchronize their data with remote storage and utilizeapplications require heavy CPU processing or extensive memory such as Microsoft Office or AdobePhotoshop, as they run in a desktop computer.The combination of cloud computing and mobile computing introduces mobile cloud computing, which alsopresent new issues of security threats such as unauthorized access to resources exist in mobile cloud.Protecting mobile cloud computing from illegitimateaccess becomes an important concern to mobile users.This paper proposes and implements a new user authentication mechanism of mobile cloud computingusing fingerprint recognition system. Fingerprint images of mobile users can be captured and processedusing mobile phone camera to access mobile cloud computing . The implementation of the proposedsolution in different mobile operating systems anddevices show security enhancement in mobile cloudcomputing with accepted performance level

  1. Efficient Architectural Framework for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Souvik Pal

    2012-06-01

    Full Text Available Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.

  2. Cloud Computing with iPlant Atmosphere.

    Science.gov (United States)

    McKay, Sheldon J; Skidmore, Edwin J; LaRose, Christopher J; Mercer, Andre W; Noutsos, Christos

    2013-10-15

    Cloud Computing refers to distributed computing platforms that use virtualization software to provide easy access to physical computing infrastructure and data storage, typically administered through a Web interface. Cloud-based computing provides access to powerful servers, with specific software and virtual hardware configurations, while eliminating the initial capital cost of expensive computers and reducing the ongoing operating costs of system administration, maintenance contracts, power consumption, and cooling. This eliminates a significant barrier to entry into bioinformatics and high-performance computing for many researchers. This is especially true of free or modestly priced cloud computing services. The iPlant Collaborative offers a free cloud computing service, Atmosphere, which allows users to easily create and use instances on virtual servers preconfigured for their analytical needs. Atmosphere is a self-service, on-demand platform for scientific computing. This unit demonstrates how to set up, access and use cloud computing in Atmosphere.

  3. User Security in Cloud Using Password Authentication

    Directory of Open Access Journals (Sweden)

    Deepika Singh

    2014-06-01

    Full Text Available Cloud computing technology is an open standard, service-based, Internet-centric, safe, convenient data storage and network computing services [8]. Cloud computing is an internet based model for enabling convenient, on demand network access to a shared pool of configurable computing resources [9]. The software and data that you access for your work doesn‟t exist on your computer instead it‟s on the server. This concept of using services not stored on your system is called Cloud Computing. In this paper, we are implementing a technique to enhance the security of cloud. We create an algorithm based on the selection of username and generate a password to strengthen the security in cloud.

  4. Cloud computing for data-intensive applications

    CERN Document Server

    Li, Xiaolin

    2014-01-01

    This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studie

  5. Cloud management and security

    CERN Document Server

    Abbadi, Imad M

    2014-01-01

    Written by an expert with over 15 years' experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure(e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discuss...

  6. Cloud Databases: A Paradigm Shift in Databases

    Directory of Open Access Journals (Sweden)

    Indu Arora

    2012-07-01

    Full Text Available Relational databases ruled the Information Technology (IT industry for almost 40 years. But last few years have seen sea changes in the way IT is being used and viewed. Stand alone applications have been replaced with web-based applications, dedicated servers with multiple distributed servers and dedicated storage with network storage. Cloud computing has become a reality due to its lesser cost, scalability and pay-as-you-go model. It is one of the biggest changes in IT after the rise of World Wide Web. Cloud databases such as Big Table, Sherpa and SimpleDB are becoming popular. They address the limitations of existing relational databases related to scalability, ease of use and dynamic provisioning. Cloud databases are mainly used for data-intensive applications such as data warehousing, data mining and business intelligence. These applications are read-intensive, scalable and elastic in nature. Transactional data management applications such as banking, airline reservation, online e-commerce and supply chain management applications are write-intensive. Databases supporting such applications require ACID (Atomicity, Consistency, Isolation and Durability properties, but these databases are difficult to deploy in the cloud. The goal of this paper is to review the state of the art in the cloud databases and various architectures. It further assesses the challenges to develop cloud databases that meet the user requirements and discusses popularly used Cloud databases.

  7. REVIEW PAPER ON MOBILE CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Priyanka d. Raut

    2015-10-01

    Full Text Available Nowadays smart-phones are being capable of supporting a broad range of applications, many of which demand an increasing computational power. This leads to a challenge because smart-phones are resource-constrained devices with finite computation power, memory, storage, and energy. With the development of mobility and cloud computing, mobile cloud computing (MCC has introduced and become a point of research. With the need of extendibility and on-demand self-service, it can provide the good infrastructure, platform and software services in a cloud to mobile clients through the mobile network. Therefore, Cloud computing is anticipated to bring an innovation in mobile computing, where the mobile devices can make use of clouds for data processing, storage and other intensive operations. Despite the surprising advancement achieved by MCC, the clients of MCC are still below expectations due to the related risks in terms of security and confidentiality. The more and more information is placed onto the cloud by individuals and enterprises, the more the security issue begins to grow. This paper presents the various security issues that arise about how secure the mobile cloud computing environment is.

  8. Cloud Computing Trace Characterization and Synthetic Workload Generation

    Science.gov (United States)

    2013-03-01

    to design realistic cloud workloads, which drive the evaluation of Hadoop job schedulers and Hadoop shared storage system performance. The trace...synthesizing realistic workload traces for studying the hadoop ecosystem. Presented at Modeling, Analysis & Simulation of Computer and

  9. Cloud computing development in Armenia

    Directory of Open Access Journals (Sweden)

    Vazgen Ghazaryan

    2014-10-01

    Full Text Available Purpose – The purpose of the research is to clarify benefits and risks in regards with data protection, cost; business can have by the use of this new technologies for the implementation and management of organization’s information systems.Design/methodology/approach – Qualitative case study of the results obtained via interviews. Three research questions were raised: Q1: How can company benefit from using Cloud Computing compared to other solutions?; Q2: What are possible issues that occur with Cloud Computing?; Q3: How would Cloud Computing change an organizations’ IT infrastructure?Findings – The calculations provided in the interview section prove the financial advantages, even though the precise degree of flexibility and performance has not been assessed. Cloud Computing offers great scalability. Another benefit that Cloud Computing offers, in addition to better performance and flexibility, is reliable and simple backup data storage, physically distributed and so almost invulnerable to damage. Although the advantages of Cloud Computing more than compensate for the difficulties associated with it, the latter must be carefully considered. Since the cloud architecture is relatively new, so far the best guarantee against all risks it entails, from a single company's perspective, is a well-formulated service-level agreement, where the terms of service and the shared responsibility and security roles between the client and the provider are defined.Research limitations/implications – study was carried out on the bases of two companies, which gives deeper view, but for more widely applicable results, a wider analysis is necessary.Practical implications:Originality/Value – novelty of the research depends on the fact that existing approaches on this problem mainly focus on technical side of computing.Research type: case study

  10. Extension of the Trusted Cloud Domain for the Composite Cloud Process

    Directory of Open Access Journals (Sweden)

    Sameer Rajan

    2012-05-01

    Full Text Available Internet is a "network of networks" that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-opticcables, wireless connections, and other technologies. Cloud computing [1] is a new flavor of computing where our trend of using internet changes. It makes a virtual pool of resources such as storage, CPU,networks and memory to fulfill the user’s resource requirement and provides on demand (pay per use hardware and software services without barriers. It can be named as dynamic computing because itprovides resources, when required. Cloud Computing manages the pool of resources automatically and dynamically through software and hardware. Various businesses form their cloud for the users to providepay per use services. Users are required to access the cloud according to the service. In this way, user can get benefited from the proprietary cloud on cheap prices but it is difficult for the user to find the cloud that can fulfill his demand. It is also not safe for cloud to cloud communication without trust. To resolvesuch difficulties and various other issues, it is required to extend the trusted cloud domain for accessing the compatible services provided by other clouds.

  11. Utilizing HDF4 File Content Maps for the Cloud

    Science.gov (United States)

    Lee, Hyokyung Joe

    2016-01-01

    We demonstrate a prototype study that HDF4 file content map can be used for efficiently organizing data in cloud object storage system to facilitate cloud computing. This approach can be extended to any binary data formats and to any existing big data analytics solution powered by cloud computing because HDF4 file content map project started as long term preservation of NASA data that doesn't require HDF4 APIs to access data.

  12. A State-of-the-Art Review of Cloud Forensics

    OpenAIRE

    Sameera Abdulrahman Almulla; Youssef Iraqi; Andrew Jones

    2014-01-01

    Cloud computing and digital forensics are emerging fields of technology. Unlike traditional digital forensics where the target environment can be almost completely acquired, isolated and can be under the investigators control; in cloud environments, the distribution of computation and storage poses unique and complex challenges to the investigators.Recently, the term "cloud forensics" has an increasing presence in the field of digital forensics. In this state-of-the-art review, we included th...

  13. Fog Computing to protect real and sensitivity information in Cloud

    OpenAIRE

    Thogaricheti Ashwini; Anuradha.S.G

    2015-01-01

    Cloud computing can simply be described as computing based on the internet. In the past, people depended on physical computer storage or servers to run their programs. However, with the introduction of cloud computing, people as well as business enterprises can now access their programs through the internet. Due this ease, software companies and other agencies are shifting more towards cloud computing environment. To achieve better operational efficiency in many organizations and ...

  14. Cloud Interactions

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 1 July 2004 The atmosphere of Mars is a dynamic system. Water-ice clouds, fog, and hazes can make imaging the surface from space difficult. Dust storms can grow from local disturbances to global sizes, through which imaging is impossible. Seasonal temperature changes are the usual drivers in cloud and dust storm development and growth. Eons of atmospheric dust storm activity has left its mark on the surface of Mars. Dust carried aloft by the wind has settled out on every available surface; sand dunes have been created and moved by centuries of wind; and the effect of continual sand-blasting has modified many regions of Mars, creating yardangs and other unusual surface forms. This image was acquired during mid-spring near the North Pole. The linear water-ice clouds are now regional in extent and often interact with neighboring cloud system, as seen in this image. The bottom of the image shows how the interaction can destroy the linear nature. While the surface is still visible through most of the clouds, there is evidence that dust is also starting to enter the atmosphere. Image information: VIS instrument. Latitude 68.4, Longitude 258.8 East (101.2 West). 38 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project policies at a later time. NASA's Jet Propulsion Laboratory manages the 2001 Mars Odyssey mission for NASA's Office of Space Science, Washington, D.C. The Thermal Emission Imaging System (THEMIS) was developed by Arizona State University, Tempe, in collaboration with Raytheon Santa Barbara

  15. Three-Dimensional Space to Assess Cloud Interoperability

    Science.gov (United States)

    2013-03-01

    major cloud providers, OpenStack and OpeNebula, to demonstrate the usage of the three-dimensional space and its benefits . We start this chapter with a...documentation:rel4.0:external_auth. [68] X. Gao, P. Shah, A. Yoga , A. Kodgire and X. Ni. Cloud storage survey [Online]. Available: http

  16. INTRASPECIFIC VARIATION OF THE GREEN TURTLE, Chelonia mydas (CHELONIIDAE, IN THE FORAGING AREA OF GORGONA NATURAL NATIONAL PARK (COLOMBIAN PACIFIC

    Directory of Open Access Journals (Sweden)

    Laura Sampson

    2014-06-01

    Full Text Available The size distribution and body condition of the two morphotypes of green turtle (Chelonia mydas foraging in Gorgona Natural National Park (GNNP in the Colombian Pacific was assessed from 2003 to 2012. Measurements of straight carapace length (SCL, curved carapace length (CCL, weight, and body condition of 1,023 turtles captured on the GNNP reefs were recorded. More black turtles (n = 747 than yellow turtles (n = 276 were captured, all of them juveniles. Black turtles were significantly larger and heavier than yellow turtles. The size of recruitment to the neritic zone was 40.0-49.9 cm SCL for both morphotypes, but there were more yellow than black turtles in this size class, indicating a difference in the recruitment pattern. The body condition index of yellow turtles was significantly higher than that of black turtles, which could indicate differences in resource use. Based on our results, we suggest that GNNP might function as a recruitment area for yellow turtles, which arrive at smaller sizes and as part of a coastal migratory route for black turtles, which arrive at larger sizes and maintain residence at this location for an unknown period of time.Variación intraespecífica de la tortuga verde Chelonia mydas (Cheloniidae en el área de forrajeo del Parque Nacional Natural Gorgona (Pacífico colombianoSe comparó la distribución de tallas y condición corporal de los dos morfotipos conocidos de tortuga verde (Chelonia mydas en el área de forrajeo del Parque Nacional Natural Gorgona (PNNG en el Pacífico colombiano entre 2003 y 2012. Se tomaron medidas de largo recto de caparazón (LRC, largo curvo de caparazón (LCC, peso y condición corporal de 1.023 tortugas capturadas en los arrecifes del PNG. Se capturaron más tortugas negras (n = 747 que amarillas (n = 276, todas juveniles. Las tortugas negras fueron significativamente más grandes y pesadas que las amarillas. El tamaño de reclutamiento a la zona nerítica fue de 40,0–49,9 cm

  17. Growing Cloud Computing Efficiency

    Directory of Open Access Journals (Sweden)

    Dr. Mohamed F. AlAjmi, Dr. Arun Sharma, Shakir Khan

    2012-05-01

    Full Text Available Cloud computing is basically altering the expectation for how and when computing, storage and networking assets should be allocated, managed and devoted. End-users are progressively more sensitive in response time of services they ingest. Service Developers wish for the Service Providers to make sure or give the ability for dynamically assigning and managing resources in respond to alter the demand patterns in real-time. Ultimately, Service Providers are under anxiety to build their infrastructure to facilitate real-time end-to-end visibility and energetic resource management with well grained control to decrease total cost of tenure for improving quickness. What is required to rethink of the underlying operating system and management infrastructure to put up the on-going renovation of data centre from the traditional server-centric architecture model to a cloud or network centric model? This paper projects and describes a indication model for a network centric data centre infrastructure management heap that make use of it and validates key ideas that have enabled dynamism, the quality of being scalable, reliability and security in the telecommunication industry to the computing engineering. Finally, the paper will explain a proof of concept classification that was implemented to show how dynamic resource management can be enforced to enable real-time service guarantee for network centric data centre architecture.

  18. Cloud Computing and Its Applications in GIS

    Science.gov (United States)

    Kang, Cao

    2011-12-01

    of cloud computing. This paper presents a parallel Euclidean distance algorithm that works seamlessly with the distributed nature of cloud computing infrastructures. The mechanism of this algorithm is to subdivide a raster image into sub-images and wrap them with a one pixel deep edge layer of individually computed distance information. Each sub-image is then processed by a separate node, after which the resulting sub-images are reassembled into the final output. It is shown that while any rectangular sub-image shape can be used, those approximating squares are computationally optimal. This study also serves as a demonstration of this subdivide and layer-wrap strategy, which would enable the migration of many truly spatial GIS algorithms to cloud computing infrastructures. However, this research also indicates that certain spatial GIS algorithms such as cost distance cannot be migrated by adopting this mechanism, which presents significant challenges for the development of cloud-based GIS systems. The third article is entitled "A Distributed Storage Schema for Cloud Computing based Raster GIS Systems". This paper proposes a NoSQL Database Management System (NDDBMS) based raster GIS data storage schema. NDDBMS has good scalability and is able to use distributed commodity computers, which make it superior to Relational Database Management Systems (RDBMS) in a cloud computing environment. In order to provide optimized data service performance, the proposed storage schema analyzes the nature of commonly used raster GIS data sets. It discriminates two categories of commonly used data sets, and then designs corresponding data storage models for both categories. As a result, the proposed storage schema is capable of hosting and serving enormous volumes of raster GIS data speedily and efficiently on cloud computing infrastructures. In addition, the scheme also takes advantage of the data compression characteristics of Quadtrees, thus promoting efficient data storage. Through

  19. Martian Clouds

    Science.gov (United States)

    2004-01-01

    [figure removed for brevity, see original site] Released 28 June 2004 The atmosphere of Mars is a dynamic system. Water-ice clouds, fog, and hazes can make imaging the surface from space difficult. Dust storms can grow from local disturbances to global sizes, through which imaging is impossible. Seasonal temperature changes are the usual drivers in cloud and dust storm development and growth. Eons of atmospheric dust storm activity has left its mark on the surface of Mars. Dust carried aloft by the wind has settled out on every available surface; sand dunes have been created and moved by centuries of wind; and the effect of continual sand-blasting has modified many regions of Mars, creating yardangs and other unusual surface forms. This image was acquired during early spring near the North Pole. The linear 'ripples' are transparent water-ice clouds. This linear form is typical for polar clouds. The black regions on the margins of this image are areas of saturation caused by the build up of scattered light from the bright polar material during the long image exposure. Image information: VIS instrument. Latitude 68.1, Longitude 147.9 East (212.1 West). 38 meter/pixel resolution. Note: this THEMIS visual image has not been radiometrically nor geometrically calibrated for this preliminary release. An empirical correction has been performed to remove instrumental effects. A linear shift has been applied in the cross-track and down-track direction to approximate spacecraft and planetary motion. Fully calibrated and geometrically projected images will be released through the Planetary Data System in accordance with Project policies at a later time. NASA's Jet Propulsion Laboratory manages the 2001 Mars Odyssey mission for NASA's Office of Space Science, Washington, D.C. The Thermal Emission Imaging System (THEMIS) was developed by Arizona State University, Tempe, in collaboration with Raytheon Santa Barbara Remote Sensing. The THEMIS investigation is led by Dr. Philip

  20. Cloud Computing (4)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ 8 Case Study Cloud computing is still a new phenomenon. Although many IT giants are developing their own cloud computing infrastructures,platforms, software, and services, few have really succeeded in becoming cloud computing providers.

  1. Blue skies for CLOUD

    CERN Multimedia

    2006-01-01

    Through the recently approved CLOUD experiment, CERN will soon be contributing to climate research. Tests are being performed on the first prototype of CLOUD, an experiment designed to assess cosmic radiation influence on cloud formation.

  2. A hazy outlook for cloud computing.

    Science.gov (United States)

    Perna, Gabriel

    2012-01-01

    Because of competing priorities as well as cost, security, and implementation concerns, cloud-based storage development has gotten off to a slow start in healthcare. CIOs, CTOs, and other healthcare IT leaders are adopting a variety of strategies in this area, based on their organizations' needs, resources, and priorities.

  3. TRUSTED CLOUD COMPUTING FRAMEWORK FOR HEALTHCARE SECTOR

    Directory of Open Access Journals (Sweden)

    Mervat Adib Bamiah

    2014-01-01

    Full Text Available Cloud computing is rapidly evolving due to its efficient characteristics such as cost-effectiveness, availability and elasticity. Healthcare organizations and consumers lose control when they outsource their sensitive data and computing resources to a third party Cloud Service Provider (CSP, which may raise security and privacy concerns related to data loss and misuse appealing threats. Lack of consumers’ knowledge about their data storage location may lead to violating rules and regulations of Health Insurance Portability and Accountability Act (HIPAA that can cost them huge penalty. Fear of data breach by internal or external hackers may decrease consumers’ trust in adopting cloud computing and benefiting from its promising features. We designed a Healthcare Trusted Cloud Computing (HTCC framework that maintains security, privacy and considers HIPAA regulations. HTCC framework deploys Trusted Computing Group (TCG technologies such as Trusted Platform Module (TPM, Trusted Software Stack (TSS, virtual Trusted Platform Module (vTPM, Trusted Network Connect (TNC and Self Encrypting Drives (SEDs. We emphasize on using strong multi-factor authentication access control mechanisms and strict security controls, as well as encryption for data at storage, in-transit and while process. We contributed in customizing a cloud Service Level Agreement (SLA by considering healthcare requirements. HTCC was evaluated by comparing with previous researchers’ work and conducting survey from experts. Results were satisfactory and showed acceptance of the framework. We aim that our proposed framework will assist in optimizing trust on cloud computing to be adopted in healthcare sector.

  4. An Approach to Secure Resource Sharing Algorithm (SRSA) for Multi Cloud Environment

    OpenAIRE

    Er. Parul Indoria; Prof. Abhishek Didel

    2013-01-01

    Cloud computing is an idea intended to deliver computing and storage resources to a community of users. In a cloud computing environment a user can use applications without installing, and accessing personal files of any other user in the network. The cloud computing technology allows efficient computation by centralizing storage, memory and processing. The practice of computing in two or more data centers separated by the Internet in popularity due to an explosion in scalable ...

  5. Analysis of Performance and Optimization of Point Cloud Conversion in Spatial Databases

    Science.gov (United States)

    Chrόszcz, Aleksandra; Łukasik, Piotr; Lupa, Michał

    2016-10-01

    This article compares popular relational database management systems and one nonrelational database in the context of storage of cloud points from LIDAR. The authors examine the efficient storage of cloud points in the database and optimization of query execution time. Additionally, there is also a comparison of the impact of SSD and traditional HDD technology on the time taken to perform operations on a point cloud.

  6. Cloud-Top Entrainment in Stratocumulus Clouds

    Science.gov (United States)

    Mellado, Juan Pedro

    2017-01-01

    Cloud entrainment, the mixing between cloudy and clear air at the boundary of clouds, constitutes one paradigm for the relevance of small scales in the Earth system: By regulating cloud lifetimes, meter- and submeter-scale processes at cloud boundaries can influence planetary-scale properties. Understanding cloud entrainment is difficult given the complexity and diversity of the associated phenomena, which include turbulence entrainment within a stratified medium, convective instabilities driven by radiative and evaporative cooling, shear instabilities, and cloud microphysics. Obtaining accurate data at the required small scales is also challenging, for both simulations and measurements. During the past few decades, however, high-resolution simulations and measurements have greatly advanced our understanding of the main mechanisms controlling cloud entrainment. This article reviews some of these advances, focusing on stratocumulus clouds, and indicates remaining challenges.

  7. Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Directory of Open Access Journals (Sweden)

    Shanthi.P

    2013-10-01

    Full Text Available Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of dataaccess with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not provided with fault tolerant design. The proposed paper attempts to develop data scalability in a cloud environment by implementing Cloud based Gateway Clustering (CBGC mechanism with fault tolerant design. The Client accesses the data from the cloud using Cloud core storage gateway, which is an API. This paper proposes a core gateway which is divided into multiple sub virtual gateways to improve the data access speed. Also an enhanced Gateway Cut Detection (GCD Algorithm is proposed to detect and recover sub-gateway failures and make sub- gateways to be available throughout the communication. The proposed CBGC mechanism with GCD is highly scalable and reliable to cloudresources.

  8. Silicon Photonics Cloud (SiCloud)

    DEFF Research Database (Denmark)

    DeVore, P. T. S.; Jiang, Y.; Lynch, M.;

    2015-01-01

    Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths.......Silicon Photonics Cloud (SiCloud.org) is the first silicon photonics interactive web tool. Here we report new features of this tool including mode propagation parameters and mode distribution galleries for user specified waveguide dimensions and wavelengths....

  9. Detecting patterns of fertilization and frequency of multiple paternity in Chelonia mydas of Colola (Michoacán, Mexico Detección de patrones de fertilización y frecuencia de paternidad múltiple en Chelonia mydas de Colola (Michoacán, México

    Directory of Open Access Journals (Sweden)

    Libny Ingrid Lara-De La Cruz

    2010-04-01

    Full Text Available We present a microsatellite analysis that allows an indirect determination of the process of fertilization in the genital tract of Chelonia mydas. The strategy was based in that the order of oviposition is related to fertilization order. Once the genotype of the offspring was obtained through microsatellite analyses, it was possible to determine the frequency of multiple paternity and to infer the presence of anatomical structures or physiological mechanisms that allow females to undergo cryptic choice processes, which allowed us to hypothesize the existence of post-copula factors that determine reproductive success in a polyandrous system. This paper does not show the presence of physiological mechanisms that allow control of fertilization order in polyandrous females of Chelonia mydas.Presentamos un análisis con microsatélites para determinar de manera indirecta si existe un mecanismo de control del proceso de fertilización en el tracto genital de Chelonia mydas. La estrategia utilizada se basa en que el orden de oviposición está relacionado con el orden de fertilización. Determinando el genotipo de la progenie, fue posible determinar la frecuencia de paternidad múltiple e inferir la presencia de estructurasanatómicas o mecanismos fisiológicos, que actúen como factores post-copulatorios para regular los eventos reproductivos en un sistema poliándrico. El presente trabajo no muestra la presencia de mecanismos fisiológicos que permitan el control del orden de fertilización en hembras poliándricas de Chelonia mydas.

  10. Automatic Cloud Bursting under FermiCloud

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Hao [Fermilab; Shangping, Ren [IIT; Garzoglio, Gabriele [Fermilab; Timm, Steven [Fermilab; Bernabeu, Gerard [Fermilab; Kim, Hyun Woo; Chadwick, Keith; Jang, Haengjin [KISTI, Daejeon; Noh, Seo-Young [KISTI, Daejeon

    1900-01-01

    Cloud computing is changing the infrastructure upon which scientific computing depends from supercomputers and distributed computing clusters to a more elastic cloud-based structure. The service-oriented focus and elasticity of clouds can not only facilitate technology needs of emerging business but also shorten response time and reduce operational costs of traditional scientific applications. Fermi National Accelerator Laboratory (Fermilab) is currently in the process of building its own private cloud, FermiCloud, which allows the existing grid infrastructure to use dynamically provisioned resources on FermiCloud to accommodate increased but dynamic computation demand from scientists in the domains of High Energy Physics (HEP) and other research areas. Cloud infrastructure also allows to increase a private cloud’s resource capacity through “bursting” by borrowing or renting resources from other community or commercial clouds when needed. This paper introduces a joint project on building a cloud federation to support HEP applications between Fermi National Accelerator Laboratory and Korea Institution of Science and Technology Information, with technical contributions from the Illinois Institute of Technology. In particular, this paper presents two recent accomplishments of the joint project: (a) cloud bursting automation and (b) load balancer. Automatic cloud bursting allows computer resources to be dynamically reconfigured to meet users’ demands. The load balance algorithm which the cloud bursting depends on decides when and where new resources need to be allocated. Our preliminary prototyping and experiments have shown promising success, yet, they also have opened new challenges to be studied

  11. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Amina AIT OUAHMAN

    2014-10-01

    Full Text Available Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in this field to have taken place in recent times. According to the National Institute for Standards and Technology (NIST, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations. Clouds bring out tremendous benefits for both individuals and enterprises. Clouds support economic savings, outsourcing mechanisms, resource sharing, any-where any-time accessibility, on-demand scalability, and service flexibility. Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers. Clouds could also offer better security advantages over individual server deployments. Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security issues. The new concepts introduced by the clouds, such as computation outsourcing, resource sharing, and external data warehousing, increase the security and privacy concerns and create new security challenges. Moreover, the large scale of the clouds, the proliferation of mobile access devices (e

  12. Non-migratory breeding by isolated green sea turtles ( Chelonia mydas) in the Indian Ocean: biological and conservation implications

    Science.gov (United States)

    Whiting, Scott D.; Murray, Wendy; Macrae, Ismail; Thorn, Robert; Chongkin, Mohammad; Koch, Andrea U.

    2008-04-01

    Green sea turtles ( Chelonia mydas) are renowned for their long-distance migrations but have less fame for short-distance migrations or non-migratory behavior. We present satellite telemetric evidence from Cocos (Keeling) Islands, Indian Ocean for the first predominantly non-migratory green sea turtle ( C. mydas) population. The mean migration distance from the nesting beach to the foraging grounds was 35.5 km with a maximum mean transit time of 3.4 days. The behavior of this population has major implications for our general understanding of green turtle behavior and their life cycle and for conservation. Firstly, these results indicate a level of juvenile or adult non-breeding homing behavior from the open ocean to foraging grounds adjacent to their natal nesting beach. Secondly, a non-migratory breeding phase reduces the consumption of reproductive energy utilized, potentially resulting in higher fecundity for this population. Thirdly, the close proximity of the nesting and foraging habitats allows for uniformity in management and conservation strategies rarely possible for wide-ranging green turtle populations.

  13. Hearing in the Juvenile Green Sea Turtle (Chelonia mydas): A Comparison of Underwater and Aerial Hearing Using Auditory Evoked Potentials.

    Science.gov (United States)

    Piniak, Wendy E D; Mann, David A; Harms, Craig A; Jones, T Todd; Eckert, Scott A

    2016-01-01

    Sea turtles spend much of their life in aquatic environments, but critical portions of their life cycle, such as nesting and hatching, occur in terrestrial environments, suggesting that it may be important for them to detect sounds in both air and water. In this study we compared underwater and aerial hearing sensitivities in five juvenile green sea turtles (Chelonia mydas) by measuring auditory evoked potential responses to tone pip stimuli. Green sea turtles detected acoustic stimuli in both media, responding to underwater stimuli between 50 and 1600 Hz and aerial stimuli between 50 and 800 Hz, with maximum sensitivity between 200 and 400 Hz underwater and 300 and 400 Hz in air. When underwater and aerial hearing sensitivities were compared in terms of pressure, green sea turtle aerial sound pressure thresholds were lower than underwater thresholds, however they detected a wider range of frequencies underwater. When thresholds were compared in terms of sound intensity, green sea turtle sound intensity level thresholds were 2-39 dB lower underwater particularly at frequencies below 400 Hz. Acoustic stimuli may provide important environmental cues for sea turtles. Further research is needed to determine how sea turtles behaviorally and physiologically respond to sounds in their environment.

  14. Development and application of biochemical and haematological reference intervals to identify unhealthy green sea turtles (Chelonia mydas).

    Science.gov (United States)

    Flint, Mark; Morton, John M; Limpus, Colin J; Patterson-Kane, Janet C; Murray, Peter J; Mills, Paul C

    2010-09-01

    Biochemical and haematological reference intervals (RIs) have been reported for sea turtles, but their value for ante-mortem disease diagnosis may be limited due to small sample sizes and outdated statistical analyses. In the present study, 290 green sea turtles (Chelonia mydas) were captured, clinically assessed and blood sampled. Of these, 211 were classified as 'clinically healthy' and 25 as 'clinically unhealthy'. RIs were estimated using data from the healthy turtles and compared with blood values from the unhealthy animals. All of the unhealthy animals had plasma biochemical and haematological values outside one or more RIs (albumin, 48% of unhealthy animals; alkaline phosphatase, 35%; aspartate transaminase, 13%; creatinine, 30%; globulin, 3%; glucose, 34%; lactic dehydrogenase, 26%; phosphorus, 22%; sodium, 13%; thrombocytes, 57%; and monocytes, 5%). Among small immature turtles, those with Chelonibia testudinaria plastron barnacle counts 20 were three times more likely to be unhealthy than those with no barnacles. In addition, small immature and mature turtles were more likely to be unhealthy than large immature turtles.

  15. Flow cytometry as a tool in the evaluation of blood leukocyte function in Chelonia mydas (Linnaeus, 1758) (Testudines, Cheloniidae).

    Science.gov (United States)

    Rossi, S; Sá-Rocha, V M; Kinoshita, D; Genoy-Puerto, A; Zwarg, T; Werneck, M R; Sá-Rocha, L C; Matushima, E R

    2009-08-01

    Chelonia mydas is a sea turtle that feeds and nests on the Brazilian coast and a disease called fibropapillomatosis is a threat to this species. Because of this, it is extremely necessary to determine a methodology that would enable the analysis of blood leukocyte function in these sea turtles. In order to achieve this aim, blood samples were collected from C. mydas with or without fibropapillomas captured on the São Paulo north coast. Blood samples were placed in tubes containing sodium heparin and were transported under refrigeration to the laboratory in sterile RPMI 1640 cell culture medium. Leukocytes were separated by density gradient using Ficoll-PaqueTM Plus, Amershan Biociences. The following stimuli were applied in the assessment of leukocyte function: Phorbol Miristate-Acetate (PMA) for oxidative burst activity evaluation and Zymosan A (Saccharomyces cerevisiae) Bio Particles, Alexa Fluor 594 conjugate for phagocytosis evaluation. Three cell populations were identified: heterophils, monocytes and lymphocytes. Monocytes were the cells responsible for phagocytosis and oxidative burst.

  16. Molecular Characterization of Coccidia Associated with an Epizootic in Green Sea Turtles (Chelonia mydas) in South East Queensland, Australia.

    Science.gov (United States)

    Chapman, Phoebe A; Owen, Helen; Flint, Mark; Traub, Rebecca J; Cribb, Thomas H; Mills, Paul C

    2016-01-01

    In the spring of 2014, mass mortalities among wild green sea turtles occurred off the coast of south-east Queensland, Australia. The suspected causative agent was Caryospora cheloniae, an eimeriid coccidian implicated in previous epizootics. Necropsies were undertaken on a subset of 11 dead turtles, with subsequent histopathology and molecular analyses. All turtles returned positive PCR results for coccidial infection in various tissues; these included the brain, gastrointestinal tract, lung, kidney and thyroid. Granulomatous encephalitis was consistently observed, as well as enteritis and, less frequently, thyroiditis and nephritis. Sequencing and phylogenetic analyses indicated the presence of two distinct coccidian genotypes, presumably separate species-one associated with the brain, gastrointestinal tract and lung, and the second with the thyroid and kidney. Maximum likelihood and Bayesian inference analyses placed the first genotype closest to the lankesterellid genus Schellackia, rather than in the Eimeriidae, while the second was paraphyletic to the eimeriids. Presence of coccidial stages in extra-intestinal tissues of the primary host raises questions about the potential presence of intermediate or paratenic hosts within the life cycles, as well as their current placement relative to the genus Caryospora. This study represents the first genetic characterization of this emerging disease agent in green sea turtles, an endangered species, and has relevance for life-cycle elucidation and future development of diagnostics.

  17. Characterization of fibropapillomatosis in green turtles Chelonia mydas (Cheloniidae) captured in a foraging area in southeastern Brazil.

    Science.gov (United States)

    Tagliolatto, Alícia Bertoloto; Guimarães, Suzana Machado; Lobo-Hajdu, Gisele; Monteiro-Neto, Cassiano

    2016-10-27

    Fibropapillomatosis (FP) is a multifactorial disease that affects all species of marine turtles, including green turtles Chelonia mydas (Linnaeus, 1758). It is characterised by the development of internal or external tumours that, depending on their locations and sizes, may intensely impact the health condition of sea turtles. The goal of this study was to characterise the disease in C. mydas found in a foraging area in southeastern Brazil, evaluate the prevalence in this region, and correlate presence and absence, size, body distribution, number of tumours, and disease severity with biometric variables of the captured green turtles. Between 2008 and 2014, the prevalence rate of FP was 43.09%, out of 246 green turtles. The size of the animals with FP was relatively greater than animals without tumours, and the prevalence of FP increased with animal size, peaking in the 60-80 cm size class. From 2013 to 2014, gross evaluation of fibropapillomas was performed. The number of tumours per turtle ranged from 1 to 158. The size of tumours ranged from 10 cm (Size D); Size A tumours and turtles slightly affected by the disease (Score 1) predominated. Tumour progression (72.1%) and regression (32.8%) were seen in some recaptured individuals (n = 61). Moreover, 24.6% of these turtles showed both progressions and regressions of tumours.

  18. Flow cytometry as a tool in the evaluation of blood leukocyte function in Chelonia mydas (Linnaeus, 1758 (Testudines, Cheloniidae

    Directory of Open Access Journals (Sweden)

    S. Rossi

    Full Text Available Chelonia mydas is a sea turtle that feeds and nests on the Brazilian coast and a disease called fibropapillomatosis is a threat to this species. Because of this, it is extremely necessary to determine a methodology that would enable the analysis of blood leukocyte function in these sea turtles. In order to achieve this aim, blood samples were collected from C. mydas with or without fibropapillomas captured on the São Paulo north coast. Blood samples were placed in tubes containing sodium heparin and were transported under refrigeration to the laboratory in sterile RPMI 1640 cell culture medium. Leukocytes were separated by density gradient using Ficoll-PaqueTM Plus, Amershan Biociences®. The following stimuli were applied in the assessment of leukocyte function: Phorbol Miristate-Acetate (PMA for oxidative burst activity evaluation and Zymosan A (Saccharomyces cerevisiae Bio Particles®, Alexa Fluor® 594 conjugate for phagocytosis evaluation. Three cell populations were identified: heterophils, monocytes and lymphocytes. Monocytes were the cells responsible for phagocytosis and oxidative burst.

  19. Concentration of heavy metals in tissues of green turtles (Chelonia mydas sampled in the Cananéia estuary, Brazil

    Directory of Open Access Journals (Sweden)

    Edison Barbieri

    2009-09-01

    Full Text Available Thirty specimens (15 adults and 15 juveniles of Chelonia mydas found in the Cananéia estuary in the state of São Paulo on the southeastern Brazilian coast between January 2005 and September 2006, were analyzed The concentrations of Cd, Cu, Pb, Mn and Ni in liver and kidney samples of adult and juvenile green turtles were determined by Flame Atomic Absorption Spectrophotometry.The average Cd concentration found in adult livers (0.57µg.g-1 was significantly higher than that in juveniles (0.279µg.g-1. Cu concentrations were significantly higher in the liver than in the kidney, and significantly higher in adults (39.9µg.g-1 than in juveniles (20.7µg.g-1 Average Mn concentrations in liver and kidney did not differ between adults (4.32 and 4.17µg.g-1 and juveniles (4.81 and 3.82µg.g-1, whereas Ni concentrations in adults (0.28 and 0.19µg.g-1, respectively were significantly higher than in juveniles (0.13 and 0.089µg.g-1, respectively. Pb concentrations in liver were significantly higher in adults (0.37µg.g-1 than in juveniles (0.06µg.g-1. The concentrations of essential trace elements in Chelonia mydas were generally comparable to values reported in other, similar studies. With respect to non-essential metals (Cd, Pb and Ni, Chelonia mydas presented lower values than those reported for their northern Atlantic counterparts.Analisou-se 30 espécimes (15 adultos e 15 juvenis de Chelonia mydas encontradas no estuário de Cananéia, Estado de São Paulo, região sudeste, durante o período de janeiro de 2005 a setembro de 2006. Foram determinados no fígado e rins de adultos e juvenis de C. mydas os seguintes metais: Cd, Cu, Pb, Mn e Ni, através de Espectrofotometria de Absorção Atômica. Verificou-se que as concentrações médias de Cd no fígado de adultos (0,957µg.g-1 foram significativamente diferentes em relação a dos juvenis (0,279µg.g-1. As concentrações médias de Cu no fígado de C. mydas foram diferentes em relação ao rim

  20. First record of hybridization between green Chelonia mydas and hawksbill Eretmochelys imbricata sea turtles in the Southeast Pacific.

    Science.gov (United States)

    Kelez, Shaleyla; Velez-Zuazo, Ximena; Pacheco, Aldo S

    2016-01-01

    Hybridization among sea turtle species has been widely reported in the Atlantic Ocean, but their detection in the Pacific Ocean is limited to just two individual hybrid turtles, in the northern hemisphere. Herein, we report, for the first time in the southeast Pacific, the presence of a sea turtle hybrid between the green turtle Chelonia mydas and the hawksbill turtle Eretmochelys imbricata. This juvenile sea turtle was captured in northern Peru (4°13'S; 81°10'W) on the 5(th) of January, 2014. The individual exhibited morphological characteristics of C. mydas such as dark green coloration, single pair of pre-frontal scales, four post-orbital scales, and mandibular median ridge, while the presence of two claws in each frontal flipper, and elongated snout resembled the features of E. imbricata. In addition to morphological evidence, we confirmed the hybrid status of this animal using genetic analysis of the mitochondrial gene cytochrome oxidase I, which revealed that the hybrid individual resulted from the cross between a female E. imbricata and a male C. mydas. Our report extends the geographical range of occurrence of hybrid sea turtles in the Pacific Ocean, and is a significant observation of interspecific breeding between one of the world's most critically endangered populations of sea turtles, the east Pacific E. imbricata, and a relatively healthy population, the east Pacific C. mydas.

  1. Reproductive biology of the green turtle (Chelonia mydas) at Tern Island, French Frigate Shoals, Hawai`i

    Science.gov (United States)

    Niethammer, K.R.; Balazs, G.H.; Hatfield, J.S.; Nakai, G.L.; Megyesi, J.L.

    1997-01-01

    We monitored nesting of the green turtle (Chelonia mydas Linnaeus) on Tern Island, French Frigate Shoals, in the Northwestern Hawaiian Islands from 1986 through 1991. Egg oviposition occurred between 26 April and 20 October. Nesting peaked between mid-June and early August. Hatchlings emerged between mid-August and early October. Mean incubation period was 66.0 (range 53-97) days. Mean clutch size was 92.4 (range 33-150) eggs. Mean hatching success was 78.6% when averaged over success of individual nests and 81.1% when calculated as percentage of total number of eggs. Natural hatchling emergence was 71.1%, based on percentage of total number of eggs. Live and dead hatchlings were found when nests were excavated and accounted for 10.0% of the eggs. Incubation periods tended to be longer in early and later portions of the season than in midseason, and incubation periods tended to decrease the farther inland the nest was situated from the high tide line. Maximum hatching success occurred at an incubation length of 66.7 days. Other trends indicated that nesting peaked near 5 July when conditions produced a near optimal incubation period for yielding maximum hatching success.

  2. IDENTIFICATION OF THE STOCK/POPULATION OF GREEN TURTLE (Chelonia mydas IN THE SUKAMADE (EAST JAVA NESTING BEACH

    Directory of Open Access Journals (Sweden)

    HIDAYATUN NISA PURWANASARI

    2015-06-01

    Full Text Available Defining the genetic structure of a particular population of marine turtle is an essential ecological aspect to promote their conservation and enhancement because the resources-protect schemes should be made to the each population unit. Mitochondrial DNA (mtDNA has been proven effective for detecting population structure in nesting population. We use this method to assess the stock/population of green turtle ( Chelonia mydas in the Sukamade nesting beach. Three haplotypes, i.e. C3, CS, and the new one that we called Sl were found. Haplotype (hd and nucleotide diversities (? were calculated to be 0.538 ± 0.115 and 0.00381, respectively. The closest genetic distance was 0.003 (between C3 and CS, and the longest was 0.011 (between C3 and Sl. Comparison between the genetic distances that found in this research and those defined for the Australasian region by Moritz et al ( 2002 is presented as a phylogenetic tree. Pairwise Fst using molecular distances following the model of Tamura-Nei for nucleotide substitution, as well as two other tests, i.e. pairwise Fst using haplotype frequencies, and the Exact test strongly indicates that the nesting population of Sukamade beach is genetically distinct as compared to the other nesting population within the Australasian region.

  3. Swimming for your life: locomotor effort and oxygen consumption during the green turtle (Chelonia mydas) hatchling frenzy.

    Science.gov (United States)

    Booth, David T

    2009-01-01

    Swimming effort and oxygen consumption of newly emerged green turtle Chelonia mydas hatchlings was measured simultaneously and continuously for the first 18 h of swimming after hatchlings entered the water. Oxygen consumption was tightly correlated to swimming effort during the first 12 h of swimming indicating that swimming is powered predominantly by aerobic metabolism. The patterns of swimming effort and oxygen consumption could be divided into three distinct phases: (1) the rapid fatigue phase from 0 to 2 h when the mean swim thrust decreased from 45 to 30 mN and oxygen consumption decreased from 33 to 18 ml h(-1); (2) the slow fatigue phase from 2 to 12 h when the mean swim thrust decreased from 30 to 22 mN and oxygen consumption decreased from 18 to 10 ml h(-1); and (3) the sustained effort phase from 12 to 18 h when mean swim thrust averaged 22 mN and oxygen consumption averaged 10 ml h(-1). The decrease in mean swim thrust was caused by a combination of a decrease in front flipper stroke rate during a power stroking bout, a decrease in mean maximum thrust during a power stroking bout and a decrease in the proportion of time spent power stroking. Hence hatchlings maximise their swimming thrust as soon as they enter the water, a time when a fast swimming speed will maximise the chance of surviving the gauntlet of predators inhabiting the shallow fringing reef before reaching the relative safety of deeper water.

  4. Stable isotopes in barnacles as a tool to understand green sea turtle (Chelonia mydas) regional movement patterns

    Science.gov (United States)

    Detjen, M.; Sterling, E.; Gómez, A.

    2015-12-01

    Sea turtles are migratory animals that travel long distances between their feeding and breeding grounds. Traditional methods for researching sea turtle migratory behavior have important disadvantages, and the development of alternatives would enhance our ability to monitor and manage these globally endangered species. Here we report on the isotope signatures in green sea-turtle (Chelonia mydas) barnacles (Platylepas sp.) and discuss their potential relevance as tools with which to study green sea turtle migration and habitat use patterns. We analyzed oxygen (δ18O) and carbon (δ13C) isotope ratios in barnacle calcite layers from specimens collected from green turtles captured at the Palmyra Atoll National Wildlife Refuge (PANWR) in the central Pacific. Carbon isotopes were not informative in this study. However, the oxygen isotope results suggest likely regional movement patterns when mapped onto a predictive oxygen isotope map of the Pacific. Barnacle proxies could therefore complement other methods in understanding regional movement patterns, informing more effective conservation policy that takes into account connectivity between populations.

  5. Accumulation of trace metals in the embryos and hatchlings of Chelonia mydas from Peninsular Malaysia incubated at different temperatures.

    Science.gov (United States)

    Ikonomopoulou, Maria P; Olszowy, Henry; Francis, Rod; Ibrahim, Kamarruddin; Whittier, Joan

    2013-04-15

    A variety of trace metals were measured in the egg contents of three clutches of Chelonia mydas collected from Kuala Terengganu state in Peninsular Malaysia. We quantified Mn, Cu, Zn, Se (essential trace metals) and As (anthropogenic pollutant) at several developmental stages obtained by incubating eggs at two different temperatures (27 °C and 31 °C). The incubation temperatures were chosen because they produce predominantly male or predominantly female hatchlings, respectively. The eggs were removed from the sand and washed before being placed in incubators, to ensure that the only possible source of the detected metals was maternal transfer. Other metals: Mo, Co, Ni, Cd, Sn, Sb, Hg, Tl and Pb (all non-essential metals) were detected at concentrations below the lower limit of quantitation (LLOQ). Trace metal concentrations, particularly [Zn], increased during development, other metals (Cu, As, Se and Cr) accumulated to a lesser degree than zinc but no significant differences were observed between the incubation temperatures at any stage of incubation. To date, only a few studies on trace metals in turtle embryos and hatchlings have been reported; this study will provide basic knowledge on the accumulation of trace metals during development at two different incubation temperatures.

  6. Localization of fibropapilloma-associated turtle herpesvirus in green turtles (Chelonia mydas) by in-situ hybridization.

    Science.gov (United States)

    Kang, K I; Torres-Velez, F J; Zhang, J; Moore, P A; Moore, D P; Rivera, S; Brown, C C

    2008-11-01

    Fibropapilloma-associated turtle herpesvirus (FPTHV) is the presumed aetiological agent of sea turtle fibropapillomatosis (FP). Intralesional DNA and RNA of the virus have been detected by polymerase chain reaction (PCR) and reverse transcriptase-PCR (RT-PCR), respectively, but the exact location and distribution of the virus within the tumours have not been addressed. In this study, in-situ hybridization (ISH) was used to investigate viral transcriptional activity and localization of FPTHV. Twenty-five tumours were obtained from the skin or conjunctiva of 105 green turtles (Chelonia mydas) examined on two islands in Puerto Rico (Culebra and Culebrita). These lesions comprised 19 fibropapillomas and six fibromas. FPTHV mRNA transcripts were detected by ISH in three fibropapillomas, with positive reactions confined to the nuclei of clusters of epithelial cells. Viral DNA was detected by riboprobe ISH combined with denaturation in 14 tumours, including both fibropapillomas and fibromas. Signals were confined to the nuclei of acanthotic epithelial cells and were not seen in the subepithelial fibrous areas of the tumours. These results suggest that FPTHV is present in epithelial cells and transcriptionally active in fibropapillomas.

  7. Winter diets of immature green turtles (Chelonia mydas) on a northern feeding ground: integrating stomach contents and stable isotope analyses

    Science.gov (United States)

    Williams, Natalie C.; Bjorndal, Karen A.; Lamont, Margaret M.; Carthy, Raymond R.

    2015-01-01

    The foraging ecology and diet of the green turtle, Chelonia mydas, remain understudied, particularly in peripheral areas of its distribution. We assessed the diet of an aggregation of juvenile green turtles at the northern edge of its range during winter months using two approaches. Stomach content analyses provide a single time sample, and stable isotope analyses integrate diet over a several-month period. We evaluated diet consistency in prey choice over time by comparing the results of these two approaches. We examined stomach contents from 43 juvenile green turtles that died during cold stunning events in St. Joseph Bay, Florida, in 2008 and 2011. Stomach contents were evaluated for volume, dry mass, percent frequency of occurrence, and index of relative importance of individual diet items. Juvenile green turtles were omnivorous, feeding primarily on seagrasses and tunicates. Diet characterizations from stomach contents differed from those based on stable isotope analyses, indicating the turtles are not feeding consistently during winter months. Evaluation of diets during warm months is needed.

  8. Spirorchiidiasis in stranded loggerhead Caretta caretta and green turtles Chelonia mydas in Florida (USA): host pathology and significance.

    Science.gov (United States)

    Stacy, Brian A; Foley, Allen M; Greiner, Ellis; Herbst, Lawrence H; Bolten, Alan; Klein, Paul; Manire, Charles A; Jacobson, Elliott R

    2010-04-09

    Spirorchiid trematodes are implicated as an important cause of stranding and mortality in sea turtles worldwide. However, the impact of these parasites on sea turtle health is poorly understood due to biases in study populations and limited or missing data for some host species and regions, including the southeastern United States. We examined necropsy findings and parasitological data from 89 loggerhead Caretta caretta and 59 green turtles Chelonia mydas that were found dead or moribund (i.e. stranded) in Florida (USA) and evaluated the role of spirorchiidiasis in the cause of death. High prevalence of infection in the stranding population was observed, and most infections were regarded as incidental to the cause of death. Spirorchiidiasis was causal or contributory to death in some cases; however, notable host injury and/or large numbers of parasites were observed in some animals, including nutritionally robust turtles, with no apparent relationship to cause of death. New spirorchiid species records for the region were documented and identified genera included Neospirorchis, Hapalotrema, Carettacola, and Learedius. Parasites inhabited and were associated with injury and inflammation in a variety of anatomic locations, including large arteries, the central nervous system, endocrine organs, and the gastrointestinal tract. These findings provide essential information on the diversity of spirorchiids found in Florida sea turtles, as well as prevalence of infection and the spectrum of associated pathological lesions. Several areas of needed study are identified with regard to potential health implications in the turtle host, and findings caution against over-interpretation in individual cases.

  9. Evidence of regression of fibropapillomas in juvenile green turtles Chelonia mydas caught in Niterói, southeast Brazil.

    Science.gov (United States)

    Machado Guimarães, Suzana; Mas Gitirana, Humberto; Vidal Wanderley, Amanda; Monteiro-Neto, Cassiano; Lobo-Hajdu, Gisele

    2013-02-28

    Fibropapillomatosis is a disease characterized by cutaneous tumors affecting all marine turtle species, but mostly Chelonia mydas. The disease was first reported in 1938, and since then, the number of sightings has been increasing over the years. This disease can cause many complications in the affected animal and can lead to death, and is thus included in the many threats to marine turtle populations. It is still not known for certain what causes this disease, although many studies indicate a herpesvirus as the main etiologic agent. The incidence of fibropapillomatosis is rarely reported in adults, leading to speculations that there may be a cure for the disease or that the animals die before reaching adulthood. In this paper, 2 cases of fibropapillomatosis regression are reported from juvenile C. mydas caught between July 2008 and July 2010 in the coastal zone of Itaipu, Niterói, Rio de Janeiro, Brazil. These individuals were identified photographically upon recapture. One individual had a total regression (disappearance) of external papilloma within 164 d between first capture and recapture, and the other individual had a partial regression (decrease in size) observed within 13 to 188 d of recapture. The mechanism that triggers the regression is still unknown but is likely to be an immune system response or removal of the tumor promoter. There are few reported cases of regression in the world, and constant monitoring through mark-recapture is necessary to assess whether the marine turtles affected by this disease have real chances of survival.

  10. First record of hybridization between green Chelonia mydas and hawksbill Eretmochelys imbricata sea turtles in the Southeast Pacific

    Directory of Open Access Journals (Sweden)

    Shaleyla Kelez

    2016-02-01

    Full Text Available Hybridization among sea turtle species has been widely reported in the Atlantic Ocean, but their detection in the Pacific Ocean is limited to just two individual hybrid turtles, in the northern hemisphere. Herein, we report, for the first time in the southeast Pacific, the presence of a sea turtle hybrid between the green turtle Chelonia mydas and the hawksbill turtle Eretmochelys imbricata. This juvenile sea turtle was captured in northern Peru (4°13′S; 81°10′W on the 5th of January, 2014. The individual exhibited morphological characteristics of C. mydas such as dark green coloration, single pair of pre-frontal scales, four post-orbital scales, and mandibular median ridge, while the presence of two claws in each frontal flipper, and elongated snout resembled the features of E. imbricata. In addition to morphological evidence, we confirmed the hybrid status of this animal using genetic analysis of the mitochondrial gene cytochrome oxidase I, which revealed that the hybrid individual resulted from the cross between a female E. imbricata and a male C. mydas. Our report extends the geographical range of occurrence of hybrid sea turtles in the Pacific Ocean, and is a significant observation of interspecific breeding between one of the world’s most critically endangered populations of sea turtles, the east Pacific E. imbricata, and a relatively healthy population, the east Pacific C. mydas.

  11. Molecular Characterization of Coccidia Associated with an Epizootic in Green Sea Turtles (Chelonia mydas in South East Queensland, Australia.

    Directory of Open Access Journals (Sweden)

    Phoebe A Chapman

    Full Text Available In the spring of 2014, mass mortalities among wild green sea turtles occurred off the coast of south-east Queensland, Australia. The suspected causative agent was Caryospora cheloniae, an eimeriid coccidian implicated in previous epizootics. Necropsies were undertaken on a subset of 11 dead turtles, with subsequent histopathology and molecular analyses. All turtles returned positive PCR results for coccidial infection in various tissues; these included the brain, gastrointestinal tract, lung, kidney and thyroid. Granulomatous encephalitis was consistently observed, as well as enteritis and, less frequently, thyroiditis and nephritis. Sequencing and phylogenetic analyses indicated the presence of two distinct coccidian genotypes, presumably separate species-one associated with the brain, gastrointestinal tract and lung, and the second with the thyroid and kidney. Maximum likelihood and Bayesian inference analyses placed the first genotype closest to the lankesterellid genus Schellackia, rather than in the Eimeriidae, while the second was paraphyletic to the eimeriids. Presence of coccidial stages in extra-intestinal tissues of the primary host raises questions about the potential presence of intermediate or paratenic hosts within the life cycles, as well as their current placement relative to the genus Caryospora. This study represents the first genetic characterization of this emerging disease agent in green sea turtles, an endangered species, and has relevance for life-cycle elucidation and future development of diagnostics.

  12. Cloud-based space situational awareness: initial design and evaluation

    Science.gov (United States)

    Liu, Bingwei; Chen, Yu; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik

    2013-05-01

    The need for a global collaborating space situational awareness (SSA) network, including radars, optical and other sensors for communication and surveillance, has become a top priority for most countries who own or operate man-made space-crafts. Such a SSA system requires vast storage, powerful computing capacity and the ability to serve hundreds of thousands of users to access the same database. These requirements make traditional distributed networking system insufficient. Cloud computing, which features scalable and elastic storage and computing services, has been recognized as an ideal candidate that can meet the challenges of SSA systems' requirements. In this paper, we propose a Cloud-based information fusion system for SSA and examine a prototype that serves space tracking algorithms. We discuss the benefits of using Cloud Computing as an alternative for data processing and storage and explore details of Cloud implementation for a representative SSA system environment.

  13. Bioinformatics clouds for big data manipulation

    KAUST Repository

    Dai, Lin

    2012-11-28

    As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics.This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor. 2012 Dai et al.; licensee BioMed Central Ltd.

  14. Bioinformatics clouds for big data manipulation

    Directory of Open Access Journals (Sweden)

    Dai Lin

    2012-11-01

    Full Text Available Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS, Software as a Service (SaaS, Platform as a Service (PaaS, and Infrastructure as a Service (IaaS, and present our perspectives on the adoption of cloud computing in bioinformatics. Reviewers This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.

  15. Security Issues related with cloud computing

    Directory of Open Access Journals (Sweden)

    Manju,

    2014-04-01

    Full Text Available The term CLOUD means Common Location Independent Online Utility on Demand. It‟s an emerging technology in IT industries. Cloud technologies are improving day by day and now it become a need for all small and large scale industries. Companies like Google, Amazon, Microsoft etc. is providing virtualized environment for user by which it omits the need for physical storage and others. But as the advantage of cloud computing is increasing day by day the issues are also threatening the IT industries. These issues related with the security of the data. The basic idea of this review paper is to elaborate the security issues related with cloud computing and what methods are implemented to improve these security. Certain algorithms like RSA, DES, and Ceaser Cipher etc. implemented to improve the security issues. In this paper we have implemented Identity based mRSA algorithm in this paper for improving security of data.

  16. Cloud computing and digital media fundamentals, techniques, and applications

    CERN Document Server

    Li, Kuan-Ching; Shih, Timothy K

    2014-01-01

    Cloud Computing and Digital Media: Fundamentals, Techniques, and Applications presents the fundamentals of cloud and media infrastructure, novel technologies that integrate digital media with cloud computing, and real-world applications that exemplify the potential of cloud computing for next-generation digital media. It brings together technologies for media/data communication, elastic media/data storage, security, authentication, cross-network media/data fusion, interdevice media interaction/reaction, data centers, PaaS, SaaS, and more.The book covers resource optimization for multimedia clo

  17. Electron cloud effects: codes and simulations at KEK

    CERN Document Server

    Ohmi, K

    2013-01-01

    Electron cloud effects had been studied at KEK-Photon Factory since 1995. e-p instability had been studied in proton rings since 1965 in BINP, ISR and PSR. Study of electron cloud effects with the present style, which was based on numerical simulations, started at 1995 in positron storage rings. The instability observed in KEKPF gave a strong impact to B factories, KEKB and PEPII, which were final stage of their design in those days. History of cure for electron cloud instability overlapped the progress of luminosity performance in KEKB. The studies on electron cloud codes and simulations in KEK are presented.

  18. Design Private Cloud of Oil and Gas SCADA System

    Directory of Open Access Journals (Sweden)

    Liu Miao

    2014-05-01

    Full Text Available SCADA (Supervisory Control and Data Acquisition system is computer control system based on supervisory. SCADA system is very important to oil and gas pipeline engineering. Cloud computing is fundamentally altering the expectations for how and when computing, storage and networking resources should be allocated, managed and consumed. In order to increase resource utilization, reliability and availability of oil and gas pipeline SCADA system, the SCADA system based on cloud computing is proposed in the paper. This paper introduces the system framework of SCADA system based on cloud computing and the realization details about the private cloud platform of SCADA system.

  19. Telemedicine Based on Mobile Devices and Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Lidong Wang

    2014-04-01

    Full Text Available Mobile devices such as smartphones and tablets support kinds of mobile computing and services. They can access to the cloud or offload the computation-intensive part to the cloud computing resources. Mobile cloud computing (MCC integrates the cloud computing into the mobile environment, which extends mobile devices’ battery lifetime, improves their data storage capacity and processing power, and improves their reliability and information security. In this paper, the applications of smartphones in telemedicine and MCC-based telemedicine were presented. Issues on the information security of smartphones and tablets, challenges of smartphones in telemedicine and challenges of MCC-based telemedicine were also introduced.

  20. Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing

    OpenAIRE

    Yang, Ching-Nung; Lai, Jia-Bin; Fu, Zhangjie

    2015-01-01

    Cloud computing is an Internet-based computing. In cloud computing, the service is fully served by the provider. Users need nothing but personal devices and Internet access. Computing services, such as data, storage, software, computing, and application, can be delivered to local devices through Internet. The major security issue of cloud computing is that cloud providers must ensure that their infrastructure is secure, and prevent illegal data accesses from outsiders, other clients, or even ...

  1. Like Open Source, Cloud Hides in Plain Sight

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ I came across an article in InfoWorld about a survey that TheInfoPro conducted among Fortune 1000 firms regarding their use of public cloud storage offerings.The bottom line: they haven't, they aren't, and they won't.Eightyseven percent of respondents stated they have no plans to use public storage-as-a-service, while only 10% say that they will.Clearly, the survey indicates this market segment has no use for cloud storage.

  2. Crushing data silos with ownCloud

    CERN Document Server

    CERN. Geneva

    2013-01-01

    More and more people store their personal files and documents in cloud services like Dropbox, Google Drive, Skydrive or iCloud. The reason is that they provide convenient features to sync your files between devices and share them with others. We are heading full speed into a future where a huge piece of the personal information of the world is stored in very few centralized services. Questions emerge what the impact on user privacy, surveillance, lawfulness of content and storage cost will be in in the long run. I don't think that a world where most of the personal data of the world is stored on servers of a hand full companies is a good one. This talk will discuss the problems of a future with centralized cloud file sync and share services and will present ownCloud as a possible solution. ownCloud is a free software project that offers a decentralized alternative to proprietary cloud services where everybody can run an own cloud service comparable with Dropbox but on own hardware and with full ...

  3. Cloud Computing (2)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: Cloud computing is a topic of intense interest in the Internet field. Major IT giants have launched their own cloud computing products. This four-part lecture series discusses cloud computing technology in the following aspects: The first part provided a brief description of the origin and characteristics of cloud computing from the users view of point; the other parts introduce typical applications of cloud computing, technically analyze the specific content within the cloud, its components, architecture and computational paradigm, compare cloud computing to other distributed computing technologies, and discuss its successful cases, commercial models, related technical and economic issues, and development trends.

  4. Cloud Computing (1)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: Cloud computing is a topic of intense interest in the Internet field. Major IT giants have launched their own cloud computing products. This four-part lecture series will discuss cloud computing technology in the following aspects: The first part provides a brief description of the origin and characteristics of cloud computing from the users view of point; the other parts introduce typical applications of cloud computing, technically analyze the specific content within the cloud, its components, architecture and computational paradigm, compare cloud computing to other distributed computing technologies, and discuss its successful cases, commercial models, related technical and economic issues, and development trends.

  5. Robots and sensor clouds

    CERN Document Server

    Shakshuki, Elhadi

    2016-01-01

    This book comprises four chapters that address some of the latest research in clouds robotics and sensor clouds. The first part of the book includes two chapters on cloud robotics. The first chapter introduces a novel resource allocation framework for cloud robotics and proposes a Stackelberg game model and the corresponding task oriented pricing mechanism for resource allocation. In the second chapter, the authors apply Cloud Computing for building a Cloud-Based 3D Point Cloud extractor for stereo images. Their objective is to have a dynamically scalable and applicable to near real-time scenarios.  .

  6. Data Classification Based on Confidentiality in Virtual Cloud Environment

    Directory of Open Access Journals (Sweden)

    Munwar Ali Zardari

    2014-10-01

    Full Text Available The aim of this study is to provide suitable security to data based on the security needs of data. It is very difficult to decide (in cloud which data need what security and which data do not need security. However it will be easy to decide the security level for data after data classification according to their security level based on the characteristics of the data. In this study, we have proposed a data classification cloud model to solve data confidentiality issue in cloud computing environment. The data are classified into two major classes: sensitive and non-sensitive. The K-Nearest Neighbour (K-NN classifier is used for data classification and the Rivest, Shamir and Adelman (RSA algorithm is used to encrypt sensitive data. After implementing the proposed model, it is found that the confidentiality level of data is increased and this model is proved to be more cost and memory friendly for the users as well as for the cloud services providers. The data storage service is one of the cloud services where data servers are virtualized of all users. In a cloud server, the data are stored in two ways. First encrypt the received data and store on cloud servers. Second store data on the cloud servers without encryption. Both of these data storage methods can face data confidentiality issue, because the data have different values and characteristics that must be identified before sending to cloud severs.

  7. The CLOUD experiment

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The Cosmics Leaving Outdoor Droplets (CLOUD) experiment as shown by Jasper Kirkby (spokesperson). Kirkby shows a sketch to illustrate the possible link between galactic cosmic rays and cloud formations. The CLOUD experiment uses beams from the PS accelerator at CERN to simulate the effect of cosmic rays on cloud formations in the Earth's atmosphere. It is thought that cosmic ray intensity is linked to the amount of low cloud cover due to the formation of aerosols, which induce condensation.

  8. Cloud Computing (3)

    Institute of Scientific and Technical Information of China (English)

    Wang Bai; Xu Liutong

    2010-01-01

    @@ Editor's Desk: In the preceding two parts of this series, several aspects of cloud computing-including definition, classification, characteristics, typical applications, and service levels-were discussed. This part continues with a discussion of Cloud Computing Oopen Architecture and Market-Oriented Cloud. A comparison is made between cloud computing and other distributed computing technologies, and Google's cloud platform is analyzed to determine how distributed computing is implemented in its particular model.

  9. Hematological profile of Chelonia mydas (Testudines, Cheloniidae according to the severity of fibropapillomatosis or its absence Perfil hematológico de Chelonia mydas (Testudines, Cheloniidae de acordo com o grau de acometimento pela fibropapilomatose e sua ausência

    Directory of Open Access Journals (Sweden)

    Silmara Rossi

    2009-12-01

    Full Text Available The green turtle Chelonia mydas feeds and nests in the Brazilian coastal area and is considered an endangered species by the World Conservation Union (IUCN 2009 and threatened by the Red List of Brazilian Fauna (Ministério do Meio Ambiente 2009. Fibropapillomatosis is a disease characterized by benign skin tumors (fibropapillomas, and it is one of the main threats to the survival of this species. Studies suggest the involvement of viruses as infectious agents associated with environmental and genetic factors. Blood samples were collected from 45 turtles captured in the coastal area of the state of Sao Paulo, Brazil. From these, 27 were affected by fibropapillomas and 18 were tumor free. Biometrical data on the turtles, size, location and quantity of tumors were recorded. The area occupied by fibropapillomas per animal was calculated and four groups were determined according to severity of the disease or its absence. The objective of the study was to compare hemogram results of the sea turtles classified in these four groups. The lowest hematocrit value was observed in severely affected animals. In the hemoglobin assay, the highest value was observed in the group of tumor free turtles and the lowest, in animals severely affected. Lymphocyte counts and curved carapace length were on the verge of statistical significance.Chelonia mydas, denominada tartaruga verde, é uma tartaruga marinha que frequenta o litoral brasileiro para alimentação e nidificação e é considerada em perigo de extinção pela IUCN (World Conservation Union, 2009 e ameaçada pela Lista Vermelha da Fauna Brasileira (Ministério do Meio Ambiente, 2009. A fibropapilomatose, doença caracterizada por tumores cutâneos benignos (fibropapilomas, é uma das mais importantes ameaças à sobrevivência dessa espécie. Pesquisas sugerem o envolvimento de agentes infecciosos virais em associação com fatores ambientais e genéticos. Foram colhidas amostras sanguíneas de 45

  10. Energy storage

    CERN Document Server

    Brunet, Yves

    2013-01-01

    Energy storage examines different applications such as electric power generation, transmission and distribution systems, pulsed systems, transportation, buildings and mobile applications. For each of these applications, proper energy storage technologies are foreseen, with their advantages, disadvantages and limits. As electricity cannot be stored cheaply in large quantities, energy has to be stored in another form (chemical, thermal, electromagnetic, mechanical) and then converted back into electric power and/or energy using conversion systems. Most of the storage technologies are examined: b

  11. ABOUT THE SUITABILITY OF CLOUDS IN HIGH-PERFORMANCE COMPUTING

    Directory of Open Access Journals (Sweden)

    Harald Richter

    2016-01-01

    Full Text Available Cloud computing has become the ubiquitous computing and storage paradigm. It is also attractive for scientists, because they do not have to care any more for their own IT infrastructure, but can outsource it to a Cloud Service Provider of their choice. However, for the case of High-Performance Computing (HPC in a cloud, as it is needed in simulations or for Big Data analysis, things are getting more intricate, because HPC codes must stay highly efficient, even when executed by many virtual cores (vCPUs. Older clouds or new standard clouds can fulfil this only under special precautions, which are given in this article. The results can be extrapolated to other cloud OSes than OpenStack and to other codes than OpenFOAM, which were used as examples.

  12. Automated Grid Monitoring for LHCb through HammerCloud

    CERN Document Server

    CERN. Geneva

    2015-01-01

    The HammerCloud system is used by CERN IT to monitor the status of the Worldwide LHC Computing Grid (WLCG). HammerCloud automatically submits jobs to WLCG computing resources, closely replicating the workflow of Grid users (e.g. physicists analyzing data). This allows computation nodes and storage resources to be monitored, software to be tested (somewhat like continuous integration), and new sites to be stress tested with a heavy job load before commissioning. The HammerCloud system has been in use for ATLAS and CMS experiments for about five years. This summer's work involved porting the HammerCloud suite of tools to the LHCb experiment. The HammerCloud software runs functional tests and provides data visualizations. HammerCloud's LHCb variant is written in Python, using the Django web framework and Ganga/DIRAC for job management.

  13. A Swarm Intelligence Based Model for Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Ahmed S. Salama

    2015-01-01

    Full Text Available Mobile Computing (MC provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC. MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing Model (SIBMCCM. A model that uses a proposed Parallel Particle Swarm Optimization (PPSO algorithm to enhance the access time for the mobile cloud computing services which support different E Commerce models and to better secure the communication through the mobile cloud and the mobile commerce transactions.

  14. Proposed congestion control method for cloud computing environments

    CERN Document Server

    Kuribayashi, Shin-ichi

    2012-01-01

    As cloud computing services rapidly expand their customer base, it has become important to share cloud resources, so as to provide them economically. In cloud computing services, multiple types of resources, such as processing ability, bandwidth and storage, need to be allocated simultaneously. If there is a surge of requests, a competition will arise between these requests for the use of cloud resources. This leads to the disruption of the service and it is necessary to consider a measure to avoid or relieve congestion of cloud computing environments. This paper proposes a new congestion control method for cloud computing environments which reduces the size of required resource for congested resource type instead of restricting all service requests as in the existing networks. Next, this paper proposes the user service specifications for the proposed congestion control method, and clarifies the algorithm to decide the optimal size of required resource to be reduced, based on the load offered to the system. I...

  15. The environmental contaminant DDE fails to influence the outcome of sexual differentiation in the marine turtle Chelonia mydas.

    Science.gov (United States)

    Podreka, S; Georges, A; Maher, B; Limpus, C J

    1998-04-01

    In many turtles, the temperature experienced during the middle of egg incubation determines the sex of the offspring. The implication of steroid sex hormones as the proximate trigger for sex determination opens the possibility that endocrine-disrupting contaminants may also influence the outcome of sexual differentiation. In this study we investigate the potential effects of DDE (a common DDT metabolite) on sexual differentiation of Chelonia mydas (green sea turtle). Four clutches of eggs collected from Heron Island, Queensland, Australia, were treated with DDE at the beginning of the thermosensitive period for sexual determination. An incubation temperature of 28 degrees C or less produces male hatchlings in this species, whereas 30 degrees C or more produces female hatchlings. Dosed eggs were consequently incubated at two temperatures (27.6 degrees C and 30.4 degrees C) on the upper and lower boundaries of the sex determination threshold for this species. DDE, ranging from 3.3 to 66.5 microg, was dissolved in 5, 10, and 25 microl ethanol and applied to eggshells above the embryo. Less than 2.5 ng/g DDE was present in eggs prior to dosing. Approximately 34% of the applied DDE was absorbed in the eggs, but only approximately 8% of applied DDE was found in embryos. Thus, treated eggs, corrected for background DDE, had up to 543 ng/g DDE. The sex ratio at these doses did not differ from what would be expected on consideration of temperature alone. Incubation time, hatching success, incidence of body deformities, hatching size, and weight were also within the limits of healthy developed hatchlings. This indicates that the eggs of C. mydas in the wild with concentrations of DDE less than 543 ng/g should produce hatchlings with relatively high hatching success, survival rate, and normally differentiated gonads.

  16. Artisanal Green Turtle, Chelonia mydas, fishery of Caribbean Nicaragua: I. Catch rates and trends, 1991-2011.

    Science.gov (United States)

    Lagueux, Cynthia J; Campbell, Cathi L; Strindberg, Samantha

    2014-01-01

    This is the first assessment of catch rates for the legal, artisanal green turtle, Chelonia mydas, fishery in Caribbean Nicaragua. Data were collected by community members, monitoring up to 14 landing sites from 1991 to 2011. We examined take levels, and temporal and spatial variability in catch rates for the overall fishery, by region, and community using General Additive Mixed Models (GAMMs). More than 171,556 green turtles were killed during the period, with a mean estimated minimum 8,169±2,182 annually. There was a statistically significant decline in catch rates overall. Catch rates peaked in 1997 and 2002, followed by a downward trend, particularly from mid-2008 to the end of the study period. Similar downward trends were evident in both study regions. Community specific catch rate trends also indicated declines with decreases ranging from 21% to 90%. Decrease in catch rates in Nicaragua is cause for concern even though the principal source rookery at Tortuguero, Costa Rica, shows an increase in nesting activity. Explanations for the apparent discrepancy between the increasing trend at Tortuguero and decreasing catch rate trends in Nicaragua include: i) an increase in reproductive output, ii) insufficient time has passed to observe the impact of the fishery on the rookery due to a time lag, iii) changes in other segments of the population have not been detected since only nesting activity is monitored, iv) the expansive northern Nicaragua foraging ground may provide a refuge for a sufficient portion of the Tortuguero rookery, and/or v) a larger than expected contribution of non-Tortuguero rookeries occurring in Nicaragua turtle fishing areas. Our results highlight the need for close monitoring of rookeries and in-water aggregations in the Caribbean. Where consumptive use still occurs, nations sharing this resource should implement scientifically based limits on exploitation to ensure sustainability and mitigate impacts to regional population diversity.

  17. Artisanal Green Turtle, Chelonia mydas, fishery of Caribbean Nicaragua: I. Catch rates and trends, 1991-2011.

    Directory of Open Access Journals (Sweden)

    Cynthia J Lagueux

    Full Text Available This is the first assessment of catch rates for the legal, artisanal green turtle, Chelonia mydas, fishery in Caribbean Nicaragua. Data were collected by community members, monitoring up to 14 landing sites from 1991 to 2011. We examined take levels, and temporal and spatial variability in catch rates for the overall fishery, by region, and community using General Additive Mixed Models (GAMMs. More than 171,556 green turtles were killed during the period, with a mean estimated minimum 8,169±2,182 annually. There was a statistically significant decline in catch rates overall. Catch rates peaked in 1997 and 2002, followed by a downward trend, particularly from mid-2008 to the end of the study period. Similar downward trends were evident in both study regions. Community specific catch rate trends also indicated declines with decreases ranging from 21% to 90%. Decrease in catch rates in Nicaragua is cause for concern even though the principal source rookery at Tortuguero, Costa Rica, shows an increase in nesting activity. Explanations for the apparent discrepancy between the increasing trend at Tortuguero and decreasing catch rate trends in Nicaragua include: i an increase in reproductive output, ii insufficient time has passed to observe the impact of the fishery on the rookery due to a time lag, iii changes in other segments of the population have not been detected since only nesting activity is monitored, iv the expansive northern Nicaragua foraging ground may provide a refuge for a sufficient portion of the Tortuguero rookery, and/or v a larger than expected contribution of non-Tortuguero rookeries occurring in Nicaragua turtle fishing areas. Our results highlight the need for close monitoring of rookeries and in-water aggregations in the Caribbean. Where consumptive use still occurs, nations sharing this resource should implement scientifically based limits on exploitation to ensure sustainability and mitigate impacts to regional population

  18. EFFECTS OF "SWIM WITH THE TURTLES" TOURIST ATTRACTIONS ON GREEN SEA TURTLE (CHELONIA MYDAS) HEALTH IN BARBADOS, WEST INDIES.

    Science.gov (United States)

    Stewart, Kimberly; Norton, Terry; Mohammed, Hamish; Browne, Darren; Clements, Kathleen; Thomas, Kirsten; Yaw, Taylor; Horrocks, Julia

    2016-04-01

    Along the West Coast of Barbados a unique relationship has developed between endangered green sea turtles (Chelonia mydas) and humans. Fishermen began inadvertently provisioning these foraging turtles with fish offal discarded from their boats. Although initially an indirect supplementation, this activity became a popular attraction for visitors. Subsequently, demand for this activity increased, and direct supplementation or provisioning with food began. Food items offered included raw whole fish (typically a mixture of false herring [Harengula clupeola] and pilchard [Harengula humeralis]), filleted fish, and lesser amounts of processed food such as hot dogs, chicken, bread, or various other leftovers. Alterations in behavior and growth rates as a result of the provisioning have been documented in this population. The purpose of this study was to determine how tourism-based human interactions are affecting the overall health of this foraging population and to determine what potential health risks these interactions may create for sea turtles. Juvenile green sea turtles (n=29) were captured from four sites off the coast of Barbados, West Indies, and categorized into a group that received supplemental feeding as part of a tour (n=11) or an unsupplemented group (n=18) that consisted of individuals that were captured at sites that did not provide supplemental feeding. Following capture, a general health assessment of each animal was conducted. This included weight and morphometric measurements, a systematic physical examination, determination of body condition score and body condition index, epibiota assessment and quantification, and clinical pathology including hematologic and biochemical testing and nutritional assessments. The supplemented group was found to have changes to body condition, vitamin, mineral, hematologic, and biochemical values. Based on these results, recommendations were made to decrease negative behaviors and health impacts for turtles as a result

  19. Intestinal and cloacal strictures in free-ranging and aquarium-maintained green sea turtles (Chelonia mydas).

    Science.gov (United States)

    Erlacher-Reid, Claire D; Norton, Terry M; Harms, Craig A; Thompson, Rachel; Reese, David J; Walsh, Michael T; Stamper, M Andrew

    2013-06-01

    Intestinal or cloacal strictures that resulted in intestinal obstruction were diagnosed in six green sea turtles (Chelonia mydas) from three rehabilitation facilities and two zoologic parks. The etiologies of the strictures were unknown in these cases. It is likely that anatomic adaptations of the gastrointestinal tract unique to the green sea turtle's herbivorous diet, paired with causes of reduced intestinal motility, may predispose the species to intestinal damage and subsequent obstructive intestinal disease. In aquarium-maintained green sea turtles, obesity, diet, reduced physical activity, chronic intestinal disease, and inappropriate or inadequate antibiotics might also be potential contributing factors. Clinical, radiographic, and hematologic abnormalities common among most of these sea turtles include the following: positive buoyancy; lethargy; inappetence; regurgitation; obstipation; dilated bowel and accumulation of oral contrast material; anemia; hypoglycemia; hypoalbuminemia; hypocalcemia; and elevated creatine kinase, aspartate aminotransferase, and blood urea nitrogen. Although these abnormalities are nonspecific with many possible contributing factors, intestinal disease, including strictures, should be considered a differential in green sea turtles that demonstrate all or a combination of these clinical findings. Although diagnostic imaging, including radiographs, computed tomography, or magnetic resonance imaging, are important in determining a cause for suspected gastrointestinal disease and identifying an anatomic location of obstruction, intestinal strictures were not successfully identified when using these imaging modalities. Lower gastrointestinal contrast radiography, paired with the use of oral contrast, was useful in identifying the suspected site of intestinal obstruction in two cases. Colonoscopy was instrumental in visually diagnosing intestinal stricture in one case. Therefore, lower gastrointestinal contrast radiography and

  20. Multinational tagging efforts illustrate regional scale of distribution and threats for east pacific green turtles (Chelonia mydas agassizii.

    Directory of Open Access Journals (Sweden)

    Catherine E Hart

    Full Text Available To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006. Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja California peninsula to their breeding grounds in Michoacán (1337-2928 km. In addition, three post-nesting females were satellite tracked from Colola beach, Michoacán to their foraging grounds in southern Mexico and Central America (941.3-3020 km. A further six turtles were tracked in the Gulf of California within their foraging grounds giving insights into the scale of ranging behaviour. Turtles undertaking long-distance migrations showed a tendency to follow the coastline. Turtles tracked within foraging grounds showed that foraging individuals typically ranged up to 691.6 km (maximum from release site location. Additionally, we carried out threat analysis (using the cumulative global human impact in the Eastern Pacific clustering pre-existing satellite tracking studies from Galapagos, Costa Rica, and data obtained from this study; this indicated that turtles foraging and nesting in Central American waters are subject to the highest anthropogenic impact. Considering that turtles from all three rookeries were found to migrate towards Central America, it is highly important to implement conservation plans in Central American coastal areas to ensure the survival of the remaining green turtles in the Eastern Pacific. Finally, by combining satellite tracking data from this and previous studies, and data of tag returns we created the best available distributional patterns for this particular sea turtle species, which emphasized that conservation measures in key

  1. Organohalogen contaminants in blood of Kemp's ridley (Lepidochelys kempii) and green sea turtles (Chelonia mydas) from the Gulf of Mexico.

    Science.gov (United States)

    Swarthout, Robert F; Keller, Jennifer M; Peden-Adams, Margie; Landry, Andre M; Fair, Patricia A; Kucklick, John R

    2010-02-01

    The threat that exposure to organohalogen (OH) contaminants poses to endangered populations of Kemp's ridley (Lepidochelys kempii) and green sea turtles (Chelonia mydas) is not well understood, partly because few OH data are available. Blood samples from live juvenile and sub-adult L. kempii (n = 46) and C. mydas (n = 9) from the Gulf of Mexico and from L. kempii from the southeastern US coast (n = 3) were extracted using microwave-assisted extraction, and analyzed by large volume injection gas chromatography-mass spectrometry for 85 polychlorinated biphenyls (PCBs), 25 organochlorine pesticides (OCPs) and 27 polybrominated diphenyl ethers (PBDEs). Plasma chemistries, hematology and immune responses were also assessed. Concentrations of SigmaPCBs (geometric mean, range: 3190 pg g(-1), 227-21590 pg g(-1) blood), SigmaDDTs (geometric mean, range: 541 pg g(-1), 161-4310 pg g(-1) blood) and OCPs in L. kempii from the Gulf were comparable to those reported in L. kempii from the Atlantic. SigmaPBDEs were detected in all samples (geometric mean, range: 146 pg g(-1), 19.5-1450 pg g(-1) blood), with PBDE 47, 99, 100, 153 and 154 being the predominant congeners. SigmaPCBs, SigmaDDTs and Sigmachlordanes were one order of magnitude lower in green turtles, and SigmaPBDE concentrations were lower by half due to trophic level differences. L. kempii from the southeast USA had higher percentages of highly chlorinated PCBs indicating exposure to Aroclor 1268. Blood urea nitrogen was positively correlated to Sigmachlordanes, and SigmaPCBs were inversely correlated to creatine phosphokinase in L. kempii. These data help establish baseline contaminant concentrations in live L. kempii and C. mydas.

  2. Retrospective pathology survey of green turtles Chelonia mydas with fibropapillomatosis in the Hawaiian Islands, 1993-2003

    Science.gov (United States)

    Work, T.M.; Balazs, G.H.; Rameyer, R.A.; Morris, R.A.

    2004-01-01

    We necropsied 255 stranded green turtles Chelonia mydas with fibropapillomatosis (FP) from the Hawaiian Islands, North Pacific, from August 1993 through May 2003. Of these, 214 (84%) were euthanized due to advanced FP and the remainder were found dead in fresh condition. Turtles were assigned a standardized tumor severity score ranging from 1 (lightly tumored) to 3 (heavily tumored). Tumors were counted and measured and categorized as external, oral, or internal and tissues evaluated by light microscopy. Turtles in tumor score 2 and 3 categories predominated, and tumor score 3 turtles were significantly larger than the other 2 categories. More juveniles stranded than subadults or adults. Total cross-sectional area of tumors increased significantly with straight carapace length (SCL). Frequency distribution of total number of external tumors per turtle was significantly skewed to the right, and there were significantly more tumors at the front than rear of turtles. Eighty percent of turtles had oral tumors, and 51% of turtles with oral tumors had tumors in the glottis. Thirty-nine percent of turtles had internal tumors, most of them in the lung, kidney and heart. Fibromas predominated in lung, kidney and musculoskeletal system whereas myxofibromas were more common in intestines and spleen. Fibrosarcomas of low-grade malignancy were most frequent in the heart, and heart tumors had a predilection for the right atrium. Turtles with FP had significant additional complications including inflammation with vascular flukes, bacterial infections, poor body condition, and necrosis of salt gland. Turtles with oral tumors were more likely to have secondary complications such as pneumonia. Most turtles came from the island of Oahu (74%) followed by Maui (20%), Hawaii, Molokai, and Lanai (<3% each). On Oahu, significantly more turtles we necropsied stranded along the northwestern and northeastern shores.

  3. Multinational tagging efforts illustrate regional scale of distribution and threats for east pacific green turtles (Chelonia mydas agassizii).

    Science.gov (United States)

    Hart, Catherine E; Blanco, Gabriela S; Coyne, Michael S; Delgado-Trejo, Carlos; Godley, Brendan J; Jones, T Todd; Resendiz, Antonio; Seminoff, Jeffrey A; Witt, Matthew J; Nichols, Wallace J

    2015-01-01

    To further describe movement patterns and distribution of East Pacific green turtles (Chelonia mydas agassizii) and to determine threat levels for this species within the Eastern Pacific. In order to do this we combined published data from existing flipper tagging and early satellite tracking studies with data from an additional 12 satellite tracked green turtles (1996-2006). Three of these were tracked from their foraging grounds in the Gulf of California along the east coast of the Baja California peninsula to their breeding grounds in Michoacán (1337-2928 km). In addition, three post-nesting females were satellite tracked from Colola beach, Michoacán to their foraging grounds in southern Mexico and Central America (941.3-3020 km). A further six turtles were tracked in the Gulf of California within their foraging grounds giving insights into the scale of ranging behaviour. Turtles undertaking long-distance migrations showed a tendency to follow the coastline. Turtles tracked within foraging grounds showed that foraging individuals typically ranged up to 691.6 km (maximum) from release site location. Additionally, we carried out threat analysis (using the cumulative global human impact in the Eastern Pacific) clustering pre-existing satellite tracking studies from Galapagos, Costa Rica, and data obtained from this study; this indicated that turtles foraging and nesting in Central American waters are subject to the highest anthropogenic impact. Considering that turtles from all three rookeries were found to migrate towards Central America, it is highly important to implement conservation plans in Central American coastal areas to ensure the survival of the remaining green turtles in the Eastern Pacific. Finally, by combining satellite tracking data from this and previous studies, and data of tag returns we created the best available distributional patterns for this particular sea turtle species, which emphasized that conservation measures in key areas may have

  4. INTRASPECIFIC VARIATION OF THE GREEN TURTLE, Chelonia mydas (CHELONIIDAE, IN THE FORAGING AREA OF GORGONA NATURAL NATIONAL PARK (COLOMBIAN PACIFIC

    Directory of Open Access Journals (Sweden)

    LAURA SAMPSON

    2014-01-01

    Full Text Available RESUMEN Se comparó la distribución de tallas y condición corporal de los dos morfotipos conocidos de tortuga verde (Chelonia mydas en el área de forrajeo del Parque Nacional Natural Gorgona (PNNG en el Pacífico colombiano entre 2003 y 2012. Se tomaron medidas de largo recto de caparazón (LRC, largo curvo de caparazón (LCC, peso y condición corporal de 1.023 tortugas capturadas en los arrecifes del PNNG. Se capturaron más tortugas negras (n = 747 que amarillas (n = 276, todas juveniles. Las tortugas negras fueron significativamente más grandes y pesadas que las amarillas. El tamaño de reclutamiento a la zona nerítica fue de 40,0–49,9 cm para ambos morfotipos, pero hubo más tortugas amarillas que negras en este intervalo de tamaños, lo cual sugiere una variación en el patrón de reclutamiento. El índice de condición corporal de las tortugas amarillas fue significativamente más alto que el de las tortugas negras, lo cual podría indicar diferencias en la utilización de recursos. Con base en los resultados obtenidos, se sugiere que el PNNG podría funcionar como un área de reclutamiento para las tortugas amarillas, las cuales llegan más pequeñas a esta zona; y como parte de la ruta migratoria costera de las tortugas negras, las cuales llegan más grandes e incluso residen en esta localidad durante un lapso de tiempo desconocido.

  5. Probe Storage

    NARCIS (Netherlands)

    Gemelli, Marcellino; Abelmann, Leon; Engelen, Johan B.C.; Khatib, Mohammed G.; Koelmans, Wabe W.; Zaboronski, Olog; Campardo, Giovanni; Tiziani, Federico; Laculo, Massimo

    2011-01-01

    This chapter gives an overview of probe-based data storage research over the last three decades, encompassing all aspects of a probe recording system. Following the division found in all mechanically addressed storage systems, the different subsystems (media, read/write heads, positioning, data chan

  6. Atomic storage

    CERN Multimedia

    Ricadela, A

    2003-01-01

    IBM is supplying CERN, the European Organization for Nuclear Research, with its Storage Tank file system virtualization software, 20 terabytes of storage capacity, and services under a three-year deal to build computer systems that will support the Large Hadron Collider accelerator (1 paragraph).

  7. A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API

    Directory of Open Access Journals (Sweden)

    Shikha Joshi

    2012-06-01

    Full Text Available Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-and-play way. It has the advantages of high scalability, ease-of-use, cost-effectiveness and simplifying infrastructure planning etc. However, the emerging use of cloud storage has led to the problem of verifying that storage server indeed store the data. When users store their data in cloud storage, they mostly concern about whether the data is intact. In this paper we propose an efficient approach for making cloud data management and sharing in a secure manner. For this we mainly concentrate on six different security majors which are Confidentiality, Availability, Integrity, Possession, Authenticity and Utility. We implement these phenomena in java.

  8. Secure cloud computing

    CERN Document Server

    Jajodia, Sushil; Samarati, Pierangela; Singhal, Anoop; Swarup, Vipin; Wang, Cliff

    2014-01-01

    This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli, Iorga, and Chokani describe the evolution of cloud computing and the current state of practice, followed by the challenges of cryptographic key management in the cloud. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and explore the economic viability of cloud computing with and without security mechanisms involving cryptographic mechanisms. The next two chapters addres

  9. Cloud Processed CCN Affect Cloud Microphysics

    Science.gov (United States)

    Hudson, J. G.; Noble, S. R., Jr.; Tabor, S. S.

    2015-12-01

    Variations in the bimodality/monomodality of CCN spectra (Hudson et al. 2015) exert opposite effects on cloud microphysics in two aircraft field projects. The figure shows two examples, droplet concentration, Nc, and drizzle liquid water content, Ld, against classification of CCN spectral modality. Low ratings go to balanced separated bimodal spectra, high ratings go to single mode spectra, strictly monomodal 8. Intermediate ratings go merged modes, e.g., one mode a shoulder of another. Bimodality is caused by mass or hygroscopicity increases that go only to CCN that made activated cloud droplets. In the Ice in Clouds Experiment-Tropical (ICE-T) small cumuli with lower Nc, greater droplet mean diameters, MD, effective radii, re, spectral widths, σ, cloud liquid water contents, Lc, and Ld were closer to more bimodal (lower modal ratings) below cloud CCN spectra whereas clouds with higher Nc, smaller MD, re, σ, and Ld were closer to more monomodal CCN (higher modal ratings). In polluted stratus clouds of the MArine Stratus/Stratocumulus Experiment (MASE) clouds that had greater Nc, and smaller MD, re, σ, Lc, and Ld were closer to more bimodal CCN spectra whereas clouds with lower Nc, and greater MD, re, σ, Lc, and Ld were closer to more monomodal CCN. These relationships are opposite because the dominant ICE-T cloud processing was coalescence whereas chemical transformations (e.g., SO2 to SO4) were dominant in MASE. Coalescence reduces Nc and thus also CCN concentrations (NCCN) when droplets evaporate. In subsequent clouds the reduced competition increases MD and σ, which further enhance coalescence and drizzle. Chemical transformations do not change Nc but added sulfate enhances droplet and CCN solubility. Thus, lower critical supersaturation (S) CCN can produce more cloud droplets in subsequent cloud cycles, especially for the low W and effective S of stratus. The increased competition reduces MD, re, and σ, which inhibit coalescence and thus reduce drizzle

  10. Cloud Service Standard Expectations of Cloud Computing%云计算中的云服务标准期望

    Institute of Scientific and Technical Information of China (English)

    李渊

    2014-01-01

    云计算是能够使用户在互连网上使用应用程序的一种环境,可进行数据的存储和保护。云计算中需要定期备份云存储数据,管理员期望能够在云停机后将数据完整地恢复到云中。这种简单的做法存在潜在的缺陷,数据管理系统可能会被锁死在服务提供商专用的云服务与存储方法中。云服务标准可以解决并纠正基本的数据传输故障。分析了云服务用户对云互操作性的期望,并说明了各个云服务标准组织以及它们提供的解决方案。%Cloud computing is the ability to enable users to interconnect applications online using an environment for data storage and protection, while providing services. Cloud computing cloud storage needs to regularly back up data, administrators expect to shut down after the data in the cloud completely restored to the cloud. This simple approach the has potential defects. Data manage ment in the system administrators of may be locked in the service provider dedicated cloud services and storage methods. Cloud service standards can be addressed and corrected basic data transmission failures. In this paper,the cloud service user expectations of cloud interoperabilit is analyzed, and describes the various standards organizations and their cloud services to provide solutions.

  11. Cryptonite: A Secure and Performant Data Repository on Public Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2012-06-29

    Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using a StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.

  12. Resesrch on the Method of Cloud Storage Oriented to the Mobile Terminal%一种面向移动终端的云存储方法研究

    Institute of Scientific and Technical Information of China (English)

    吴永发; 曾碧

    2013-01-01

    Based on the analysis of HDFS and Dynamo architecture ,a strategy that the database technology and the dynamic consistent hashing algorithm are adopted to deal with different target groups ,is presented in this paper . The strategy can schedule integratively according to the storage cost of each storage node ,provide the optimal storage node to external .Through the theoretical analysis and the simulation results ,this strategy can make the system achieve load balance . Moreover , it can improve overall efficiency of the system and also meet the requirements the data lookup positioning .%  在分析 HDFS和Dynamo架构的基础上,引入数据库技术以及动态一致性哈希算法分类处理不同对象组的方法。本方法可根据各个存储节点存储代价,进行综合调度,对外提供最优存储节点。通过算法描述和仿真结果分析表明,此方法可以使系统达到负载均衡,并且从整体上提高了系统的效率,在数据查找定位上也可以满足要求。

  13. In the clouds

    NARCIS (Netherlands)

    Wassink, J.

    2012-01-01

    Clouds always used to be the least understood element of the weather system, but that is rapidly changing . Computer clouds increasingly correspond with those in the sky, which promises weather forecasts at street level and more accurate climate scenarios.

  14. Allocations for Heterogenous Distributed Storage

    CERN Document Server

    Ntranos, Vasileios; Dimakis, Alexandros G

    2012-01-01

    We study the problem of storing a data object in a set of data nodes that fail independently with given probabilities. Our problem is a natural generalization of a homogenous storage allocation problem where all the nodes had the same reliability and is naturally motivated for peer-to-peer and cloud storage systems with different types of nodes. Assuming optimal erasure coding (MDS), the goal is to find a storage allocation (i.e, how much to store in each node) to maximize the probability of successful recovery. This problem turns out to be a challenging combinatorial optimization problem. In this work we introduce an approximation framework based on large deviation inequalities and convex optimization. We propose two approximation algorithms and study the asymptotic performance of the resulting allocations.

  15. Point Cloud Server (pcs) : Point Clouds In-Base Management and Processing

    Science.gov (United States)

    Cura, R.; Perret, J.; Paparoditis, N.

    2015-08-01

    In addition to the traditional Geographic Information System (GIS) data such as images and vectors, point cloud data has become more available. It is appreciated for its precision and true three-Dimensional (3D) nature. However, managing the point cloud can be difficult due to scaling problems and specificities of this data type. Several methods exist but are usually fairly specialised and solve only one aspect of the management problem. In this work, we propose a complete and efficient point cloud management system based on a database server that works on groups of points rather than individual points. This system is specifically designed to solve all the needs of point cloud users: fast loading, compressed storage, powerful filtering, easy data access and exporting, and integrated processing. Moreover, the system fully integrates metadata (like sensor position) and can conjointly use point clouds with images, vectors, and other point clouds. The system also offers in-base processing for easy prototyping and parallel processing and can scale well. Lastly, the system is built on open source technologies; therefore it can be easily extended and customised. We test the system will several billion points of point clouds from Lidar (aerial and terrestrial ) and stereo-vision. We demonstrate ~ 400 million pts/h loading speed, user-transparent greater than 2 to 4:1 compression ratio, filtering in the approximately 50 ms range, and output of about a million pts/s, along with classical processing, such as object detection.

  16. Comparing Point Clouds

    Science.gov (United States)

    2004-04-01

    Point clouds are one of the most primitive and fundamental surface representations. A popular source of point clouds are three dimensional shape...acquisition devices such as laser range scanners. Another important field where point clouds are found is in the representation of high-dimensional...framework for comparing manifolds given by point clouds is presented in this paper. The underlying theory is based on Gromov-Hausdorff distances, leading

  17. Computer animation of clouds

    Energy Technology Data Exchange (ETDEWEB)

    Max, N.

    1994-01-28

    Computer animation of outdoor scenes is enhanced by realistic clouds. I will discuss several different modeling and rendering schemes for clouds, and show how they evolved in my animation work. These include transparency-textured clouds on a 2-D plane, smooth shaded or textured 3-D clouds surfaces, and 3-D volume rendering. For the volume rendering, I will present various illumination schemes, including the density emitter, single scattering, and multiple scattering models.

  18. Cloud computing strategies

    CERN Document Server

    Chorafas, Dimitris N

    2011-01-01

    A guide to managing cloud projects, Cloud Computing Strategies provides the understanding required to evaluate the technology and determine how it can be best applied to improve business and enhance your overall corporate strategy. Based on extensive research, it examines the opportunities and challenges that loom in the cloud. It explains exactly what cloud computing is, what it has to offer, and calls attention to the important issues management needs to consider before passing the point of no return regarding financial commitments.

  19. Governmental Cloud - Part of Cloud Computing

    Directory of Open Access Journals (Sweden)

    Cristian IVANUS

    2014-01-01

    Full Text Available Large IT (Information Technology companies propose cloud government's (G-Cloud development model through investment from the private sector, which will facilitate the access of users from public sector to the new generation IT services. Through the G-Cloud private operators that operate governmental cloud infrastructure by adding specific SaaS (Software as a Service functionalities, proposed model by big companies, supports public institutions in optimizing costs and increased operational efficiency, bringing tangible benefits in relation with citizens and thus with the whole society. These optimizations are achieved by moving the initial investment to the private sector, through type subscription model cost by eliminating dependency on human factors (technical and by providing a low cost [1]. This paper aims to bring to the attention of specialists, some aspects of Governmental Cloud from the European Union (EU countries to be understood and implemented in Romania.

  20. OpenStack Object Storage (Swift) essentials

    CERN Document Server

    Kapadia, Amar; Varma, Sreedhar

    2015-01-01

    If you are an IT administrator and you want to enter the world of cloud storage using OpenStack Swift, then this book is ideal for you. Basic knowledge of Linux and server technology is beneficial to get the most out of the book.