National Engineering Research Center for Science and Technology Resources Sharing Service

Beijing, China

National Engineering Research Center for Science and Technology Resources Sharing Service

Beijing, China
SEARCH FILTERS
Time filter
Source Type

Song B.,Beihang University | Xiao L.,Beihang University | Xiao L.,National Engineering Research Center for Science and Technology Resources Sharing Service | Qin G.,Beihang University | And 5 more authors.
Communications in Computer and Information Science | Year: 2017

Satellite applications such as remote sensing application are overwhelmed with vast quantities of data. Nevertheless, the storage resources in the satellite are so limited that it should be used more efficient. The similarity between the remote sensing data is high, but the dissimilar parts of the data distribute irregularly. When using the traditional deduplication algorithm to split the file into chunks, a large amount of chunks are exactly similar but not the same, which results in the bad effect of data deduplication. We propose a deduplication algorithm based on data similarity and delta encoding to reduce the usage of storage resources. The data similarity analysis can find out the similar data. The delta encoding technology can reduce the usage of storage resources. Through experiments on remote sensing application data, we have achieved deduplication ratios up to 30:1, and analyzed how the chunksize affect the experiment results. © Springer Nature Singapore Pte Ltd. 2017.


Yue X.,Beihang University | Xiao L.,Beihang University | Xiao L.,National Engineering Research Center for Science and Technology Resources Sharing Service | Zhan W.,Beihang University | And 4 more authors.
Proceedings - 2016 7th International Conference on Cloud Computing and Big Data, CCBD 2016 | Year: 2017

The development of cloud computing is surely unprecedented in IT industry with many companies adapting to this new technology. The related companies undoubtedly benefit a lot from cloud computing. Meanwhile, the security of cloud platforms becomes one of the concerns for companies. As an important underlying component, the virtual machine image is also in need of especial protection. In this paper, we propose an optimized approach to protect the virtual machine image integrity. In the approach, we propose an architecture of integrity protection, optimize a hardware environment as the fundamental deployment environment, design a measurement module to measure and verify images, and design a strategy module to handle the results. Finally, we integrate it with OpenStack and evaluate its security and performance. The experiments demonstrate that our approach can protect the image integrity well and the measurement speed is increased three times faster than the ordinary approach with a little more resource consumption. © 2016 IEEE.


Yan G.,Heilongjiang Institute of Science and Technology | Tian X.,Heilongjiang Institute of Science and Technology | Shen X.,Beihang University | Shen X.,Key Laboratory of Urban Run Emergency Security Simulation Technology | And 4 more authors.
AIP Conference Proceedings | Year: 2017

The social network theory is introduced for the industrial technology alliance based on the actual needs of the development of the industrial technology alliance. Through discussing the influence of the core enterprise network capacity on alliance performance, this article establishes evaluation system and index model of core enterprise network ability. We also evaluate and analyze the network capacity of core enterprise by fuzzy comprehensive evaluation method. So, the evaluation method is very important and full of practical value with a new research vision. © 2017 Author(s).

Loading National Engineering Research Center for Science and Technology Resources Sharing Service collaborators
Loading National Engineering Research Center for Science and Technology Resources Sharing Service collaborators