International Conference on Computer Systems and Technologies- CompSysTech’2004 Global Ide

合集下载

计算机视觉方向的一些顶级会议和期刊

计算机视觉方向的一些顶级会议和期刊

ICCV的全称是International Comference on Computer Vision,正如很多和他一样的名字的会议一行,这样最朴实的名字的会议,通常也是这方面最nb的会议。

ICCV两年一次,与ECCV正好错开,是公认的三个会议中级别最高的。

它的举办地方会在世界各地选,上次是在北京,下次在巴西,2009在日本。

iccv上的文章看起来一般都比较好懂,我是比较喜欢的。

CVPR的全称是Internaltional Conference on Computer Vision and Pattern Recogintion。

这是一个一年一次的会议,举办地从来没有出过美国,因此想去美国旅游的同学不要错过。

正如它的名字一样,这个会上除了视觉的文章,还会有不少模式识别的文章,当然两方面的结合自然也是重点。

ECCV的全称是Europeon Conference on Computer Vision,是一个欧洲的会议。

虽然名字不是International,但是会议的级别不比前面两个差多少。

欧洲人一般比较看中理论,但是从最近一次会议来看,似乎大家也开始注重应用了,oral里面的demo非常之多,演示效果很好,让人赏心悦目、叹为观止。

不过欧洲的会有一个不好,就是他们的人通常英语口音很重,有些人甚至不太会说英文,所以开会和交流的时候,稍微有些费劲。

总的来说,以上三个会议是做计算机视觉人必须关注的会议,建议每一期的oral都要精读,poster调自己相关的仔细看看。

如果有好的进一步的想法,可以马上发表,因为他们已经是最新的了,对他们的改进通常也是最新的。

同时如果你做了类似的工作,却没有引用这些会议的文章,很有可能会被人指出综述部分的问题,因为评审的人一般都是牛人,对这三个会议也会很关注的。

计算机视觉、IP、AI方向的一些顶级会议和期刊Computer VisionConf.:Best: ICCV, Inter. Conf. on Computer VisionCVPR, Inter. Conf. on Computer Vision and Pattern RecognitionGood: ECCV, Euro. Conf. on Comp. VisionICIP, Inter. Conf. on Image ProcessingICPR, Inter. Conf. on Pattern RecognitionACCV, Asia Conf. on Comp. VisionJour.:Best: PAMI, IEEE Trans. on Patt. Analysis and Machine IntelligenceIJCV, Inter. Jour. on Comp. VisionGood: CVIU, Computer Vision and Image UnderstandingPR, Pattern Reco.NetworkConf.:ACM/SigCOMM ACM Special Interest Group of Communication..ACM/SigMetric 这个系统方面也有不少的Info Com 几百人的大会,不如ACM/SIG的精。

(会议管理)CS专业重要国际学术会议

(会议管理)CS专业重要国际学术会议
Middleware
ACM/IFIP/USENIX中间件国际会议
58.
ACMInternational Symposium on Mobile Ad Hoc Networking and Computing
MobiHoc
ACM移动自组织网络与计算国际会议
59.
InternationalConference on MobileSystems,Applications,andServices
ICCCN
计算机通信和网络国际会议
45.
International Conference on Distributed Computing Systems
ICDCS
分布式计算系统国际会议
46.
IEEEInternational Conference on Data Engineering
ICDE
IEEE数据工程国际会议
EUROCRYPT
加密技术的理论与应用国际会议
37.
The AnnualConference of the European Association for Computer Graphics
Eurographics
计算机图形学欧洲协会年度会议
38.
ACMEUROSYSConference
EUROSYS
11.
International Conference on Computer Vision
ICCV
计算机视觉国际会议
12.
IEEE International Conference on Network Protocols
ICNP
IEEE网络协议国际会议
13.
IEEE International Conference on Computer Communication

重邮科技处对于论文期刊级别的认定文件

重邮科技处对于论文期刊级别的认定文件

学科 综合
中国科学 科学通报
刊名
理学
数学学报、物理学报、力学学报、地球物理学报
工学
电子学报、通信学报、电子与信息学报、软件学报、计算机 学报、中国激光、自动化学报、机械工程学报、仪器仪表学 报、生物化学与生物物理进展
重庆邮电大学认定的自然科学类 B 类权威期刊
学科
刊名
理学
中国物理快报、化学学报、高等学校化学学报、物理化学学 报、高分子学报、应用数学学报、数学年刊
29 INFORMS (管理科学与运筹学国际会议)
30 ICIS(International Conference on Information Systems,信息系统国际会议) IEEE/SMC(IEEE Conference on Systems, Man and Cybernetics,系统工程
讨会)
STOC (ACM Symposium on Theory of Computing ,ACM 国际计算理论学术 研讨会) FOCS (IEEE Symposium on Foundations of Computer Science,IEEE 国际计 算机科学基础学术研讨会) FSE (ACM Conference on the Foundations of Software Engineering,ACM 国 际软件工程基础学术会议)
26 IBC(International Botanical Congress,国际植物学大会)
27 IEEE-EMBS(IEEE-生物医学工程学会国际学术年会)
28
IUBMB(The International Union of Biochemistry and Molecular Biology,国 际生物化学与分子生物学联盟会议)

国内外各领域顶级学术会议大全

国内外各领域顶级学术会议大全
文案大全
实用标准文档
序号 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
刊物名称(以期刊名称的拼音为序) 总被引频次
电子学报(英文版、中文版)
中文版 1676
高技术通讯(英文版、中文版) 计算机辅助设计与图形学学报 计算机工程 计算机集成制造系统 J COMPUT SCI & TECH 计算机学报 计算机研究与发展 计算数学(英) 科学通报(英文版、中文版) 模式识别与人工智能 软件学报 系统仿真学报 系统工程理论与实践
数学类第 4 名 综合类第 1 名
计算机类第 10 名 计算机类第 2 名 电子类第 7 名 信息类第 7 名 信息类第 3 名 计算机类第 16 名
综合类第 10 名
计算机类第 7 名 计算机类第 6 名
综合类第 11 名
计算机类第 9 名 计算机类第 18 名 计算机类第 20 名 计算机类第 21 名
28 IEEE/ACM Design Automation Conference
国际计算语言学会年会,是本领域最权威的国际学术会 议之一,每年举办一次 计算语言学会议,也是本领域最权威的国际学术会议之 一,两年一次 是语音和声学信号处理领域最权威的国际学术会议之 一,也是图像、视频信号处理领域的权威会议之一,每 年举办一次 自然语言处理亚洲联盟主办的国际会议,是自然语言处 理领域亚洲区域最有影响的学术会议,基本是每年举办 一次
网络测量领域顶级的专业会议
网络测量
下一代互联网研究 rank1
中心
12 ICCV: IEEE International Conference on
Computer Vision
领域顶级国际会议,录取率 20%左右,2 年一次,中国 计算机视觉,模式

电子信息领域学术会议分级目录

电子信息领域学术会议分级目录

电子信息领域学术会议分级目录随着科技发展,电子信息领域的学术会议也越来越多。

在海量的学术会议中,如何筛选出对自己的研究有帮助的会议成为了每个研究人员都必须面对的问题。

本文将为大家介绍电子信息领域常见的学术会议分级目录。

一、顶级会议一般来讲,顶级会议具有国际影响力和权威性,其论文接收率极低,一般不超过20%。

这类会议的论文质量高,容量大,能吸引国内外专家前来参会。

电子信息领域的顶级会议有:IEEE International Conference on Computer Vision(ICCV)、Conference on Computer Vision and Pattern Recognition(CVPR)、IEEE International Conference on Robotics and Automation(ICRA)、International Conference on Machine Learning(ICML)。

二、重要会议重要会议在电子信息领域较为活跃,论文接收率在30%~50%,对于大部分学者而言,选择参加这类会议是较为明智的选择。

重要会议通常会邀请权威学者发表主题演讲,展示最前沿的科研成果。

电子信息领域的重要会议包括: Asian Conference on Computer Vision (ACCV)、IEEE Conference on Computer Communications (INFOCOM)、International Conference on Data Mining (ICDM)、International Joint Conference on Artificial Intelligence (IJCAI)。

三、普通会议普通会议绝大部分为本地或地区性质较强的学术会议,成果难以在国际学术界产生很大影响。

但是,普通会议通常为研究人员提供了一个相对成熟的交流机制,也为他们展示和发表研究成果提供了一个很好的平台。

体系结构顶会

体系结构顶会

体系结构顶会随着计算机技术的不断进步与发展,计算机体系结构的研究变得越来越重要。

体系结构顶会是计算机体系结构领域里最具权威性的会议之一,每年都会吸引来自世界各地的科研人员和学者参加。

在这篇文章中,我将介绍一下体系结构顶会的一些信息。

体系结构顶会(The International Symposium on Computer Architecture,简称ISCA)是由计算机体系结构学会(ACM SIGARCH)主办的、历史最悠久、最具权威性的计算机体系结构会议之一。

ISCA自1973年至今已经成功举办了47届,是计算机体系结构领域的重要盛会之一。

二、ISCA有哪些特点?1.精选论文ISCA的论文要经过严格的筛选程序,只选取最具有代表性、最具有前瞻性的研究论文。

在ISCA会议上发表论文,需要通过两轮评审,主要评估的是论文的原创性和科学性。

2.高水平报告ISCA吸引了众多国际上计算机体系结构领域的知名学者和研究人员,这些专家将为参会者们带来高水平的报告,展示最新的技术动态和发展方向。

3.开放性交流ISCA会议以开放性的交流为主,各参会人员可以互相学习、交流、讨论。

此外,ISCA 还提供了丰富的报告展示和互动机会,能够为参会人员提供更多的学术交流平台。

三、ISCA的主要议题1.单芯片多处理器(CMP)计算机体系结构2.存储系统体系结构3.高效能可扩展的流处理器体系结构4.功率,功率管理和动力学5.软件和编译器优化技术6.可扩展多核计算机体系结构7.可编程体系结构和可重构计算8.单元操作和指令集体系结构四、ISCA历届会议简介ISCA会议自1973年开始,至今已经举办了47届。

以下是ISCA会议近几年的简介: 1.2020年ISCA时间:2020年5月30日至6月3日地点:美国加利福尼亚州圣地亚哥论文数量:153篇地点:美国西雅图地点:日本津市地点:加拿大多伦多地点:韩国首尔六、总结体系结构顶会是计算机体系结构领域里最权威的会议之一,对于该领域的学者和研究人员具有重要的意义。

CCF推荐的国际学术会议和期刊目录修订版发布

CCF推荐的国际学术会议和期刊目录修订版发布

CCF推荐的国际学术会议和期刊目录修订版发布CCF(China Computer Federation中国计算机学会)于2010年8月发布了第一版推荐的国际学术会议和期刊目录,一年来,经过业内专家的反馈和修订,于日前推出了修订版,现将修订版予以发布。

本次修订对上一版内容进行了充实,一些会议和期刊的分类排行进行了调整,目录包括:计算机科学理论、计算机体系结构与高性能计算、计算机图形学与多媒体、计算机网络、交叉学科、人工智能与模式识别、软件工程/系统软件/程序设计语言、数据库/数据挖掘/内容检索、网络与信息安全、综合刊物等方向的国际学术会议及期刊目录,供国内高校和科研单位作为学术评价的参考依据。

目录中,刊物和会议分为A、B、C三档。

A类表示国际上极少数的顶级刊物和会议,鼓励我国学者去突破;B类是指国际上著名和非常重要的会议、刊物,代表该领域的较高水平,鼓励国内同行投稿;C类指国际上重要、为国际学术界所认可的会议和刊物。

这些分类目录每年将学术界的反馈和意见,进行修订,并逐步增加研究方向。

中国计算机学会推荐国际学术刊物(网络/信息安全)一、 A类序号刊物简称刊物全称出版社网址1. TIFS IEEE Transactions on Information Forensics andSecurity IEEE /organizations/society/sp/tifs.html2. TDSC IEEE Transactions on Dependable and Secure ComputingIEEE /tdsc/3. TISSEC ACM Transactions on Information and SystemSecurity ACM /二、 B类序号刊物简称刊物全称出版社网址1. Journal of Cryptology Springer /jofc/jofc.html2. Journal of Computer SecurityIOS Press /jcs/3. IEEE Security & Privacy IEEE/security/4. Computers &Security Elsevier http://www.elsevier.nl/inca/publications/store/4/0/5/8/7/7/5. JISecJournal of Internet Security NahumGoldmann. /JiSec/index.asp6. Designs, Codes andCryptography Springer /east/home/math/numbers?SGWID=5 -10048-70-35730330-07. IET Information Security IET /IET-IFS8. EURASIP Journal on InformationSecurity Hindawi /journals/is三、C类序号刊物简称刊物全称出版社网址1. CISDA Computational Intelligence for Security and DefenseApplications IEEE /2. CLSR Computer Law and SecurityReports Elsevier /science/journal/026736493. Information Management & Computer Security MCB UniversityPress /info/journals/imcs/imcs.jsp4. Information Security TechnicalReport Elsevier /locate/istr中国计算机学会推荐国际学术会议(网络/信息安全方向)一、A类序号会议简称会议全称出版社网址1. S&PIEEE Symposium on Security and Privacy IEEE /TC/SP-Index.html2. CCSACM Conference on Computer and Communications Security ACM /sigs/sigsac/ccs/3. CRYPTO International Cryptology Conference Springer-Verlag /conferences/二、B类序号会议简称会议全称出版社网址1. SecurityUSENIX Security Symposium USENIX /events/2. NDSSISOC Network and Distributed System Security Symposium Internet Society /isoc/conferences/ndss/3. EurocryptAnnual International Conference on the Theory and Applications of Cryptographic Techniques Springer /conferences/eurocrypt2009/4. IH Workshop on Information Hiding Springer-Verlag /~rja14/ihws.html5. ESORICSEuropean Symposium on Research in Computer Security Springer-Verlag as.fr/%7Eesorics/6. RAIDInternational Symposium on Recent Advances in Intrusion Detection Springer-Verlag /7. ACSACAnnual Computer Security Applications ConferenceIEEE /8. DSNThe International Conference on Dependable Systems and Networks IEEE/IFIP /9. CSFWIEEE Computer Security Foundations Workshop /CSFWweb/10. TCC Theory of Cryptography Conference Springer-Verlag /~tcc08/11. ASIACRYPT Annual International Conference on the Theory and Application of Cryptology and Information Security Springer-Verlag /conferences/ 12. PKC International Workshop on Practice and Theory in Public Key Cryptography Springer-Verlag /workshops/pkc2008/三、 C类序号会议简称会议全称出版社网址1. SecureCommInternational Conference on Security and Privacy in Communication Networks ACM /2. ASIACCSACM Symposium on Information, Computer and Communications Security ACM .tw/asiaccs/3. ACNSApplied Cryptography and Network Security Springer-Verlag /acns_home/4. NSPWNew Security Paradigms Workshop ACM /current/5. FC Financial Cryptography Springer-Verlag http://fc08.ifca.ai/6. SACACM Symposium on Applied Computing ACM /conferences/sac/ 7. ICICS International Conference on Information and Communications Security Springer /ICICS06/8. ISC Information Security Conference Springer /9. ICISCInternational Conference on Information Security and Cryptology Springer /10. FSE Fast Software Encryption Springer http://fse2008.epfl.ch/11. WiSe ACM Workshop on Wireless Security ACM /~adrian/wise2004/12. SASN ACM Workshop on Security of Ad-Hoc and Sensor Networks ACM /~szhu/SASN2006/13. WORM ACM Workshop on Rapid Malcode ACM /~farnam/worm2006.html14. DRM ACM Workshop on Digital Rights Management ACM /~drm2007/15. SEC IFIP International Information Security Conference Springer http://sec2008.dti.unimi.it/16. IWIAIEEE International Information Assurance Workshop IEEE /17. IAWIEEE SMC Information Assurance Workshop IEEE /workshop18. SACMATACM Symposium on Access Control Models and Technologies ACM /19. CHESWorkshop on Cryptographic Hardware and Embedded Systems Springer /20. CT-RSA RSA Conference, Cryptographers' Track Springer /21. DIMVA SIG SIDAR Conference on Detection of Intrusions and Malware and Vulnerability Assessment IEEE /dimva200622. SRUTI Steps to Reducing Unwanted Traffic on the Internet USENIX /events/23. HotSecUSENIX Workshop on Hot Topics in Security USENIX /events/ 24. HotBots USENIX Workshop on Hot Topics in Understanding Botnets USENIX /event/hotbots07/tech/25. ACM MM&SEC ACM Multimedia and Security Workshop ACM。

计算机TOP40国际学术会议(A、B分类)

计算机TOP40国际学术会议(A、B分类)

计算机TOP40国际学术会议(A、B分类)为提高学术水平、促进国际学术交流,经研究决定,拟将计算机学科国际顶尖学术会议学术论文分为A、B两类,等同于《华中科技大学期刊分类办法》中规定的A、B类期刊。

A、B类国际顶尖学术会议学术论文分类如下:一、A类1. International Conference on Architectural Support for ProgrammingLanguages and Operating Systems (ASPLOS)2. ACM Conference on Computer and Communication Security (CCS)3. USENIX Conference on File and Storage Techniques (FAST)4. International Symposium on High Performance Computer Architecture(HPCA)5. International Conference on Software Engineering (ICSE)6. International Symposium on Computer Architecture (ISCA)7. USENIX Conference on Operating System and Design (OSDI)8. ACM SIGCOMM Conference (SIGCOMM)9. ACM Annual International ACM SIGIR Conference on Research andDevelopment in Information Retrieval (SIGIR)10. International Conference on Management of Data and Symposium onPrinciples of Database Systems (SIGMOD/PODS)11. ACM Symposium on Operating Systems Principles (SOSP)12. Annual ACM Symposium on Theory of Computing (STOC)13. USENIX Annual Technical Conference (USENIX)14. ACM International Conference on Virtual Execution Environments (VEE)15. International Conference on Very Large Data Bases (VLDB)二、B类1. International Conference on Dependable Systems and Networks (DSN)2. IEEE Symposium on Foundations of Computer Science (FOCS)3. IEEE International Symposium on High Performance DistributedComputing (HPDC)4. International Conference on Distributed Computing Systems (ICDCS)5. International Conference on Data Engineering (ICDE)6. IEEE International Conference on Network Protocols (ICNP)7. ACM International Conference on Supercomputing (ICS)8. International Joint Conference on Artificial Intelligence (IJCAI)9. IEEE Conference on Computer Communications (INFOCOM)10. ACM SIGKDD International Conference on Knowledge Discovery and DataMining (KDD)11. Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)12. ACM/IFIP/USENIX International Middleware Conference (Middleware)13. ACM International Conference on Multimedia (MM)14. ACM International Conference on Mobile Systems, Applications, andServices (MobiSys)15. ACM Conference on Programming Language Design and Implementation(PLDI)16. Annual ACM Symposium on Principles of Distributed Computing (PODC)17. ACM Symposium on Principles of Programming Languages (POPL)18. ACM SIGPLAN Symposium on Principles and Practice of ParallelProgramming (PPoPP)19. IEEE Real-Time Systems Symposium (RTSS)20. Supercomputing (SC'XY) Conference21. ACM Conference on Computer Graphics and Interactive Techniques(SIGGRAPH)22. ACM Conference on Measurement and Modeling of Computer Systems(SIGMETRICS)23. IEEE Symposium on Security and Privacy (SP)24. Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA)25. International World Wide Web Conference (WWW)。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Global Identification of Storage Objects in Network Attached StorageIliya Georgiev, Kiril Boyanov, Ivo GeorgievAbstract: Network attached disk storage is an independent Internet node and provides geographical distribution, mutual identification and exchange of storage objects. The paper describes a method for global identification of storage objects and a structure of object registry. For the identification word-wide unique identifiers are generated by double hash transformation based on the Advanced Encryption Standard (Rijndael) with no collisions.Key words: network attached storage, global identification of storage objects, cryptographic hashing INTRODUCTIONDisk storage architectures provided by the industry today are direct-attached storage (DAS), storage area networks (SAN) and network-attached storage devices (NAS) [3]. Direct-attached storage is connected directly to the I/O bus and offers high performance and minimal security concerns, but there are limits on connectivity. SAN is a part of a switched network that provides fast scalable interconnect for large numbers of independent computers and storage devices. Both DAS and SAN are block-based. The host operating system is responsible for mapping their data structures (files and directories) to blocks on the disk devices.NAS provides file serving allowing data sharing across platforms and application servers. These servers (Web servers, e-commerce servers, bio-information repositories, digital libraries, multimedia servers and others) have different functionality and information exchange load with the storage.The main service, which NAS devices offer to such servers, is geographically distributed repository of storage objects. In Internet-based global computing, it was observed that the servers are very powerful and fault-tolerant, but are still vulnerable to an unexpected catastrophe such as natural disaster or planned attack. All of the stored data could be destroyed instantly. In order to make mission-critical data operational even after a devastating strike, it is highly imperative to have distributed information and remote disaster recovery. The decentralized and dispersed nature of NAS gives the potential to be robust to faults or intentional attack, making it ideal for long-term repository.Network attached storage has driven increasingly complex processing and optimization inside storage devices. Data stored in network storage is considered a collection of storage objects. Such collection can be mapped onto different file structures. Mutual identification and exchange of storage objects between different devices face problems of data distribution and security.In this article, we address one of the research problems in distributed file service of NAS: global identification of storage objects. The described approach is implemented in a NAS under development.FILE SERVICE IN NASNetwork attached storage exists in Internet environment. The provided file service depends on the storage usage and the demand for greater interactivity. The global computing requirements suggest two usage scenarios for the provided file service.In the first one a server owns several geographically distributed NAS, connected via Internet. The NAS devices serve as a remote storage to the servers, but also can replicate data between each other, insuring consistent data copies. The NAS filer is responsible for mapping the application data structures to blocks on the storage devices. Additional metadata is transferred from the server to the storage to do such mappings. The metadata is controlled completely on the embedded NAS controller. In this scenario the NAS functionality offers file services compatible to the low-level file systems implemented in the most popular OS:a. Usage of iSCSI that is an IP based storage-networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage storage over long distances.b. File sharing systems like MS Common Internet File System that runs over TCP/IP and utilizes the global domain name service. For any particular file, NAS determines the name of the server and the relative name within the server, exchanges messages with the server for connecting, opening a file, reading its data, closing the file and disconnecting from the server.The second scenario is to incorporate a distributed file service in NAS, which requires algorithms for performing distributed search and related global identification. Such file sharing system enables to exchange storage objects directly among different NAS without the need of a central file server. The network-attached storage is used as a P2P (peer-to-peer) node. Distributed file service is a natural characteristic of such NAS, which extends the local computer storage with a pool of storage spread throughout the Internet.METHOD FOR GLOBAL IDENTIFICATIONOne of the challenges of designing NAS with a distributed file service, is how to find any given object in a large geographically dispersed storage. In classical file systems, the files are identified by a pair, where the first part is the identifier of the computer (usually the host IP address) and the second part is the path in the directory hierarchy. Such identification is not usable in NAS with a distributed file service, because the information can migrate over hosts with different IP addresses, and also the directory hierarchy is not enough informative when the stored data is considered as a collection of data objects. The approach accepted in our system is to assign a storage object unique identifier (SOID) to each storage object and to provide a storage object registry of the objects.We propose each unique identifier to be generated by a very exacting algorithm that is sufficiently precise to prevent any two SOIDs from ever being generated in duplicate. Additionally a digest (search key) is extracted from the SOID. The digest supports fast lookup and searching of the corresponding storage object. The SOIDs are hash codes, generated by the proposed algorithm, which guarantee world wide consistent identification of such objects.The purpose of object registries is to provide a storage object discovery platform for the Internet applications and an information framework for describing data objects exposed by any entity or application program. Using this framework, the registry manages the metadata about storage objects.The process of data locating can be presented by the following paradigm: the application constructs messages referencing SOIDs and lets the NAS infrastructure pass these messages from peer to peer until the targets are located. Co-operation between the NAS and ability to route messages directly to objects without knowing their location are needed. Such functionality and interface require from the NAS to replicate, destroy, and migrate data to meet application-level goals [1].In distributed file service, symmetric lookup algorithms could search the data where there is no a central node, and each node is typically involved in only a small fraction of the search paths in the system.GENERATION OF SOIDThe proposed method provides flexibility of use and identifier generation of different NAS entities. The NAS entity and file naming structure allows the establishment of unique names. There are two instances of names in the open distributed environment: externally visible and internal (globally unique).The externally visible (seen by humans) name is referred to the storage object or NAS entity text name. This text name is usually of variable length, thereby making itinternally difficult to use by the security facilities. In our method the text name is one-way hashed providing a visible name with fixed length and very high uniqueness.The internal name is the globally unique identifier (SOID), which also is a fixed length value. While the external names after initial hashing are unique enough to ensure that no security problems could result from duplication, the SOID is unique in both "time and space" ensuring that no two objects will ever be assigned the same value. In addition, it provides a basis for allowing object authentication to be performed once for an application session and for applications to access stored information in any NAS for which they are authorized. Data integrity and confidentiality services are enabled for use between any two nodes. Figure 1 represents the proposed method for SOID generation.Figure 1. Generation of globally unique Storage Object IdentifierAs input string, we use any text string, which could be derived from the object name or directory path attributes. If the object is just created and is considered anonymous, the input string is generated randomly.The next step is padding. The input string is “padded” (by appending extra bits) as necessary to attain an overall bitlength, which is a multiple of the blocklength suitable for further processing with the following cryptographic hash function. First, the string is padded to make it a multiple of 256 bits long. Further we append a digit-one-byte, then as many zeros as necessary to make the string 32-bit multiple of 256, and finally a 32-bit representation of the length of the string before padding.For visible name generation, the padded strings are further manipulated by a one-way cryptographic hash function that we have created and implemented using the fundamental principles of cryptographic hash functions [5]. It runs the basic Rijndael block cipher [2] that works with 256 bit key length and 256-bit block length and produces a 256 bits long external visible name. The one-way hash function H maps an input X of arbitrary finite bitlength, to an output H(X) of fixed bitlength n. The hash input is divided into byte-length blocks X i. The block cipher Rijndael performs simple whole-byte operations that make it very fast and appropriate for different platforms. Also, it provides extra flexibility, in that both the key size and the block size may be chosen to be any of 128, 192, or 256 bits.In the proposed hashing the encrypted block and the key given to the Rijndael encryption are selected equal to 256 bits. Each block X i serves as input to the internal fixed-size hash function, which computes a new intermediate result and the next input block X i. Letting E k denote encryption with key k, the block H t is computed as follows: H1← E k (X1); H i← E k (H i-1 ⊕ X i), 2 <i ≤ t.This is a cipher-block chaining, discarding ciphertext blocks C i = H i. The 256-bit padded string from the previous step serves as the key to encrypt a known plain text (wetake it with all 0-bits). This yields a one-way function of the key (our padded string). The last cipher-text block is the hash value. The cipher-block chaining uses the previous hash value as the key (the very first time the previous hash value is equal to 32 bits zero), the message block (all 0-bits) as the input, and the current hash value EXOR-ed with the previous hash value and with the cipher output.The generated visible name serves as input for the next step of our implementation - salting. To ensure fully theoretical and practical uniqueness the visible name is augmented (salted) with a string with higher degree of randomness. Salting is based on both static and dynamic attributes, which are taken in order to generate the SOID. The main goal is to choose among such attributes, which will yield always-different values for salting. The salt consists of two main parts - static and dynamic. The static part is a snapshot of certain system parameters at the moment the salting function was called for the first time. The static fields of the "salt" remain constant for a certain process, no matter how many times the salting function is executed. The parameters of the dynamic part of the "salt", in contrast to static fields, change every time the salting function is called. While dynamic parameters may happen to be the same on different systems or for different processes on a single system, it is very unlikely that the static fields would also match, i.e. two different systems were in the same state at a certain point in time.We have chosen the following eight attributes for the static and dynamic parts of the “salt”:•Static fields:PID - process identifier; System time - system time taken at the start of this process; Ticks - the amount of CPU time since the beginning of theprocess (in msec); Address - a memory address taken during the firstexecution of the salting function;•Dynamic fields: System time, Ticks & Address - same as the respective static fields but taken every time the function is called; Counter - a counter, whichtells how many times the function was called (it insures against two calls of thesalting function within less than a millisecond).The salted strings are input again to a one-way Rijndael hash function to produce the SOID. Now the “salt” is the plain input text to be encrypted and the visible name is the key. The “salt” input is divided into byte-length blocks X i, which are the chaining variables. The chaining variables go to the input and the visible name to the cipher key. The new value of the chaining variable is given by the old value EXOR-ed with the cipher output.The next step is to produce a 32-bit Search Key. The motivation to extract a 32-bit key for searching is obvious. Using a 256-bit SOID for searching is computationally expensive. A 32-bit digest ensures fast lookup in any data structure. For a digest, we decided to use a cyclic redundancy code with the generator-polynomial CRC-32, popular for the Ethernet [5]. The generator-polynomial is:x32+x26+x23+x22+x16+x12+x11+x10+x8+x7+x5+x4+x2+x1+x0Using the excellent theoretical analysis in [4] we estimated the collision degree of such digest. This polynomial, when used with 256-bit SOIDs, is fully collision-free if the Hamming distance between the SOIDs is 1,2 or 3 bits. For 4 and more bits distance we used the formula 256!/r! (256-r)!, where r is the distance in bits. The collision degree is slightly more than 1 out of 232 generated search keys on average.TEST RESULTS OF SOID GENERATIONFor testing, we have produced a fully automated application. The test stand contains two applications. The first one is for creation of different random strings and for SOID generation. The second one is for analyzing of any possible duplicated search key from different SOIDs.Some test results are shown into the following table below. There are no equal SOIDs generated – the double usage of Rijndael cipher makes the collision distance equalto 2256. The only collisions we have are duplicated search keys from different SOIDs – in average one collision for 100,000 generations.Number Type ofstringLength ofstring [bits]Number ofGeneratedstringsCollisions:•NO for SOID;•Few for the search key.1 Fixed 1 110,000 1 duplicated search key2 Fixed 100 100,000 Nocollisions3 Fixed 75 125,000 1 duplicated search key4 Fixed 128 225,000 3 duplicated search keys6 Sequence 32 100,000 Nocollisions7 Sequence 100 120,000 2 duplicated search keys8 Sequence 200 100,000 Nocollisions9 Random 2 10,000 Nocollisions10 Random 200 50,000 Nocollisions STORAGE OBJECTS REGISTRYFollowing the recommendations of the Internet society, we organize the discovery of the storage objects in a two-level registry for global identification.The first level could be considered as a table of the tuples "search key – SOID – Internet location (optional)" of all consistent objects in the NAS. In a peer-to-peer lookup scenario such table is considered a distributed search hash table. The hash table abstraction provides a general-purpose interface for location-independent naming upon which a variety of applications can be built. The hash tables interface implements just one function: lookup (SOID). The function starts by performing a CRC to generate the search key. This key is used for fast search in order to check if the NAS has a tuple for the object. If such search matches, the NAS can retrieve the object or yield the network location currently responsible for the given SOID.A distributed storage application might use this interface as follows. To publish a file under a particular name, the publisher would convert the name to a SOID, than call lookup(SOID). The publisher would then send the file to be stored at the NAS, responsible for the SOID. A client wishing to read that file would later obtain its SOID, call lookup(SOID), and ask the resulting NAS for a copy of the file.The second level of the registry represents all known information about a storage object. The individual instance data are sensitive to the parent/child relationships found in the application directory tree. Also some of the parameters could be changed during the live period of the storage objects like action enabled, permission bits and so on. The information associated with a storage object could be split into two groups:a. Identification information. It is considered permanent and persistent during the lifetime of the data object. It contains the following data: search key (32 bits); SOID (256 bits); o wnerName - recorded name of the individual (computer, Web site, person, enterprise) that have created the object data. This is the certified name of the owner that manages the master copy of the storage object data and keeps registry information. The owner records this data at the time data is saved; lookupURL - a list of Uniform Resource Locators (URL) that points to file discovery mechanisms; name - required name recorded for the storage object; r eferencedObjects - a list of one or more logical or physical connected data objects; description - one or more short data descriptions.b.Parameters that can be changed during the lifetime of the storage object: functionsEnabled - bits defining the operations performed on the storage object: open, edit, append, read, write; permissions - bits defining the actions allowed.IMPLEMENTATIONTwo different implementations of the method have been produced. The first implementation in C++ was oriented to verify and experimentally prove the method. The created automatic test system has been running for more than a month in order to collect information about the number of collisions. The input strings were generated with different lengths from one to 200 alphanumerical symbols.The second implementation is on ARM symmetric multiprocessing architecture, using assembly language with no loop-carried dependencies and minimal cache misses. It is a part of the functionality of a NAS, oriented to provide distributed bio-information.RELATED WORKSThe use of unique keys is a proved approach for identification of programming objects, digital documents and different computing resources. The Universally Unique Identifier is an identifier standard used in software construction, standardized by the Open Software Foundation (OSF) as part of the Distributed Computing Environment (DCE). The most widespread use of this standard is in Microsoft's GUIDs. The Microsoft algorithm has been justifiably criticized because of its collision degree and the usage of Ethernet MAC addresses [6].We have carefully compared most of the generic methods on several criteria: collision ratio, portability to different platforms, NAS specifics, etc.After some analysis we decided to create a new method, which follows the paradigm of the standard but takes abvantages of double hashing function and is based on the last international cryptography standard.CONCLUSIONS AND FUTURE WORKAn approach for global identification of storage objects in network-attached storage has been laid out. It offers a method for generation of globally unique storage object identifiers without collisions and a structure of an object registry. The method has been tested and implemented in a network-attached storage under development.Our future work would be oriented to make our approach compatible with some of the emerging distributed environments like grid computing, Web services and P2P computing.REFERENCES[1] Balakrishnan. H., M. Frans Kaashoek, D.Karger, R.Morris, I.Stoika. Looking Up Data in P2P Systems. Communications of the ACM, vo.46, No.2, February 2003, pp.43-48.[2] Daemen J., V. Rjimen. The Rijndael Block Cipher. Advanced Encryption Standard. At /publications/fips/fips197/fips-197.pdf.[3] Gibson G. A., Van Meter R. Network Attached Storage Architecture. Communications of the ACM, Vol. 43, No. 11, (2000) pp. 37-45.[4] Koopman P.32-bit cyclic redundancy codes for Internet applications. Proceedings of the IEEE International Conference on Dependable Systems and Networks, 2002.[5] Menezes A., van Oorshot, S.Vanstone. Handbook of Applied Cryptography. CRC Press, New York, 1997.[6] Microsoft Globally Unique Identifier. /wiki/Globally_Unique_IdentifierABOUT THE AUTHORSIliya Georgiev, Prof. PhD, Department of Math and Computer Science, Metro State College of Denver, Campus box 38, P.O. Box 173362, Denver 80217, USA, Phone: +303 673 9403, Е-mail: gueorgil@, URL: /~gueorgil/Kiril Boyanov, Acad. DSc, Central Laboratory for Parallel Processing, acad. G. Bonchev str.bl.25A, Sofia 1113, Bulgaria, Phone: +359-2-9796617, E-mail: boyanov@acad.bg Ivo Georgiev, B.S., San Francisco State University, 1600 Holloway Avenue, San Francisco, CA 94132, USA, E-mail: ivogeorg@。

相关文档
最新文档