skip to main content
10.1007/978-3-030-62460-6_22guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Adaptive Data Protection Scheme for Optimizing Storage Space

Published: 08 October 2020 Publication History

Abstract

Data is the main driving factor of artificial intelligence represented by machine learning, and how to ensure data security is one of the severe challenges. In many traditional methods, a single snapshot strategy is used to protect data. In order to meet the flexibility of data protection and optimize storage space, this paper presents a new architecture and an implementation in the Linux kernel. The idea is to hook system calls and analyze the relationship between applications and files. By tracking system calls, the system can perceive the file modification and automatically adjust the time interval for generating snapshots. Time granularity changes with the application load to achieve on-demand protection. Extensive experiments have been carried out to show that the scheme can monitor the process of operating files, reduce storage costs and hardly affect the performance of system.

References

[1]
Jacob S, Menon VG, Al-Turjman F, et al. Artificial muscle intelligence system with deep learning for post-stroke assistance and rehabilitation IEEE Access 2019 7 133463-133473
[2]
Sangaiah AK, Lu H, and Hu Q Cognitive science and artificial intelligence for human cognition and communication IEEE Consum. Electron. Mag. 2019 9 1 72-73
[3]
Zafar, S., Jangsher, S., Aloqaily, M., et al.: Resource allocation in moving small cell network using deep learning based interference determination. In: 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). IEEE, pp. 1–6 (2019)
[4]
Sharma G, Srivastava G, and Mago V A framework for automatic categorization of social data into medical domains IEEE Trans. Comput. Soc. Syst. 2019 7 129-140
[5]
Edwards, L.: data protection and e-privacy: from spam and cookies to big data, machine learning and profiling. Soc. Sci. Electron. Publ. (2018)
[6]
Ullah F, Naeem H, Jabbar S, et al. Cyber security threats detection in internet of things using deep learning approach IEEE Access 2019 7 124379-124389
[7]
Elnozahy EN, Alvisi L, Wang YM, et al. A survey of rollback-recovery protocols in message-passing systems ACM Comput. Surv. (CSUR) 2002 34 3 375-408
[8]
Netzer RHB and Xu J Necessary and sufficient conditions for consistent global snapshots IEEE Trans. Parallel Distrib. Syst. 1995 6 2 165-169
[9]
Johann T Reward for return of sheepdog and pups Farmers Weekly 2018 169 7 1
[10]
Chen, L., Kang, H., Jia, W.: Design and implementation of snapshot system in cloud storage log-structured file-system. Comput. Appl. Softw. 7 (2013)
[11]
Zhao, Z., Luo, Y.: Design and implementation of a remote disaster recovery system based on fine-grained snapshot. Comput. Eng. Sci. 7 (2008)
[12]
Zhou W, Tan H, Yi L, et al. High-performance snapshot of logical volumes based on out-of-band storage virtualization J. Comput. Res. Dev. 2012 49 3 636-645
[13]
Li, C., Zhang, Q., Tan, J., Yan, Z.: Linux file system encryption design. Internet Things Technol. 8(2): 77–79, 82 (2018)
[14]
Peterson Z and Burns R Ext3cow: a time-shifting file system for regulatory compliance ACM Trans. Storage (TOS) 2005 1 2 190-212
[15]
Hitz, D., Lau, J., Malcolm, M.A.: File system design for an NFS file server appliance. USENIX Winter 94 (1994)
[16]
Duzy, G.: Match snaps to apps. Storage, Special Issue on Managing the Information that Drives the Enterprise, 46–52 (2005)
[17]
Xu G, Gang W, and Jing L Multi-point incremental snapshot design based on the same snapshot volume Comput. Eng. Appl. 2005 3 113-115
[18]
Bhat WA and Wani MA Forensic analysis of B-tree file system (Btrfs) Digit. Investig. 2018 27 57-70
[19]
Wei, Y., Shin, D.: NAND flash storage device performance in Linux file system. In: 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT). IEEE (2011)
[20]
Li, S., et al.: COW-IMM: a novel integrity measurement method based on copy-on-write for file in virtual machine. IEEE Access 6, 51776–51790 (2018)
[21]
Guo, S., Xie, W.: Analysis in depth on Linux proc file system programming. J. Huaqiao Univ. (Nat. Sci.) 5 (2010)
[22]
Peng, G.-J., et al.: Abnormal file management activities identification system based on association analysis of behaviors. Comput. Eng. Des. (2015)

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Machine Learning for Cyber Security: Third International Conference, ML4CS 2020, Guangzhou, China, October 8–10, 2020, Proceedings, Part II
Oct 2020
622 pages
ISBN:978-3-030-62459-0
DOI:10.1007/978-3-030-62460-6
  • Editors:
  • Xiaofeng Chen,
  • Hongyang Yan,
  • Qiben Yan,
  • Xiangliang Zhang

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 08 October 2020

Author Tags

  1. Adaptive protection
  2. Snapshot
  3. Storage optimization

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Feb 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media