Fog computing security: a review of current applications and security solutions

S Khan, S Parkinson, Y Qin - Journal of Cloud Computing, 2017 - Springer
Fog computing is a new paradigm that extends the Cloud platform model by providing
computing resources on the edges of a network. It can be described as a cloud-like platform …

A survey on graph processing accelerators: Challenges and opportunities

CY Gui, L Zheng, B He, C Liu, XY Chen… - Journal of Computer …, 2019 - Springer
Graph is a well known data structure to represent the associated relationships in a variety of
applications, eg, data science and machine learning. Despite a wealth of existing efforts on …

Designing a true {Direct-Access} file system with {DevFS}

S Kannan, AC Arpaci-Dusseau… - … USENIX Conference on …, 2018 - usenix.org
We present DevFS, a direct-access file system embedded completely within a storage
device. DevFS provides direct access without compromising file system integrity …

{CrossFS}: A cross-layered {Direct-Access} file system

Y Ren, C Min, S Kannan - 14th USENIX Symposium on Operating …, 2020 - usenix.org
We design CrossFS, a cross-layered direct-access file system disaggregated across user-
level, firmware, and kernel layers for scaling I/O performance and improving concurrency …

X-SSD: A storage system with native support for database logging and replication

S Lee, A Lerner, A Ryser, K Park, C Jeon… - Proceedings of the …, 2022 - dl.acm.org
Transaction logging and log shipping are standard techniques to provide recoverability and
high availability in data management systems. They entail an update to a local log file at …

An efficient database backup and recovery scheme using write-ahead logging

H Kim, HY Yeom, Y Son - 2020 IEEE 13th International …, 2020 - ieeexplore.ieee.org
Many cloud services perform periodic database backup to keep the data safe from failures
such as sudden system crashes. In the database system, two techniques are widely used for …

Security and privacy issues in fog computing environment

M Lata, V Kumar - … Journal of Electronic Security and Digital …, 2022 - inderscienceonline.com
Fog computing has emerged as a new computing paradigm to overcome a number of
challenges faced by the cloud computing. It has extended the cloud computing standards to …

Integrating LSM trees with multichip flash translation layer for write-efficient KVSSDs

SM Wu, KH Lin, LP Chang - IEEE Transactions on Computer …, 2020 - ieeexplore.ieee.org
Log-structured-merge (LSM) trees are a highly write-optimized data structure for lightweight,
high-performance key-value (KV) stores. Furthermore, solid-state drives (SSDs) are a crucial …

[HTML][HTML] Reversing File Access Control Using Disk Forensics on Low-Level Flash Memory

C Rother, B Chen - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
In the history of access control, nearly every system designed has relied on the operating
system (OS) to enforce the access control protocols. However, if the OS (and specifically root …

Design and implementation of SSD-assisted backup and recovery for database systems

Y Son, M Kim, S Kim, HY Yeom… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As flash-based solid-state drive (SSD) becomes more prevalent because of the rapid fall in
price and the significant increase in capacity, customers expect better data services than …