Chuqiao Xiao’s research while affiliated with East China Normal University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


An example of parameters (n = 10, k = 5, d = 9): reconstruction by the data collector (DC) is shown on the left and repair by a new node when old node has failed is shown on the right.
Bitmatrix of each element over GF2ww=3; M(0) is the all-zero matrix and M(1) is the identity matrix. Each columns except 1st column is calculated by the left-hand column∗2.
Two forms of multiplication based on bitmatrix over GF8.
Using Bitmatrix transform Ψ×M. Shown in the upper part of this figure is the transformation of PB-MSR codes for the parameters n=5,k=3,d=4, and B=6. The transformation of PB-MBR for the parameters n=4,k=2,d=3, and B=5 is shown in the bottom half of the illustration. All encoded blocks are stored on the corresponding nodes.
Product bitmatrix ϕf on node 1.

+11

PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w
  • Article
  • Full-text available

January 2021

·

125 Reads

·

1 Citation

Chuqiao Xiao

·

Xueqing Gong

·

Yefeng Xia

·

Qian Zhang

Edge computing, as an emerging computing paradigm, aims to reduce network bandwidth transmission overhead while storing and processing data on edge nodes. However, the storage strategies required for edge nodes are different from those for existing data centers. Erasure code (EC) strategies have been applied in some decentralized storage systems to ensure the privacy and security of data storage. Product-matrix (PM) regenerating codes (RGCs) as a state-of-the-art EC family are designed to minimize the repair bandwidth overhead or minimize the storage overhead. Nevertheless, the high complexity of the PM framework contains more finite-domain multiplication operations than classical ECs, which heavily consumes computational resources at the edge nodes. In this paper, a theoretical derivation of each step of the PM minimum storage regeneration (PM-MSR) and PM minimum bandwidth regeneration (PM-MBR) codes is performed and the XOR complexity over finite fields is analyzed. On this basis, a new construct called product bitmatrix (PB) is designed to reduce the complexity of XOR operations in the PM framework, and two heuristics are used to further reduce the XOR numbers of the PB-MSR and PB-MBR codes, respectively. The evaluation results show that the PB construction significantly reduces the XOR number compared to the PM-MSR, PM-MBR, Reed–Solomon (RS), and Cauchy RS codes while retaining optimal performance and reliability.

Download

CBase-EC: Achieving Optimal Throughput-Storage Efficiency Trade-Off Using Erasure Codes

January 2021

·

70 Reads

Chuqiao Xiao

·

Yefeng Xia

·

Qian Zhang

·

[...]

·

Liyan Zhu

Many distributed database systems that guarantee high concurrency and scalability adopt read-write separation architecture. Simultaneously, these systems need to store massive amounts of data daily, requiring different mechanisms for storing and accessing data, such as hot and cold data access strategies. Unlike distributed storage systems, the distributed database splits a table into sub-tables or shards, and the request frequency of each sub-table is not the same within a specific time. Therefore, it is not only necessary to design hot-to-cold approaches to reduce storage overhead, but also cold-to-hot methods to ensure high concurrency of those systems. We present a new redundant strategy named CBase-EC, using erasure codes to trade the performances of transaction processing and storage efficiency for CBase database systems developed for financial scenarios of the Bank. Two algorithms are proposed: the hot-cold tablets (shards) recognition algorithm and the hot-cold dynamic conversion algorithm. Then we adopt two optimization approaches to improve CBase-EC performance. In the experiment, we compare CBase-EC with three-replicas in CBase. The experimental results show that although the transaction processing performance declined by no more than 6%, the storage efficiency increased by 18.4%.


Keyword Search in Decentralized Storage Systems

December 2020

·

191 Reads

·

12 Citations

The emerging decentralized storage systems (DSSs), such as InterPlanetary File System (IPFS), Storj, and Sia, provide people with a new storage model. Instead of being centrally managed, the data are sliced up and distributed across the nodes of the network. Furthermore, each data object is uniquely identified by a cryptographic hash (ObjectId) and can only be retrieved by ObjectId. Compared with the search functions provided by the existing centralized storage systems, the application scenarios of the DSSs are subject to certain restrictions. In this paper, we first apply decentralized B+Tree and HashMap to the DSSs to provide keyword search. Both indexes are kept in blocks. Since these blocks may be scattered on multiple nodes, we ensure that all operations involve as few blocks as possible to reduce network cost and response time. In addition, the version control and version merging algorithms are designed to effectively organize the indexes and facilitate data integration. The experimental results prove that our indexes have excellent availability and scalability.

Citations (1)


... Researchers in the field of distributed systems have been continuously conducting diverse studies to optimize data storage and retrieval performance. Zhu et al. [19] applied distributed B (balance)+ Tree and HashMap structures to distributed storage systems to enable keyword search. The B+ Tree structure optimizes disk access, making it suitable for block access in decentralized storage systems. ...

Reference:

Research on IPFS Image Copyright Protection Method Based on Blockchain
Keyword Search in Decentralized Storage Systems