{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T13:25:32Z","timestamp":1725715532808},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_2","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T04:16:01Z","timestamp":1360383361000},"page":"14-25","source":"Crossref","is-referenced-by-count":0,"title":["Research on Data Fault Tolerance Mechanism Based on ECT in Cloud Storage"],"prefix":"10.1007","author":[{"given":"Danwei","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiaojuan","family":"Ping","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: What\u2019s New About Cloud Computing Security? UCB\/EECS (May 2010)"},{"key":"2_CR2","unstructured":"Sotto, L.J., Treacy, B.C., McLellan, M.L.: Privacy and Data Security Risks in Cloud Computing. Electronic Commerce & Law Report (February 2010)"},{"key":"2_CR3","unstructured":"Huang, X.: Based the HDFS cloud storage service system. Dalian Maritime University (2010)"},{"key":"2_CR4","unstructured":"Borthakur, D.: HDFS architecture. The Apache Software Foundation (2008)"},{"key":"2_CR5","unstructured":"Flag hearing data backup and recovery and security. China Railway Publishing House, Beijing (2008)"},{"key":"2_CR6","first-page":"29","volume-title":"Proc. of the 19th ACM SOSP","author":"S. Ghemawat","year":"2003","unstructured":"Ghemawat, S., Gobioff, H., Leung, S.-T.: The Google file system. In: Proc. of the 19th ACM SOSP, pp. 29\u201343. ACM Press, New York (2003)"},{"key":"2_CR7","unstructured":"Amazon Simple Storage Service (S3), \n                  \n                    http:\/\/www.amazon.com\/s3"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Jia, W., Chen, W.: Based on the information is scattered RS erasure code algorithm. Computer Applications\u00a0(30), 3197\u20133200 (2010)","DOI":"10.3724\/SP.J.1087.2010.03197"},{"key":"2_CR9","unstructured":"Plank, J.S., Ding, Y.: Note: Correction to the 1997 Tutorial on Reed-Solomon Coding. University of Tennessee. Tech. Rep. CS-03-504 (2003)"},{"key":"2_CR10","unstructured":"Niu, H.: Vandermonde determinant in the determinant calculation. Education Innovation Review (17) (2008)"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:48:49Z","timestamp":1557535729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}