The Cloud Streaming Service Migration in Cloud Video Storage System

Y. Tsai
{"title":"The Cloud Streaming Service Migration in Cloud Video Storage System","authors":"Y. Tsai","doi":"10.1109/WAINA.2013.146","DOIUrl":null,"url":null,"abstract":"Video surveillance is used to solve the problems of public security and preservation of evidence. So far, many researchers have offered their secure systems. However, storage and streaming migration issues must be discussed in more detail. In the paper, a method for streaming service migration in a cloud video storage system and the system using the same are provided, and the cloud storage video system includes a directory host, stream processing apparatuses and detection apparatuses. The method includes: assigning a first stream processing apparatus to establish a first stream connection with a first detection apparatus among the detection apparatuses, and assigning at least a second stream processing apparatus to establish a second stream connection with the first detection apparatus but not to receive the video stream data from the first detection apparatus, and assigning the first processing apparatus to receive and store the video stream data from the first detection apparatus, and the second stream processing apparatus receives and stores the video stream data from the first detection apparatus when the directory host determines that the first stream connection is abnormal, and disconnects the first stream connection.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WAINA.2013.146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Video surveillance is used to solve the problems of public security and preservation of evidence. So far, many researchers have offered their secure systems. However, storage and streaming migration issues must be discussed in more detail. In the paper, a method for streaming service migration in a cloud video storage system and the system using the same are provided, and the cloud storage video system includes a directory host, stream processing apparatuses and detection apparatuses. The method includes: assigning a first stream processing apparatus to establish a first stream connection with a first detection apparatus among the detection apparatuses, and assigning at least a second stream processing apparatus to establish a second stream connection with the first detection apparatus but not to receive the video stream data from the first detection apparatus, and assigning the first processing apparatus to receive and store the video stream data from the first detection apparatus, and the second stream processing apparatus receives and stores the video stream data from the first detection apparatus when the directory host determines that the first stream connection is abnormal, and disconnects the first stream connection.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
云视频存储系统中的云流媒体业务迁移
视频监控是用来解决公共安全和证据保全问题的。到目前为止,许多研究人员已经提供了他们的安全系统。但是,必须更详细地讨论存储和流迁移问题。本文提供了一种在云视频存储系统中实现流媒体服务迁移的方法及使用该方法的系统,所述云存储视频系统包括目录主机、流处理设备和检测设备。方法包括:指定第一流处理设备在检测设备之间与第一检测设备建立第一流连接,并指定至少第二流处理设备与第一检测设备建立第二流连接,但不接收来自第一检测设备的视频流数据,并指定第一处理设备接收和存储来自第一检测设备的视频流数据。当目录主机确定第一流连接异常时,第二流处理装置接收并存储来自第一检测装置的视频流数据,并断开第一流连接。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
WiMAX-WLAN Vehicle-to-Infrastructure Network Architecture during Fast Handover Process RFID Tracking for Urban Transportation Using EPCGlobal-based WebServices An Effective Attack Detection Approach in Wireless Mesh Networks Privacy Enhanced and Computationally Efficient HSK-AKA LTE Scheme On Scheduling Real-Time Multi-item Queries in Multi-RSU Vehicular Ad Hoc Networks (VANETs)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1