Filters








2,891 Hits in 6.6 sec

A Layered Architecture for Erasure-Coded Consistent Distributed Storage [article]

Kishori M. Konwar, N. Prakash, Nancy Lynch, Muriel Medard
2017 arXiv   pre-print
We use a class of erasure codes known as regenerating codes for storage of data in the back-end layer.  ...  Motivated by emerging applications to the edge computing paradigm, we introduce a two-layer erasure-coded fault-tolerant distributed storage system offering atomic access for read and write operations.  ...  While this may be the first work that explicitly uses regenerating codes for consistent data storage, the study of erasure codes-like Reed-Solomon codes-in implementations of consistent distributed storage  ... 
arXiv:1703.01286v2 fatcat:mmpneknoivcxrm4rmzwn3e4ywa

On the Adoption of Erasure Code for Cloud Storage by Major Distributed Storage Systems

Aatish Chiniah, Avinash Mungur
2021 EAI Endorsed Transactions on Cloud Systems  
Replication is the method used for providing redundancy. However Erasure Coding is a worthy alternative.  ...  CONCLUSION: This paper provides researchers in the field with a comprehensive review of Distributed Storage Systems and how the adoption of erasure codes will enhance their capabilities.  ...  We thank Associate Professor Anwitaman Datta, NTU, Singapore, for his scientific insight on the subject matter and constant support.  ... 
doi:10.4108/eai.14-9-2021.170955 fatcat:2lbpvhzs2ffvrmkhisa2gyfzcu

Randomized network coding in distributed storage systems with layered overlay

M. Martalo, M. Picone, M. Amoretti, G. Ferrari, R. Raheli
2011 2011 Information Theory and Applications Workshop  
In this paper, we analyze the performance of a peer-to-peer (P2P) distributed storage architecture based on a layered overlay scheme, where some nodes provide their disk capacities for hosting data fragments  ...  Index Terms-Distributed storage, erasure coding, randomized network coding, peer-to-peer (P2P).  ...  Malugo is a recently developed P2P storage system, consisting of two layers [16] .  ... 
doi:10.1109/ita.2011.5743599 dblp:conf/ita/MartaloPAFR11 fatcat:57frex5xsnbzlalu56su5zwsy4

Distributing Google

V. Gopalakrishnan, B. Bhattacharjee, P. Keleher
2006 22nd International Conference on Data Engineering Workshops (ICDEW'06)  
Our architecture consists of a data store layer which is used to reliably store and recompute indexes over a slow timescale and a caching layer that is used to respond to most queries.  ...  In this paper, we describe an architecture for constructing a scalable search infrastructure that is designed to cope with the challenges of scale described above.  ...  Motivated by these observations, we propose a two-layer architecture consisting of an index store layer and an explicit caching layer.  ... 
doi:10.1109/icdew.2006.49 dblp:conf/icde/GopalakrishnanBK06 fatcat:gqacrro2szbwbd5ishhwo2qycy

A Practical Network Coding Approach for Peer-to-Peer Distributed Storage

Marco Martalo, Marco Picone, Riccardo Bussandri, Michele Amoretti
2010 2010 IEEE International Symposium on Network Coding (NetCod)  
In this paper, we analyze the performance of a peerto-peer (P2P) distributed storage network based on the overlay architecture defined by the Wuala project.  ...  In particular, when a resource is published in the network, the fragments are randomly encoded with a predetermined overhead, which is consistent with the erasure coding strategy.  ...  In this paper, we propose a practical network coding approach for P2P distributed storage, based on the architecture of the Wuala project, described in more detail in Section II-A.  ... 
doi:10.1109/netcod.2010.5487686 fatcat:5g2lrykhq5hz3lt7miitamlswy

Resilient and Secure File Dispersal in a Mobile P2P System

Khalid Ashraf, Rachid Anane, Nick Blundell
2011 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications  
This paper presents an approach to resilient file management and network storage through the design and implementation of a file dispersal system for a mobile P2P network, based on distributed hash tables  ...  The convergence of mobile networks and P2P systems has led to the deployment of a range of schemes for file storage over a network.  ...  The availability of P2P systems and distributed schemes for file storage has given a greater impetus to this mode of management.  ... 
doi:10.1109/waina.2011.149 dblp:conf/aina/AshrafAB11 fatcat:aty52s75ufcandwgibyn4z33v4

Experiences on File Systems: Which is the best file system for you?

J Blomer
2015 Journal of Physics, Conference Series  
On the other hand, the general and simple file system interface makes it notoriously difficult for a distributed file system to perform well under a variety of different workloads.  ...  This contribution provides a taxonomy of commonly used distributed file systems and points out areas of research and development that are particularly important for high-energy physics.  ...  Typically the storage overhead of erasure codes is much smaller than a factor of two. Erasure codes, however, come at the cost of computational complexity.  ... 
doi:10.1088/1742-6596/664/4/042004 fatcat:q6wmxssh7vbftjyncwzlcyktsa

Identity Broadcast Virtual Proxy for Centralized Cloud Server

Roshitha P P, Sneha T Subramanian, T Sivakumar
2017 International Journal of Engineering Research and  
A secured distributed storage system is formulated using a secured threshold proxy re-encryption server that integrates with a decentralized erasure code.  ...  Cloud computing is emerged as a data interactive model in which users can store their data in an online cloud server.  ...  CONCLUSION The paper proposes cloud storage system consists of storage servers and key server. A threshold proxy reencryption scheme is integrated with erasure code over exponents.  ... 
doi:10.17577/ijertv6is050243 fatcat:r37dmypsxrfspbaymtrjntpcz4

Cloud Storage over Multiple Data Centers [chapter]

Shuai Mu, Maomeng Su, Pin Gao, Yongwei Wu, Keqin Li, Albert Y. Zomaya
2015 Handbook on Data Centers  
In this chapter we introduce the architecture evolution of typical cloud storage, and common techniques used in the design, such as replication strategies, data striping methods and consistency models.  ...  We also introduce a trend in the practice of cloud storage-cloud of clouds. 2.3.2 Chunk Servers Each chunk server keeps the storage for many chunk replicas, which are assigned by the namenode.  ...  Therefore, erasure code is becoming a better solution for mass storage. Erasure Code Types Erasure code is derived from communication field.  ... 
doi:10.1007/978-1-4939-2092-1_24 fatcat:ilo6izy3zbfmjikwcwgx2bezeu

Redundancy and distributed caching in mobile DTNs

Mikko Juhani Pitkänen, Jörg Ott
2007 Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture - MobiArch '07  
Having established how to leverage DTN routing nodes for distributed content retrieval, caching, and storage in previous work, in this paper, we investigate applying redundancy schemes to improve message  ...  Beyond plain message forwarding, the increasing amount of storage in modern devices enables nodes to hold messages for an extended period of time.  ...  DTN Nodes for Distributed Storage To enable cooperation between nodes, we have defined an architecture for supporting message-based content storage in DTN nodes [18] .  ... 
doi:10.1145/1366919.1366930 fatcat:65vb2kdpwrahpjj67zc2lfqdwm

Hybrid Approach for Improving the Performance of Data Reliability in Cloud Storage Management

Ali Alzahrani, Tahir Alyas, Khalid Alissa, Qaiser Abbas, Yazed Alsaawy, Nadia Tabassum
2022 Sensors  
channels, erasure coding has been proposed for this framework, which in the past proved itself as a trustworthy mechanism for the job.  ...  The proposed framework provides a hybrid approach to combine the benefits of replication and erasure coding to attain the optimal solution for storage, specifically focused on reliability and recovery.  ...  This layer also contains the respective algorithms for erasure coding as well as for replication.  ... 
doi:10.3390/s22165966 pmid:36015727 pmcid:PMC9412250 fatcat:qruf2ib43zhbpkhmjzzio2v2je

SafeFS: a modular architecture for secure user-space file systems

Rogério Pontes, Dorian Burihabwa, Francisco Maia, João Paulo, Valerio Schiavoni, Pascal Felber, Hugues Mercier, Rui Oliveira
2017 Proceedings of the 10th ACM International Systems and Storage Conference on - SYSTOR '17  
a secure distributed file system.  ...  Results reveal that while each layer has a cost, one can build safe yet efficient storage architectures. Furthermore, the different combinations of blocks sometimes yield surprising tradeoffs.  ...  First, we plan to smooth the efforts to integrate any existing FUSE file system as a SafeFS layer, for example by exploring Linux's LD PRELOAD mechanism, thus avoiding any recompilation step.  ... 
doi:10.1145/3078468.3078480 dblp:conf/systor/PontesBMPSFMO17 fatcat:ju224kr4pfbjpey2w3ikvnm54u

Overview of current techniques in remote data auditing

Hualong Wu, Bo Zhao
2016 Applied Mathematics and Nonlinear Sciences  
Recently, more and more remote auditing approaches are categorized into the three different classes, that is, replication-based, erasure coding-based, and network coding-based to present a taxonomy.  ...  a new concept to enable public auditability for the outsourced data in the cloud.  ...  The scheme of High-Availability and Integrity Layer (HAIL) is about erasure coding-based remote data auditing for distributed storage systems.  ... 
doi:10.21042/amns.2016.1.00011 fatcat:aoks5unc75dmhepurdo7cyamju

Reliable Multi-cloud Storage Architecture Based on Erasure Code to Improve Storage Performance and Failure Recovery

Emmy Mugisha, Gongxuan Zhang
2017 International Journal of Advanced Cloud Computing and Applied Research  
Analysis shows that RMCSA resolves a number of storage issues and recommends Zfec library as erasure code emulator due to its accuracy.  ...  This study proposes Reliable Multi-Cloud Storage Architecture (RMCSA) based on Erasure Codes, that content can be dispersed to different cloud storage providers to reduce challenges which lead to Lock-In  ...  The authors express their appreciation to Nanjing University of Science and Technology for creating a research fostering environment.  ... 
doi:10.23953/cloud.ijaccar.260 fatcat:cwifw7w2j5ch3p5nlx5mxms3da

Erasure Codes for Increasing the Availability of Grid Data Storage

M. Pitkanen, R. Moussa, M. Swany, T. Niemi
2006 Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06)  
Redundant data is computed using Reed-Solomon (RS) codes. The level of availability can be chosen for each individual file.  ...  In this paper, we describe the design of a highlyavailable Grid data storage system. Increased availability is ensured by data redundancy and file striping.  ...  The OceanStore also discusses the use of RS erasure codes for the archival layer of their data storage.  ... 
doi:10.1109/aict-iciw.2006.90 dblp:conf/aict/PitkanenMSN06 fatcat:6gwfg65ymzbsjkt2qs7hfeu25a
« Previous Showing results 1 — 15 out of 2,891 results