Filters








32 Hits in 9.7 sec

Efficient and Available In-Memory KV-Store with Hybrid Erasure Coding and Replication

Haibo Chen, Heng Zhang, Mingkai Dong, Zhaoguo Wang, Yubin Xia, Haibing Guan, Binyu Zang
2017 ACM Transactions on Storage  
This paper makes the first case of building highly available in-memory KV-store by integrating erasure coding to achieve memory efficiency, while not notably degrading performance.  ...  In-memory key/value store (KV-store) is a key building block for many systems like databases and large websites.  ...  The source code of Cocytus is available via http://ipads.se.sjtu.edu. cn/pub/projects/cocytus.  ... 
doi:10.1145/3129900 fatcat:tk4mscxdtzacfgguvtz4oqifim

Erasure Coding for Small Objects in In-Memory KV Storage [article]

Matt M. T. Yiu, Helen H. W. Chan, Patrick P. C. Lee
2017 arXiv   pre-print
We present MemEC, an erasure-coding-based in-memory key-value (KV) store that achieves high availability and fast recovery while keeping low data redundancy across storage servers.  ...  By encoding objects in entirety, MemEC is shown to incur 60% less storage redundancy for small objects than existing replication- and erasure-coding-based approaches.  ...  This work was supported in part by grants from Huawei Technologies (YB2014110015) and ITS/113/14 from the ITF of HK-SAR.  ... 
arXiv:1701.08084v2 fatcat:qw6f2n7jcjc5zpvnrk2o5kwr2m

Secure end-to-end processing of smart metering data

Andrey Brito, Christof Fetzer, Stefan Köpsell, Peter Pietzuch, Marcelo Pasin, Pascal Felber, Keiko Fonseca, Marcelo Rosa, Luiz Gomes, Rodrigo Riella, Charles Prado, Luiz F. Rust (+4 others)
2019 Journal of Cloud Computing: Advances, Systems and Applications  
Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently.  ...  Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently.  ...  Innovation through the Horizon 2020 Program, in the 3 rd Brazil-Europe coordinated call.  ... 
doi:10.1186/s13677-019-0141-z fatcat:jnshkzd3brc5jjclgccpffmn2u

Fed-DIC: Diagonally Interleaved Coding in a Federated Cloud Environment [chapter]

Giannis Tzouros, Vana Kalogeraki
2020 Lecture Notes in Computer Science  
A common practice is to utilize fault tolerance methods like Replication and Erasure Coding for maximizing data availability.  ...  of our approach in terms of read access cost, data availability, storage overhead, load balancing and network bandwidth rate compared to popular Replication and Erasure Coding schemes.  ...  This research has been supported by the Computer Systems and Communications Laboratory at AUEB. The authors would like to thank Dr. Davide Frey for shepherding the paper.  ... 
doi:10.1007/978-3-030-50323-9_4 fatcat:zdaruj22hfasbgsfevnnavdrlq

Hybris

Dan Dobre, Paolo Viotti, Marko Vukolić
2014 Proceedings of the ACM Symposium on Cloud Computing - SOCC '14  
In turn, the hybrid design allows Hybris to efficiently and robustly tolerate cloud outages, but also potential malice in clouds without overhead.  ...  Hybris robustly replicates metadata on trusted private premises (private cloud), separately from data which is dispersed (using replication or erasure coding) across multiple untrusted public clouds.  ...  Let W be the set of all PUT operations in ex, and let wr be the PUT operation with maximum timestamp ts max in W that completes the call to RMDS in line 13, Alg. 1.  ... 
doi:10.1145/2670979.2670991 dblp:conf/cloud/DobreVV14 fatcat:jbi42xcuvfghfcjnx3zhfbyjxm

Hybris

Paolo Viotti, Dan Dobre, Marko Vukolić
2017 ACM Transactions on Storage  
In turn, the hybrid design allows Hybris to efficiently and robustly tolerate cloud outages, but also potential malice in clouds without overhead.  ...  Hybris robustly replicates metadata on trusted private premises (private cloud), separately from data which is dispersed (using replication or erasure coding) across multiple untrusted public clouds.  ...  Let W be the set of all PUT operations in ex, and let wr be the PUT operation with maximum timestamp ts max in W that completes the call to RMDS in line 13, Alg. 1.  ... 
doi:10.1145/3119896 fatcat:mggrp2nfrvealkltmbbnjsagly

Atlas: Baidu's key-value storage system for cloud data

Chunbo Lai, Song Jiang, Liqiong Yang, Shiding Lin, Guangyu Sun, Zhenyu Hou, Can Cui, Jason Cong
2015 2015 31st Symposium on Mass Storage Systems and Technologies (MSST)  
1 To prevent service of individual requests from holding excessive amount of resources, including memory and I/O bandwidth, we impose a limit on request sizes, which is 256KB, for our workload.  ...  To address this issue, we adopt a customized compact server design based on the ARM processors and replace three-copy replication for data protection with erasure coding to enable low-power and high-density  ...  Using Reed-Solomon coding, instead of data replication, means more data need to be read for data recovery. A new set of codes for erasure coding (LRC) have been proposed to reduce the cost [14] .  ... 
doi:10.1109/msst.2015.7208288 dblp:conf/mss/LaiJYLSHCC15 fatcat:2qp7s2lap5hrteyd35ga23r2ea

2020 Index IEEE Transactions on Parallel and Distributed Systems Vol. 31

2021 IEEE Transactions on Parallel and Distributed Systems  
., +, TPDS Feb. 2019 400-414 SEALDB: An Efficient LSM-tree Based KV Store on SMR Drives with Sets and Dynamic Bands.  ...  ., +, TPDS Dec. 2019 2820-2835 SEALDB: An Efficient LSM-tree Based KV Store on SMR Drives with Sets and Dynamic Bands.  ... 
doi:10.1109/tpds.2020.3033655 fatcat:cpeatdjlpzhqdersvsk5nmzjkm

A New Minimize Matrix Computation Coding Method for Distributed Storage Systems

Chao Yin, Haitao Lv, Tongfang Li, Xiaoping Qu, Jianzong Wang, Guangyong Gao
2019 Mathematical Problems in Engineering  
The test result shows that OptRS codes can improve the performance in different data block numbers, parity block numbers, block size, normal reading, and degraded reading, compared with RS codes and CRS  ...  In this paper, we propose optimal RS codes (OptRS codes in short) based on RS codes and CRS codes that can offer better performance for encoding and decoding as well as maximizing the utilization of storage  ...  Each machine is equipped with Xeon E5606 CPU with 16 GB D D R3 memory and 500 GB disks, and an Intel Xeon E5 − 2660 CPU with 32 GB memory and 1T disk is equipped in the server node.  ... 
doi:10.1155/2019/4163780 fatcat:lymvv6qktzhuxcjsc5rdvz6mdm

A convergence of key-value storage systems from clouds to supercomputers

Tonglin Li, Xiaobing Zhou, Ke Wang, Dongfang Zhao, Iman Sadooghi, Zhao Zhang, Ioan Raicu
2015 Concurrency and Computation  
This paper also presents several real systems that have adopted ZHT, namely FusionFS (a distributed file system), IStore (a storage system with erasure coding), MATRIX (distributed scheduling), Slurm++  ...  The distributed data-structures share some characteristics with structured distributed hash tables, having resilience in face of failures with high availability; however, they should support close to constant  ...  ACKNOWLEDGEMENT This work was supported in part by the National Science Foundation grant NSF-1054974.  ... 
doi:10.1002/cpe.3614 fatcat:6xr3stuvbzdrpnt2gkxqyxzvj4

Specification Of Security Enablers For Data Management

Marko Vukolic
2016 Zenodo  
These techniques can be optionally combined with dependability and security components pertaining to fault-tolerant state-machine replication and distributed storage described in the first two parts.  ...  Chapter 5 empirically evaluates latency-optimization for state-machine replication in WANs and informs the design of novel state-machine replication protocols.  ...  Erasure codes Two of our protocols employ erasure codes [266] to decrease the storage overhead associated with full replication.  ... 
doi:10.5281/zenodo.263831 fatcat:ksk4ze2tuncfbexjzsorjnoabe

A Lightweight Symmetric Cryptography Scheme for Identifying Compromised Node in WSN

Yassine Maleh, Abdellah Ezzati
2016 Indonesian Journal of Electrical Engineering and Computer Science  
Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic.  ...  They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, we present an illustration of different attacks and vulnerabilities in WSN.  ...  The predistribution of encryption keys in a WSN is the fact of storing these keys in the memory nodes before deployment.  ... 
doi:10.11591/ijeecs.v2.i2.pp431-451 fatcat:mdfyxjgawvdhrhtfbqcnymzibi

Addressing fault tolerance for staging based scientific workflows

Shaohua Duan
2020
As the data volumes and generate rates keep growing, the traditional data resilience approaches such as n-way replication and erasure codes become cost prohibitive, and data staging requires more scalable  ...  and efficient approach to support the data resilience.  ...  Actually, replication schemes such as standard primary-backup (PBR) [14] and chain-replication [48] have been widely used for building highly available in-memory KV-store systems.  ... 
doi:10.7282/t3-esz3-tr98 fatcat:ae5rdmn3ezdvhiogs3j2uvy5mm

Information Security in Wireless Sensor Networks [chapter]

Abdelraouf Ouadjaout, Miloud Bagaa, Abdelmalik Bachir, Yacine Challal, Nouredine Lasla, Lyes Khelladi
2009 Encyclopedia on Ad Hoc and Ubiquitous Computing  
We discuss the main attacks stemming from these vulnerabilities, along with the solutions proposed in the literature to cope with them.  ...  Wireless and Multihop Communication: In addition to providing easy deployment, wireless communication has the advantage of offering access to hardly accessible locations such as disastrous and hostile  ...  With the same formula, node v computes its pair-wise key with u.  Key erasure phase: after the expiration of time T min , the node u erases K IN from its memory and hence forbids an intruder from getting  ... 
doi:10.1142/9789812833495_0017 fatcat:qhh6vtqfxza2xllthuh5yo2fju

Data center evolution

Krishna Kant
2009 Computer Networks  
We define a layered model for such data centers and provide a detailed treatment of state of the art and emerging challenges in storage, networking, management and power/thermal aspects.  ...  As data centers continue to grow in size and complexity, it is desirable to understand aspects of their design that are worthy of carrying forward, as well as existing or upcoming shortcomings and challenges  ...  He also provided significant comments on other sections of the paper and helped with polishing them.  ... 
doi:10.1016/j.comnet.2009.10.004 fatcat:7tfgno3j45bwnlljd6f6iww6jy
« Previous Showing results 1 — 15 out of 32 results