24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)最新文献

筛选
英文 中文
Providing Quality of Service Support in Object-Based File System 提供基于对象的文件系统的服务质量支持
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.28
Joel C. Wu, S. Brandt
{"title":"Providing Quality of Service Support in Object-Based File System","authors":"Joel C. Wu, S. Brandt","doi":"10.1109/MSST.2007.28","DOIUrl":"https://doi.org/10.1109/MSST.2007.28","url":null,"abstract":"Bourbon is a quality of service framework designed to work with the Ceph object-based storage system. Ceph is a highly scalable distributed file system that can scale up to tens of thousands of object-based storage devices (OSDs). The Bourbon framework enables Ceph to become QoS-aware by providing the capability to isolate performance between different classes of workloads. The Bourbon framework is enabled by Q-EBOFS, a QoS-aware enhancement of the EBOFS object-based file system. Q-EBOFS allows individual OSDs to become QoS-aware, and by leveraging on the random element of the CRUSH data distribution algorithm employed by Ceph, it is possible for a collection of independent QoS-aware OSDs to provide class-based performance isolation at the global level. This preserves the highly scalable nature of Ceph by avoiding the introduction of any centralized components or the need to collect and propagate global state information. This paper presents the Bourbon framework by first describing Q-EBOFS, and then examines how a collection of OSDs running Q-EBOFS can work together to provide global-level QoS.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116616931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Capability based Secure Access Control to Networked Storage Devices 基于能力的网络存储设备安全访问控制
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.6
M. Factor, D. Naor, E. Rom, J. Satran, Sivan Tal
{"title":"Capability based Secure Access Control to Networked Storage Devices","authors":"M. Factor, D. Naor, E. Rom, J. Satran, Sivan Tal","doi":"10.1109/MSST.2007.6","DOIUrl":"https://doi.org/10.1109/MSST.2007.6","url":null,"abstract":"Today, access control security for storage area networks (zoning and masking) is implemented by mechanisms that are inherently insecure, and are tied to the physical network components. However, what we want to secure is at a higher logical level independent of the transport network; raising security to a logical level simplifies management, provides a more natural fit to a virtualized infrastructure, and enables a finer grained access control. In this paper, we describe the problems with existing access control security solutions, and present our approach which leverages the OSD (Object-based Storage Device) security model to provide a logical, cryptographically secured, in-band access control for today's existing devices. We then show how this model can easily be integrated into existing systems and demonstrate that this in-band security mechanism has negligible performance impact while simplifying management, providing a clean match to compute virtualization and enabling fine grained access control.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"410 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132312040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Cryptographic Security for a High-Performance Distributed File System 高性能分布式文件系统的加密安全
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.10
R. Pletka, C. Cachin
{"title":"Cryptographic Security for a High-Performance Distributed File System","authors":"R. Pletka, C. Cachin","doi":"10.1109/MSST.2007.10","DOIUrl":"https://doi.org/10.1109/MSST.2007.10","url":null,"abstract":"Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guarantee end-to-end security for their clients. This paper describes a generic design for cryptographic file systems and its realization in a distributed storage-area network (SAN) file system. Key management is integrated with the meta-data service of the SAN file system. The implementation supports file encryption as well as integrity protection through hash trees. Both techniques have been implemented in the client file system driver. Benchmarks demonstrate that the overhead is noticeable for some artificially constructed use cases, but that it is very small for typical file system applications.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134103482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
RAIF: Redundant Array of Independent Filesystems RAIF:独立文件系统冗余阵列
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.30
N. Joukov, A. Krishnakumar, Chaitanya Patti, A. Rai, Sunil Satnur, Avishay Traeger, E. Zadok
{"title":"RAIF: Redundant Array of Independent Filesystems","authors":"N. Joukov, A. Krishnakumar, Chaitanya Patti, A. Rai, Sunil Satnur, Avishay Traeger, E. Zadok","doi":"10.1109/MSST.2007.30","DOIUrl":"https://doi.org/10.1109/MSST.2007.30","url":null,"abstract":"Storage virtualization and data management are well known problems for individual users as well as large organizations. Existing storage-virtualization systems either do not support a complete set of possible storage types, do not provide flexible data-placement policies, or do not support per-file conversion (e.g., encryption). This results in suboptimal utilization of resources, inconvenience, low reliability, and poor performance. We have designed a stackable file system called redundant array of independent filesystems (RAIF). It combines the data survivability and performance benefits of traditional RAID with the flexibility of composition and ease of development of stackable file systems. RAIF can be mounted on top of directories and thus on top of any combination of network, distributed, disk-based, and memory-based file systems. Individual files can be replicated, striped, or stored with erasure-correction coding on any subset of the underlying file systems. RAIF has similar performance to RAID. In configurations with parity, RAIF's write performance is better than the performance of driver-level and even entry-level hardware RAID systems. This is because RAIF has better control over the data and parity caching.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"10 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131805457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Modeling the Impact of Checkpoints on Next-Generation Systems 模拟检查点对下一代系统的影响
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.24
R. Oldfield, Sarala Arunagiri, P. Teller, Seetharami R. Seelam, Maria Ruiz Varela, R. Riesen, P. Roth
{"title":"Modeling the Impact of Checkpoints on Next-Generation Systems","authors":"R. Oldfield, Sarala Arunagiri, P. Teller, Seetharami R. Seelam, Maria Ruiz Varela, R. Riesen, P. Roth","doi":"10.1109/MSST.2007.24","DOIUrl":"https://doi.org/10.1109/MSST.2007.24","url":null,"abstract":"The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands of processors. For application-driven, periodic checkpoint operations, the state-of-the-art does not provide a solution that scales to next-generation systems. We demonstrate this by using mathematical modeling to compute a lower bound of the impact of these approaches on the performance of applications executed on three massive-scale, in-production, DOE systems and a theoretical petaflop system. We also adapt the model to investigate a proposed optimization that makes use of \"lightweight\" storage architectures and overlay networks to overcome the storage system bottleneck. Our results indicate that (1) as we approach the scale of next-generation systems, traditional checkpoint/restart approaches will increasingly impact application performance, accounting for over 50% of total application execution time; (2) although our alternative approach improves performance, it has limitations of its own; and (3) there is a critical need for new approaches to fault tolerance that allow continuous computing with minimal impact on application scalability.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132630900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 142
Efficient Logging and Replication Techniques for Comprehensive Data Protection 全面数据保护的高效日志记录和复制技术
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.14
Maohua Lu, Shibiao Lin, T. Chiueh
{"title":"Efficient Logging and Replication Techniques for Comprehensive Data Protection","authors":"Maohua Lu, Shibiao Lin, T. Chiueh","doi":"10.1109/MSST.2007.14","DOIUrl":"https://doi.org/10.1109/MSST.2007.14","url":null,"abstract":"Mariner is an iSCSI-based storage system that is designed to provide comprehensive data protection on commodity ATA disk and gigabit Ethernet technologies while offering the same performance as those without any such protection. In particular, Mariner supports continuous data protection (CDP) that allows every disk update within a time window to be undoable, and local/remote mirroring to guard data against machine/site failures. To minimize the performance overhead associated with CDP, Mariner employs a modified track-based logging technique that unifies the long-term logging required for CDP and short-term logging for low-latency disk writes. This new logging technique strikes an optimal balance among log space utilization, disk write latency, and ease of historical data access. To reduce the performance penalty of physical data replication used in local/remote mirroring, Mariner features a modified two-phase commit protocol that in turn is built on top of a novel transparent reliable multicast (TRM) mechanism specifically designed for Ethernet-based storage area networks. Without flooding the network, TRM is able to keep the network traffic load of reliable N-way replication roughly at the same level as the no-replication case, regardless of the value of N. Empirical performance measurements on the first Mariner prototype, which is built from gigabit Ethernet and ATA disks, shows that the average end-to-end latency for a 4KByte iSCSI write is under 1.2 msec when data logging and replication are both turned on.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131997828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Performance Evaluation of Multiple TCP connections in iSCSI iSCSI环境下多TCP连接的性能评估
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.26
K. BhargavaKumar, Ganesh M. Narayan, K. Gopinath
{"title":"Performance Evaluation of Multiple TCP connections in iSCSI","authors":"K. BhargavaKumar, Ganesh M. Narayan, K. Gopinath","doi":"10.1109/MSST.2007.26","DOIUrl":"https://doi.org/10.1109/MSST.2007.26","url":null,"abstract":"Storage area networks (SANs) based on fibre channel have been used extensively in the last decade while iSCSI is fast becoming a serious contender due to its reduced costs and unified infrastructure. This work examines the performance of iSCSI with multiple TCP connections. Multiple TCP connections are often used to realize higher bandwidth but there may be no fairness in how bandwidth is distributed. We propose a mechanism to share congestion information across multiple flows in \"Fair-TCP\" for improved performance. Our results show that Fair-TCP significantly improves the performance for I/O intensive workloads.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134227268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Partial Disk Failures: Using Software to Analyze Physical Damage 部分磁盘故障:使用软件分析物理损坏
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.25
Hai Huang, K. Shin
{"title":"Partial Disk Failures: Using Software to Analyze Physical Damage","authors":"Hai Huang, K. Shin","doi":"10.1109/MSST.2007.25","DOIUrl":"https://doi.org/10.1109/MSST.2007.25","url":null,"abstract":"A good understanding of disk failures is crucial to ensure a reliable storage of data. There have been numerous studies characterizing disk failures under the common assumption that failed disks are generally unusable. Contrary to this assumption, partial disk failures are very common, e.g., caused by a head crash resulting in a small number of inaccessible disk sectors. Nevertheless, the damage can sometimes be catastrophic if the file system meta-data were among the affected sectors. As disk density rapidly increases, the likelihood of losing data also rises. This paper describes our experience in analyzing partial disk failures using the physical locations of damaged disk sectors to assess the extent and characteristics of the damage on disk platter surfaces. Based on our findings, we propose several fault-tolerance techniques to proactively guard against permanent data loss due to partial disk failures.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"1978 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128484185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation and Evaluation of a Popularity-Based Reconstruction Optimization Algorithm in Availability-Oriented Disk Arrays 面向可用性磁盘阵列中基于人气的重构优化算法的实现与评价
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.20
Lei Tian, Hong Jiang, D. Feng, Qin Xin, Xing Shu
{"title":"Implementation and Evaluation of a Popularity-Based Reconstruction Optimization Algorithm in Availability-Oriented Disk Arrays","authors":"Lei Tian, Hong Jiang, D. Feng, Qin Xin, Xing Shu","doi":"10.1109/MSST.2007.20","DOIUrl":"https://doi.org/10.1109/MSST.2007.20","url":null,"abstract":"In this paper, we implement the incorporation of a popularity-based multi-threaded reconstruction optimization algorithm, PRO, into the recovery mechanism of the Linux software RAID (MD), which is a well-known and widely-used availability-oriented disk array scheme. To evaluate the impact of PRO on RAID- structured storage systems such as MD, we conduct extensive trace-driven experiments. Our results demonstrate PRO's significant performance advantage over the existing reconstruction schemes, especially on a RAID-5 disk array, in terms of the measured reconstruction time and response time.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133599385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
GreenStor: Application-Aided Energy-Efficient Storage GreenStor:应用辅助节能存储
24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) Pub Date : 2007-09-24 DOI: 10.1109/MSST.2007.17
N. Mandagere, Jim Diehl, D. Du
{"title":"GreenStor: Application-Aided Energy-Efficient Storage","authors":"N. Mandagere, Jim Diehl, D. Du","doi":"10.1109/MSST.2007.17","DOIUrl":"https://doi.org/10.1109/MSST.2007.17","url":null,"abstract":"The volume of online data content has shown an unprecedented growth in recent years. Fueling this growth are new federal regulations which warrant longer data retention and a general increase in the richness of data content. To cope with this growth, high performance computing and enterprise environments are making use of large disk-based solutions that consume power all the time, unlike tape-based solutions. As a consequence, the energy consumption of the storage solutions has grown significantly. In this work we propose a storage solution called GreenStor, which makes use of application hinting on top of massive arrays of idle disks (MAID) to improve energy efficiency. GreenStor is centered on MAID, but with more efficient data movement to aid in energy conservation. Specifically, we propose an extent-based metadata manager that achieves better space efficiency without sacrificing cache utilization and an opportunistic scheduling scheme that helps provide better use of application hints in a MAID system. Results show that our proposed opportunistic scheme for application hint scheduling consumes up to 40% less energy compared to traditional non-MAID storage solutions, whereas use of standard schemes for scheduling application hints on typical MAID systems is only able to achieve a smaller energy savings of about 25% versus non-MAID storage.","PeriodicalId":109619,"journal":{"name":"24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信