2013 IEEE International Conference on Big Data 2013
DOI: 10.1109/bigdata.2013.6691658
|View full text |Cite
|
Sign up to set email alerts
|

Efficient updates in cross-object erasure-coded storage systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…We evaluate the update efficiency by the Update Time, which is defined as the total duration from the update request to the end of the update. We consider three standard configurations of ( , ) code in HDFS-RAID: (1) RS (9,6) [ =9, =6, =3] (2) RS (10,6) [ =10, =6, =4] (3) RS (14,10) [ =14, =10, =4] and test the update efficiency of the four schemes under different cross-rack bandwidths. In actual production, the intra-rack bandwidth is 10Gb/s, the cross-rack bandwidth is 1Gb/s [25].…”
Section: ) Update Efficiency Assessmentmentioning
confidence: 99%
“…We evaluate the update efficiency by the Update Time, which is defined as the total duration from the update request to the end of the update. We consider three standard configurations of ( , ) code in HDFS-RAID: (1) RS (9,6) [ =9, =6, =3] (2) RS (10,6) [ =10, =6, =4] (3) RS (14,10) [ =14, =10, =4] and test the update efficiency of the four schemes under different cross-rack bandwidths. In actual production, the intra-rack bandwidth is 10Gb/s, the cross-rack bandwidth is 1Gb/s [25].…”
Section: ) Update Efficiency Assessmentmentioning
confidence: 99%
“…For the two-level DEC, the total number of I/O reads and the storage size are random variables that are respectively given by η = k + L j=2 η j , where η j is given in (11) and δ = n + L j=2 n j , where n j is given in (10). Note that η and δ are also dependent on the threshold T .…”
Section: Threshold Design Problemmentioning
confidence: 99%
“…In this paper, we investigate a new aspect of erasure code design, aimed at storing multiple versions of data. The presented work is loosely related to the issues of efficient updates [7], [8], [9], [10], and of deduplication [11]. Existing works on update of • J. Harshan and Frédérique Oggier are with the Division of Mathematical Sciences, Nanyang Technological University, Singapore.…”
Section: Introductionmentioning
confidence: 99%
“…Let {x j ∈ F k q , 1 ≤ j ≤ L} be the sequence of versions of a data object to be stored in the network, where x j is the jth version (or version at the j-th instant of time). The number of components modified from x j to x j+1 is reflected in the vector z j+1 = x j+1 − x j in (2) which is then γ j+1 -sparse (see Definition 1) for some 1 ≤ γ j+1 ≤ k. We propose an encoding strategy using an (n, k) linear erasure code (see (1)) which exploits the sparsity of the differences across updates, thus referred to as sparsity exploiting coding (SEC). Note that the value γ j+1 may a priori vary across updates of the same object and across different objects, and that sparsity is exploitable only when γ j+1 < k 2 .…”
Section: Sparsity Exploiting Coding (Sec)mentioning
confidence: 99%
“…Existing works are however predominantly geared towards storing immutable content, unlike the case of versioned data. The recent works which do focus on mutable content do so in the context of efficiently carrying out an update [7], [3], [5], [1], and thus focuses only on the storage of the latest version of the data.…”
Section: Introductionmentioning
confidence: 99%