2015
DOI: 10.1109/tpds.2014.2321745
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Rateless Codes in Cloud Storage Systems

Abstract: Abstract-Block-Level Cloud Storage (BLCS) offers to users and applications the access to persistent block storage devices (virtual disks) that can be directly accessed and used as if they were raw physical disks. In this paper we devise ENIGMA, an architecture for the back-end of BLCS systems able to provide adequate levels of access and transfer performance, availability, integrity, and confidentiality, for the data it stores. ENIGMA exploits LT rateless codes to store fragments of sectors on storage nodes or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 33 publications
(31 citation statements)
references
References 24 publications
0
31
0
Order By: Relevance
“…Moreover, we show that the average number of sector reads required to identify all polluters is very low and decreases as the coding redundancy increases. We use the architecture of ENIGMA (defined in [2]) as a blueprint for the model of a typical cloud storage system based on LT codes, and we exploit some results reported [2] to set the values of various system parameters in the experimental evaluation. We would like to point out that in [2] we limited ourselves to quantify the ability of ENIGMA of merely tolerate the presence of polluters in the system, i.e.…”
Section: Our Contributionmentioning
confidence: 99%
“…Moreover, we show that the average number of sector reads required to identify all polluters is very low and decreases as the coding redundancy increases. We use the architecture of ENIGMA (defined in [2]) as a blueprint for the model of a typical cloud storage system based on LT codes, and we exploit some results reported [2] to set the values of various system parameters in the experimental evaluation. We would like to point out that in [2] we limited ourselves to quantify the ability of ENIGMA of merely tolerate the presence of polluters in the system, i.e.…”
Section: Our Contributionmentioning
confidence: 99%
“…Related design can also be found in data access scheduling [14,16,19,20], access collision avoidance [17,18], and encoding/decoding time optimization [32,33] and there are also some work using the LT erasure codes to adjust the system to meet user requirements such as availability, integrity and confidentiality [6]. Restricting to the special case of a single file or homogeneous files, service delay bounds of erasure-coded storage have been recently studied in [40,45,49,50].…”
Section: B Related Workmentioning
confidence: 99%
“…To demonstrate the effectiveness of our joint optimization, we vary file size in the experiment from 50MB to 200MB and plot the average download latency of the 1000 individual files, out of which each quarter is using a distinct erasure code (11,6), (10,7), (10,6) and (9,4), and our analytical latency upper bound in Figure 11 . We see that latency increases superlinearly as file size grows, since it generates higher load on the storage system, causing larger queuing latency (which is super-linear according to our analysis).…”
Section: B Experiments and Evaluationmentioning
confidence: 99%
See 2 more Smart Citations