首页 > 最新文献

2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)最新文献

英文 中文
MDC-Cast: A Total-Order Broadcast Protocol for Multi-Datacenter Environments MDC-Cast:多数据中心环境下的全顺序广播协议
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00035
Mohamad-Jaafar Nehme, Nicolas Palix, Kamal Beydoun, Vivien Quéma
The recent Total-Order Broadcast protocols that have been designed to sustain high throughput and low latency target fully switched environments, such as small datacenters and clusters. These protocols fail to achieve good performance in multi-datacenter environments, that are characterized by non-uniform network connectivity among a set of remote datacenters. More precisely, machines within a datacenter are connected using a fully switched network, whereas machines across datacenters use shared inter-datacenter network cables. This paper presents a novel Total-Order Broadcast protocol, called MDC-cast that specifically targets multi-datacenter environments.
最近的全顺序广播协议旨在维持高吞吐量和低延迟,目标是完全交换的环境,例如小型数据中心和集群。这些协议无法在多数据中心环境中实现良好的性能,多数据中心环境的特点是一组远程数据中心之间的网络连接不统一。更准确地说,数据中心内的机器使用完全交换的网络连接,而跨数据中心的机器使用共享的数据中心间网络电缆。本文提出了一种新颖的全序广播协议,称为MDC-cast,专门针对多数据中心环境。
{"title":"MDC-Cast: A Total-Order Broadcast Protocol for Multi-Datacenter Environments","authors":"Mohamad-Jaafar Nehme, Nicolas Palix, Kamal Beydoun, Vivien Quéma","doi":"10.1109/SRDS.2018.00035","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00035","url":null,"abstract":"The recent Total-Order Broadcast protocols that have been designed to sustain high throughput and low latency target fully switched environments, such as small datacenters and clusters. These protocols fail to achieve good performance in multi-datacenter environments, that are characterized by non-uniform network connectivity among a set of remote datacenters. More precisely, machines within a datacenter are connected using a fully switched network, whereas machines across datacenters use shared inter-datacenter network cables. This paper presents a novel Total-Order Broadcast protocol, called MDC-cast that specifically targets multi-datacenter environments.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129341962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collective Attestation: for a Stronger Security in Embedded Networks 集体认证:增强嵌入式网络的安全性
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00039
Ahmad Ibrahim
Embedded devices are increasingly permeating our environment to collect data and act on the insight derived. Examples of such devices include smart environments and autonomous systems. The increasing ability to connect, communicate with, and remotely control such devices via the legacy internet has raised considerable security and privacy concerns. One key mechanism to protect the software integrity of these devices is attestation. In this dissertation, we devise attestation schemes that are scalable and applicable for large networks of embedded devices. In particular, we present attestation schemes that are capable of detecting remote malware infestation, physical, and run-time attacks in different settings including smart environments and autonomous systems.
嵌入式设备越来越多地渗透到我们的环境中,以收集数据并根据得出的见解采取行动。这类设备的例子包括智能环境和自主系统。通过传统互联网连接、通信和远程控制这些设备的能力日益增强,引起了相当大的安全和隐私问题。保护这些设备的软件完整性的一个关键机制是认证。在本论文中,我们设计了可扩展且适用于嵌入式设备大型网络的认证方案。特别是,我们提出了能够在不同设置(包括智能环境和自治系统)中检测远程恶意软件感染、物理和运行时攻击的认证方案。
{"title":"Collective Attestation: for a Stronger Security in Embedded Networks","authors":"Ahmad Ibrahim","doi":"10.1109/SRDS.2018.00039","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00039","url":null,"abstract":"Embedded devices are increasingly permeating our environment to collect data and act on the insight derived. Examples of such devices include smart environments and autonomous systems. The increasing ability to connect, communicate with, and remotely control such devices via the legacy internet has raised considerable security and privacy concerns. One key mechanism to protect the software integrity of these devices is attestation. In this dissertation, we devise attestation schemes that are scalable and applicable for large networks of embedded devices. In particular, we present attestation schemes that are capable of detecting remote malware infestation, physical, and run-time attacks in different settings including smart environments and autonomous systems.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"450 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed Systems 分布式系统中多步骤攻击检测的可扩展高效关联引擎
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00014
David Lanoë, M. Hurfin, Eric Totel
In distributed systems and in particular in industrial SCADA environments, alert correlation systems are necessary to identify complex multi-step attacks within the huge amount of alerts and events. In this paper we describe an automata-based correlation engine developed in the context of a European project where the main stakeholder was an energy distribution company. The behavior of the engine is extended to fit new requirements. In the proposed solution, a fully automated process generates thousands of correlation rules. Despite this major scalability challenge, the designed correlation engine exhibits good performances. Expected rates of incoming low level alerts approaching several hundreds of elements per second are tolerated. Moreover, the used data structures allow to quickly handle dynamic changes of the set of correlation rules. As some attack steps are not observed, the correlation engine can be tuned to raise an alert when all the attack steps except k of them have been detected. To be able to react to an ongoing attack by taking countermeasures, alerts must also be raised as soon as a significant prefix of an attack scenario is recognized. Fulfilling these additional requirements leads to increase the memory consumption. Therefore purge mechanisms are also proposed and analyzed. An evaluation of the tool is conducted in the context of a SCADA environment.
在分布式系统中,特别是在工业SCADA环境中,警报关联系统对于在大量警报和事件中识别复杂的多步骤攻击是必要的。在本文中,我们描述了在欧洲项目的背景下开发的基于自动机的关联引擎,该项目的主要利益相关者是一家能源分销公司。发动机的性能得到了扩展,以适应新的要求。在建议的解决方案中,一个完全自动化的过程生成数千个相关规则。尽管存在这个主要的可伸缩性挑战,所设计的相关引擎仍然表现出良好的性能。可以容忍接近每秒几百个元素的预期低级别警报传入率。此外,所使用的数据结构允许快速处理相关规则集的动态变化。由于没有观察到某些攻击步骤,因此可以对相关引擎进行调优,以便在检测到除k个攻击步骤外的所有攻击步骤时发出警报。为了能够通过采取对策对正在进行的攻击做出反应,还必须在识别到攻击场景的重要前缀时立即发出警报。满足这些额外的需求会导致内存消耗的增加。在此基础上,提出并分析了净化机理。在SCADA环境中对该工具进行了评估。
{"title":"A Scalable and Efficient Correlation Engine to Detect Multi-Step Attacks in Distributed Systems","authors":"David Lanoë, M. Hurfin, Eric Totel","doi":"10.1109/SRDS.2018.00014","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00014","url":null,"abstract":"In distributed systems and in particular in industrial SCADA environments, alert correlation systems are necessary to identify complex multi-step attacks within the huge amount of alerts and events. In this paper we describe an automata-based correlation engine developed in the context of a European project where the main stakeholder was an energy distribution company. The behavior of the engine is extended to fit new requirements. In the proposed solution, a fully automated process generates thousands of correlation rules. Despite this major scalability challenge, the designed correlation engine exhibits good performances. Expected rates of incoming low level alerts approaching several hundreds of elements per second are tolerated. Moreover, the used data structures allow to quickly handle dynamic changes of the set of correlation rules. As some attack steps are not observed, the correlation engine can be tuned to raise an alert when all the attack steps except k of them have been detected. To be able to react to an ongoing attack by taking countermeasures, alerts must also be raised as soon as a significant prefix of an attack scenario is recognized. Fulfilling these additional requirements leads to increase the memory consumption. Therefore purge mechanisms are also proposed and analyzed. An evaluation of the tool is conducted in the context of a SCADA environment.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130291211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improving Reliability of Deduplication-Based Storage Systems with Per-File Parity 基于文件奇偶校验的重复数据删除存储系统可靠性研究
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00028
Suzhen Wu, Huagao Luan, Bo Mao, Hong Jiang, Gen Niu, Hui Rao, Fang Yu, Jindong Zhou
The reliability issue in deduplication-based storage systems has not received adequate attention. Existing approaches introduce data redundancy after files have been deduplicated, either by replication on critical data chunks, i.e., chunks with high reference count, or RAID schemes on unique data chunks, which means that these schemes are based on individual unique data chunks rather than individual files. This can leave individual files vulnerable to losses, particularly in the presence of transient and unrecoverable data chunk errors such as latent sector errors. To address this file reliability issue, this paper proposes a Per-File Parity (short for PFP) scheme to improve the reliability of deduplication-based storage systems. PFP computes the XOR parity within parity groups of data chunks of each file after the chunking process but before the data chunks are deduplicated. Therefore, PFP can provide parity redundancy protection for all files by intra-file recovery and a higher-level protection for data chunks with high reference counts by inter-file recovery. Our reliability analysis and extensive data-driven, failure-injection based experiments conducted on a prototype implementation of PFP show that PFP significantly outperforms the existing redundancy solutions, DTR and RCR, in system reliability, tolerating multiple data chunk failures and guaranteeing file availability upon multiple data chunk failures. Moreover, a performance evaluation shows that PFP only incurs an average of 5.7% performance degradation to the deduplication-based storage system.
基于重复数据删除的存储系统的可靠性问题没有得到足够的重视。现有的方法在文件重复数据删除后引入数据冗余,要么通过在关键数据块(即具有高引用计数的块)上的复制,要么通过在唯一数据块上的RAID方案,这意味着这些方案基于单个唯一数据块,而不是单个文件。这可能使单个文件容易丢失,特别是在存在瞬时和不可恢复的数据块错误(如潜在扇区错误)的情况下。为了解决这个文件可靠性问题,本文提出了一个文件奇偶校验(PFP)方案来提高基于重复数据删除的存储系统的可靠性。PFP计算每个文件的数据块的奇偶组内的异或奇偶,在分块过程之后,但在数据块重复数据删除之前。因此,PFP可以通过文件内恢复为所有文件提供奇偶校验冗余保护,并通过文件间恢复为具有高引用计数的数据块提供更高级别的保护。我们对PFP的原型实现进行了可靠性分析和广泛的数据驱动、基于故障注入的实验,结果表明,PFP在系统可靠性、容忍多个数据块故障和保证多个数据块故障时文件可用性方面显著优于现有的冗余解决方案DTR和RCR。性能评估表明,PFP对基于重复数据删除的存储系统的平均性能下降仅为5.7%。
{"title":"Improving Reliability of Deduplication-Based Storage Systems with Per-File Parity","authors":"Suzhen Wu, Huagao Luan, Bo Mao, Hong Jiang, Gen Niu, Hui Rao, Fang Yu, Jindong Zhou","doi":"10.1109/SRDS.2018.00028","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00028","url":null,"abstract":"The reliability issue in deduplication-based storage systems has not received adequate attention. Existing approaches introduce data redundancy after files have been deduplicated, either by replication on critical data chunks, i.e., chunks with high reference count, or RAID schemes on unique data chunks, which means that these schemes are based on individual unique data chunks rather than individual files. This can leave individual files vulnerable to losses, particularly in the presence of transient and unrecoverable data chunk errors such as latent sector errors. To address this file reliability issue, this paper proposes a Per-File Parity (short for PFP) scheme to improve the reliability of deduplication-based storage systems. PFP computes the XOR parity within parity groups of data chunks of each file after the chunking process but before the data chunks are deduplicated. Therefore, PFP can provide parity redundancy protection for all files by intra-file recovery and a higher-level protection for data chunks with high reference counts by inter-file recovery. Our reliability analysis and extensive data-driven, failure-injection based experiments conducted on a prototype implementation of PFP show that PFP significantly outperforms the existing redundancy solutions, DTR and RCR, in system reliability, tolerating multiple data chunk failures and guaranteeing file availability upon multiple data chunk failures. Moreover, a performance evaluation shows that PFP only incurs an average of 5.7% performance degradation to the deduplication-based storage system.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133184688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Man-In-The-Middle Attacks on Ethereum 中间人攻击对以太坊的影响
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00012
Parinya Ekparinya, V. Gramoli, Guillaume Jourjon
Recent theoretical attacks conjectured the vulnerabilities of mainstream blockchains through simulations or assumption violations. Unfortunately, previous results typically omit both the nature of the network under which the blockchain code runs and whether blockchains are private, consortium or public. In this paper, we study the public Ethereum blockchain as well as a consortium and private blockchains and quantify the feasibility of man-in-the-middle and double spending attacks against them. To this end, we list important properties of the Ethereum public blockchain topology, we deploy VMs with constrained CPU quantum to mimic the top-10 mining pools of Ethereum and we attack them, by first partitioning the network through BGP hijacking or ARP spoofing before issuing a Balance Attack to steal coins. Our results demonstrate that attacking Ethereum is remarkably devastating in a consortium or private context as the adversary can multiply her digital assets by 200,000 × in 10 hours through BGP hijacking whereas it would be almost impossible in a public context.
最近的理论攻击通过模拟或假设违反来推测主流区块链的漏洞。不幸的是,以前的结果通常忽略了区块链代码运行的网络的性质,以及区块链是私有的、联盟的还是公共的。在本文中,我们研究了公共以太坊区块链以及财团和私有区块链,并量化了中间人攻击和双重支出攻击的可行性。为此,我们列出了以太坊公共区块链拓扑的重要属性,我们部署具有受限CPU量子的虚拟机来模拟以太坊的前10个矿池,然后我们攻击它们,首先通过BGP劫持或ARP欺骗对网络进行分区,然后发布平衡攻击来窃取硬币。我们的研究结果表明,在财团或私人环境中攻击以太坊是非常具有破坏性的,因为对手可以通过BGP劫持在10小时内将其数字资产乘以200,000 x,而在公共环境中几乎不可能。
{"title":"Impact of Man-In-The-Middle Attacks on Ethereum","authors":"Parinya Ekparinya, V. Gramoli, Guillaume Jourjon","doi":"10.1109/SRDS.2018.00012","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00012","url":null,"abstract":"Recent theoretical attacks conjectured the vulnerabilities of mainstream blockchains through simulations or assumption violations. Unfortunately, previous results typically omit both the nature of the network under which the blockchain code runs and whether blockchains are private, consortium or public. In this paper, we study the public Ethereum blockchain as well as a consortium and private blockchains and quantify the feasibility of man-in-the-middle and double spending attacks against them. To this end, we list important properties of the Ethereum public blockchain topology, we deploy VMs with constrained CPU quantum to mimic the top-10 mining pools of Ethereum and we attack them, by first partitioning the network through BGP hijacking or ARP spoofing before issuing a Balance Attack to steal coins. Our results demonstrate that attacking Ethereum is remarkably devastating in a consortium or private context as the adversary can multiply her digital assets by 200,000 × in 10 hours through BGP hijacking whereas it would be almost impossible in a public context.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"378 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116000605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Practical Continuous Aggregation in Wireless Edge Environments 无线边缘环境中的实用连续聚合
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00015
P. Costa, J. Leitao
The edge computing paradigm brings the promise of overcoming the practical scalability limitations of cloud computing, that are a result of the high volume of data produced by Internet of Things (IoT) and other large-scale applications. The principle of edge computing is to move computations beyond the data center, closer to end-user devices where data is generated and consumed. This new paradigm creates the opportunity for edge-enabled systems and applications, that have components executing directly and cooperatively on edge devices. Having systems' components, actively and directly, collaborating in the edge, requires some form of distributed monitoring as to adapt to variable operational conditions. Monitoring requires efficient ways to aggregate information collected from multiple devices. In particular, and considering some IoT applications, monitoring will happen among devices that communicate primarily via wireless channels. In this paper we study the practical performance of several distributed continuous aggregation protocols in the wireless ad hoc setting, and propose a novel protocol that is more precise and robust than competing alternative.
边缘计算范式有望克服云计算的实际可扩展性限制,这些限制是由物联网(IoT)和其他大规模应用程序产生的大量数据造成的。边缘计算的原理是将计算移出数据中心,更接近生成和使用数据的最终用户设备。这种新模式为支持边缘的系统和应用程序创造了机会,这些系统和应用程序的组件可以在边缘设备上直接协作执行。让系统的组件在边缘进行主动和直接的协作,需要某种形式的分布式监控,以适应可变的操作条件。监控需要有效的方法来聚合从多个设备收集的信息。特别是,考虑到一些物联网应用,监控将发生在主要通过无线通道通信的设备之间。本文研究了几种分布式连续聚合协议在无线自组织环境下的实际性能,提出了一种比竞争方案更精确、更鲁棒的新协议。
{"title":"Practical Continuous Aggregation in Wireless Edge Environments","authors":"P. Costa, J. Leitao","doi":"10.1109/SRDS.2018.00015","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00015","url":null,"abstract":"The edge computing paradigm brings the promise of overcoming the practical scalability limitations of cloud computing, that are a result of the high volume of data produced by Internet of Things (IoT) and other large-scale applications. The principle of edge computing is to move computations beyond the data center, closer to end-user devices where data is generated and consumed. This new paradigm creates the opportunity for edge-enabled systems and applications, that have components executing directly and cooperatively on edge devices. Having systems' components, actively and directly, collaborating in the edge, requires some form of distributed monitoring as to adapt to variable operational conditions. Monitoring requires efficient ways to aggregate information collected from multiple devices. In particular, and considering some IoT applications, monitoring will happen among devices that communicate primarily via wireless channels. In this paper we study the practical performance of several distributed continuous aggregation protocols in the wireless ad hoc setting, and propose a novel protocol that is more precise and robust than competing alternative.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125919845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Title page iii] [标题页iii]
Pub Date : 2018-10-01 DOI: 10.1109/srds.2018.00002
{"title":"[Title page iii]","authors":"","doi":"10.1109/srds.2018.00002","DOIUrl":"https://doi.org/10.1109/srds.2018.00002","url":null,"abstract":"","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131486016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geographic State Machine Replication 地理状态机复制
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00034
Paulo R. Coelho, F. Pedone
Many current online services need to serve clients distributed across geographic areas. These systems are subject to stringent availability and performance requirements. In order to meet these requirements, replication is used to tolerate the crash of servers and improve performance by deploying replicas near the clients. Coordinating geographically distributed replicas, however, is challenging. This paper presents GeoPaxos, a protocol that addresses this challenge by combining three insights. It decouples order from execution in state machine replication, it induces a partial order on the execution of operations, instead of a total order, and it exploits geographic locality, typical of geo-distributed online services. GeoPaxos outperforms state-of-the-art approaches by more than an order of magnitude in some cases. We describe GeoPaxos design and implementation in detail, and present an extensive performance evaluation.
许多当前的在线服务需要为分布在不同地理区域的客户提供服务。这些系统受到严格的可用性和性能要求的约束。为了满足这些需求,使用复制来容忍服务器崩溃,并通过在客户端附近部署副本来提高性能。然而,协调地理上分布的副本是一项挑战。本文介绍了GeoPaxos,这是一种通过结合三个观点来解决这一挑战的协议。它将状态机复制中的顺序与执行解耦,它在操作执行中引入部分顺序,而不是全部顺序,并且它利用地理位置,这是地理分布式在线服务的典型特点。在某些情况下,GeoPaxos比最先进的方法要好一个数量级以上。我们详细描述了GeoPaxos的设计和实现,并提出了广泛的性能评估。
{"title":"Geographic State Machine Replication","authors":"Paulo R. Coelho, F. Pedone","doi":"10.1109/SRDS.2018.00034","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00034","url":null,"abstract":"Many current online services need to serve clients distributed across geographic areas. These systems are subject to stringent availability and performance requirements. In order to meet these requirements, replication is used to tolerate the crash of servers and improve performance by deploying replicas near the clients. Coordinating geographically distributed replicas, however, is challenging. This paper presents GeoPaxos, a protocol that addresses this challenge by combining three insights. It decouples order from execution in state machine replication, it induces a partial order on the execution of operations, instead of a total order, and it exploits geographic locality, typical of geo-distributed online services. GeoPaxos outperforms state-of-the-art approaches by more than an order of magnitude in some cases. We describe GeoPaxos design and implementation in detail, and present an extensive performance evaluation.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
DMap: A Fault-Tolerant and Scalable Distributed Data Structure DMap:一种容错和可扩展的分布式数据结构
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00026
S. Benz, F. Pedone
Major efforts have been spent in recent years to improve the performance, scalability and reliability of distributed systems. In order to hide the complexity of designing distributed applications, many proposals provide efficient high-level communication abstractions (e.g., atomic multicast). These abstractions, however, are often unfamiliar to average application designers and, as a result, implementing distributed applications that tolerate failures and scale performance without sacrificing consistency remains a challenging task. In this paper, we introduce DMap, a reliable and scalable distributed ordered map. DMap fully implements the generic Java SortedMap interface and can be easily used to scale existing Java applications. To substantiate our claim, we have used DMap to turn H2, a centralized database, into a scalable and reliable data management system.
近年来,人们一直在努力提高分布式系统的性能、可伸缩性和可靠性。为了隐藏设计分布式应用程序的复杂性,许多建议提供高效的高层通信抽象(例如,原子组播)。然而,这些抽象对于一般的应用程序设计人员来说通常是不熟悉的,因此,实现能够容忍故障并在不牺牲一致性的情况下扩展性能的分布式应用程序仍然是一项具有挑战性的任务。本文介绍了一种可靠的、可扩展的分布式有序映射DMap。DMap完全实现了通用的Java SortedMap接口,可以很容易地用于扩展现有的Java应用程序。为了证实我们的说法,我们使用DMap将H2(一个集中式数据库)转变为可扩展且可靠的数据管理系统。
{"title":"DMap: A Fault-Tolerant and Scalable Distributed Data Structure","authors":"S. Benz, F. Pedone","doi":"10.1109/SRDS.2018.00026","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00026","url":null,"abstract":"Major efforts have been spent in recent years to improve the performance, scalability and reliability of distributed systems. In order to hide the complexity of designing distributed applications, many proposals provide efficient high-level communication abstractions (e.g., atomic multicast). These abstractions, however, are often unfamiliar to average application designers and, as a result, implementing distributed applications that tolerate failures and scale performance without sacrificing consistency remains a challenging task. In this paper, we introduce DMap, a reliable and scalable distributed ordered map. DMap fully implements the generic Java SortedMap interface and can be easily used to scale existing Java applications. To substantiate our claim, we have used DMap to turn H2, a centralized database, into a scalable and reliable data management system.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133920119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Cloud-of-Clouds Storage Made Efficient: A Network Coding Based Approach 高效的移动云存储:一种基于网络编码的方法
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00018
Jiajie Shen, Yi Li, Yangfan Zhou, Xin Wang
Cloud-of-clouds storage is a viable means to ensure security and reliability of distributed data storage, where data are encrypted, encoded, and stored in multiple clouds. However, it is a great challenge to adopt such a paradigm in mobile devices (e.g., smartphone). Mobile devices are generally incapable to perform the heavy-weight operations (i.e., data encryption, encoding, and transmission) required in such a paradigm, given the limited resources in such devices. This paper focuses on addressing this challenge, i.e., improving data storage performance in mobile cloud-of-clouds storage systems. The key of our proposal is to allow the low-capability mobile devices to offload the computational and transmission overhead to the clouds. In other words, we propose a Network Coding based Cloud-of-clouds Storage (NCCS) scheme, where the clouds can encode and exchange data collaboratively. We consider two state-of-the-art cloud-of-clouds storage approaches, i.e., AONT-RS and CAONT-RS, as example cases to deploy our scheme. Accordingly, we propose their network coding-based enhancements, namely NAONT-RS and NCAONT-RS. We implement a prototype cloud-of-clouds system to verify the efficiency of our proposal. We deploy the prototype on Microsoft Azure and conduct extensive experiments with real-world traces. The experimental results show that NAONT-RS and NCAONT-RS can reduce the time of data storage process by up to 50% and improve the throughput by up to 110% compared with their original versions, i.e., AONT-RS and CAONT-RS.
云的云存储是确保分布式数据存储的安全性和可靠性的可行手段,其中数据在多个云中进行加密、编码和存储。然而,在移动设备(例如智能手机)中采用这种范式是一个巨大的挑战。由于移动设备中的资源有限,移动设备通常无法执行这种范例中所需的重量级操作(即数据加密、编码和传输)。本文的重点是解决这一挑战,即提高移动云的云存储系统中的数据存储性能。我们建议的关键是允许低功能的移动设备将计算和传输开销转移到云端。换句话说,我们提出了一种基于网络编码的云存储(NCCS)方案,其中云可以协作编码和交换数据。我们考虑了两种最先进的云的云存储方法,即AONT-RS和CAONT-RS,作为部署我们方案的示例案例。因此,我们提出了基于网络编码的增强,即NAONT-RS和NCAONT-RS。我们实现了一个原型的云的云系统来验证我们的建议的效率。我们将原型部署在Microsoft Azure上,并使用真实世界的痕迹进行了广泛的实验。实验结果表明,与AONT-RS和CAONT-RS相比,NAONT-RS和NCAONT-RS的数据存储时间最多减少50%,吞吐量最多提高110%。
{"title":"Mobile Cloud-of-Clouds Storage Made Efficient: A Network Coding Based Approach","authors":"Jiajie Shen, Yi Li, Yangfan Zhou, Xin Wang","doi":"10.1109/SRDS.2018.00018","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00018","url":null,"abstract":"Cloud-of-clouds storage is a viable means to ensure security and reliability of distributed data storage, where data are encrypted, encoded, and stored in multiple clouds. However, it is a great challenge to adopt such a paradigm in mobile devices (e.g., smartphone). Mobile devices are generally incapable to perform the heavy-weight operations (i.e., data encryption, encoding, and transmission) required in such a paradigm, given the limited resources in such devices. This paper focuses on addressing this challenge, i.e., improving data storage performance in mobile cloud-of-clouds storage systems. The key of our proposal is to allow the low-capability mobile devices to offload the computational and transmission overhead to the clouds. In other words, we propose a Network Coding based Cloud-of-clouds Storage (NCCS) scheme, where the clouds can encode and exchange data collaboratively. We consider two state-of-the-art cloud-of-clouds storage approaches, i.e., AONT-RS and CAONT-RS, as example cases to deploy our scheme. Accordingly, we propose their network coding-based enhancements, namely NAONT-RS and NCAONT-RS. We implement a prototype cloud-of-clouds system to verify the efficiency of our proposal. We deploy the prototype on Microsoft Azure and conduct extensive experiments with real-world traces. The experimental results show that NAONT-RS and NCAONT-RS can reduce the time of data storage process by up to 50% and improve the throughput by up to 110% compared with their original versions, i.e., AONT-RS and CAONT-RS.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1