首页 > 最新文献

ACM Transactions on Storage最新文献

英文 中文
A High-Performance RDMA-oriented Learned Key-Value Store for Disaggregated Memory Systems 面向RDMA的高性能分解存储系统学习键值存储
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-09-05 DOI: 10.1145/3620674
Pengfei Li, Yu Hua, Pengfei Zuo, Zhangyu Chen, Jiajie Sheng
Disaggregated memory systems separate monolithic servers into different components, including compute and memory nodes, to enjoy the benefits of high resource utilization, flexible hardware scalability, and efficient data sharing. By exploiting the high-performance RDMA (Remote Direct Memory Access), the compute nodes directly access the remote memory pool without involving remote CPUs. Hence, the ordered key-value (KV) stores (e.g., B-trees and learned indexes) keep all data sorted to provide rang query service via the high-performance network. However, existing ordered KVs fail to work well on the disaggregated memory systems, due to either consuming multiple network roundtrips to search the remote data or heavily relying on the memory nodes equipped with insufficient computing resources to process data modifications. In this paper, we propose a scalable RDMA-oriented KV store with learned indexes, called ROLEX, to coalesce the ordered KV store in the disaggregated systems for efficient data storage and retrieval. ROLEX leverages a retraining-decoupled learned index scheme to dissociate the model retraining from data modification operations via adding a bias and some data-movement constraints to learned models. Based on the operation decoupling, data modifications are directly executed in compute nodes via one-sided RDMA verbs with high scalability. The model retraining is hence removed from the critical path of data modification and asynchronously executed in memory nodes by using dedicated computing resources. ROLEX efficiently alleviates the fragmentation and garbage collection issues, due to allocating and reclaiming space via fixed-size leaves that are accessed via the atomic-size leaf numbers. Our experimental results on YCSB and real-world workloads demonstrate that ROLEX achieves competitive performance on the static workloads, as well as significantly improving the performance on dynamic workloads by up to 2.2 × than state-of-the-art schemes on the disaggregated memory systems. We have released the open-source codes for public use in GitHub.
分解内存系统将单片服务器分离为不同的组件,包括计算和内存节点,以享受高资源利用率、灵活的硬件可扩展性和高效数据共享的好处。通过利用高性能的RDMA(远程直接内存访问),计算节点可以直接访问远程内存池,而无需涉及远程CPU。因此,有序键值(KV)存储(例如,B树和学习索引)保持所有数据的排序,以通过高性能网络提供范围查询服务。然而,由于消耗多个网络往返来搜索远程数据,或者严重依赖于配备有不足计算资源的存储器节点来处理数据修改,现有的有序KV在分解的存储器系统上不能很好地工作。在本文中,我们提出了一种具有学习索引的面向RDMA的可扩展KV存储,称为ROLEX,以在分解系统中合并有序的KV存储,从而实现高效的数据存储和检索。ROLEX利用再训练解耦学习索引方案,通过向学习模型添加偏差和一些数据移动约束,将模型再训练与数据修改操作分离。基于操作解耦,数据修改通过具有高可伸缩性的单边RDMA谓词直接在计算节点中执行。因此,模型再训练从数据修改的关键路径中删除,并通过使用专用计算资源在内存节点中异步执行。ROLEX通过固定大小的叶分配和回收空间,有效地缓解了碎片和垃圾收集问题,这些叶是通过原子大小的叶编号访问的。我们在YCSB和真实世界工作负载上的实验结果表明,ROLEX在静态工作负载上实现了有竞争力的性能,并且在动态工作负载上比在分解内存系统上的最先进方案显著提高了2.2倍。我们已经在GitHub中发布了供公众使用的开源代码。
{"title":"A High-Performance RDMA-oriented Learned Key-Value Store for Disaggregated Memory Systems","authors":"Pengfei Li, Yu Hua, Pengfei Zuo, Zhangyu Chen, Jiajie Sheng","doi":"10.1145/3620674","DOIUrl":"https://doi.org/10.1145/3620674","url":null,"abstract":"Disaggregated memory systems separate monolithic servers into different components, including compute and memory nodes, to enjoy the benefits of high resource utilization, flexible hardware scalability, and efficient data sharing. By exploiting the high-performance RDMA (Remote Direct Memory Access), the compute nodes directly access the remote memory pool without involving remote CPUs. Hence, the ordered key-value (KV) stores (e.g., B-trees and learned indexes) keep all data sorted to provide rang query service via the high-performance network. However, existing ordered KVs fail to work well on the disaggregated memory systems, due to either consuming multiple network roundtrips to search the remote data or heavily relying on the memory nodes equipped with insufficient computing resources to process data modifications. In this paper, we propose a scalable RDMA-oriented KV store with learned indexes, called ROLEX, to coalesce the ordered KV store in the disaggregated systems for efficient data storage and retrieval. ROLEX leverages a retraining-decoupled learned index scheme to dissociate the model retraining from data modification operations via adding a bias and some data-movement constraints to learned models. Based on the operation decoupling, data modifications are directly executed in compute nodes via one-sided RDMA verbs with high scalability. The model retraining is hence removed from the critical path of data modification and asynchronously executed in memory nodes by using dedicated computing resources. ROLEX efficiently alleviates the fragmentation and garbage collection issues, due to allocating and reclaiming space via fixed-size leaves that are accessed via the atomic-size leaf numbers. Our experimental results on YCSB and real-world workloads demonstrate that ROLEX achieves competitive performance on the static workloads, as well as significantly improving the performance on dynamic workloads by up to 2.2 × than state-of-the-art schemes on the disaggregated memory systems. We have released the open-source codes for public use in GitHub.","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43932825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block-Level Image Service for the Cloud 云的块级图像服务
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-09-05 DOI: 10.1145/3620672
Huiba Li, Zhihao Zhang, Yifan Yuan, Rui Du, Kai Ma, Lanzheng Liu, Yiming Zhang, Windsor Hsu
Businesses increasingly need agile and elastic computing infrastructure to respond quickly to real world situations. By offering efficient process-based virtualization and a layered image system, containers are designed to enable agile and elastic application deployment. However, creating or updating large container clusters is still slow due to the image downloading and unpacking process. In this paper, we present DADI Image Service, a block-level image service for increased agility and elasticity in deploying applications. DADI replaces the waterfall model of starting containers (downloading image, unpacking image, starting container) with fine-grained on-demand transfer of remote images, realizing instant start of containers. To accelerate the cold start of containers, DADI designs a pull-based prefetching mechanism which allows a host to read necessary image data beforehand at the granularity of image layers. We design a P2P-based decentralized image sharing architecture to balance traffic among all the participating hosts and propose a pull-push collaborative prefetching mechanism to accelerate cold start. DADI efficiently supports various kinds of runtimes including cgroups, QEMU, etc., further realizing “build once, run anywhere”. DADI has been deployed at scale in the production environment of Alibaba, serving one of the world’s largest ecommerce platforms. Performance results show that DADI can cold start 10,000 containers on 1,000 hosts within 4 seconds.
企业越来越需要灵活和弹性的计算基础设施来快速响应现实世界的情况。通过提供高效的基于流程的虚拟化和分层映像系统,容器被设计为实现灵活和弹性的应用程序部署。然而,由于图像下载和解包过程,创建或更新大型容器集群的速度仍然很慢。在本文中,我们介绍了DADI映像服务,这是一种块级映像服务,用于提高部署应用程序的灵活性和弹性。DADI将启动容器的瀑布模型(下载映像、打开映像、启动容器)替换为远程映像的细粒度按需传输,实现了容器的即时启动。为了加速容器的冷启动,DADI设计了一种基于拉的预取机制,该机制允许主机以图像层的粒度预先读取必要的图像数据。我们设计了一种基于P2P的去中心化图像共享架构,以平衡所有参与主机之间的流量,并提出了一种拉-推协同预取机制来加速冷启动。DADI有效地支持各种运行时,包括cgroups、QEMU等,进一步实现了“一次构建,随处运行”。DADI已在阿里巴巴的生产环境中大规模部署,为全球最大的电子商务平台之一提供服务。性能结果表明,DADI可以在4秒内冷启动1000台主机上的10000个容器。
{"title":"Block-Level Image Service for the Cloud","authors":"Huiba Li, Zhihao Zhang, Yifan Yuan, Rui Du, Kai Ma, Lanzheng Liu, Yiming Zhang, Windsor Hsu","doi":"10.1145/3620672","DOIUrl":"https://doi.org/10.1145/3620672","url":null,"abstract":"Businesses increasingly need agile and elastic computing infrastructure to respond quickly to real world situations. By offering efficient process-based virtualization and a layered image system, containers are designed to enable agile and elastic application deployment. However, creating or updating large container clusters is still slow due to the image downloading and unpacking process. In this paper, we present DADI Image Service, a block-level image service for increased agility and elasticity in deploying applications. DADI replaces the waterfall model of starting containers (downloading image, unpacking image, starting container) with fine-grained on-demand transfer of remote images, realizing instant start of containers. To accelerate the cold start of containers, DADI designs a pull-based prefetching mechanism which allows a host to read necessary image data beforehand at the granularity of image layers. We design a P2P-based decentralized image sharing architecture to balance traffic among all the participating hosts and propose a pull-push collaborative prefetching mechanism to accelerate cold start. DADI efficiently supports various kinds of runtimes including cgroups, QEMU, etc., further realizing “build once, run anywhere”. DADI has been deployed at scale in the production environment of Alibaba, serving one of the world’s largest ecommerce platforms. Performance results show that DADI can cold start 10,000 containers on 1,000 hosts within 4 seconds.","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45552135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective 文件系统中的安全战争:基于漏洞中心视角的实证研究
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-07-17 DOI: https://dl.acm.org/doi/10.1145/3606020
Jinghan Sun, Shaobo Li, Jun Xu, Jian Huang

This paper presents a systematic study on the security of modern file systems, following a vulnerability-centric perspective. Specifically, we collected 377 file system vulnerabilities committed to the CVE database in the past 20 years. We characterize them from four dimensions that include why the vulnerabilities appear, how the vulnerabilities can be exploited, what consequences can arise, and how the vulnerabilities are fixed. This way, we build a deep understanding of the attack surfaces faced by file systems, the threats imposed by the attack surfaces, and the good and bad practices in mitigating the attacks in file systems. We envision that our study will bring insights towards the future development of file systems, the enhancement of file system security, and the relevant vulnerability mitigating solutions.

本文从以漏洞为中心的角度对现代文件系统的安全性进行了系统的研究。具体来说,我们收集了过去20年CVE数据库中存在的377个文件系统漏洞。我们从四个方面来描述它们,包括漏洞出现的原因、漏洞如何被利用、可能产生的后果以及如何修复漏洞。通过这种方式,我们可以深入了解文件系统面临的攻击面、攻击面所带来的威胁,以及减轻文件系统攻击的好方法和坏方法。我们预期我们的研究将为文件系统的未来发展,增强文件系统的安全性,以及相关的漏洞缓解解决方案带来见解。
{"title":"The Security War in File Systems: An Empirical Study from A Vulnerability-Centric Perspective","authors":"Jinghan Sun, Shaobo Li, Jun Xu, Jian Huang","doi":"https://dl.acm.org/doi/10.1145/3606020","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3606020","url":null,"abstract":"<p>This paper presents a systematic study on the security of modern file systems, following a vulnerability-centric perspective. Specifically, we collected 377 file system vulnerabilities committed to the CVE database in the past 20 years. We characterize them from four dimensions that include why the vulnerabilities appear, how the vulnerabilities can be exploited, what consequences can arise, and how the vulnerabilities are fixed. This way, we build a deep understanding of the attack surfaces faced by file systems, the threats imposed by the attack surfaces, and the good and bad practices in mitigating the attacks in file systems. We envision that our study will bring insights towards the future development of file systems, the enhancement of file system security, and the relevant vulnerability mitigating solutions.</p>","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138512819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FASTSync: a FAST Delta Sync Scheme for Encrypted Cloud Storage in High-Bandwidth Network Environments FASTSync:用于高带宽网络环境下加密云存储的快速增量同步方案
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-07-07 DOI: 10.1145/3607536
Suzhen Wu, Zhanhong Tu, Yuxuan Zhou, Zuocheng Wang, Zhirong Shen, Wei Chen, Wen Wang, Weichun Wang, Bo Mao
More and more data are stored in cloud storage which brings two major challenges. First, the modified files in the cloud should be quickly synchronized to ensure data consistency, e.g., delta synchronization (sync) achieves efficient cloud sync by synchronizing only the updated part of the file. Second, the huge data in the cloud needs to be deduplicated and encrypted, e.g., Message-Locked Encryption (MLE) implements data deduplication by encrypting the content among different users. However, when combined, a few updates in the content can cause large sync traffic amplification for both keys and ciphertext in the MLE-based cloud storage, significantly degrading the cloud sync efficiency. A feature-based encryption sync scheme, FeatureSync, is proposed to address the delta amplification problem. However, with further improvement of the network bandwidth, the performance of FeatureSync stagnates. In our preliminary experimental evaluations, we find that the bottleneck of the computational overhead in the high-bandwidth network environments is the main bottleneck in FeatureSync. In this paper, we propose an enhanced feature-based encryption sync scheme FASTSync to optimize the performance of FeatureSync in high-bandwidth network environments. The performance evaluations on a lightweight prototype implementation of FASTSync show that FASTSync reduces the cloud sync time by 70.3% and the encryption time by 37.3% on average, compared with FeatureSync.
越来越多的数据存储在云存储中,这带来了两大挑战。首先,应该快速同步云中修改后的文件,以确保数据一致性,例如,delta同步(sync)通过只同步文件的更新部分来实现高效的云同步。其次,云中的巨大数据需要进行重复数据消除和加密,例如,消息锁定加密(MLE)通过加密不同用户之间的内容来实现重复数据消除。然而,当结合在一起时,内容中的一些更新可能会导致基于MLE的云存储中的密钥和密文的大量同步流量放大,从而显著降低云同步效率。为了解决增量放大问题,提出了一种基于特征的加密同步方案FeatureSync。然而,随着网络带宽的进一步提高,FeatureSync的性能停滞不前。在我们的初步实验评估中,我们发现高带宽网络环境中的计算开销瓶颈是FeatureSync的主要瓶颈。在本文中,我们提出了一种增强的基于特征的加密同步方案FASTSync,以优化FeatureSync在高带宽网络环境中的性能。对FASTSync轻量级原型实现的性能评估表明,与FeatureSync相比,FASTSync平均减少了70.3%的云同步时间和37.3%的加密时间。
{"title":"FASTSync: a FAST Delta Sync Scheme for Encrypted Cloud Storage in High-Bandwidth Network Environments","authors":"Suzhen Wu, Zhanhong Tu, Yuxuan Zhou, Zuocheng Wang, Zhirong Shen, Wei Chen, Wen Wang, Weichun Wang, Bo Mao","doi":"10.1145/3607536","DOIUrl":"https://doi.org/10.1145/3607536","url":null,"abstract":"More and more data are stored in cloud storage which brings two major challenges. First, the modified files in the cloud should be quickly synchronized to ensure data consistency, e.g., delta synchronization (sync) achieves efficient cloud sync by synchronizing only the updated part of the file. Second, the huge data in the cloud needs to be deduplicated and encrypted, e.g., Message-Locked Encryption (MLE) implements data deduplication by encrypting the content among different users. However, when combined, a few updates in the content can cause large sync traffic amplification for both keys and ciphertext in the MLE-based cloud storage, significantly degrading the cloud sync efficiency. A feature-based encryption sync scheme, FeatureSync, is proposed to address the delta amplification problem. However, with further improvement of the network bandwidth, the performance of FeatureSync stagnates. In our preliminary experimental evaluations, we find that the bottleneck of the computational overhead in the high-bandwidth network environments is the main bottleneck in FeatureSync. In this paper, we propose an enhanced feature-based encryption sync scheme FASTSync to optimize the performance of FeatureSync in high-bandwidth network environments. The performance evaluations on a lightweight prototype implementation of FASTSync show that FASTSync reduces the cloud sync time by 70.3% and the encryption time by 37.3% on average, compared with FeatureSync.","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48634042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FASTSync: a FAST Delta Sync Scheme for Encrypted Cloud Storage in High-Bandwidth Network Environments FASTSync:用于高带宽网络环境下加密云存储的快速增量同步方案
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-07-07 DOI: https://dl.acm.org/doi/10.1145/3607536
Suzhen Wu, Zhanhong Tu, Yuxuan Zhou, Zuocheng Wang, Zhirong Shen, Wei Chen, Wei Wang, Weichun Wang, Bo Mao

More and more data are stored in cloud storage which brings two major challenges. First, the modified files in the cloud should be quickly synchronized to ensure data consistency, e.g., delta synchronization (sync) achieves efficient cloud sync by synchronizing only the updated part of the file. Second, the huge data in the cloud needs to be deduplicated and encrypted, e.g., Message-Locked Encryption (MLE) implements data deduplication by encrypting the content among different users. However, when combined, a few updates in the content can cause large sync traffic amplification for both keys and ciphertext in the MLE-based cloud storage, significantly degrading the cloud sync efficiency. A feature-based encryption sync scheme, FeatureSync, is proposed to address the delta amplification problem. However, with further improvement of the network bandwidth, the performance of FeatureSync stagnates. In our preliminary experimental evaluations, we find that the bottleneck of the computational overhead in the high-bandwidth network environments is the main bottleneck in FeatureSync. In this paper, we propose an enhanced feature-based encryption sync scheme FASTSync to optimize the performance of FeatureSync in high-bandwidth network environments. The performance evaluations on a lightweight prototype implementation of FASTSync show that FASTSync reduces the cloud sync time by 70.3% and the encryption time by 37.3% on average, compared with FeatureSync.

越来越多的数据存储在云存储中,这带来了两大挑战。首先,对云中的修改文件进行快速同步以保证数据的一致性,例如delta synchronization (sync)通过只同步文件中更新的部分来实现高效的云同步。其次,云中的海量数据需要进行重复数据删除和加密,例如消息锁定加密(Message-Locked Encryption, MLE)通过对不同用户之间的内容进行加密来实现重复数据删除。但是,当结合使用时,内容中的一些更新可能会导致基于mle的云存储中的密钥和密文的大量同步流量放大,从而显著降低云同步效率。为了解决增量放大问题,提出了一种基于特征的加密同步方案FeatureSync。然而,随着网络带宽的进一步提高,FeatureSync的性能停滞不前。在我们的初步实验评估中,我们发现高带宽网络环境下计算开销的瓶颈是FeatureSync的主要瓶颈。在本文中,我们提出了一种增强的基于特征的加密同步方案FASTSync,以优化高带宽网络环境下FeatureSync的性能。对FASTSync轻量级原型实现的性能评估表明,与FeatureSync相比,FASTSync平均减少了70.3%的云同步时间和37.3%的加密时间。
{"title":"FASTSync: a FAST Delta Sync Scheme for Encrypted Cloud Storage in High-Bandwidth Network Environments","authors":"Suzhen Wu, Zhanhong Tu, Yuxuan Zhou, Zuocheng Wang, Zhirong Shen, Wei Chen, Wei Wang, Weichun Wang, Bo Mao","doi":"https://dl.acm.org/doi/10.1145/3607536","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3607536","url":null,"abstract":"<p>More and more data are stored in cloud storage which brings two major challenges. First, the modified files in the cloud should be quickly synchronized to ensure data consistency, e.g., delta synchronization (sync) achieves efficient cloud sync by synchronizing only the updated part of the file. Second, the huge data in the cloud needs to be deduplicated and encrypted, e.g., Message-Locked Encryption (MLE) implements data deduplication by encrypting the content among different users. However, when combined, a few updates in the content can cause large sync traffic amplification for both keys and ciphertext in the MLE-based cloud storage, significantly degrading the cloud sync efficiency. A feature-based encryption sync scheme, FeatureSync, is proposed to address the delta amplification problem. However, with further improvement of the network bandwidth, the performance of FeatureSync stagnates. In our preliminary experimental evaluations, we find that the bottleneck of the computational overhead in the high-bandwidth network environments is the main bottleneck in FeatureSync. In this paper, we propose an enhanced feature-based encryption sync scheme FASTSync to optimize the performance of FeatureSync in high-bandwidth network environments. The performance evaluations on a lightweight prototype implementation of FASTSync show that FASTSync reduces the cloud sync time by 70.3% and the encryption time by 37.3% on average, compared with FeatureSync.</p>","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138512818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries 支持联合查询的无所有者分布式对称可搜索加密
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-07-05 DOI: 10.1145/3607255
Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, R. Deng
Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) in dual-cloud architecture to generate search tokens with the data owner free from sharing key and being online. Then, we provide fine-grained conjunctive query in the distributed architecture using additive secret sharing and symmetric-key hidden vector encryption. Finally, formal security analysis and empirical performance evaluation demonstrate that ODiSC is adaptively simulation-secure and efficient.
对称可搜索加密(SSE)作为一种理想的原语,可以确保数据隐私,同时支持对加密数据的检索。然而,现有的多用户SSE方案要求数据所有者与所有查询用户共享密钥,或者始终在线以生成搜索令牌。虽然有一些解决方案可以解决这个问题,但它们至少有一个弱点,例如不支持联合查询、数据所有者的结果解密辅助以及未经授权的访问。为了解决上述问题,我们提出了一种支持联合查询的无所有者分布式对称可搜索加密(ODiSC)。具体而言,我们首先评估了双云架构中的带噪声弱伪随机函数的学习奇偶性(LPN-wPRF),以与数据所有者生成不共享密钥且在线的搜索令牌。然后,我们在分布式体系结构中使用加性秘密共享和对称密钥隐藏向量加密来提供细粒度的联合查询。最后,形式化安全分析和实证性能评估表明,ODiSC具有自适应仿真的安全性和有效性。
{"title":"Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries","authors":"Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, R. Deng","doi":"10.1145/3607255","DOIUrl":"https://doi.org/10.1145/3607255","url":null,"abstract":"Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) in dual-cloud architecture to generate search tokens with the data owner free from sharing key and being online. Then, we provide fine-grained conjunctive query in the distributed architecture using additive secret sharing and symmetric-key hidden vector encryption. Finally, formal security analysis and empirical performance evaluation demonstrate that ODiSC is adaptively simulation-secure and efficient.","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47729536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries 支持联合查询的无所有者分布式对称可搜索加密
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-07-05 DOI: https://dl.acm.org/doi/10.1145/3607255
Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng

Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) in dual-cloud architecture to generate search tokens with the data owner free from sharing key and being online. Then, we provide fine-grained conjunctive query in the distributed architecture using additive secret sharing and symmetric-key hidden vector encryption. Finally, formal security analysis and empirical performance evaluation demonstrate that ODiSC is adaptively simulation-secure and efficient.

对称可搜索加密(SSE)作为一种理想的原语,可以在保证数据隐私的同时支持对加密数据的检索。然而,现有的多用户SSE方案要求数据所有者与所有查询用户共享密钥,或者始终在线以生成搜索令牌。虽然有一些解决方案可以解决这个问题,但它们至少有一个缺点,例如不支持联合查询、数据所有者的结果解密协助以及未经授权的访问。为了解决上述问题,我们提出了一种支持合取查询(ODiSC)的无所有者分布式对称可搜索加密。具体而言,我们首先评估了双云架构中的带噪声学习奇偶性弱伪随机函数(LPN-wPRF),以生成数据所有者不共享密钥且在线的搜索令牌。然后,我们在分布式架构中使用加性秘密共享和对称密钥隐藏向量加密提供细粒度的联合查询。最后,形式安全性分析和实证性能评价表明,ODiSC具有自适应仿真安全性和有效性。
{"title":"Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries","authors":"Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng","doi":"https://dl.acm.org/doi/10.1145/3607255","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3607255","url":null,"abstract":"<p>Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an <underline>O</underline>wner-free <underline>Di</underline>stributed <underline>S</underline>ymmetric searchable encryption supporting <underline>C</underline>onjunctive query (ODiSC). Specifically, we first evaluate Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) in dual-cloud architecture to generate search tokens with the data owner free from sharing key and being online. Then, we provide fine-grained conjunctive query in the distributed architecture using additive secret sharing and symmetric-key hidden vector encryption. Finally, formal security analysis and empirical performance evaluation demonstrate that ODiSC is adaptively simulation-secure and efficient.</p>","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138512867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CostCounter: A Better Method for Collision Mitigation in Cuckoo Hashing 成本计数器:杜鹃哈希中一种更好的冲突缓解方法
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-06-19 DOI: https://dl.acm.org/doi/10.1145/3596910
Haonan Wu, Shuxian Wang, Zhanfeng Jin, Yuhang Zhang, Ruyun Ma, Sijin Fan, Ruili Chao

Hardware is often required to support fast search and high-throughput applications. Consequently, the performance of search algorithms is limited by storage bandwidth. Hence, the search algorithm must be optimized accordingly. We propose a CostCounter (CC) algorithm based on cuckoo hashing and an Improved CostCounter (ICC) algorithm. A better path can be selected when collisions occur using a cost counter to record the kick-out situation. Our simulation results indicate that the CC and ICC algorithms can achieve more significant performance improvements than Random Walk (RW), Breadth First Search (BFS), and MinCounter (MC). With two buckets and two slots per bucket, under the 95% memory load rate of the maximum load rate, CC and ICC are optimized on read-write times over 20% and 80% compared to MC and BFS, respectively. Furthermore, the CC and ICC algorithms achieve a slight improvement in storage efficiency compared with MC. In addition, we implement RW, MC, and the proposed algorithms using fine-grained locking to support a high throughput rate. From the test on field programmable gate arrays, we verify the simulation results and our algorithms optimize the maximum throughput over 23% compared to RW and 9% compared to MC under 95% of the memory capacity. The test results indicate that our CC and ICC algorithms can achieve better performance in terms of hardware bandwidth and memory load efficiency without incurring a significant resource cost.

通常需要硬件来支持快速搜索和高吞吐量应用程序。因此,搜索算法的性能受到存储带宽的限制。因此,搜索算法必须进行相应的优化。提出了一种基于布谷鸟哈希的CostCounter (CC)算法和一种改进的CostCounter (ICC)算法。当发生碰撞时,可以选择更好的路径,使用成本计数器记录踢球情况。仿真结果表明,CC和ICC算法比Random Walk (RW)、广度优先搜索(BFS)和MinCounter (MC)算法能取得更显著的性能改进。对于两个桶和每个桶两个槽,在最大负载率为95%的内存负载率下,CC和ICC的读写时间分别比MC和BFS高20%和80%。此外,与MC相比,CC和ICC算法在存储效率方面略有提高。此外,我们使用细粒度锁定实现RW, MC和所提出的算法以支持高吞吐率。通过对现场可编程门阵列的测试,我们验证了仿真结果,我们的算法在95%的内存容量下,与RW相比优化了23%的最大吞吐量,与MC相比优化了9%的最大吞吐量。测试结果表明,我们的CC和ICC算法在硬件带宽和内存负载效率方面可以获得更好的性能,而不会产生显着的资源成本。
{"title":"CostCounter: A Better Method for Collision Mitigation in Cuckoo Hashing","authors":"Haonan Wu, Shuxian Wang, Zhanfeng Jin, Yuhang Zhang, Ruyun Ma, Sijin Fan, Ruili Chao","doi":"https://dl.acm.org/doi/10.1145/3596910","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3596910","url":null,"abstract":"<p>Hardware is often required to support fast search and high-throughput applications. Consequently, the performance of search algorithms is limited by storage bandwidth. Hence, the search algorithm must be optimized accordingly. We propose a CostCounter (CC) algorithm based on cuckoo hashing and an Improved CostCounter (ICC) algorithm. A better path can be selected when collisions occur using a cost counter to record the kick-out situation. Our simulation results indicate that the CC and ICC algorithms can achieve more significant performance improvements than Random Walk (RW), Breadth First Search (BFS), and MinCounter (MC). With two buckets and two slots per bucket, under the 95% memory load rate of the maximum load rate, CC and ICC are optimized on read-write times over 20% and 80% compared to MC and BFS, respectively. Furthermore, the CC and ICC algorithms achieve a slight improvement in storage efficiency compared with MC. In addition, we implement RW, MC, and the proposed algorithms using fine-grained locking to support a high throughput rate. From the test on field programmable gate arrays, we verify the simulation results and our algorithms optimize the maximum throughput over 23% compared to RW and 9% compared to MC under 95% of the memory capacity. The test results indicate that our CC and ICC algorithms can achieve better performance in terms of hardware bandwidth and memory load efficiency without incurring a significant resource cost.</p>","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138526294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Bug Analysis and Detection for Distributed Storage and Computing Systems 分布式存储与计算系统的性能缺陷分析与检测
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-06-19 DOI: https://dl.acm.org/doi/10.1145/3580281
Jiaxin Li, Yiming Zhang, Shan Lu, Haryadi S. Gunawi, Xiaohui Gu, Feng Huang, Dongsheng Li

This article systematically studies 99 distributed performance bugs from five widely deployed distributed storage and computing systems (Cassandra, HBase, HDFS, Hadoop MapReduce and ZooKeeper). We present the TaxPerf database, which collectively organizes the analysis results as over 400 classification labels and over 2,500 lines of bug re-description. TaxPerf is classified into six bug categories (and 18 bug subcategories) by their root causes; resource, blocking, synchronization, optimization, configuration, and logic. TaxPerf can be used as a benchmark for performance bug studies and debug tool designs. Although it is impractical to automatically detect all categories of performance bugs in TaxPerf, we find that an important category of blocking bugs can be effectively solved by analysis tools. We analyze the cascading nature of blocking bugs and design an automatic detection tool called PCatch, which (i) performs program analysis to identify code regions whose execution time can potentially increase dramatically with the workload size; (ii) adapts the traditional happens-before model to reason about software resource contention and performance dependency relationship; and (iii) uses dynamic tracking to identify whether the slowdown propagation is contained in one job. Evaluation shows that PCatch can accurately detect blocking bugs of representative distributed storage and computing systems by observing system executions under small-scale workloads.

本文系统地研究了5个广泛部署的分布式存储和计算系统(Cassandra、HBase、HDFS、Hadoop MapReduce和ZooKeeper)的99个分布式性能bug。我们提供了TaxPerf数据库,它将分析结果组织为400多个分类标签和2500多行错误重新描述。TaxPerf按其根本原因分为六个bug类别(和18个bug子类别);资源、阻塞、同步、优化、配置和逻辑。TaxPerf可以用作性能错误研究和调试工具设计的基准。虽然在TaxPerf中自动检测所有类别的性能错误是不切实际的,但我们发现,分析工具可以有效地解决一类重要的阻塞错误。我们分析了阻塞错误的级联性质,并设计了一个名为PCatch的自动检测工具,它(i)执行程序分析以识别执行时间可能随着工作负载大小而急剧增加的代码区域;(ii)将传统的“事前发生”模型应用于软件资源争用和性能依赖关系的推理;(iii)使用动态跟踪来识别减速传播是否包含在一个作业中。评估表明,通过观察小规模工作负载下的系统执行情况,PCatch可以准确地检测代表性分布式存储和计算系统的阻塞错误。
{"title":"Performance Bug Analysis and Detection for Distributed Storage and Computing Systems","authors":"Jiaxin Li, Yiming Zhang, Shan Lu, Haryadi S. Gunawi, Xiaohui Gu, Feng Huang, Dongsheng Li","doi":"https://dl.acm.org/doi/10.1145/3580281","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3580281","url":null,"abstract":"<p>This article systematically studies 99 distributed performance bugs from five widely deployed distributed storage and computing systems (Cassandra, HBase, HDFS, Hadoop MapReduce and ZooKeeper). We present the <i>TaxPerf</i> database, which collectively organizes the analysis results as over 400 classification labels and over 2,500 lines of bug re-description. TaxPerf is classified into six bug categories (and 18 bug subcategories) by their root causes; resource, blocking, synchronization, optimization, configuration, and logic. TaxPerf can be used as a benchmark for performance bug studies and debug tool designs. Although it is impractical to automatically detect all categories of performance bugs in TaxPerf, we find that an important category of blocking bugs can be effectively solved by analysis tools. We analyze the cascading nature of blocking bugs and design an automatic detection tool called <i>PCatch</i>, which (i) performs program analysis to identify code regions whose execution time can potentially increase dramatically with the workload size; (ii) adapts the traditional happens-before model to reason about software resource contention and performance dependency relationship; and (iii) uses dynamic tracking to identify whether the slowdown propagation is contained in one job. Evaluation shows that PCatch can accurately detect blocking bugs of representative distributed storage and computing systems by observing system executions under small-scale workloads.</p>","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138526283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Derrick: A Three-layer Balancer for Self-managed Continuous Scalability Derrick:自我管理持续可扩展性的三层平衡器
IF 1.7 3区 计算机科学 Q3 Computer Science Pub Date : 2023-06-19 DOI: https://dl.acm.org/doi/10.1145/3594543
Andrzej Jackowski, Leszek Gryz, Michał Wełnicki, Cezary Dubnicki, Konrad Iwanicki

Data arrangement determines the capacity, resilience, and performance of a distributed storage system. A scalable self-managed system must place its data efficiently not only during stable operation but also after an expansion, planned downscaling, or device failures. In this article, we present Derrick, a data balancing algorithm addressing these needs, which has been developed for HYDRAstor, a highly scalable commercial storage system. Derrick makes its decisions quickly in case of failures but takes additional time to find a nearly optimal data arrangement and a plan for reaching it when the device population changes. Compared to balancing algorithms in two other state-of-the-art systems, Derrick provides better capacity utilization, reduced data movement, and improved performance. Moreover, it can be easily adapted to meet custom placement requirements.

数据的排列方式决定了分布式存储系统的容量、弹性和性能。可扩展的自我管理系统必须有效地放置其数据,不仅在稳定运行期间,而且在扩展、计划缩小或设备故障之后。在本文中,我们介绍了Derrick,一种解决这些需求的数据平衡算法,它是为HYDRAstor(一种高度可扩展的商业存储系统)开发的。Derrick在出现故障时可以快速做出决定,但需要额外的时间来找到近乎最佳的数据安排,并在设备数量发生变化时制定实现该安排的计划。与其他两种最先进系统的平衡算法相比,Derrick提供了更好的容量利用率,减少了数据移动,提高了性能。此外,它可以很容易地适应自定义放置要求。
{"title":"Derrick: A Three-layer Balancer for Self-managed Continuous Scalability","authors":"Andrzej Jackowski, Leszek Gryz, Michał Wełnicki, Cezary Dubnicki, Konrad Iwanicki","doi":"https://dl.acm.org/doi/10.1145/3594543","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3594543","url":null,"abstract":"<p>Data arrangement determines the capacity, resilience, and performance of a distributed storage system. A scalable self-managed system must place its data efficiently not only during stable operation but also after an expansion, planned downscaling, or device failures. In this article, we present Derrick, a data balancing algorithm addressing these needs, which has been developed for HYDRAstor, a highly scalable commercial storage system. Derrick makes its decisions quickly in case of failures but takes additional time to find a nearly optimal data arrangement and a plan for reaching it when the device population changes. Compared to balancing algorithms in two other state-of-the-art systems, Derrick provides better capacity utilization, reduced data movement, and improved performance. Moreover, it can be easily adapted to meet custom placement requirements.</p>","PeriodicalId":49113,"journal":{"name":"ACM Transactions on Storage","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138526295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Storage
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1