Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2014, Vol. 54 Issue (1) : 137-144     DOI:
Orginal Article |
Fault-tolerant mechanism combined with replication and error correcting code for cloud file systems
Dongri YANG1,Ying WANG1(),Peng LIU2
1. College of Engineering & Information Technology,University of Chinese Academy of Sciences, Beijing 100049, China
2. PLA University of Science and Technology, Nanjing 210007, China
Download: PDF(2344 KB)   HTML
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks     Supporting Info
Guide   
Abstract  

Fault tolerant is important for the reliability of cloud storage file systems. This paper analyzes the reliability of typical cloud file systems with a central metadata server and proposes a fault-tolerant mechanism that combines replication schemes with error correcting codes for storage node reliability guarantee as well as a hot-standby scheme for the metadata server reliability guarantee. Experimental results demonstrate that the mechanism improves the reliability of current cloud storage file systems and at the same time improves the storage utilizations compared with replication schemes.

Keywords cloud storage      fault tolerant      hot stand-by      replication      erasure codes     
ZTFLH:     
Fund: 
Issue Date: 15 January 2014
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
Dongri YANG
Ying WANG
Peng LIU
Cite this article:   
Dongri YANG,Ying WANG,Peng LIU. Fault-tolerant mechanism combined with replication and error correcting code for cloud file systems[J]. Journal of Tsinghua University(Science and Technology), 2014, 54(1): 137-144.
URL:  
http://jst.tsinghuajournals.com/EN/     OR     http://jst.tsinghuajournals.com/EN/Y2014/V54/I1/137
  
  
  
  
  
  
  
[1] Wang Y, Yang D R, Li P. CloStor: A cloud storage system for fast large-scale data I/O [M]//Advance in Computer Science and Its Applications. Springer Berlin Heidelberg, 2014: 1023-1030.
[2] Ghemawat S, Gobioff H, Leung S T. The Google file system [C]// Proc of the Symp on Operating Systems Principles (SOSP 2003). Bolton: ACM Press, 2003: 29-43.
[3] Shvachko K, Kuang H, Radia S, et al. The Hadoop distributed file system [C]// Proc of the IEEE 26th Symp on MSST. Lake Tahoe: IEEE, 2010: 1-10.
[4] Decandia G, Hastorun D, Jampani M, et al.Dynamo: Amazon's highly available key-value store [C]// Proc of the SOSP 2007. Stevenson: ACM Press, 2007: 205-220.
[5] Lakshman A, Malik P. Cassandra: A decentralized structured storage system [J]. ACM SIGOPS Operating Systems Review, 2010, 44(2): 35-40.
[6] Bhagwat D, Pollack K, Long D D E, et al. Providing high reliability in a minimum redundancy archival storage system [C]// Proc of the 14th IEEE International Symposium on MASCOTS. 2006: 413-421.
[7] Spillers N. Storage challenges in the medical industry [C]// The 4th Intelligent Storage Workshop. Digital Technology Center, University of Minnesota, 2006.
[8] Wicker S B, Bhargava V K. Reed-Solomon Codes and Their Applications [M]. Piscataway, NJ: IEEE Press, 1983.
[9] Luby M G, Mitzenmacher M, Shokrollahi M A, et al.Efficient erasure correcting codes[J]. IEEE Transactions on Information Theory, 2001, 47(2): 569-584.
url: http://dx.doi.org/10.1109/18.910575
[1] CAO Laicheng, WU Qirui, WANG Yafei, WU Rong, GUO Xian. Efficient semantic-based multiuser search scheme[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1228-1233.
[2] CAO Laicheng, LIU Yufei, DONG Xiaoye, GUO Xian. User privacy-preserving cloud storage scheme on CP-ABE[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(2): 150-156.
[3] MA Rui, ZHU Tianbao, MA Ke, HU Changzhen, ZHAO Xiaolin. Single-witness-based distributed detection for node replication attack[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 909-913,920.
[4] CAO Laicheng, HE Wenwen, LIU Yufei, GUO Xian, FENG Tao. Cooperative dynamic data possession scheme across a cloud storage environment[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(10): 1048-1055.
[5] LI Yong, YAO Ge, LEI Linan, ZHANG Xiaofei, YANG Kun. LBT-based cloud data integrity verification scheme[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(5): 504-510.
[6] WANG Weiping, ZHANG Junfeng, WANG Jianxin. Data integrity check based on null space for network coding based cloud storage[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(1): 83-88,96.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd