Pond: the OceanStore Prototype Sean Rhea, Patric Eaton, Dennis Gells, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz University of California, Berkeley.

Slides:



Advertisements
Similar presentations
Tapestry: Decentralized Routing and Location SPAM Summer 2001 Ben Y. Zhao CS Division, U. C. Berkeley.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
What is OceanStore? - 10^10 users with files each - Goals: Durability, Availability, Enc. & Auth, High performance - Worldwide infrastructure to.
Peer-to-Peer (P2P) Distributed Storage 1Dennis Kafura – CS5204 – Operating Systems.
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility Antony Rowstron, Peter Druschel Presented by: Cristian Borcea.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
POND: the OceanStore Prototype Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon, Ben Zhao and John Kubiatowicz UC, Berkeley File and Storage.
Pond: the OceanStore Prototype CS 6464 Cornell University Presented by Yeounoh Chung.
Pond The OceanStore Prototype. Pond -- Dennis Geels -- January 2003 Talk Outline System overview Implementation status Results from FAST paper Conclusion.
Pond: the OceanStore Prototype Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon,
Pond The OceanStore Prototype. Introduction Problem: Rising cost of storage management Observations: Universal connectivity via Internet $100 terabyte.
Pond: the OceanStore Prototype Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon,
David Choffnes, Winter 2006 OceanStore Maintenance-Free Global Data StorageMaintenance-Free Global Data Storage, S. Rhea, C. Wells, P. Eaton, D. Geels,
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
OceanStore: An Infrastructure for Global-Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels,
Outline for today Structured overlay as infrastructures Survey of design solutions Analysis of designs.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
OceanStore An Architecture for Global-scale Persistent Storage By John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels,
Scalable Adaptive Data Dissemination Under Heterogeneous Environment Yan Chen, John Kubiatowicz and Ben Zhao UC Berkeley.
OceanStore Status and Directions ROC/OceanStore Retreat 1/13/03 John Kubiatowicz University of California at Berkeley.
Tentative Updates in MINO Steven Czerwinski Jeff Pang Anthony Joseph John Kubiatowicz ROC Winter Retreat January 13, 2002.
Naming and Integrity: Self-Verifying Data in Peer-to-Peer Systems Hakim Weatherspoon, Chris Wells, John Kubiatowicz University of California, Berkeley.
OceanStore: Data Security in an Insecure world John Kubiatowicz.
OceanStore: An Architecture for Global-Scale Persistent Storage Professor John Kubiatowicz, University of California at Berkeley
Opportunities for Continuous Tuning in a Global Scale File System John Kubiatowicz University of California at Berkeley.
Concurrency Control & Caching Consistency Issues and Survey Dingshan He November 18, 2002.
OceanStore/Tapestry Toward Global-Scale, Self-Repairing, Secure and Persistent Storage Anthony D. Joseph John Kubiatowicz Sahara Retreat, January 2003.
Or, Providing High Availability and Adaptability in a Decentralized System Tapestry: Fault-resilient Wide-area Location and Routing Issues Facing Wide-area.
Wide-area cooperative storage with CFS
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
OceanStore An Architecture for Global-Scale Persistent Storage Motivation Feature Application Specific Components - Secure Naming - Update - Access Control-
Long Term Durability with Seagull Hakim Weatherspoon (Joint work with Jeremy Stribling and OceanStore group) University of California, Berkeley ROC/Sahara/OceanStore.
OceanStore: An Architecture for Global - Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patric Eaton, Dennis Geels,
Team CMD Distributed Systems Team Report 2 1/17/07 C:\>members Corey Andalora Mike Adams Darren Stanley.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Wide-Area Cooperative Storage with CFS Robert Morris Frank Dabek, M. Frans Kaashoek, David Karger, Ion Stoica MIT and Berkeley.
OceanStore: An Architecture for Global-Scale Persistent Storage John Kubiatowicz, et al ASPLOS 2000.
Cooperative File System. So far we had… - Consistency BUT… - Availability - Partition tolerance ?
1 JTE HPC/FS Pastis: a peer-to-peer file system for persistant large-scale storage Jean-Michel Busca Fabio Picconi Pierre Sens LIP6, Université Paris 6.
Failure Resilience in the Peer-to-Peer-System OceanStore Speaker: Corinna Richter.
Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks, Gregory R. Ganger Carnegie Mellon University Michael K. Reiter University of North Carolina.
OceanStore: An Infrastructure for Global-Scale Persistent Storage John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels,
Chapter 6 Electronic Mail Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI 1.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
Practical Byzantine Fault Tolerance
Byzantine fault-tolerance COMP 413 Fall Overview Models –Synchronous vs. asynchronous systems –Byzantine failure model Secure storage with self-certifying.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
OceanStore: An Architecture for Global- Scale Persistent Storage.
1 JTE HPC/FS Pastis: a peer-to-peer file system for persistant large-scale storage Jean-Michel Busca Fabio Picconi Pierre Sens LIP6, Université Paris 6.
Effective Replica Maintenance for Distributed Storage Systems USENIX NSDI’ 06 Byung-Gon Chun, Frank Dabek, Andreas Haeberlen, Emil Sit, Hakim Weatherspoon,
Toward Achieving Tapeless Backup at PB Scales Hakim Weatherspoon University of California, Berkeley Frontiers in Distributed Information Systems San Francisco.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
SECURITY IN DISTRIBUTED FILE SYSTEMS Tejaswini Kalluri, Venkata Prudhvi Raj Konda, Kanna Karri.
Outline for Today’s Lecture Administrative: –Happy Thanksgiving –Sign up for demos. Objective: –Peer-to-peer file systems Mechanisms employed Issues Some.
1 JTE HPC/FS Pastis: a peer-to-peer file system for persistant large-scale storage Jean-Michel Busca Fabio Picconi Pierre Sens LIP6, Université Paris 6.
Security of the Internet of Things: perspectives and challenges
2013Prof. Reuven Aviv, Mail Security1 Pretty Good Privacy (PGP) Prof. Reuven Aviv Dept. of Computer Science Tel Hai Academic College.
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
OceanStore : An Architecture for Global-Scale Persistent Storage Jaewoo Kim, Youngho Yi, Minsik Cho.
OceanStore: An Architecture for Global-Scale Persistent Storage
Accessing nearby copies of replicated objects
Providing Secure Storage on the Internet
OceanStore: Data Security in an Insecure world
Pond: the OceanStore Prototype
OceanStore: An Architecture for Global-Scale Persistent Storage
Content Distribution Network
Outline for today Oceanstore: An architecture for Global-Scale Persistent Storage – University of California, Berkeley. ASPLOS 2000 Feasibility of a Serverless.
Presentation transcript:

Pond: the OceanStore Prototype Sean Rhea, Patric Eaton, Dennis Gells, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz University of California, Berkeley Proc. of the 2 nd USENIX Conf. On File and Storage Technologies (FAST ‘03) Presented by Park, Seon-Yeong

2/26 Ubiquitous Computing Telephone SPO Watch PDA Cell Phone Digital TV PC Storage Pool

3/26 OceanStore Overview Internet-scale, Cooperative File System Application Calendars, , Contact Lists, Large Digital Libraries, Repositories for Scientific Data, Distributed Design Tool, etc. Requirements Universal Availability Durability Understandable Consistency Model Privacy vs. Information Sharing

4/26 Data Model (1/2) Data Object A File in a Traditional File System Named by an Active Globally-Unique Identifier, AGUID –Location Independent –Preventing Name Space Collisions SHA-1 AGUID Application-specified Name + Owner’s Public Key

5/26 Data Model (2/2) Data Object Sequences of Read-only Versions Block Reference –Cryptographically-secure Hash of Child Block’s Contents

6/26 Underlying Technology Access Control Data Update Primary Replica Archival Storage Secondary Replica Data Read Data Location & Routing ;Tapestry

7/26 Access Control Reader Restriction Encrypt All Data Distribute Encryption Key to Users with Read Permission Writer Restriction Access Control List (ACL) for an Object All Writes be Signed so that Well-behaved Servers and Clients Verify them based on the ACL

8/26 Underlying Technology Access Control Data Update Primary Replica Archival Storage Secondary Replica Data Read Data Location & Routing

9/26 Data Update (1/2) Update Adding a New Version to the Head of Version Stream Array of Potential Actions each Guarded by a Predicate –Predicate Examples Checking Latest Version_Num, Comparing a Region of Bytes to an Expected Value, etc. –Action Examples Replacing a Set of Bytes, Appending New Data, Truncating the Object, etc. Timestamp Client ID... Client Signature

10/26 Data Update (2/2) Application Primary Replica (Inner Ring) Archival Storages Application Secondary Replica Secondary Replica

11/26 Primary Replica Inner Ring A Set of Servers that Implement Object’s Primary Replica Applies Updates and Creates New Versions –Serialization –Access Control –Create Archival Fragments Update Agreements –Byzantine Agreement Protocol Distributed Decision Process in which All Non-faulty Participants Reach the Same Decision for a Group of Size 3 f +1, no more than f Faulty Servers

12/26 Archival Storage Simple Replication Tolerance of One Failure for an Addition 100% Storage Cost Erasure Codes Efficient and Stable Storage for Archival Copies Storage Cost by a Factor of N/M Original Block can be Reconstructed from Any M Fragments Block Fragment 1 Fragment 2 Fragment N... Fragment 1 Fragment 2 Fragment M... Encoded by Erasure Code M < N Fragment 3

13/26 Secondary Replica Whole-block Caching to Avoid Erasure Codes on Frequently-read Objects Push-based Update Every Time the Primary Replica Applies an Update Dissemination Tree Application-level Multicast Tree Rooted at Primary Replica Parent Nodes are Pre-existing Replicas to Serve Objects

14/26 Underlying Technology Access Control Data Update Primary Replica Archival Storage Secondary Replica Data Read Data Location & Routing

15/26 Data Read Application Primary Replica (Inner Ring) Archival Storages Secondary Replica 1. AGUID 2. Latest VGUID 3. Search Blocks from Secondary Replicas 4. Search enough Fragments from Archival Storages

16/26 Underlying Technology Access Control Data Update Primary Replica Archival Storage Secondary Replica Data Read Data Location & Routing

17/26 Data Location & Routing (1/4) Tapestry Decentralized Object Location and Routing System Using Globally Unique Identifier (GUID) to Hosts and Resources Location Independent Locality Aware

18/26 Data Location & Routing (2/4) Routing Example Messages are Routed to the Destination ID Digit by Digit ***8=>**98=>*598=>4598 B4F BB CA E D L1 L2 L3 L4 L2 L4 L3 L1

19/26 Data Location & Routing (3/4) Location Independent & Locality Aware L1 L2 L3 L4 L2 L4 L3 Replica Location Pointer L1

20/26 Data Location & Routing (4/4) Routing Table

21/26 Prototype Prototype Software Architecture

22/26 Experimental Results (1/2) Update Performance

23/26 Experimental Results (2/2) Comparison with NFS Write Read Read/Write

24/26 Related Work Other Peer-to-peer File Systems PAST[Rows01] and CFS[Dabe01] –No Write Sharing IVY[Muth02], Pangaea[Sait02] –Provide Both Read and Write Sharing but, –No Single Point of Consistency

25/26 Conclusion Operational OceanStore Prototype Universally Accessible, Fault-tolerance, Security and Information Sharing Future Research Improving Performance –Efficient Threshold Schemes and Archival Data Generation Self-Maintenance Stability and Fault-tolerance Supporting More Applications

26/26 Discussion System Design Choice Security vs. Fast Response Simple vs. Complicate Design Storage Service Provider (SSP) Independent SSP vs. Confederation of Companies such as IBM, AT&T Efficient Storage Usage

27/26 Primary Replica (Ext.) Modification of Byzantine Agreement Protocol Public Key Cryptography –Symmetric-key Message Authentication Codes (MACs) for Inner Ring –Public-key Cryptography for All Other Machines Proactive Threshold Signatures –Flexibility in Choosing the Membership of Inner Ring –Single Public Key with l Private Key Shares –Any k Correctly Generated Signature Shares among l –Independent Sets of Key Shares can be Used to Control Membership Responsible Party –To Choose the Hosts that Make Up Inner Rings