Abstract
Existing backup systems are unsatisfactory: commercial backup services are reliable but expensive while peer-to-peer systems are cheap but offer limited assurance of data reliability. This article introduces Friendstore, a system that provides inexpensive and reliable backup by giving users the choice to store backup data only on nodes they trust (typically those owned by friends and colleagues). Because it is built on trusted nodes, Friendstore is not burdened by the complexity required to cope with potentially malicious participants. Friendstore only needs to detect and repair accidental data loss and to ensure balanced storage exchange. The disadvantage of using only trusted nodes is that Friendstore cannot achieve perfect storage utilization.
Friendstore is designed for a heterogeneous environment where nodes have very different access link speeds and available disk spaces. To ensure long-term data reliability, a node with limited upload bandwidth refrains from storing more data than its calculated maintainable capacity. A high bandwidth node might be limited by its available disk space. We introduce a simple coding scheme, called XOR(1,2), which doubles a node's ability to store backup information in the same amount of disk space at the cost of doubling the amount of data transferred during restore. Analysis and simulations using long-term node activity traces show that a node can reliably back up tens of gigabytes of data even with low upload bandwidth.
- Adya, A., Bolosky, W., Castro, M., Cermak, G., Chaiken, R., Douceur, J., Howell, J., Lorch, J., Theimer, M., and Wattenhofer , R. 2002. FARsite: Federated available and reliable storage for incompletely trusted environments. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation. Google Scholar
Digital Library
- Aiyer, A., Avisi, L., Clement, A., Dahlin, M., Martin, J., and Porth, C. 2005. Bar tolerance for cooperative services. In Proceedings of the Symposium on Operating Systems Principles (SOSP). Google Scholar
Digital Library
- Baker, M., Shah, M., Rosenthal, D., Roussopoulos, M., Maniatis, P., Giuli, T. J., and Bungale, P. 2006. A fresh look at the reliability of long-term digital storage. In Proceedings of the SIGOPS European Conference on Computer Systems (Euro-Sys). Google Scholar
Digital Library
- Batten, C., Barr, K., Saraf, A., and Trepetin, S. 2002. pstore: A secure peer-to-peer backup system. Tech. rep. MIT-LCS-TM-632, Massachusetts Institute of Technology.Google Scholar
- Bhagwan, R., Tati, K., Cheng, Y., Savage, S., and Voelker, G. M. 2004. Totalrecall: System support for automated availability management. In Proceedings of the ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI). Google Scholar
Digital Library
- Blake, C. and Rodrigues, R. 2003. High availability, scalable storage, dynamic peer networks: Pick two. In Proceedings of the 9th Workshop on Hot Topics in Operating Systems. Google Scholar
Digital Library
- Bolosky, W., Douceur, J., Ely, D., and Theimer, M. 2000. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS). Google Scholar
Digital Library
- Bowers, K. D., Juels, A., and Oprea, A. 2009a. Hail: A high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). ACM, New York, NY, 187--198. Google Scholar
Digital Library
- Bowers, K. D., Juels, A., and Oprea, A. 2009b. Proofs of retrievability: Theory and implementation. In Proceedings of the ACM Workshop on Cloud Computing Security (CCSW). ACM, New York, NY, 43--54. Google Scholar
Digital Library
- Chang, F., Ji, M., Leung, S.-T., Maccormick, J., Perl, S., and Zhang, L. 2002. Myraid: Cost-effective disaster tolerance. In Proceedings of the 1st USENIX Conference on File and STorage Technologies. Google Scholar
Digital Library
- Chun, B.-G., Dabek , F., Haeberlen, Sit, E., Weatherspoon, H., Kaashoek, M. F., and Morris, R. 2006. Efficient replica maintenance for distributed storage systems. In Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI). Google Scholar
Digital Library
- Cohen, B. 2002. Incentives build robustness in bitTorrent. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems.Google Scholar
- Cox, L. P., Murrary, C., and Noble, B. 2002. Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI). Google Scholar
Digital Library
- Cox, L. P. and Noble, B. 2003. Samsara: Honor among thieves in peer-to-peer storage. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP). Google Scholar
Digital Library
- Crashplan. Crashplan: Automatic offsite backup. http://www.crashplan.com//.Google Scholar
- Dabek, F., Kaashoek, M. F., Li, J., Morris, R., Robertson, J., and Sit, E. 2004. Designing a DHT for low latency and high throughput. In Proceedings of the 1st ACM Symposium on Networked Systems Design and Implementation (NSDI). Google Scholar
Digital Library
- Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. 1986. Spki certificate theory. Internet RFC 2693 http://www.cis.ohio-state.edu/htbin/rfc/rfc2693.html. Google Scholar
Digital Library
- Ford, B., Strauss, J., Lesniewski-Laas, C., Rhea, S., Kaashoek, F., and Morris, R. 2006. Persistent personal names for globally connected mobile devices. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI). Google Scholar
Digital Library
- Fu,Y., Chase, J. S., Chun, B., Schwab, S., and Vahdat, A. 2003. In Proceedings of the 19th ACM Symposium on Operating System Principles (SOSP).Google Scholar
- Garriss, S., Kaminsky, M., Fredman, M. J., Karp, B., Mazires, D., and Yu, H. 2006. Re: reliable email. In Proceedings of the 3rd Symposium on Networked System Design and Implementation (NSDI). Google Scholar
Digital Library
- Gibson, G. and Patterson, D. 1993. Designing disk arrays for high data reliability. J. Parallel Distrib. Comput. 17, 1--2, 4--27. Google Scholar
Digital Library
- Haeberlen, A., Mislove, A., and Druschel, P. 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI). Google Scholar
Digital Library
- Hogg, T. and Adamic, L . 2004. Enhancing reputation mechanisms via online social networks. In Proceedings of the 5th ACM Conference on Electronic Commerce. Google Scholar
Digital Library
- Huang, C., Li, J., and Ross, K. 2007. Can Internet video-on-demand be profitable? In Proceedings of the ACM SIGCOMM Data Communications Festival. Google Scholar
Digital Library
- Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. 2003. The eigentrust algorithm for reputation management in p2p networks. InProceedings of the 12th International Conference on World Wide Web (WWW). ACM, New York, NY, 640--651. Google Scholar
Digital Library
- Kotla, R., Alvisi, L., and Dahlin, M. 2007. Safestore: A durable and practical storage system. In Proceedings of the USENIX Annual Technical Conference. Google Scholar
Digital Library
- Krohn, M., Freedman, M., and Mazires, D. 2004. On-the-fiy verification of rateless erasure codes for efficient content distribution. In Proceedings of the IEEE Symposium on Security and Privacy.Google Scholar
- Li, H., Clement, A., Wong, E., Napper, J., Roy, I., Alvisi, L., and Dahlin, M. 2006. BAR gossip. In Proceedings of USENIX Operating Systems Design and Implementation (OSDI). Google Scholar
Digital Library
- Li, J. and Dabek, F. 2006. F2f: reliable storage in open networks. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems (IPTPS).Google Scholar
- Lillibridge, M., Elnikety, S., Birrel, A., and Burrows, M. 2003. A cooperative Internet backup scheme. In Proceedings of the USENIX Annual Technical Conference. Google Scholar
Digital Library
- Maniatis, P., Roussopoulos, M., Giuli, T., Rosenthal, D. S. H., and Baker, M. 2005. The LOCKSS peer-to-peer digital preservation system. ACM Trans. Comput. Syst. 23. Google Scholar
Digital Library
- Marti, S., Ganesan, P., and Garcia-Molina, H. 2004. DHT routing using social links. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS). Google Scholar
Digital Library
- Mislove, A., Gummadi, K. P., and Druschel, P. 2006. Exploiting social networks for Internet search. In Proceedings of the 5th Workshop on Hot Topics in Networks (HotNets).Google Scholar
- Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., and Bhattacharjee, B. 2007. Measurement and analysis of online social networks. InProceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC). 29--42. Google Scholar
Digital Library
- Muthitacharoen, A., Chen, B., and Mazires, D. 2001. A low-bandwidth network file system. In Proceedings of the 18th Symposium on Operating Systems Principles (SOSP). Google Scholar
Digital Library
- Ngan, T.-W., Wallach, D., and Druschel, P. 2003. Enforcing fair sharing of peer-to-peer resources. In Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS).Google Scholar
- Patterson, D., Gibson, G., and Katz, R. 1988. A case for redundant arrays of inexpensive disks (raid). In Proceedings of the ACM SIGMOD International Conference on Management of Data. Google Scholar
Digital Library
- Pinheiro, E., Weber, W.-D., and Barroso, L. A. 2007. Failure trends in a large disk drive population. In Proceedings of the 5th Usenix Conference on File and Storage Technologies (FAST). Google Scholar
Digital Library
- Plank, J. S., Buchsbaum, A. L., Collins, R. L., and Thomason, M. G. 2005. Small parity-check erasure codes-exploration and observations. In Proceedings of the IEEE International Conference on Dependable Systems and Networks (DSN). Google Scholar
Digital Library
- Popescu, B. C., Crispo, B., and Tanenbaum, A. S. 2004. Safe and private data sharing with turtle: Friends team-up and beat the system. In Proceedings of the 12th Cambridge International Workshop on Security Protocols. Google Scholar
Digital Library
- Ramabhadran, S. and Pasquale, J. 2006. Analysis of long-running replicated systems. In Proceedings of the 25th IEEE Conference on Computer Communications (INFOCOM).Google Scholar
- Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B., and Kubiatowicz, J. 2003. Pond: The oceanstore prototype. In Proceedings of the USENIX Conference on File and Storage Technologies. Google Scholar
Digital Library
- Rhea, S., Godfrey, B., Karp, B., Kubiatowicz, J., Ratnasamy, S., Shenker, S., Stoica, I., and Yu, H. 2005. OpenDHT: A public DHT service and its uses. InProceedings of the ACM SIGCOMM Conference on Internet Measurement (IMC). Google Scholar
Digital Library
- Rowstron, A. and Druschel, P. 2001a. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware). Google Scholar
Digital Library
- Rowstron, A. and Druschel, P. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP). Google Scholar
Digital Library
- Sabater, J. and Sierra, C. 2002. Social ReGreT, a reputation model based on social relations. ACM SIGecom ExChanges 3, 1, 44--56. Google Scholar
Digital Library
- Schroeder, B. and Gibson, G. 2007. Disk failures in the real world: What does an MTTF of 1,000,000 hours mean too you? In Proceedings of the 5th Usenix Conference on File and Storage Technologies (FAST). Google Scholar
Digital Library
- So, K. and Sirer, E. G. 2007. Latency and bandwidth-minimizing failure detectors. In Proceedings of the European Conference on Computer Systems (EuroSys). Google Scholar
Digital Library
- Storer, M. W., Greenan, K. M., Miller, E. L., and Voruganti, K. 2007. Potshards: Secure long-term storage without encryption. In Proceedings of the USENIX Annual Technical Conference. 142--156. Google Scholar
Digital Library
- Tati, K. and Voelker, G. 2006. On object maintenance in peer-to-peer systems. In Proceedings of the 5th International Workshop on Peer-to-peer systems (IPTPS).Google Scholar
- Toivonen, R., Onnela, J.-P., Saramäki, J., Hyvönen, J., and Kaski, K. 2006. A model for social networks. Physica: Statis. Mech. Appl. 371, 2, 851--860.Google Scholar
Cross Ref
- Tran, D. N., Chiang, F., and Li, J. 2008. Friendstore: Cooperative online backup using trusted nodes. In Proceedings of the 1st International Workshop on Social Network Systems (SocialNet). Google Scholar
Digital Library
- Yang, M., Chen, H., Zhao, B. Y., Dai, Y., and Zhang, Z. 2004. Deployment of a large-scale peer-to-peer social network. In Proceedings of USENIX WORLDS.Google Scholar
Index Terms
Efficient cooperative backup with decentralized trust management
Recommendations
Towards a delivery scheme for speedup of data backup in distributed storage systems using erasure codes
Distributed storage systems, built on peer-to-peer networks, can provide large-scale data storage and high data reliability by redundancy. Data backup is the process to store data into a set of redundant storage nodes. Rapid completion of such a process ...
Load-Balanced Recovery Schemes for Single-Disk Failure in Storage Systems with Any Erasure Code
ICPP '13: Proceedings of the 2013 42nd International Conference on Parallel ProcessingAs increasingly growing volume of data demanding high reliability are stored in disk arrays protected by erasure code, various codes with different error detection and correction capabilities are proposed. For higher reliability, codes that can correct ...
A Stack-Based Single Disk Failure Recovery Scheme for Erasure Coded Storage Systems
SRDS '14: Proceedings of the 2014 IEEE 33rd International Symposium on Reliable Distributed SystemsThe fast growing of data scale encourages the wide employment of data disks with large storage capacity. However, a mass of data disks' equipment will in turn increase the probability of data loss or damage, because of the appearance of various kinds of ...








Comments