Abstract
This article investigates the transient use of free local storage for improving performance in VM-based mobile computing systems implemented as thick clients on host PCs. We use the term TransientPC systems to refer to these types of systems. The solution we propose, called TransPart, uses the higher-performing local storage of host hardware to speed up performance-critical operations. Our solution constructs a virtual storage device on demand (which we call transient storage) by borrowing free disk blocks from the host’s storage. In this article, we present the design, implementation, and evaluation of a TransPart prototype, which requires no modifications to the software or hardware of a host computer. Experimental results confirm that TransPart offers low overhead and startup cost, while improving user experience.
- William A. Arbaugh, David J. Farber, and Jonathan M. Smith. 1997. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Security and Privacy (SP). Google Scholar
Digital Library
- Micah Beck, Terry Moore, and James S. Plank. 2002. An end-to-end approach to globally scalable network storage. In Proceedings of the ACM SIGCOMM Conference. Google Scholar
Digital Library
- Ramón Cáceres, Casey Carter, Chandra Narayanaswami, and Mandayam Raghunath. 2005. Reincarnating PCs with portable SoulPads. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys). Google Scholar
Digital Library
- Remy Card, Theodore Ts’o, and Stephen Tweedie. 1994. Design and implementation of the second extended filesystem. In Proceedings of the 1st Dutch International Symposium on Linux.Google Scholar
- Ramesh Chandra, Nickolai Zeldovich, Constantine Sapuntzakis, and Monica S. Lam. 2005. The Collective: A cache-based system management architecture. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation. Google Scholar
Digital Library
- James Cipar, Mark D. Corner, and Emery D. Berger. 2007. Contributing storage using the transparent file system. ACM Trans. Storage 3, 3. Google Scholar
Digital Library
- CNN. 2010. Buggy McAfee update whacks Windows XP PCs - CNN.com. http://www.cnn.com/2010/TECH/04/22/cnet.mcafee.antivirus.bug/index.html.Google Scholar
- Russell Coker. 2001. Bonnie++ home page. http://www.coker.com.au/bonnie++.Google Scholar
- devmapper. 2001. Linux Device-Mapper. Device-Mapper resource page. http://sources.redhat.com/dm/.Google Scholar
- dm-crypt. 2010. dm-crypt. dm-crypt: A device-mapper crypto target http://www.saout.de/misc/dm-crypt/.Google Scholar
- Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. 2003. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP). Google Scholar
Digital Library
- Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, and Xiaolan Zhang. 2008. Trustworthy and personalized computing on public kiosks. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, New York, NY, 199--210. DOI:http://dx.doi.org/10.1145/1378600.1378623. Google Scholar
Digital Library
- John H. Howard, Michael L. Kazar, Sherri G. Menees, David A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, and Michael J. West. 1988. Scale and performance in a distributed file system. ACM Trans. Comput. Syst. 6, 1, 51--81. DOI:http://dx.doi.org/10.1145/35037.35059. Google Scholar
Digital Library
- Sukwoo Kang and A. L. Narasimha Reddy. 2006. An approach to virtual allocation in storage systems. ACM Trans. Storage 2, 4. Google Scholar
Digital Library
- Clare-Marie Karat, Christine Halverson, Daniel Horn, and John Karat. 1999. Patterns of entry and correction in large vocabulary continuous speech recognition systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, New York, NY, 568--575. DOI:http://dx.doi.org/10.1145/302979.303160. Google Scholar
Digital Library
- Jeffrey Katcher. 1997. PostMark: A new file system benchmark. Tech. rep. TR3022. Network Appliance. http://communities.netapp.com/servlet/JiveServlet/download/2609-1551/Katcher97-postmark-netapp-tr3022.pdf.Google Scholar
- Michael Kozuch and M. Satyanarayanan. 2002. Internet suspend/resume. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications. Google Scholar
Digital Library
- Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4, 265--310. DOI:http://dx.doi.org/10.1145/138873.138874. Google Scholar
Digital Library
- Dennis Lee, Jean-Loup Baer, Brian Bershad, and Tom Anderson. 1999. Reducing startup latency in Web and desktop applications. In Proceedings of the 3rd Conference on USENIX Windows NT Symposium (WINSYM). USENIX Association, Berkeley, CA, 17--17. Google Scholar
Digital Library
- LibreOffice. 2013. LibreOffice.org - LibreOffice.org Project Home Page. http://www.libreoffice.org/.Google Scholar
- Christopher R. Lumb, Jiri Schindler, and Gregory R. Ganger. 2002. Freeblock scheduling outside of disk firmware. In Proceedings of the Conference on File and Storage Technologies (FAST). Google Scholar
Digital Library
- LVM. 2008. LVM2. LVM2 Resource Page. http://sourceware.org/lvm2/.Google Scholar
- Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. 2010. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (SP). Google Scholar
Digital Library
- Jonathan M. McCune, Bryan J. Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. 2008. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems (Eurosys). Google Scholar
Digital Library
- J. Menon, D. A. Pease, R. Rees, L. Duyanovich, and B. Hillsberg. 2003. IBM storage tank -- A heterogeneous scalable SAN file system. IBM Syst. J. 42, 2. Google Scholar
Digital Library
- MokaFive. 2010. MokaFive home page. http://www.mokafive.com.Google Scholar
- NTFSProgs. 2007. Linux-NTFS project. Linux-NTFS. http://www.linux- ntfs.org/.Google Scholar
- Nishkam Ravi, Chandra Narayanaswami, Mandayam Raghunath, and Marcel Rosu. 2007. Towards securing pocket hard drives and portable personalities. IEEE Pervasive Computing 6, 4. Google Scholar
Digital Library
- ReadyBoost. 2012. ReadyBoost - Microsoft Windows. http://windows.microsoft.com/en-US/windows7/products/features/readyboost.Google Scholar
- Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. 2004. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th Conference on USENIX Security Symposium (SSYM). USENIX Association, Berkeley. Google Scholar
Digital Library
- Constantine R. Sapuntzakis, Ramesh Chandra, Ben Pfaff, Monica S. Lain, Mendel Rosenblum, and Jim Chow. 2002. Optimizing the migration of virtual computers. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation. Google Scholar
Digital Library
- M. Satyanarayanan, Benjamin Gilbert, Matt Toups, Niraj Tolia, Ajay Surie, David R. O’Hallaron, Adam Wolbach, Jan Harkes, Adrian Perrig, David J. Farber, Michael A. Kozuch, Casey J. Helfrich, Partho Nath, and H. Andres Lagar-Cavilla. 2007. Pervasive personal computing in an Internet suspend/resume system. IEEE Internet Comput. 11, 2, 16--25. Google Scholar
Digital Library
- Emin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B. Schneider. 2011. Logical attestation: An authorization architecture for trustworthy computing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP). Google Scholar
Digital Library
- Stephen Smaldone, Benjamin Gilbert, Nilton Bila, Liviu Iftode, Eyal de Lara, and M. Satyanarayanan. 2009. Leveraging smart phones to reduce mobility footprints. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, New York, NY, 109--122. DOI:http://dx.doi.org/10.1145/1555816.1555828. Google Scholar
Digital Library
- Craig A. N. Soules, Garth R. Goodson, John D. Strunk, and Gregory R. Ganger. 2003. Metadata efficiency in versioning file systems. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA, 43--58. Google Scholar
Digital Library
- Ajay Surie, Adrian Perrig, M. Satyanarayanan, and David J. Farber. 2007. Rapid trust establishment for pervasive personal computing. IEEE Pervasive Comput. 6, 4, 24--30. DOI:http://dx.doi.org/10.1109/MPRV.2007.84. Google Scholar
Digital Library
- Richard Ta-Min, Lionel Litty, and David Lie. 2006. Splitting interfaces: Making trust between applications and operating systems configurable. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI). Google Scholar
Digital Library
- Niraj Tolia, Jan Harkes, Michael Kozuch, and M. Satyanarayanan. 2004. Integrating portable and distributed storage. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA, 227--238. Google Scholar
Digital Library
- Avishay Traeger, Erez Zadok, Nikolai Joukov, and Charles P. Wright. 2008. A nine year study of file system and storage benchmarking. Trans. Storage 4, 2, 1--56. DOI:http://dx.doi.org/10.1145/1367829.1367831. Google Scholar
Digital Library
- TrueCrypt. 2010. TrueCrypt. Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. http://www.truecrypt.org/.Google Scholar
- Theodore Ts’o. 2010. E2fsprogs: Ext2/3/4 Filesystem utilities. http://e2fsprogs.sourceforge.net/.Google Scholar
- YUM. 2010. YUM - Yellowdog Updater Modified. YUM Package Manager Project Home Page. http://yum.baseurl.org.Google Scholar
Index Terms
Optimizing Storage Performance for VM-Based Mobile Computing
Recommendations
Virtual Machine Migration Method between Different Hypervisor Implementations and Its Evaluation
WAINA '12: Proceedings of the 2012 26th International Conference on Advanced Information Networking and Applications WorkshopsVirtualization technologies are an important building block for cloud services. Each service will run on virtual machines (VMs) deployed over different hyper visors in the future. Therefore, a VM migration method between different hyper visor ...
Enabling Instantaneous Relocation of Virtual Machines with a Lightweight VMM Extension
CCGRID '10: Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid ComputingWe are developing an efficient resource management system with aggressive virtual machine (VM) relocation among physical nodes in a data center. Existing live migration technology, however, requires a long time to change the execution host of a VM, it ...
A live storage migration mechanism over wan and its performance evaluation
VTDC '09: Proceedings of the 3rd international workshop on Virtualization technologies in distributed computingLive migration of virtual machines is a key technology for the next generation of IaaS cloud services, contributing to dynamic portability and mobility of VM-based services among datacenters. The practical use of live migration, however, is still ...






Comments