skip to main content
research-article

Optimizing Storage Performance for VM-Based Mobile Computing

Published:01 May 2013Publication History
Skip Abstract Section

Abstract

This article investigates the transient use of free local storage for improving performance in VM-based mobile computing systems implemented as thick clients on host PCs. We use the term TransientPC systems to refer to these types of systems. The solution we propose, called TransPart, uses the higher-performing local storage of host hardware to speed up performance-critical operations. Our solution constructs a virtual storage device on demand (which we call transient storage) by borrowing free disk blocks from the host’s storage. In this article, we present the design, implementation, and evaluation of a TransPart prototype, which requires no modifications to the software or hardware of a host computer. Experimental results confirm that TransPart offers low overhead and startup cost, while improving user experience.

References

  1. William A. Arbaugh, David J. Farber, and Jonathan M. Smith. 1997. A secure and reliable bootstrap architecture. In Proceedings of the IEEE Symposium on Security and Privacy (SP). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Micah Beck, Terry Moore, and James S. Plank. 2002. An end-to-end approach to globally scalable network storage. In Proceedings of the ACM SIGCOMM Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ramón Cáceres, Casey Carter, Chandra Narayanaswami, and Mandayam Raghunath. 2005. Reincarnating PCs with portable SoulPads. In Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Remy Card, Theodore Ts’o, and Stephen Tweedie. 1994. Design and implementation of the second extended filesystem. In Proceedings of the 1st Dutch International Symposium on Linux.Google ScholarGoogle Scholar
  5. Ramesh Chandra, Nickolai Zeldovich, Constantine Sapuntzakis, and Monica S. Lam. 2005. The Collective: A cache-based system management architecture. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. James Cipar, Mark D. Corner, and Emery D. Berger. 2007. Contributing storage using the transparent file system. ACM Trans. Storage 3, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. CNN. 2010. Buggy McAfee update whacks Windows XP PCs - CNN.com. http://www.cnn.com/2010/TECH/04/22/cnet.mcafee.antivirus.bug/index.html.Google ScholarGoogle Scholar
  8. Russell Coker. 2001. Bonnie++ home page. http://www.coker.com.au/bonnie++.Google ScholarGoogle Scholar
  9. devmapper. 2001. Linux Device-Mapper. Device-Mapper resource page. http://sources.redhat.com/dm/.Google ScholarGoogle Scholar
  10. dm-crypt. 2010. dm-crypt. dm-crypt: A device-mapper crypto target http://www.saout.de/misc/dm-crypt/.Google ScholarGoogle Scholar
  11. Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenblum, and Dan Boneh. 2003. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Scott Garriss, Ramón Cáceres, Stefan Berger, Reiner Sailer, Leendert van Doorn, and Xiaolan Zhang. 2008. Trustworthy and personalized computing on public kiosks. In Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, New York, NY, 199--210. DOI:http://dx.doi.org/10.1145/1378600.1378623. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. John H. Howard, Michael L. Kazar, Sherri G. Menees, David A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, and Michael J. West. 1988. Scale and performance in a distributed file system. ACM Trans. Comput. Syst. 6, 1, 51--81. DOI:http://dx.doi.org/10.1145/35037.35059. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sukwoo Kang and A. L. Narasimha Reddy. 2006. An approach to virtual allocation in storage systems. ACM Trans. Storage 2, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Clare-Marie Karat, Christine Halverson, Daniel Horn, and John Karat. 1999. Patterns of entry and correction in large vocabulary continuous speech recognition systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, New York, NY, 568--575. DOI:http://dx.doi.org/10.1145/302979.303160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Jeffrey Katcher. 1997. PostMark: A new file system benchmark. Tech. rep. TR3022. Network Appliance. http://communities.netapp.com/servlet/JiveServlet/download/2609-1551/Katcher97-postmark-netapp-tr3022.pdf.Google ScholarGoogle Scholar
  17. Michael Kozuch and M. Satyanarayanan. 2002. Internet suspend/resume. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4, 265--310. DOI:http://dx.doi.org/10.1145/138873.138874. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Dennis Lee, Jean-Loup Baer, Brian Bershad, and Tom Anderson. 1999. Reducing startup latency in Web and desktop applications. In Proceedings of the 3rd Conference on USENIX Windows NT Symposium (WINSYM). USENIX Association, Berkeley, CA, 17--17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. LibreOffice. 2013. LibreOffice.org - LibreOffice.org Project Home Page. http://www.libreoffice.org/.Google ScholarGoogle Scholar
  21. Christopher R. Lumb, Jiri Schindler, and Gregory R. Ganger. 2002. Freeblock scheduling outside of disk firmware. In Proceedings of the Conference on File and Storage Technologies (FAST). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. LVM. 2008. LVM2. LVM2 Resource Page. http://sourceware.org/lvm2/.Google ScholarGoogle Scholar
  23. Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. 2010. TrustVisor: Efficient TCB reduction and attestation. In Proceedings of the IEEE Symposium on Security and Privacy (SP). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jonathan M. McCune, Bryan J. Parno, Adrian Perrig, Michael K. Reiter, and Hiroshi Isozaki. 2008. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems (Eurosys). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. J. Menon, D. A. Pease, R. Rees, L. Duyanovich, and B. Hillsberg. 2003. IBM storage tank -- A heterogeneous scalable SAN file system. IBM Syst. J. 42, 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. MokaFive. 2010. MokaFive home page. http://www.mokafive.com.Google ScholarGoogle Scholar
  27. NTFSProgs. 2007. Linux-NTFS project. Linux-NTFS. http://www.linux- ntfs.org/.Google ScholarGoogle Scholar
  28. Nishkam Ravi, Chandra Narayanaswami, Mandayam Raghunath, and Marcel Rosu. 2007. Towards securing pocket hard drives and portable personalities. IEEE Pervasive Computing 6, 4. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. ReadyBoost. 2012. ReadyBoost - Microsoft Windows. http://windows.microsoft.com/en-US/windows7/products/features/readyboost.Google ScholarGoogle Scholar
  30. Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. 2004. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th Conference on USENIX Security Symposium (SSYM). USENIX Association, Berkeley. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Constantine R. Sapuntzakis, Ramesh Chandra, Ben Pfaff, Monica S. Lain, Mendel Rosenblum, and Jim Chow. 2002. Optimizing the migration of virtual computers. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. M. Satyanarayanan, Benjamin Gilbert, Matt Toups, Niraj Tolia, Ajay Surie, David R. O’Hallaron, Adam Wolbach, Jan Harkes, Adrian Perrig, David J. Farber, Michael A. Kozuch, Casey J. Helfrich, Partho Nath, and H. Andres Lagar-Cavilla. 2007. Pervasive personal computing in an Internet suspend/resume system. IEEE Internet Comput. 11, 2, 16--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Emin Gün Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B. Schneider. 2011. Logical attestation: An authorization architecture for trustworthy computing. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Stephen Smaldone, Benjamin Gilbert, Nilton Bila, Liviu Iftode, Eyal de Lara, and M. Satyanarayanan. 2009. Leveraging smart phones to reduce mobility footprints. In Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services (MobiSys). ACM, New York, NY, 109--122. DOI:http://dx.doi.org/10.1145/1555816.1555828. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Craig A. N. Soules, Garth R. Goodson, John D. Strunk, and Gregory R. Ganger. 2003. Metadata efficiency in versioning file systems. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA, 43--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ajay Surie, Adrian Perrig, M. Satyanarayanan, and David J. Farber. 2007. Rapid trust establishment for pervasive personal computing. IEEE Pervasive Comput. 6, 4, 24--30. DOI:http://dx.doi.org/10.1109/MPRV.2007.84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Richard Ta-Min, Lionel Litty, and David Lie. 2006. Splitting interfaces: Making trust between applications and operating systems configurable. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI). Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Niraj Tolia, Jan Harkes, Michael Kozuch, and M. Satyanarayanan. 2004. Integrating portable and distributed storage. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA, 227--238. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Avishay Traeger, Erez Zadok, Nikolai Joukov, and Charles P. Wright. 2008. A nine year study of file system and storage benchmarking. Trans. Storage 4, 2, 1--56. DOI:http://dx.doi.org/10.1145/1367829.1367831. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. TrueCrypt. 2010. TrueCrypt. Free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. http://www.truecrypt.org/.Google ScholarGoogle Scholar
  41. Theodore Ts’o. 2010. E2fsprogs: Ext2/3/4 Filesystem utilities. http://e2fsprogs.sourceforge.net/.Google ScholarGoogle Scholar
  42. YUM. 2010. YUM - Yellowdog Updater Modified. YUM Package Manager Project Home Page. http://yum.baseurl.org.Google ScholarGoogle Scholar

Index Terms

  1. Optimizing Storage Performance for VM-Based Mobile Computing

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Article Metrics

          • Downloads (Last 12 months)8
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!