ABSTRACT
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to environment changes, enabling users to store and access critical data in a continuously available and highly trustable fashion. The Hydra platform uses MDS array codes that can be encoded and decoded efficiently for distributing and recovering user data. Novel uses of MDS array codes in Hydra are discussed, as well as Hydra's design goals, general structures and a set of basic operations on user data. We also explore Hydra's applications in survivable and secure data storage systems.
- T.E. Anderson, D.E. Culler and D.A. Patterson, "A Case for NOW (Networks of Workstations)," IEEE Micro, 15(1), 54--64, 1995. Google ScholarDigital Library
- T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang, "Serverless Network File Systems", ACM Trans. on Computer Systems, 41--79, Feb. 1996. Google ScholarDigital Library
- A. Bhide, E. Elnozahy and S. Morgan, "A Highly Available Network File Server", Proc. of the Winter 1991 USENIX Technical Conf., 199-205, Jan. 1991.Google Scholar
- G. R. Blakley, "Safeguarding cryptographic keys", Proc. AFIPS 1979 Nat. Computer Conf., 313--317, June 1979.Google Scholar
- M. Blaum, J. Brady, J. Bruck and J. Menon, "EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures," IEEE Trans. on Computers, 44(2), 192--202, Feb. 1995. Google ScholarDigital Library
- V. Bohossian, C. Fan, P. LeMahieu, M. Riedel, L. Xu and J. Bruck, "Computing in the RAIN: A Reliable Array of Independent Node", IEEE Trans. on Parallel and Distributed Systems, Special Issue on Dependable Network Computing, 12(2), 99--114, Feb. 2001. Google ScholarDigital Library
- M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance", Operating Systems Review, ACM Press, NY, 173--186, 1999.Google Scholar
- P.M. Chen, E.K. Lee, G.A. Gibson, R.H. Katz, D.A. Patterson, "Raid -- High-Performance, Reliable Secondary Storage," ACM Computing Surveys, 26(2), 145--185, 1994. Google ScholarDigital Library
- G.A. Gibson and R. van Meter, "Network Attached Storage Architecture", Communications of the ACM, 43(11), 37--45, Nov. 2000. Google ScholarDigital Library
- A. Gibson, D. Stodolsky, F.W. Chang, W.V. Courtright II, C.G. Demetriou, E. Ginting, M. Holland, Q. Ma, L. Neal, R.H. Patterson, J. Su, R. Youssef and J. Zelenka, "The Scotch Parallel Storage Systems," Proceedings of the IEEE CompCon Conference, 1995. Google ScholarDigital Library
- A. V. Goldberg and P. N. Yianilos, "Towards an Archival Intermemory", Proc. of IEEE Advances in Digital Libraries, Apr. 1998. Google ScholarDigital Library
- J.H. Hartman and J.K. Ousterhout, "The Zebra Striped Network File System," ACM Transactions on Computer Systems /, 13(3), 274--310, 1995. Google ScholarDigital Library
- G. H. Kim and E. H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker", Proc. of 2nd ACM Conf. on Computer and Communication Security, 1994. Google ScholarDigital Library
- J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells and B. Zhao, "OceanStore: An Architecture for Global-Scale Persistent Storage", Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems, Nov. 2000. Google ScholarDigital Library
- E. Lee and C. Thekkath, "Petal: Distributed Virtual Disks", Proc. ACM ASPLOS, 84--92, Oct. 1996. Google ScholarDigital Library
- F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, Amsterdam: North-Holland, 1977.Google Scholar
- R. J. McEliece, D. Sarwate, "On sharing secrets and Reed-Solomon codes", Comm. ACM, 24(9), 583--584, 1981. Google ScholarDigital Library
- J. Ousterhout, A. Cherenson, F. Douglis, M. Nelson and B. Welch, "The Sprite Network Operating System", IEEE Computer, 21(2): 23--26, Feb. 1988. Google ScholarDigital Library
- J. S. Plank, M. and T. Moore, "Logistical Networking Research and the Network Storage Stack," USENIX FAST 2002, Conference on File and Storage Technologies, work in progress report, January, 2002.Google Scholar
- M. Rabin, "Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance", J. ACM, 32(4), 335--348, Apr. 1989. Google ScholarDigital Library
- I. S. Reed and G. Solomon, "Polynomial Codes over Certain Finite Fields", J. SIAM, 8(10), 300--304, 1960.Google Scholar
- M. Satyanarayanan, "Scalable, Secure and Highly Available Distributed File Access", IEEE Computer, 9-21, May 1990. Google ScholarDigital Library
- M. Satyanarayanan, J.J. Kistler, P. Kumar, M.E. Okasaki, E.H. Siegel and D.C. Steere, "CODA - A Highly Available File System for a Distributed Workstation Environment," IEEE Transactions on Computers, 39(4), 447--459, 1990. Google ScholarDigital Library
- A. Shamir, "How to Share a Secret", Comm. ACM, 612-613, Nov. 1979. Google ScholarDigital Library
- SUN Microsystems, Inc. NFS: Network File System version 3 Protocol Specification, Feb. 1994.Google Scholar
- M. Waldman, A. D. Rubin and L. F. Cranor, "Publius: A robust, tamper-evident, censorship-resistant, web publishing system", Proc. 9th USENIX Security Symposium, 59-72, Aug. 2000. Online at: http://www.cs.nyu.edu/~waldman/publius/publius.pdf Google ScholarDigital Library
- J. J. Wylie, M. W. Bigrigg, J. D. Strunk. G. R. Ganger, H. Kiliccote and P. K. Khosla, "Survivable Information Storage Systems", IEEE Computer, 33(8), 61-68, Aug. 2000. Google ScholarDigital Library
- L. Xu and J. Bruck, "X-Code: MDS Array Codes with Optimal Encoding," IEEE Trans. on Information Theory, 45(1), 272--276, Jan., 1999. Google ScholarDigital Library
- L. Xu, V. Bohossian, J. Bruck and D. Wagner, "Low Density MDS Codes and Factors of Complete Graphs," IEEE Trans. on Information Theory, 45(1), 1817-1826, Nov. 1999. Google ScholarDigital Library
Index Terms
- Hydra: a platform for survivable and secure data storage systems
Recommendations
POTSHARDS: Storing Data for the Long-term Without Encryption
SISW '05: Proceedings of the Third IEEE International Security in Storage WorkshopMany archival storage systems rely on keyed encryption to ensure privacy. A data object in such a system is exposed once the key used to encrypt the data is compromised. When storing data for as long as a few decades or centuries, the use of keyed ...
Long-term threats to secure archives
StorageSS '06: Proceedings of the second ACM workshop on Storage security and survivabilityArchival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to traditional storage systems in which data lifetimes are measured in months or ...
Key Management for Encrypted Data Storage in Distributed Systems
SISW '03: Proceedings of the Second IEEE International Security in Storage WorkshopConfidential data stored on mass storage devices is atrisk to be disclosed to persons getting physical or administratoraccess to the device. Encrypting the data reducesthis risk, at the cost of more cumbersome administration.In this publication, we ...
Comments