skip to main content
10.1145/1103780.1103797acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Hydra: a platform for survivable and secure data storage systems

Published:11 November 2005Publication History

ABSTRACT

This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to environment changes, enabling users to store and access critical data in a continuously available and highly trustable fashion. The Hydra platform uses MDS array codes that can be encoded and decoded efficiently for distributing and recovering user data. Novel uses of MDS array codes in Hydra are discussed, as well as Hydra's design goals, general structures and a set of basic operations on user data. We also explore Hydra's applications in survivable and secure data storage systems.

References

  1. T.E. Anderson, D.E. Culler and D.A. Patterson, "A Case for NOW (Networks of Workstations)," IEEE Micro, 15(1), 54--64, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang, "Serverless Network File Systems", ACM Trans. on Computer Systems, 41--79, Feb. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Bhide, E. Elnozahy and S. Morgan, "A Highly Available Network File Server", Proc. of the Winter 1991 USENIX Technical Conf., 199-205, Jan. 1991.Google ScholarGoogle Scholar
  4. G. R. Blakley, "Safeguarding cryptographic keys", Proc. AFIPS 1979 Nat. Computer Conf., 313--317, June 1979.Google ScholarGoogle Scholar
  5. M. Blaum, J. Brady, J. Bruck and J. Menon, "EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures," IEEE Trans. on Computers, 44(2), 192--202, Feb. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. V. Bohossian, C. Fan, P. LeMahieu, M. Riedel, L. Xu and J. Bruck, "Computing in the RAIN: A Reliable Array of Independent Node", IEEE Trans. on Parallel and Distributed Systems, Special Issue on Dependable Network Computing, 12(2), 99--114, Feb. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance", Operating Systems Review, ACM Press, NY, 173--186, 1999.Google ScholarGoogle Scholar
  8. P.M. Chen, E.K. Lee, G.A. Gibson, R.H. Katz, D.A. Patterson, "Raid -- High-Performance, Reliable Secondary Storage," ACM Computing Surveys, 26(2), 145--185, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. G.A. Gibson and R. van Meter, "Network Attached Storage Architecture", Communications of the ACM, 43(11), 37--45, Nov. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Gibson, D. Stodolsky, F.W. Chang, W.V. Courtright II, C.G. Demetriou, E. Ginting, M. Holland, Q. Ma, L. Neal, R.H. Patterson, J. Su, R. Youssef and J. Zelenka, "The Scotch Parallel Storage Systems," Proceedings of the IEEE CompCon Conference, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. V. Goldberg and P. N. Yianilos, "Towards an Archival Intermemory", Proc. of IEEE Advances in Digital Libraries, Apr. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J.H. Hartman and J.K. Ousterhout, "The Zebra Striped Network File System," ACM Transactions on Computer Systems /, 13(3), 274--310, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. H. Kim and E. H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker", Proc. of 2nd ACM Conf. on Computer and Communication Security, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells and B. Zhao, "OceanStore: An Architecture for Global-Scale Persistent Storage", Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems, Nov. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E. Lee and C. Thekkath, "Petal: Distributed Virtual Disks", Proc. ACM ASPLOS, 84--92, Oct. 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, Amsterdam: North-Holland, 1977.Google ScholarGoogle Scholar
  17. R. J. McEliece, D. Sarwate, "On sharing secrets and Reed-Solomon codes", Comm. ACM, 24(9), 583--584, 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Ousterhout, A. Cherenson, F. Douglis, M. Nelson and B. Welch, "The Sprite Network Operating System", IEEE Computer, 21(2): 23--26, Feb. 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. S. Plank, M. and T. Moore, "Logistical Networking Research and the Network Storage Stack," USENIX FAST 2002, Conference on File and Storage Technologies, work in progress report, January, 2002.Google ScholarGoogle Scholar
  20. M. Rabin, "Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance", J. ACM, 32(4), 335--348, Apr. 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. I. S. Reed and G. Solomon, "Polynomial Codes over Certain Finite Fields", J. SIAM, 8(10), 300--304, 1960.Google ScholarGoogle Scholar
  22. M. Satyanarayanan, "Scalable, Secure and Highly Available Distributed File Access", IEEE Computer, 9-21, May 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Satyanarayanan, J.J. Kistler, P. Kumar, M.E. Okasaki, E.H. Siegel and D.C. Steere, "CODA - A Highly Available File System for a Distributed Workstation Environment," IEEE Transactions on Computers, 39(4), 447--459, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Shamir, "How to Share a Secret", Comm. ACM, 612-613, Nov. 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. SUN Microsystems, Inc. NFS: Network File System version 3 Protocol Specification, Feb. 1994.Google ScholarGoogle Scholar
  26. M. Waldman, A. D. Rubin and L. F. Cranor, "Publius: A robust, tamper-evident, censorship-resistant, web publishing system", Proc. 9th USENIX Security Symposium, 59-72, Aug. 2000. Online at: http://www.cs.nyu.edu/~waldman/publius/publius.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. J. J. Wylie, M. W. Bigrigg, J. D. Strunk. G. R. Ganger, H. Kiliccote and P. K. Khosla, "Survivable Information Storage Systems", IEEE Computer, 33(8), 61-68, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. L. Xu and J. Bruck, "X-Code: MDS Array Codes with Optimal Encoding," IEEE Trans. on Information Theory, 45(1), 272--276, Jan., 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. L. Xu, V. Bohossian, J. Bruck and D. Wagner, "Low Density MDS Codes and Factors of Complete Graphs," IEEE Trans. on Information Theory, 45(1), 1817-1826, Nov. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hydra: a platform for survivable and secure data storage systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability
        November 2005
        150 pages
        ISBN:159593233X
        DOI:10.1145/1103780

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 November 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader