Data Storage Solutions for Decentralized Online Social Networks
|
|
|
- Harriet McDaniel
- 10 years ago
- Views:
Transcription
1 Data Storage Solutions for Decentralized Online Social Networks Anwitaman Datta S* Aspects of Networked & Distributed Systems (SANDS)! School of Computer Engineering NTU Singapore isocial Summer School, KTH Stockholm
2 SANDS recommenda7on&and& decision&support&systems& & decentralized&online&social& networking&and&collabora7on& & Applica'ons) privacy&aware/preserved&data& aggrega7on,&storage,&sharing&& &&analy7cs/data:mining& data/computa7on&&at&& 3 rd &party/outsourced& distributed&key:value&stores& data:center& design& & P2P/F2F& storage& systems& networked&distributed&storage&& &&data&management&systems& (Distributed)))Systems) social& network& analysis& trust& models& & secure/privacy& preserved&computa7on& primi7ves& codes&for& storage& & Founda'onal)
3 DOSNish research at SANDS
4 DOSNish research at SANDS Selective information dissemination using social links GoDisco
5 DOSNish research at SANDS Selective information dissemination using social links GoDisco Security issues Access control, Private Information Retrieval,
6 DOSNish research at SANDS Selective information dissemination using social links GoDisco Security issues Access control, Private Information Retrieval, DOSN architectures PeerSoN, SuperNova, PriSM,
7 DOSNish research at SANDS Selective information dissemination using social links GoDisco Security issues Access control, Private Information Retrieval, DOSN architectures PeerSoN, SuperNova, PriSM, P2P storage
8 DOSNish research at SANDS Selective information dissemination using social links GoDisco Security issues Access control, Private Information Retrieval, DOSN architectures PeerSoN, SuperNova, PriSM, P2P storage h"p://sands.sce.ntu.edu.sg/0
9 P2P Storage Not the same as a file-sharing system Peer-to-Peer (P2P) storage systems leverage the combined storage capacity of a network of storage devices (peers) contributed typically by autonomous end-users as a common pool of storage space to store content reliably.
10 P2P Storage
11 Design space P2P Storage
12 P2P Storage Design space Reliability: Availability & Durability (focus of this talk)
13 P2P Storage Design space Reliability: Availability & Durability (focus of this talk) Security & Privacy: Access control, integrity, freeriding, anonymity, privacy,
14 P2P Storage Design space Reliability: Availability & Durability (focus of this talk) Security & Privacy: Access control, integrity, freeriding, anonymity, privacy, Sophisticated functionalities: Concurrency, Version Control,
15 Realizing Reliability Garbage collection Diversity of online fragments Duplicates of same fragment Maintenance strategies Lazy: Randomized Lazy: Deterministic (Threshold based) Eager: Repair all Proactive Replication Reactive New codes, e.g. self-repairing codes P2P#storage# design#space# Erasure codes Redundancy type Key based (e.g., DHTs) Selective (e.g., at friends or trusted nodes, history or proximity based, etc.) Random Placement
16 Redundancy Type
17 Redundancy Type Replication
18 Redundancy Type Replication Erasure codes Data = Object O 1 O 2 Encoding B 1 B 2 B l Retrieve any k ( k) blocks Decoding O 1 O 2 Reconstruct Data O k k blocks Lost blocks Original B n k blocks n encoded blocks (stored in storage devices in a network) O k
19 Redundancy placement
20 Redundancy placement A rather complicated problem All peers are fully cooperative and altruistic, but autonomous System capacity and resource allocation Heterogeneity, Coverage: history/prediction/
21 Redundancy placement A rather complicated problem All peers are fully cooperative and altruistic, but autonomous System capacity and resource allocation Heterogeneity, Coverage: history/prediction/ Selfish/Byzantine peers: Incentives, trust, enforcement,
22 Redundancy placement A rather complicated problem All peers are fully cooperative and altruistic, but autonomous System capacity and resource allocation Heterogeneity, Coverage: history/prediction/ Selfish/Byzantine peers: Incentives, trust, enforcement, Security & privacy implications of data placement
23 Classical P2P storage systems Successor$list$ replicas) DHT$ID$space$
24 Classical P2P storage systems Distributed Hash Table (DHT) determines storage placement, e.g., CFS/ OpenDHT Successor$list$ replicas) DHT$ID$space$
25 Classical P2P storage systems Distributed Hash Table (DHT) determines storage placement, e.g., CFS/ OpenDHT Pros: Simple design, ease of locating data Successor$list$ replicas) DHT$ID$space$
26 Classical P2P storage systems Distributed Hash Table (DHT) determines storage placement, e.g., CFS/ OpenDHT Pros: Simple design, ease of locating data Cons: mixes indexing with storage Successor$list$ replicas) DHT$ID$space$
27 Classical P2P storage systems Distributed Hash Table (DHT) determines storage placement, e.g., CFS/ OpenDHT Pros: Simple design, ease of locating data Cons: mixes indexing with storage Successor$list$ high correlation of failures replicas) DHT$ID$space$
28 Classical P2P storage systems Distributed Hash Table (DHT) determines storage placement, e.g., CFS/ OpenDHT Pros: Simple design, ease of locating data Cons: mixes indexing with storage Successor$list$ high correlation of failures cannot leverage other characteristics replicas) e.g., locality, history, etc. DHT$ID$space$
29 Classical P2P storage systems Distributed Hash Table (DHT) determines storage placement, e.g., CFS/ OpenDHT Pros: Simple design, ease of locating data Cons: mixes indexing with storage Successor$list$ high correlation of failures cannot leverage other characteristics e.g., locality, history, etc. replicas) DHT$ID$space$ may lead to poor performance access latency, repair cost,
30 Classical P2P storage systems Successor$list$ pointers)to)) replicas) DHT$ID$space$
31 Classical P2P storage systems Distributed Hash Table (DHT) as a directory, e.g., TotalRecall Successor$list$ pointers)to)) replicas) DHT$ID$space$
32 Classical P2P storage systems Distributed Hash Table (DHT) as a directory, e.g., TotalRecall Pros: Flexible placement policy Successor$list$ pointers)to)) replicas) DHT$ID$space$
33 Classical P2P storage systems Distributed Hash Table (DHT) as a directory, e.g., TotalRecall Pros: Flexible placement policy Cons of TotalRecall, which placed at random:??? Successor$list$ pointers)to)) replicas) DHT$ID$space$
34 Cloud assisted storage system Source: Google tech talk on Wuala:
35 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Source: Google tech talk on Wuala:
36 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Superpeers DHT Source: Google tech talk on Wuala:
37 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Superpeers DHT Users Source: Google tech talk on Wuala:
38 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Storage peers Superpeers DHT Users Source: Google tech talk on Wuala:
39 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Storage peers Superpeers DHT GET Users Source: Google tech talk on Wuala:
40 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
41 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
42 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
43 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
44 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
45 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Index independent of storage Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
46 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Index independent of storage Many fragments per object Storage peers Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
47 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Index independent of storage Many fragments per object Storage peers Suitable for sharing very large but static files Superpeers DHT Routing GET Users Source: Google tech talk on Wuala:
48 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Index independent of storage Many fragments per object Storage peers Suitable for sharing very large but static files Superpeers Parallel download DHT Routing GET Users Source: Google tech talk on Wuala:
49 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Index independent of storage Many fragments per object Storage peers Suitable for sharing very large but static files Superpeers Parallel download Piggy-backed, large DHT routing states DHT Routing GET Users Source: Google tech talk on Wuala:
50 Cloud assisted storage system Hybrid architecture (used previously in Wuala) Wuala s dedicated storage data center as fallback Index independent of storage Many fragments per object Storage peers Suitable for sharing very large but static files Superpeers Parallel download Piggy-backed, large DHT routing states So very few hops needed, gives high through-put DHT Routing GET Users Source: Google tech talk on Wuala:
51 More sophisticated heuristics
52 More sophisticated heuristics Incentives reciprocity, trust/reputation,
53 More sophisticated heuristics Incentives reciprocity, trust/reputation, QoS: 24/7 coverage, locality, online/offline behavior (history/prediction),
54 More sophisticated heuristics Incentives reciprocity, trust/reputation, QoS: 24/7 coverage, locality, online/offline behavior (history/prediction), Control De/centralized, local/global knowledge
55 Replication model: A clique of replicas storing each other s data (reciprocity) leading to performance inequities that can render the system they seek to maximize their perceived profits (e.g., availability Explores both centralized and decentralized settings for unreliable and thus ultimately unusable. of their data) and to minimize their contribution (e.g., the We analyze the problem using both theoretical approaches (complexity analysis the centralized system, game theory for clique the decentralized formation one) and simulation. We prove that the problem Challenge Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses Krzysztof Rzadca School of Computer Engineering Nanyang Technological University Singapore Abstract In peer-to-peer storage systems, peers replicate each others data in order to increase availability. If the matching is done centrally, the algorithm can optimize data availability in an equitable manner for all participants. However, if matching is decentralized, the peers selfishness can greatly alter the results, of optimizing availability in a centralized system is NP-hard. In decentralized settings, we show that the rational behavior of selfish peers will be to replicate only with similarly-available peers. Compared to the socially-optimal solution, highly available peers have their data availability increased at the expense of decreased data availability for less available peers. The price of TECHNICAL REPORT, 15TH JUNE 2010 Anwitaman Datta School of Computer Engineering Nanyang Technological University Singapore Sonja Buchegger School of Computer Science KTH Sweden anarchy is high: unbounded in one model, and linear with the number of time slots in the second model. We also propose centralized and decentralized heuristics that, according to our experiments, converge fast in the average case. The high price of anarchy means that a completely decentral- system could be too hostile for peers with low availability, Centralized matching - right set of peers to optimize who could never achieve satisfying replication parameters. Moreover, we experimentally show that even explicit consideration time slots or probabilistic); (2) matching (centralized and problem along two axes: (1) peer availability (deterministic storage capacity utilization (proven NP-hard) and exploitation of diurnal patterns of peer availability has a enforced or decentralized and autonomous). small effect on the data availability except when the system has truly global scope. Yet a fully centralized system is infeasible, not only because of problems in information gathering, but also the complexity of optimizing availability. The solution to this dilemma is to create system-wide cooperation rules that allow a decentralized algorithm, but also limit the selfishness of the Decentralized participants. matching availability - uses is a functionan of time, underlying either a periodic way [8] gossip Index Terms price of anarchy, equitable optimization, distributed storage (also observed for the whole system in [9]), or according to a detailed prediction for the next time period. In this model, algorithm (T-man) to explore partners I. INTRODUCTION Rzadca et al, ICDCS 2010 A decentralized system for data storage and replication is an important building block of many peer-to-peer (p2p) applications, such as backup (e.g., wuala.com), or social networks [1] (in which, when a user is off-line, the system ensures that her data is available for her friends). In such systems, uses not only storage space but, more importantly, consumes bandwidth [2]. In return, a user expects that her data will also be stored remotely, increasing availability and resilience. As users in p2p systems are assumed to be independent [3], [4], amount of other users data they store). Thus, the crucial decision an user must take is to choose other users that will replicate her data (and whose data she will replicate, assuming a reciprocity-based scheme). Depending on the organization of the system, this decision is either done through the agency of a centralized matching system (like in wuala.com), or using a fully decentralized algorithm in which users form replication agreements [5], [6]. In this paper, we study the problem of maximization of data availability in a decentralized data replication system. In order to obtain worst-case bounds in these complex systems, we model what we consider the crucial characteristics of the In the probabilistic model, a peer s availability is the probability of the peer being available (correlated with the peer s expected lifetime, like in [7], [6]). The goal is to maximize data availability given the constraints on the storage size. In contrast, in the time slot (deterministic) model peer availability is a set of time slots in which the peer is available with certainty. The goal is to minimize the number of replicas such that the sum of their availability periods covers the whole prediction time. We analyze both availability models when matching is done either centrally or in a decentralized manner. A centralized
56 Representative result (simulations with artificial data) estimated data unavailability better worse! peers (histogram) random equitable subgame perfect 50k 40k 30k 20k 10k number of peers in bucket (histogram) worse better! peer availability Fig. 2. Peers expected data unavailability as a function of their availability in random, equitable and subgame perfect assignment. Histogram shows the number of peers in each availability bucket. have their data available with expected failure probability of 0k
57 Representative result (simulations with artificial data) estimated data unavailability better worse! peers (histogram) random equitable subgame perfect 50k 40k 30k 20k 10k number of peers in bucket (histogram) Good or bad? worse better! peer availability Fig. 2. Peers expected data unavailability as a function of their availability in random, equitable and subgame perfect assignment. Histogram shows the number of peers in each availability bucket. have their data available with expected failure probability of 0k
58 How about F2F storage?
59 How about F2F storage? Friend-to-Friend instead of Peer-to-Peer
60 How about F2F storage? Friend-to-Friend instead of Peer-to-Peer Translating real life trust into something useful for reliable system design
61 How about F2F storage? Friend-to-Friend instead of Peer-to-Peer Translating real life trust into something useful for reliable system design Maps naturally to the overlying social application
62 How about F2F storage? Friend-to-Friend instead of Peer-to-Peer Translating real life trust into something useful for reliable system design Maps naturally to the overlying social application Anecdotal note: SafeBook used Friend-of-Friends for access control also
63 Place data at friends: That s it? Store at all friends (naïve/baseline) Best one can do in terms of achieving highest possible availability Very high overheads! Storage Maintenance
64 Place data at friends: That s it? Store at all friends (naïve/baseline) Best one can do in terms of achieving highest possible availability Very high overheads! Storage Maintenance Find instead a reasonable subset of friends to store at!
65 An empirical study of availability in friend-to-friend storage systems Rajesh Sharma and Anwitaman Datta Nanyang Technological University, Singapore Sharma et al, P2P 2011 Matteo Dell Amico and Pietro Michiardi Eurecom, Sophia-Antipolis, France Abstract Friend-to-friend networks, i.e. peer-to-peer networks where data are exchanged and stored solely through nodes owned by trusted users, can guarantee dependability, privacy and uncensorability by exploiting social trust. However, the limitation of storing data only on friends can come to the detriment of data availability: if no friends are online, then data stored in the system will not be accessible. In this work, we explore the tradeoffs between redundancy (i.e., how many copies of data are stored on friends), data placement (the choice of which friend nodes to store data on) and data availability (the probability of finding data online). We show that the problem of obtaining maximal availability while minimizing redundancy is NP-complete; in addition, we perform an exploratory study on data placement strategies, and we investigate their performance in terms of redundancy needed and availability obtained. By performing a trace-based evaluation, we show that nodes with as few as 10 friends can already obtain good availability levels. Keywords: friend-to-friend (F2F), storage systems, data placement, NP-complete, heuristics I. INTRODUCTION Peer-to-peer (P2P) storage systems have been studied for over a decade, starting with the OceanStore [5] project. The premise of P2P storage is crowdsourcing the storage cloud [2] to other end-users. One of the many design issues in such systems is the choice of peers at which to store data. A specific subclass of P2P storage systems have emerged based on the placement choice being constrained to friends of the data owner, for example, FriendStore [7]. The basic characteristics of such friend-to-friend (F2F) storage systems are: (i) reallife social trust is exploited to guarantee a dependable system (e.g., a friend of mine won t erase my data); (ii) data access is predominantly confined within a small social neighborhood. These networks, also known as darknets when the focus is on security, can also guarantee privacy and resistance to censorship [1]. F2F storage thus constitutes a good building block for diverse applications such as personal backup service and decentralized online social networking. For personal backup, while data persistence is more critical, data availability is nevertheless desirable. For decentralized online social networking systems such as SuperNova [6], any specific data owner is constrained by the use of only peer nodes run by friends of the data owner. There are several variations of this basic question that would interest a F2F storage system designer. A baseline is determined when all friends of a node store its data. This is the best in terms of availability that one can achieve subject to the constraint of using friend nodes exclusively. However, there are some obvious variations worth studying. Can the same availability (or any other predetermined threshold of availability) be achieved using only a subset of the node s friends? How does the law of diminishing returns work in terms of availability, as the number of used friends is increased? If a stipulated number of friends are to be used, what is the best availability that can be achieved? Furthermore, the way to measure availability itself may vary. For a personal backup application, the data owner may care for the data to be available only when it itself is online - for example, with other portable devices. For a decentralized online social networking application, the data owner can serve its own data when it is itself online, but will like the friends to make the data available when it is itself offline. More generally, availability may also be determined based on whether it was available when there was any access request for the data. These various interpretations of availability may depend on the access and application specific characteristics. The achievable and achieved performance would depend on the (temporal) characteristics of individual nodes egocentric networks (i.e., the social network consisting of those nodes and their respective immediate friends), the actual data-placement policies determining a subset of friends to store data at, as well as the interpretation of availability itself. This paper is a first attempt to formalize these quantitative aspects of F2F storage systems, exploring algorithmic aspects of data placement in (sub-)optimal subset of friends, and exposition of the efficacy of F2F storage systems using trace-driven simulations using real egocentric social network traces capturing additionally node availability traces over time. The important contributions of this paper include (i) defin-
66 An empirical study of availability in friend-to-friend storage systems Rajesh Sharma and Anwitaman Datta Nanyang Technological University, Singapore Sharma et al, P2P 2011 Matteo Dell Amico and Pietro Michiardi Eurecom, Sophia-Antipolis, France Look at the temporal online/offline behavior of owned by trusted users, can guarantee dependability, privacy and There are several variations of this basic question that friends Abstract Friend-to-friend networks, i.e. peer-to-peer networks where data are exchanged and stored solely through nodes uncensorability by exploiting social trust. However, the limitation of storing data only on friends can come to the detriment of data availability: if no friends are online, then data stored in the system will not be accessible. In this work, we explore the tradeoffs between redundancy (i.e., how many copies of data are stored on friends), data placement (the choice of which friend nodes to store data on) and data availability (the probability of finding data online). We show that the problem of obtaining maximal availability while minimizing redundancy is NP-complete; in addition, we perform an exploratory study on data placement strategies, and we investigate their performance in terms of redundancy needed and availability obtained. By performing a trace-based evaluation, we show that nodes with as few as 10 friends can already obtain good availability levels. Keywords: friend-to-friend (F2F), storage systems, data placement, NP-complete, heuristics I. INTRODUCTION Peer-to-peer (P2P) storage systems have been studied for over a decade, starting with the OceanStore [5] project. The premise of P2P storage is crowdsourcing the storage cloud [2] to other end-users. One of the many design issues in such systems is the choice of peers at which to store data. A specific subclass of P2P storage systems have emerged based on the placement choice being constrained to friends of the data owner, for example, FriendStore [7]. The basic characteristics of such friend-to-friend (F2F) storage systems are: (i) reallife social trust is exploited to guarantee a dependable system (e.g., a friend of mine won t erase my data); (ii) data access is predominantly confined within a small social neighborhood. These networks, also known as darknets when the focus is on security, can also guarantee privacy and resistance to censorship [1]. F2F storage thus constitutes a good building block for diverse applications such as personal backup service and decentralized online social networking. For personal backup, while data persistence is more critical, data availability is nevertheless desirable. For decentralized online social networking systems such as SuperNova [6], any specific data owner is constrained by the use of only peer nodes run by friends of the data owner. would interest a F2F storage system designer. A baseline is determined when all friends of a node store its data. This is the best in terms of availability that one can achieve subject to the constraint of using friend nodes exclusively. However, there are some obvious variations worth studying. Can the same availability (or any other predetermined threshold of availability) be achieved using only a subset of the node s friends? How does the law of diminishing returns work in terms of availability, as the number of used friends is increased? If a stipulated number of friends are to be used, what is the best availability that can be achieved? Furthermore, the way to measure availability itself may vary. For a personal backup application, the data owner may care for the data to be available only when it itself is online - for example, with other portable devices. For a decentralized online social networking application, the data owner can serve its own data when it is itself online, but will like the friends to make the data available when it is itself offline. More generally, availability may also be determined based on whether it was available when there was any access request for the data. These various interpretations of availability may depend on the access and application specific characteristics. The achievable and achieved performance would depend on the (temporal) characteristics of individual nodes egocentric networks (i.e., the social network consisting of those nodes and their respective immediate friends), the actual data-placement policies determining a subset of friends to store data at, as well as the interpretation of availability itself. This paper is a first attempt to formalize these quantitative aspects of F2F storage systems, exploring algorithmic aspects of data placement in (sub-)optimal subset of friends, and exposition of the efficacy of F2F storage systems using trace-driven simulations using real egocentric social network traces capturing additionally node availability traces over time. The important contributions of this paper include (i) defin-
67 An empirical study of availability in friend-to-friend storage systems Rajesh Sharma and Anwitaman Datta Nanyang Technological University, Singapore Sharma et al, P2P 2011 Matteo Dell Amico and Pietro Michiardi Eurecom, Sophia-Antipolis, France Look at the temporal online/offline behavior of owned by trusted users, can guarantee dependability, privacy and There are several variations of this basic question that friends Abstract Friend-to-friend networks, i.e. peer-to-peer networks where data are exchanged and stored solely through nodes uncensorability by exploiting social trust. However, the limitation of storing data only on friends can come to the detriment of data availability: if no friends are online, then data stored in the system will not be accessible. In this work, we explore the tradeoffs between redundancy (i.e., how many copies of data are stored on friends), data placement (the choice of which friend nodes to store data on) and data availability (the probability of finding data online). We show that the problem of obtaining maximal availability while minimizing redundancy is NP-complete; in addition, we perform an exploratory study on data placement Achievable coverage strategies, and we investigate their performance in terms of redundancy needed and availability obtained. By performing a trace-based evaluation, we show that nodes with as few as 10 friends can already obtain good availability levels. Keywords: friend-to-friend (F2F), storage systems, data placement, NP-complete, heuristics What best availability can be achieved? I. INTRODUCTION Peer-to-peer (P2P) storage systems have been studied for over a decade, starting with the OceanStore [5] project. The premise of P2P storage is crowdsourcing the storage cloud [2] to other end-users. One of the many design issues in such systems is the choice of peers at which to store data. A specific subclass of P2P storage systems have emerged based on the placement choice being constrained to friends of the data owner, for example, FriendStore [7]. The basic characteristics of such friend-to-friend (F2F) storage systems are: (i) reallife social trust is exploited to guarantee a dependable system (e.g., a friend of mine won t erase my data); (ii) data access is predominantly confined within a small social neighborhood. These networks, also known as darknets when the focus is on security, can also guarantee privacy and resistance to censorship [1]. F2F storage thus constitutes a good building block for diverse applications such as personal backup service and decentralized online social networking. For personal backup, while data persistence is more critical, data availability is nevertheless desirable. For decentralized online social networking systems such as SuperNova [6], any specific data owner is constrained by the use of only peer nodes run by friends of the data owner. would interest a F2F storage system designer. A baseline is determined when all friends of a node store its data. This is the best in terms of availability that one can achieve subject to the constraint of using friend nodes exclusively. However, there are some obvious variations worth studying. Can the same availability (or any other predetermined threshold of availability) be achieved using only a subset of the node s friends? How does the law of diminishing returns work in terms of availability, as the number of used friends is increased? If a stipulated number of friends are to be used, what is the best availability that can be achieved? Furthermore, the way to measure availability itself may vary. For a personal backup application, the data owner may care for the data to be available only when it itself is online - for example, with other portable devices. For a decentralized online social networking application, the data owner can serve its own data when it is itself online, but will like the friends to make the data available when it is itself offline. More generally, availability may also be determined based on whether it was available when there was any access request for the data. These various interpretations of availability may depend on the access and application specific characteristics. The achievable and achieved performance would depend on the (temporal) characteristics of individual nodes egocentric networks (i.e., the social network consisting of those nodes and their respective immediate friends), the actual data-placement policies determining a subset of friends to store data at, as well as the interpretation of availability itself. This paper is a first attempt to formalize these quantitative aspects of F2F storage systems, exploring algorithmic aspects of data placement in (sub-)optimal subset of friends, and exposition of the efficacy of F2F storage systems using trace-driven simulations using real egocentric social network traces capturing additionally node availability traces over time. The important contributions of this paper include (i) defin-
68 An empirical study of availability in friend-to-friend storage systems Rajesh Sharma and Anwitaman Datta Nanyang Technological University, Singapore Sharma et al, P2P 2011 Matteo Dell Amico and Pietro Michiardi Eurecom, Sophia-Antipolis, France Look at the temporal online/offline behavior of owned by trusted users, can guarantee dependability, privacy and There are several variations of this basic question that friends Abstract Friend-to-friend networks, i.e. peer-to-peer networks where data are exchanged and stored solely through nodes uncensorability by exploiting social trust. However, the limitation of storing data only on friends can come to the detriment of data availability: if no friends are online, then data stored in the system will not be accessible. In this work, we explore the tradeoffs between redundancy (i.e., how many copies of data are stored on friends), data placement (the choice of which friend nodes to store data on) and data availability (the probability of finding data online). We show that the problem of obtaining maximal availability while minimizing redundancy is NP-complete; in addition, we perform an exploratory study on data placement Achievable coverage strategies, and we investigate their performance in terms of redundancy needed and availability obtained. By performing a trace-based evaluation, we show that nodes with as few as 10 friends can already obtain good availability levels. Keywords: friend-to-friend (F2F), storage systems, data placement, NP-complete, heuristics What best availability can be achieved? I. INTRODUCTION Peer-to-peer (P2P) storage systems have been studied for over a decade, starting with the OceanStore [5] project. The premise of P2P storage is crowdsourcing the storage cloud [2] to other end-users. One of the many design issues in such systems is the choice of peers at which to store data. A specific Criticality of friends subclass of P2P storage systems have emerged based on the placement choice being constrained to friends of the data owner, for example, FriendStore [7]. The basic characteristics of such friend-to-friend (F2F) storage systems are: (i) real- Which life social trust is exploited friends to guarantee a dependable are system indispensable? (e.g., a friend of mine won t erase my data); (ii) data access is predominantly confined within a small social neighborhood. These networks, also known as darknets when the focus is on security, can also guarantee privacy and resistance to censorship [1]. F2F storage thus constitutes a good building block for diverse applications such as personal backup service and decentralized online social networking. For personal backup, while data persistence is more critical, data availability is nevertheless desirable. For decentralized online social networking systems such as SuperNova [6], any specific data owner is constrained by the use of only peer nodes run by friends of the data owner. would interest a F2F storage system designer. A baseline is determined when all friends of a node store its data. This is the best in terms of availability that one can achieve subject to the constraint of using friend nodes exclusively. However, there are some obvious variations worth studying. Can the same availability (or any other predetermined threshold of availability) be achieved using only a subset of the node s friends? How does the law of diminishing returns work in terms of availability, as the number of used friends is increased? If a stipulated number of friends are to be used, what is the best availability that can be achieved? Furthermore, the way to measure availability itself may vary. For a personal backup application, the data owner may care for the data to be available only when it itself is online - for example, with other portable devices. For a decentralized online social networking application, the data owner can serve its own data when it is itself online, but will like the friends to make the data available when it is itself offline. More generally, availability may also be determined based on whether it was available when there was any access request for the data. These various interpretations of availability may depend on the access and application specific characteristics. The achievable and achieved performance would depend on the (temporal) characteristics of individual nodes egocentric networks (i.e., the social network consisting of those nodes and their respective immediate friends), the actual data-placement policies determining a subset of friends to store data at, as well as the interpretation of availability itself. This paper is a first attempt to formalize these quantitative aspects of F2F storage systems, exploring algorithmic aspects of data placement in (sub-)optimal subset of friends, and exposition of the efficacy of F2F storage systems using trace-driven simulations using real egocentric social network traces capturing additionally node availability traces over time. The important contributions of this paper include (i) defin-
69 Evaluation Data set Italian instant messenger service Pros Social+Temporal characterisitcs May reasonably reflect the online/offline behavior Cons: Not a p2p storage system trace small, incomplete and geographically localized
70 Evaluation Data set Italian instant messenger service Pros Social+Temporal characterisitcs! 3436$nodes$ o 848$nodes$in$the$largest$component$ " Note$that$many$nodes$had$ neighbors $in$other$ servers,$for$whom$we$did$not$have$info.$ " Between$1A18$neighbors$! Use$two$weeks$of$data$ o One$for$ learning,$one$for$evaluafon$ " Time$of$day,$day$of$week$effects$ May reasonably reflect the online/offline behavior Cons: Not a p2p storage system trace small, incomplete and geographically localized
71 Representative results
72 Representative results! AC:$achievable$coverage$ o 50%$nodes$can$get$more$than$90%$availability$! Crit:$Time$covered$using$cri<cal$nodes$ o Too$much$dependence$on$cri<cal$nodes$
73 Representative results! AC:$achievable$coverage$ o 50%$nodes$can$get$more$than$90%$availability$! Crit:$Time$covered$using$cri<cal$nodes$ o Too$much$dependence$on$cri<cal$nodes$!!<Achievable!coverage,!Degree!of!Cri3cality,!#!of!Friends>!
74 Representative results! AC:$achievable$coverage$ o 50%$nodes$can$get$more$than$90%$availability$! Crit:$Time$covered$using$cri<cal$nodes$ o Too$much$dependence$on$cri<cal$nodes$!!<Achievable!coverage,!Degree!of!Cri3cality,!#!of!Friends>! If there are enough friends, (>10), ought to be okay! (assuming storage capacity is not an issue)
75 Bootstrapping pangs! New peers with few friends in the system, or no reputation of being highly available, will find it difficult to get started! Game-theoretic study on reciprocity based P2P cliques Analysis of ego-centric networks for F2F storage
76 SuperNova: Super-peers Based Architecture for Decentralized Online Social Networks Sharma et al, Comsnets 2012 Rajesh Sharma and Anwitaman Datta School of Computer Engineering, Nanyang Technological University, Singapore. iv: v2 [cs.si] 25 May 2011 Abstract. Recent years have seen several earnest initiatives from both academic researchers as well as open source communities to implement and deploy decentralized online social networks (DOSNs). The primary motivations for DOSNs are privacy and autonomy from big brotherly service providers. The promise of decentralization is complete freedom for end-users from any service providers both in terms of keeping privacy about content and communication, and also from any form of censorship. However decentralization introduces many challenges. One of the principal problems is to guarantee availability of data even when the data owner is not online, so that others can access the said data even when a node is offline or down. Intuitively this can be solved by replicating the data on other users machines. Existing DOSN proposals try to solve this problem using heuristics which are agnostic to the various kinds of heterogeneity both in terms of end user resources as well as end user behaviors in such a system. For instance, some propose replication at friends, or at some other peers based on other heuristics such as reciprocal storage among nodes with similar availability, or storage in a global DHT realized using all peers resources. In this paper, we argue that a pragmatic design needs to explicitly allow for and leverage on system heterogeneity, and provide incentives for the resource rich participants in the system to contribute such resources. To that end we introduce SuperNova - a super-peer based DOSN architecture. Super-peers can help (i) bootstrap new peers who are yet to have/find any friends by either providing them storage space, (ii) maintaining a directory of users, so that users can find friends in the network by name or interests, (iii) help peers find other peers to store their content in case they don t have adequate friends to do so, or if their friends are already overloaded. We envision a self-organizing system, where nodes that provide substantial resources can gain reputation, and be elevated to the status of super-peers. Users may want to become super-peers out of altruism (they want DOSNs to succeed), for the
77 SuperNova: Super-peers Based Architecture for Decentralized Online Social Networks Sharma et al, Comsnets 2012 Rajesh Sharma and Anwitaman Datta iv: v2 [cs.si] 25 May 2011 School of Computer Engineering, Nanyang Technological University, Singapore. The big picture/premise Abstract. Recent years have seen several earnest initiatives from both academic researchers as well as open source communities to implement and deploy decentralized online social networks (DOSNs). The primary motivations for DOSNs are privacy and autonomy from big brotherly service providers. The promise of decentralization is complete freedom for end-users from any service providers both in terms of keeping privacy about content and communication, and also from any form of censorship. However decentralization introduces many challenges. One of the principal problems is to guarantee availability of data even when the data owner is not online, so that others can access the said data even when a node is offline or down. Intuitively this can be solved by replicating the data on other users machines. Existing DOSN proposals try to solve this problem using heuristics which are agnostic to the various kinds of heterogeneity both in terms of end user resources as well as end user behaviors in such a system. For instance, some propose replication at friends, or at some other peers based on other heuristics such as reciprocal storage among nodes with similar availability, or storage in a global DHT realized using all peers resources. In this paper, we argue that a pragmatic design needs to explicitly allow for and leverage on system heterogeneity, and provide incentives for the resource rich participants in the system to contribute such resources. To that end we introduce SuperNova - a super-peer based DOSN architecture. Super-peers can help (i) bootstrap new peers who are yet to have/find any friends by either providing them storage space, (ii) maintaining a directory of users, so that users can find friends in the network by name or interests, (iii) help peers find other peers to store their content in case they don t have adequate friends to do so, or if their friends are already overloaded. We envision a self-organizing system, where nodes that provide substantial resources can gain reputation, and be elevated to the status of super-peers. Users may want to become super-peers out of altruism (they want DOSNs to succeed), for the
78 SuperNova: Super-peers Based Architecture for Decentralized Online Social Networks Sharma et al, Comsnets 2012 Rajesh Sharma and Anwitaman Datta iv: v2 [cs.si] 25 May 2011 School of Computer Engineering, Nanyang Technological University, Singapore. The big picture/premise Abstract. Recent years have seen several earnest initiatives from both academic researchers as well as open source communities to implement and deploy decentralized online social networks (DOSNs). The primary motivations for DOSNs Well resourced nodes act as super-peers are privacy and autonomy from big brotherly service providers. The promise of decentralization is complete freedom for end-users from any service providers both in terms of keeping privacy about content and communication, and also from incentives any form of (could censorship. be): Howeverreputation decentralization introduces within many challenges. an interest One of the principal problems is to guarantee availability of data even when the community, ability to monetize (e.g., using ads), data owner is not online, so that others can access the said data even when a node is offline or down. Intuitively this can be solved by replicating the data on other users machines. Existing DOSN proposals try to solve this problem using heuristics which are agnostic to the various kinds of heterogeneity both in terms of end user resources as well as end user behaviors in such a system. For instance, some propose replication at friends, or at some other peers based on other heuristics such as reciprocal storage among nodes with similar availability, or storage in a global DHT realized using all peers resources. In this paper, we argue that a pragmatic design needs to explicitly allow for and leverage on system heterogeneity, and provide incentives for the resource rich participants in the system to contribute such resources. To that end we introduce SuperNova - a super-peer based DOSN architecture. Super-peers can help (i) bootstrap new peers who are yet to have/find any friends by either providing them storage space, (ii) maintaining a directory of users, so that users can find friends in the network by name or interests, (iii) help peers find other peers to store their content in case they don t have adequate friends to do so, or if their friends are already overloaded. We envision a self-organizing system, where nodes that provide substantial resources can gain reputation, and be elevated to the status of super-peers. Users may want to become super-peers out of altruism (they want DOSNs to succeed), for the
79 SuperNova: Super-peers Based Architecture for Decentralized Online Social Networks Sharma et al, Comsnets 2012 Rajesh Sharma and Anwitaman Datta iv: v2 [cs.si] 25 May 2011 School of Computer Engineering, Nanyang Technological University, Singapore. The big picture/premise Abstract. Recent years have seen several earnest initiatives from both academic researchers as well as open source communities to implement and deploy decentralized online social networks (DOSNs). The primary motivations for DOSNs Well resourced nodes act as super-peers are privacy and autonomy from big brotherly service providers. The promise of decentralization is complete freedom for end-users from any service providers both in terms of keeping privacy about content and communication, and also from incentives any form of (could censorship. be): Howeverreputation decentralization introduces within many challenges. an interest One of the principal problems is to guarantee availability of data even when the community, ability to monetize (e.g., using ads), data owner is not online, so that others can access the said data even when a node is offline or down. Intuitively this can be solved by replicating the data on other users machines. Existing DOSN proposals try to solve this problem using New nodes heuristics use whichsuperpeers are agnostic to the various for kinds storage, of heterogeneityuntil both in terms they get of end user resources as well as end user behaviors in such a system. For instance, established some propose in the replication system at friends, or at some other peers based on other heuristics such as reciprocal storage among nodes with similar availability, or storage in a global DHT realized using all peers resources. In this paper, we argue that a pragmatic design needs to explicitly allow for and leverage on system heterogeneity, the andsuper-peers provide incentives for the are resource not richover-burdened, participants in the system or become so that to contribute such resources. To that end we introduce SuperNova - a super-peer a bottleneck for established peers, based DOSN architecture. Super-peers can help (i) bootstrap new peers who are yet to have/find any friends by either providing them storage space, (ii) maintaining a directory of users, so that users can find friends in the network by name or interests, (iii) help peers find other peers to store their content in case they don t have adequate friends to do so, or if their friends are already overloaded. We envision a self-organizing system, where nodes that provide substantial resources can gain reputation, and be elevated to the status of super-peers. Users may want to become super-peers out of altruism (they want DOSNs to succeed), for the
80 SuperNova: Super-peers Based Architecture for Decentralized Online Social Networks Sharma et al, Comsnets 2012 Rajesh Sharma and Anwitaman Datta iv: v2 [cs.si] 25 May 2011 School of Computer Engineering, Nanyang Technological University, Singapore. The big picture/premise Abstract. Recent years have seen several earnest initiatives from both academic researchers as well as open source communities to implement and deploy decentralized online social networks (DOSNs). The primary motivations for DOSNs Well resourced nodes act as super-peers are privacy and autonomy from big brotherly service providers. The promise of decentralization is complete freedom for end-users from any service providers both in terms of keeping privacy about content and communication, and also from incentives any form of (could censorship. be): Howeverreputation decentralization introduces within many challenges. an interest One of the principal problems is to guarantee availability of data even when the community, ability to monetize (e.g., using ads), data owner is not online, so that others can access the said data even when a node is offline or down. Intuitively this can be solved by replicating the data on other users machines. Existing DOSN proposals try to solve this problem using New nodes heuristics use whichsuperpeers are agnostic to the various for kinds storage, of heterogeneityuntil both in terms they get of end user resources as well as end user behaviors in such a system. For instance, established some propose in the replication system at friends, or at some other peers based on other heuristics such as reciprocal storage among nodes with similar availability, or storage in a global DHT realized using all peers resources. In this paper, we argue that a pragmatic design needs to explicitly allow for and leverage on system heterogeneity, the andsuper-peers provide incentives for the are resource not richover-burdened, participants in the system or become so that to contribute such resources. To that end we introduce SuperNova - a super-peer a bottleneck for established peers, based DOSN architecture. Super-peers can help (i) bootstrap new peers who are yet to have/find any friends by either providing them storage space, (ii) maintaining a directory of users, so that users can find friends in the network by name or Superpeers interests, (iii) helpcoordinating, peers find other peers to store finding their content in storage case they don tpartners, etc. have adequate friends to do so, or if their friends are already overloaded. We envision a self-organizing system, where nodes that provide substantial resources can gain reputation, and be elevated to the status of super-peers. Users may want to become super-peers out of altruism (they want DOSNs to succeed), for the
81 Representative result Take with a huge pinch of salt: artificial data to drive simulations, with too many parameters (a) Cumulative Availability (b) Individual Availability (c) System Performance Fig. 2. Comparison for Friend s Time (FT) and Total Time (TT) for Deviation (D) and NonDeviation (ND)
82 Moving forward Light weight P2P OSN Full-fledged (D)OSN Bulk (static) data storage dynamic/social data store High availability High consistency High rate of data updates Small volume of data Security modules Encryption access control Social modules Analytics Search/Navigation Recommendation P2P overlay with basic services: DHT lookup, peer-sampling, etc. Could be even (multi-)cloud based. Can be a small dynamic clique maintained aggressively
83
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM
A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences
P2P Storage Systems. Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung
P2P Storage Systems Prof. Chun-Hsin Wu Dept. Computer Science & Info. Eng. National University of Kaohsiung Outline Introduction Distributed file systems P2P file-swapping systems P2P storage systems Strengths
Survey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university
Measurement Study of Wuala, a Distributed Social Storage Service
Measurement Study of Wuala, a Distributed Social Storage Service Thomas Mager - Master Thesis Advisors: Prof. Ernst Biersack Prof. Thorsten Strufe Prof. Pietro Michiardi Illustration: Maxim Malevich 15.12.2010
Costs and Benefits of Reputation Management Systems
Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy [email protected]
Web Email DNS Peer-to-peer systems (file sharing, CDNs, cycle sharing)
1 1 Distributed Systems What are distributed systems? How would you characterize them? Components of the system are located at networked computers Cooperate to provide some service No shared memory Communication
Principles of Distributed Database Systems
M. Tamer Özsu Patrick Valduriez Principles of Distributed Database Systems Third Edition
8 Conclusion and Future Work
8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the
PEER TO PEER FILE SHARING USING NETWORK CODING
PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering
Peer-to-Peer Networks. Chapter 6: P2P Content Distribution
Peer-to-Peer Networks Chapter 6: P2P Content Distribution Chapter Outline Content distribution overview Why P2P content distribution? Network coding Peer-to-peer multicast Kangasharju: Peer-to-Peer Networks
Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
CHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
International journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
RESEARCH ARTICLE ISSN: 2321-7758 GLOBAL LOAD DISTRIBUTION USING SKIP GRAPH, BATON AND CHORD J.K.JEEVITHA, B.KARTHIKA* Information Technology,PSNA College of Engineering & Technology, Dindigul, India Article
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT
RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University
IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION N.Vijaya Sunder Sagar 1, M.Dileep Kumar 2, M.Nagesh 3, Lunavath Gandhi
Object Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers
Coding Techniques for Efficient, Reliable Networked Distributed Storage in Data Centers Anwitaman Datta Joint work with Frédérique Oggier (SPMS) School of Computer Engineering Nanyang Technological University
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems
Super-Agent Based Reputation Management with a Practical Reward Mechanism in Decentralized Systems Yao Wang, Jie Zhang, and Julita Vassileva Department of Computer Science, University of Saskatchewan,
Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)
Distributed Computing over Communication Networks: Topology (with an excursion to P2P) Some administrative comments... There will be a Skript for this part of the lecture. (Same as slides, except for today...
The Case for a Hybrid P2P Search Infrastructure
The Case for a Hybrid P2P Search Infrastructure Boon Thau Loo Ryan Huebsch Ion Stoica Joseph M. Hellerstein University of California at Berkeley Intel Research Berkeley boonloo, huebsch, istoica, jmh @cs.berkeley.edu
Multi-Datacenter Replication
www.basho.com Multi-Datacenter Replication A Technical Overview & Use Cases Table of Contents Table of Contents... 1 Introduction... 1 How It Works... 1 Default Mode...1 Advanced Mode...2 Architectural
CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT
81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to
Cloud Storage and Peer-to-Peer Storage End-user considerations and product overview
Cloud Storage and Peer-to-Peer Storage End-user considerations and product overview Project : Gigaport3 Project year : 2010 Coordination : Rogier Spoor Author(s) : Arjan Peddemors Due date : Q2 2010 Version
Peer-to-Peer and Grid Computing. Chapter 4: Peer-to-Peer Storage
Peer-to-Peer and Grid Computing Chapter 4: Peer-to-Peer Storage Chapter Outline Using DHTs to build more complex systems How DHT can help? What problems DHTs solve? What problems are left unsolved? P2P
Load Re-Balancing for Distributed File. System with Replication Strategies in Cloud
Contemporary Engineering Sciences, Vol. 8, 2015, no. 10, 447-451 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5263 Load Re-Balancing for Distributed File System with Replication Strategies
Distributed file system in cloud based on load rebalancing algorithm
Distributed file system in cloud based on load rebalancing algorithm B.Mamatha(M.Tech) Computer Science & Engineering [email protected] K Sandeep(M.Tech) Assistant Professor PRRM Engineering College
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS Nehal Markandeya 1, Sandip Khillare 2, Rekha Bagate 3, Sayali Badave 4 Vaishali Barkade 5 12 3 4 5 (Department
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems DR.K.P.KALIYAMURTHIE 1, D.PARAMESWARI 2 Professor and Head, Dept. of IT, Bharath University, Chennai-600 073 1 Asst. Prof. (SG), Dept. of Computer Applications,
IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPLEMENTATION OF RELIABLE CACHING STRATEGY IN CLOUD ENVIRONMENT M.Swapna 1, K.Ashlesha 2 1 M.Tech Student, Dept of CSE, Lord s Institute
Load Balancing in Structured Peer to Peer Systems
Load Balancing in Structured Peer to Peer Systems Dr.K.P.Kaliyamurthie 1, D.Parameswari 2 1.Professor and Head, Dept. of IT, Bharath University, Chennai-600 073. 2.Asst. Prof.(SG), Dept. of Computer Applications,
Cluster Computing. ! Fault tolerance. ! Stateless. ! Throughput. ! Stateful. ! Response time. Architectures. Stateless vs. Stateful.
Architectures Cluster Computing Job Parallelism Request Parallelism 2 2010 VMware Inc. All rights reserved Replication Stateless vs. Stateful! Fault tolerance High availability despite failures If one
A taxonomy of decentralized online social networks
DOI 10.1007/s12083-014-0258-2 A taxonomy of decentralized online social networks Shihabur Rahman Chowdhury Arup Raton Roy Maheen Shaikh Khuzaima Daudjee Received: 27 January 2013 / Accepted: 27 February
TOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
CS5412: TIER 2 OVERLAYS
1 CS5412: TIER 2 OVERLAYS Lecture VI Ken Birman Recap 2 A week ago we discussed RON and Chord: typical examples of P2P network tools popular in the cloud Then we shifted attention and peeked into the data
Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks
Airlift: Video Conferencing as a Cloud Service using Inter- Datacenter Networks Yuan Feng Baochun Li Bo Li University of Toronto HKUST 1 Multi-party video conferencing 2 Multi-party video conferencing
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
D1.1 Service Discovery system: Load balancing mechanisms
D1.1 Service Discovery system: Load balancing mechanisms VERSION 1.0 DATE 2011 EDITORIAL MANAGER Eddy Caron AUTHORS STAFF Eddy Caron, Cédric Tedeschi Copyright ANR SPADES. 08-ANR-SEGI-025. Contents Introduction
Multicast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
Ant-based Load Balancing Algorithm in Structured P2P Systems
Ant-based Load Balancing Algorithm in Structured P2P Systems Wei Mi, 2 Chunhong Zhang, 3 Xiaofeng Qiu Beijing University of Posts and Telecommunications, Beijing 876, China, {miwei985, zhangch.bupt., qiuxiaofeng}@gmail.com
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems
Efficient Content Location Using Interest-Based Locality in Peer-to-Peer Systems Kunwadee Sripanidkulchai Bruce Maggs Hui Zhang Carnegie Mellon University, Pittsburgh, PA 15213 {kunwadee,bmm,hzhang}@cs.cmu.edu
Peer-to-Peer Systems. Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf
Peer-to-Peer Systems Winter semester 2014 Jun.-Prof. Dr.-Ing. Kalman Graffi Heinrich Heine University Düsseldorf Peer-to-Peer Systems Chapter 13 Online Social Networks Introduction to Online Social Networks
Information Searching Methods In P2P file-sharing systems
Information Searching Methods In P2P file-sharing systems Nuno Alberto Ferreira Lopes PhD student (nuno.lopes () di.uminho.pt) Grupo de Sistemas Distribuídos Departamento de Informática Universidade do
MinCopysets: Derandomizing Replication In Cloud Storage
MinCopysets: Derandomizing Replication In Cloud Storage Asaf Cidon, Ryan Stutsman, Stephen Rumble, Sachin Katti, John Ousterhout and Mendel Rosenblum Stanford University [email protected], {stutsman,rumble,skatti,ouster,mendel}@cs.stanford.edu
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS
PROPOSAL AND EVALUATION OF A COOPERATIVE MECHANISM FOR HYBRID P2P FILE-SHARING NETWORKS Hongye Fu, Naoki Wakamiya, Masayuki Murata Graduate School of Information Science and Technology Osaka University
A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS
A Unified View of Network Monitoring One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS Executive Summary In the past few years, the enterprise computing technology has changed
Self-organized Multi-agent System for Service Management in the Next Generation Networks
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Magnus: Peer to Peer Backup System
Magnus: Peer to Peer Backup System Naveen Gattu, Richard Huang, John Lynn, Huaxia Xia Department of Computer Science University of California, San Diego Abstract Magnus is a peer-to-peer backup system
HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat
HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video
BitTorrent Peer To Peer File Sharing
BitTorrent Peer To Peer File Sharing CS290F: Networking for Multimedia Mini PhD Major Area Exam I) Introduction Content distribution is an important topic in networking and has been evolving from the start
Online Storage and Content Distribution System at a Large-scale: Peer-assistance and Beyond
Online Storage and Content Distribution System at a Large-scale: Peer-assistance and Beyond Bo Li Email: [email protected] Department of Computer Science and Engineering Hong Kong University of Science &
Dynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
An Introduction to Peer-to-Peer Networks
An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P
A Success and Failure Factor Study of Peer-to-Peer File Sharing Systems. Christian Lüthold, Marc Weber
A Success and Failure Factor Study of Peer-to-Peer File Sharing Systems Christian Lüthold, Marc Weber Outline Setting Up the Stage Overview of File Sharing Systems Factors & Categories Conclusion Discussion
Network Security Validation Using Game Theory
Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy
Wireless Sensor Networks Chapter 3: Network architecture
Wireless Sensor Networks Chapter 3: Network architecture António Grilo Courtesy: Holger Karl, UPB Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general
Peer-to-Peer Computing
Quang Hieu Vu Mihai Lupu Beng Chin Ooi Peer-to-Peer Computing Principles and Applications Springer 1 Introduction 1 1.1 Peer-to-Peer Computing 1 1.2 Potential, Benefits, and Applications 3 1.3 Challenges
An Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, [email protected]
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Concept and Project Objectives
3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM
LOAD BALANCING WITH PARTIAL KNOWLEDGE OF SYSTEM IN PEER TO PEER NETWORKS R. Vijayalakshmi and S. Muthu Kumarasamy Dept. of Computer Science & Engineering, S.A. Engineering College Anna University, Chennai,
Towards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds
Enhance Load Rebalance Algorithm for Distributed File Systems in Clouds Kokilavani.K, Department Of Pervasive Computing Technology, Kings College Of Engineering, Punalkulam, Tamil nadu Abstract This paper
High Throughput Computing on P2P Networks. Carlos Pérez Miguel [email protected]
High Throughput Computing on P2P Networks Carlos Pérez Miguel [email protected] Overview High Throughput Computing Motivation All things distributed: Peer-to-peer Non structured overlays Structured
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
2 Background on Erasure Coding for Distributed Storage
Data Insertion & Archiving in Erasure-coding Based Large-scale Storage Systems Lluis Pamies-Juarez 1, Frédérique Oggier 1 and Anwitaman Datta 2 1 School of Mathematical and Physical Sciences 2 School of
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks
Comparison on Different Load Balancing Algorithms of Peer to Peer Networks K.N.Sirisha *, S.Bhagya Rekha M.Tech,Software Engineering Noble college of Engineering & Technology for Women Web Technologies
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
Data Maintenance and Network Marketing Solutions
Long-Term Data Maintenance in Wide-Area Storage Systems: A Quantitative Approach Hakim Weatherspoon, Byung-Gon Chun, Chiu Wah So, John Kubiatowicz University of California, Berkeley Report No. UCB/CSD-05-404
IBM Spectrum Protect in the Cloud
IBM Spectrum Protect in the Cloud. Disclaimer IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding
Revisiting P2P content sharing in wireless ad hoc networks
Revisiting P2P content sharing in wireless ad hoc networks Mohamed Karim SBAI, Chadi BARAKAT EPI Planète, INRIA, France Email: {mksbai, cbarakat}@sophia.inria.fr Abstract. Classical content sharing applications
A Middleware Strategy to Survive Compute Peak Loads in Cloud
A Middleware Strategy to Survive Compute Peak Loads in Cloud Sasko Ristov Ss. Cyril and Methodius University Faculty of Information Sciences and Computer Engineering Skopje, Macedonia Email: [email protected]
Big Data & Scripting storage networks and distributed file systems
Big Data & Scripting storage networks and distributed file systems 1, 2, adaptivity: Cut-and-Paste 1 distribute blocks to [0, 1] using hash function start with n nodes: n equal parts of [0, 1] [0, 1] N
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
University of Tübingen Chair for Computer Networks and Internet Adapting Distributed Hash Tables for Mobile Ad Hoc Networks Tobias Heer, Stefan Götz, Simon Rieche, Klaus Wehrle Protocol Engineering and
Study on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
Enhancing P2P File-Sharing with an Internet-Scale Query Processor
Enhancing P2P File-Sharing with an Internet-Scale Query Processor Boon Thau Loo Joseph M. Hellerstein Ryan Huebsch Scott Shenker Ion Stoica UC Berkeley, Intel Research Berkeley and International Computer
