libchop,alibraryfordistributed storage&databackup



Similar documents
CooperativeDataBackup formobiledevices

Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)

bup: the git-based backup system Avery Pennarun

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

From bsdtar to tarsnap

Contents. WD Arkeia Page 2 of 14

Emacs SMTP Library. An Emacs package for sending mail via SMTP. Simon Josefsson, Alex Schroeder

Veeam Best Practices with Exablox

GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS by Nikos Mavroyanopoulos

Availability Digest. Data Deduplication February 2011

Encrypting and signing

SubmitedBy: Name Reg No Address. Mirza Kashif Abrar T079 kasmir07 (at) student.hh.se

Is Your SSL Website and Mobile App Really Secure?

Network Security Essentials Chapter 5

File Transfer. User Guide For Clients and Vendors. Last Revised: October

Top 5 Reasons to Upgrade to edocs DM 5.3

NAS 259 Protecting Your Data with Remote Sync (Rsync)

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Avamar Backup and Data De-duplication Exam

HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE

Chapter 7 Transport-Level Security

Web Security Considerations

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Quanqing XU YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud

LDA, the new family of Lortu Data Appliances

Linux System Administration. System Administration Tasks

BoardNox. Secure file sharing solution for Executive Committees and Boards of Directors.

Security Ensured Redundant Data Management under Cloud Environment

Overview. SSL Cryptography Overview CHAPTER 1

3Gen Data Deduplication Technical

Creating a Cloud Backup Service. Deon George

DeltaStor Data Deduplication: A Technical Review

Cleaning Encrypted Traffic

Security Rationale for a Cooperative Backup Service for Mobile Devices

Byte-index Chunking Algorithm for Data Deduplication System

, ) I Transport Layer Security

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros

How To Use Portlock Storage Manager Client On A Netware System (Netware) With A Virtual Disk (Veeam) On A Windows (Vheeam) Or Veeam Veea (Vfree

DilRoom. Improving, accelerating and simplifying the sharing of sensitive information.

Protecting enterprise servers with StoreOnce and CommVault Simpana

VERITAS NetBackup 6.0 Encryption

Multi-level Metadata Management Scheme for Cloud Storage System

Setting up Remote Replication on SNC NAS Series

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

K-Backup: Automatic Network Backup solution

PowerChute TM Network Shutdown Security Features & Deployment

Hervey Allen. Network Startup Resource Center. PacNOG 6: Nadi, Fiji. Security Overview

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase

Chapter 17. Transport-Level Security

Theoretical Aspects of Storage Systems Autumn 2009

How to Send Stealth Text From Your Cell Phone

Management, Logging and Troubleshooting

A Deduplication-based Data Archiving System

Fundamentals of Computer Security

Secured Communications using Linphone & Flexisip

Linux+ Guide to Linux Certification, Third Edition. Chapter 11 Compression, System Backup, and Software Installation

Configuring Backup Settings. Copyright 2009, Oracle. All rights reserved.

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services

ESCAPE ALL LIMITATIONS. Protecting Windows Microsoft. Growth in data for Microsoft Exchange is expanding at. Exchange Server

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

EISOO AnyBackup Family 5.0 All-in-One Protection

Configuration Backup and Restore. Dgw v2.0 May 14,

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

ZFS Backup Platform. ZFS Backup Platform. Senior Systems Analyst TalkTalk Group. Robert Milkowski.

Amanda The Open Source Backup & Archiving Software. Ian Turner ian@zmanda.com 11 April Copyright 2006 Zmanda, Inc. All rights reserved.

Chakchai So-In, Ph.D.

Click Studios. Passwordstate. Upgrade Instructions to V7 from V5.xx

HathiTrust Digital Assets Agreement

File Protection using rsync. Setup guide

Whitepaper: Back Up SAP HANA and SUSE Linux Enterprise Server with SEP sesam. Copyright 2014 SEP

STORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside

Service Overview CloudCare Online Backup

5 ways to make money on backup

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Cumulus: Filesystem Backup to the Cloud

DEPLOYMENT GUIDE Version 1.1. Configuring BIG-IP WOM with Oracle Database Data Guard, GoldenGate, Streams, and Recovery Manager

Administering the Web Server (IIS) Role of Windows Server

File Transfer Protocol. What is Anonymous FTP? What is FTP?

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

BACKUP YOUR SENSITIVE DATA WITH BACKUP- MANAGER

Protect Microsoft Exchange databases, achieve long-term data retention

PGP - Pretty Good Privacy

WHAT S THE DIFFERENCE? JENNIFER RICKER DIGITAL COLLECTIONS MANAGER STATE LIBRARY OF NORTH CAROLINA

Linux Backups. Russell Adams Linux Backups p. 1

4PSA Total Backup User's Guide. for Plesk and newer versions

What is included in the ATRC server support

WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression

Administering the Web Server (IIS) Role of Windows Server

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Presents. Attix5 Technology. An Introduction

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Deduplication has been around for several

WebPublish User s Manual

MySQL Security: Best Practices

Transcription:

libchop,alibraryfordistributed storage&databackup Ludovic Courtès <ludo@gnu.org> GNU Hackers Meeting, Den Haag, 24 July 2010

The Basics - inception & rationale - storing to remote, untrusted sites - library & tools for data storage The Mechanics The Plan

inception& rationale PhD in 2004 2007, LAAS-CNRS, France cooperative backup for the people! flexible & self-managed distributed storage storage to remote (untrusted) sites

storing to remote, untrusted sites dissemination of data fragments guarantees for data integrity, confidentiality, & authenticity

library& tools for data storage content-addressable storage ("deduplication") encryption via content-hash keys file chopping compression

from the command line $ chop-archiver --archive holiday-pic.jpg tree_indexer:hash_block_fetcher:hash_index_handle:64:sha1:onx5ee $ chop-archiver --restore \ tree_indexer:hash_block_fetcher:hash_index_handle:64:sha1:onx5ee \ > restored-pic.jpg

fromc chop_indexer_t *indexer; chop_chopper_t *chopper; chop_block_indexer_t *block_indexer; chop_block_store_t *store; chop_index_handle_t *index; /* Instantiate these things */ err = chop_indexer_index_blocks (indexer, chopper, block_indexer, store, store, index);

from Guile Scheme (define (archive-file file store) ;; Chop FILE and write the blocks to STORE. ;; Return an ASCII string denoting its index. (let* ((f (file-stream-open file)) (c (anchor-based-chopper-open f)) (bi (hash-block-indexer-open hash-method/sha1)) (i (tree-indexer-open 100))) (let ((index (indexer-index-blocks i c bi store store))) (index-handle-ascii-serialize index))))

The Basics The Mechanics - the storage pipeline - block stores - fixed-size chopper - content-based chopper - filters - tradeoffs The Plan

the storage pipeline block indexer data stream filter chopper stream indexer filter block store

block stores put (key, data); ring, can get (key); a byte string, can be anything

block store implementations gdbm, tdb, bdb, etc. file system (à la Git) easily transferred over HTTP, FTP, rsync, etc. remote (chop-block-server) ONC RPC, over TLS discovery using Avahi (chop-store-discover)

block indexer: content-addressable storage $ chop-archiver -i hash_block_indexer -I sha1 \ --archive britney.mp3 tree_indexer:hash_block_fetcher:hash_index_handle:64:sha1:7c4 x7e/42 sub-classes of block_fetcher and index_handle hash algo to address blocks & check integrity root block hash

block indexer: content-hash keys clear text aes256 cipher text sha256 H $ chop-archiver -i chk_block_indexer \ -I aes256,cbc,sha256,sha1 \ --archive naked.jpg :chk_index_handle:64:aes256,cbc,sha1:7c4 x7e,et4 vek/8a sha256 aes256 cipher algo & integrity check H sha1(cipher-text) key = sha256(clear-text)

content-addressable storage& compression single-instance storage single-instance

fixed-size chopper The quick brown fox jumps over the quick lazy The quick brown wildebeest jumps over the quick la

content-based chopper The quick brown fox jumps over the quick lazy The quick brown wildebeest jumps over the quick

filters block indexer data stream zlib bzip2 lzo GPG(?) chopper stream indexer zlib bzip2 lzo GPG(?) block store

tradeoffs 0.3 (for content-addressed source code revisions) compression ratio 0.2 0.1 content-defined blocks + zlib d blocks content-defined blocks + no compression 0.0 throughput

The Basics The Mechanics The Plan - (built-in) support for directories & versioning - a cooperative/p2p backup daemon - storage in GNU

(built-in) support for directories& versioning root root previous date 1188917920 previous date 1189430254 (head) /src/chbouib.c /src/chbouib.c /src/backup.scm /src/backup.scm /new-file.txt R 0 R 1 I 0 I 1 I 2 D 0 D 1 D 2 D 3 D 4

a cooperative/p2p backup daemon Backup directories versioning libchop Opportunistic Replication Service Discovery Avahi Storage Contribution put (key, data) Authentication GnuTLS Cooperation & Replication Policies File System Networking put

your idea here

storage in GNU tar cpio RCS? GNUnet Sharutils

Summary libchop is cool!

Summary mechanisms, not policy content-addressable storage, content-hash keys, etc. supports disseminated data blocks build distributed backup/storage tools!

Thanks! ludo@gnu.org http://www.nongnu.org/libchop/

Copyright 2010 Ludovic Courtès You may copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is available at http://www.gnu.org/licenses/gfdl.html.