Lamassu: Storage-Efficient Host-Side Encryption

Size: px
Start display at page:

Download "Lamassu: Storage-Efficient Host-Side Encryption"

Transcription

1 Lamassu: Storage-Efficient Host-Side Encryption Peter Shah, Won So Advanced Technology Group 9 July, NetApp, Inc. All rights reserved.

2 Agenda 1) Overview 2) Security 3) Solution Architecture 4) Experimental Results 5) Conclusion NetApp, Inc. All rights reserved.

3 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc NetApp, Inc. All rights reserved.

4 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain NetApp, Inc. All rights reserved.

5 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain NetApp, Inc. All rights reserved.

6 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain 3) Preserve storage deduplication Use convergent encryption Focus on block-oriented deduplication NetApp, Inc. All rights reserved.

7 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain Lamassu 3) Preserve storage deduplication Use convergent encryption Focus on block-oriented deduplication 4) Work with existing applications Transparent addition No changes to app or storage systems Self-contained* NetApp, Inc. All rights reserved.

8 Security Encryption Model NetApp, Inc. All rights reserved.

9 Convergent Encryption (CE) Equality-Preserving Encryption For any given plain text, convergent encryption will always produce the same cipher text NetApp, Inc. All rights reserved.

10 Convergent Encryption Message-Locked Encryption (MLE) For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Hash Block Key Data Block AES Cipher Text Message-locked encryption path NetApp, Inc. All rights reserved.

11 Convergent Encryption Message-Locked Encryption (MLE) For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Block Key Data Block AES Cipher Block Message-locked decryption path NetApp, Inc. All rights reserved.

12 Convergent Encryption Message-Locked Encryption (MLE) For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Block Key Data Block AES Cipher Block Message-locked decryption path NetApp, Inc. All rights reserved.

13 Convergent Encryption Key Storage For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Hash Block Key? Data Block AES Cipher Block NetApp, Inc. All rights reserved.

14 Convergent Encryption Key Storage For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Secret Key Hash Block Key AES Non-convergent Data Block AES Cipher Block NetApp, Inc. All rights reserved.

15 Metadata Storage Key Storage Architecture NetApp, Inc. All rights reserved.

16 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file File Data Keys NetApp, Inc. All rights reserved.

17 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file Store keys inside each file Preserve transparency Allow external storage to copy, rename, etc. File Data Stored NetApp, Inc. All rights reserved.

18 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file Store keys inside each file Preserve transparency Allow external storage to copy, rename, etc. Separate data from metadata Keep keys from polluting duplicate blocks Keep added data from breaking block alignment File Data Stored NetApp, Inc. All rights reserved.

19 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file Store keys inside each file Preserve transparency Allow external storage to copy, rename, etc. Separate data from metadata Keep keys from polluting duplicate blocks Keep added data from breaking block alignment File Data Stored NetApp, Inc. All rights reserved.

20 File Structure Logical File Layout Segment 0 Segment 1 Segment 2 Segment n Fixed-Size Segment NetApp, Inc. All rights reserved.

21 File Structure Logical File Layout Segment 0 Segment 1 Segment 2 Segment n Fixed-Size Segment Physical Offset 0 Metadata Data 0 Data 1 Data 2 Data m Logical Offset 0 Fixed-Size Data Block NetApp, Inc. All rights reserved.

22 File Structure Logical File Layout Segment 0 Segment 1 Segment 2 Segment n Fixed-Size Segment Physical Offset 0 Metadata Data 0 Data 1 Data 2 Data m Logical Offset 0 Fixed-Size Data Block Meta Slot 0 Slot 1 Slot 2 Slot m Key Table Slot NetApp, Inc. All rights reserved.

23 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes NetApp, Inc. All rights reserved.

24 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N NetApp, Inc. All rights reserved.

25 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N NetApp, Inc. All rights reserved.

26 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N Write Meta N N Block N NetApp, Inc. All rights reserved.

27 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N Write Meta N N Block N Write Data N N Block N NetApp, Inc. All rights reserved.

28 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N Write Meta N N Block N Write Data N N Block N Stale keys are cleaned up during subsequent metadata updates NetApp, Inc. All rights reserved.

29 Results Storage Efficiency & Performance NetApp, Inc. All rights reserved.

30 Overview Prototype Implementation Application FUSE Lamassu Key Manager VFS Network Linux Kernel NFS Remote Storage System NetApp, Inc. All rights reserved.

31 Comparison with other Systems Benchmarking Strategy 1) PlainFS FUSE-based (pass-through) NetApp, Inc. All rights reserved.

32 Comparison with other Systems Benchmarking Strategy 1) PlainFS FUSE-based (pass-through) 2) EncFS FUSE-based Provides AES encryption NetApp, Inc. All rights reserved.

33 Comparison with other Systems Benchmarking Strategy 1) PlainFS FUSE-based (pass-through) 2) EncFS FUSE-based Provides AES encryption 3) LamassuFS FUSE-based Provides AES encryption Provides convergent encryption NetApp, Inc. All rights reserved.

34 Deduplication Results Comparison of Deduplication Ratios 100 Relative data size after deduplication (%) PlainFS EncFS LamassuFS Percentage of redundancy in raw data NetApp, Inc. All rights reserved.

35 Deduplication Results Comparison of Deduplication Ratios 100 Relative data size after deduplication (%) PlainFS EncFS LamassuFS Percentage of redundancy in raw data NetApp, Inc. All rights reserved.

36 Singe File I/O Throughput Comparison with other FUSE systems using remote NFS storage I/O Bandwidth PlainFS EncFS LamassuFS 25 0 seq-write seq-read rand-write rand-read rand-rw NetApp, Inc. All rights reserved.

37 Single File I/O Throughput Comparison with other FUSE systems using local DRAM storage 1000 I/O Bandwidth 100 PlainFS EncFS LamassuFS 10 seq-write seq-read rand-write rand-read rand-rw NetApp, Inc. All rights reserved.

38 Conclusions Recap and Observations Strong security on shared storage Uses standard encryption techniques Preserves storage-based deduplication Transparent to both application and storage Easy to deploy Flexible user-mode architecture Can integrate with other host-side technologies NetApp, Inc. All rights reserved.

39 Conclusions Recap and Observations Strong security on shared storage Uses standard encryption techniques Preserves storage-based deduplication Transparent to both application and storage Easy to deploy Flexible user-mode architecture Can integrate with other host-side technologies Special Thanks James Kelley Questions? NetApp, Inc. All rights reserved.

40 Thank You NetApp, Inc. All rights reserved.

Lamassu: Storage-Efficient Host-Side Encryption

Lamassu: Storage-Efficient Host-Side Encryption Lamassu: Storage-Efficient Host-Side Encryption Peter Shah and Won So, NetApp Inc. https://www.usenix.org/conference/atc15/technical-session/presentation/shah This paper is included in the Proceedings

More information

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early

More information

Encrypted Data Deduplication in Cloud Storage

Encrypted Data Deduplication in Cloud Storage Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline

More information

Rio-2 Hybrid Backup Server

Rio-2 Hybrid Backup Server A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

OPERATING SYSTEM. Chapter 12: File System Implementation

OPERATING SYSTEM. Chapter 12: File System Implementation OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management

More information

Storage and File Hierarchy

Storage and File Hierarchy COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system

More information

COS 318: Operating Systems

COS 318: Operating Systems COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind

More information

Chapter 11: Implementing File Systems

Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems Operating System Concepts 99h Edition DM510-14 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation

More information

Chapter 12: File System Implementation

Chapter 12: File System Implementation Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Deploying Software Defined Storage for the Enterprise with Ceph. PRESENTATION TITLE GOES HERE Paul von Stamwitz Fujitsu

Deploying Software Defined Storage for the Enterprise with Ceph. PRESENTATION TITLE GOES HERE Paul von Stamwitz Fujitsu Deploying Software Defined Storage for the Enterprise with Ceph PRESENTATION TITLE GOES HERE Paul von Stamwitz Fujitsu Agenda Yet another attempt to define SDS Quick Overview of Ceph from a SDS perspective

More information

Chapter 10: File System Implementation

Chapter 10: File System Implementation Chapter 10: File System Implementation Chapter 10: File System Implementation File-System Structure" File-System Implementation " Directory Implementation" Allocation Methods" Free-Space Management " Efficiency

More information

Deduplication Storage System

Deduplication Storage System Deduplication Storage System Kai Li Charles Fitzmorris Professor, Princeton University & Chief Scientist and Co-Founder, Data Domain, Inc. 03/11/09 The World Is Becoming Data-Centric CERN Tier 0 Business

More information

V. File System. SGG9: chapter 11. Files, directories, sharing FS layers, partitions, allocations, free space. TDIU11: Operating Systems

V. File System. SGG9: chapter 11. Files, directories, sharing FS layers, partitions, allocations, free space. TDIU11: Operating Systems V. File System SGG9: chapter 11 Files, directories, sharing FS layers, partitions, allocations, free space TDIU11: Operating Systems Ahmed Rezine, Linköping University Copyright Notice: The lecture notes

More information

GlusterFS Architecture & Roadmap

GlusterFS Architecture & Roadmap GlusterFS Architecture & Roadmap Vijay Bellur GlusterFS co-maintainer http://twitter.com/vbellur Agenda What is GlusterFS? Architecture Integration Use Cases Future Directions Challenges Q&A What is GlusterFS?

More information

OPERATING SYSTEMS II DPL. ING. CIPRIAN PUNGILĂ, PHD.

OPERATING SYSTEMS II DPL. ING. CIPRIAN PUNGILĂ, PHD. OPERATING SYSTEMS II DPL. ING. CIPRIAN PUNGILĂ, PHD. File System Implementation FILES. DIRECTORIES (FOLDERS). FILE SYSTEM PROTECTION. B I B L I O G R A P H Y 1. S I L B E R S C H AT Z, G A L V I N, A N

More information

Chapter 12: File System Implementation. Operating System Concepts 9 th Edition

Chapter 12: File System Implementation. Operating System Concepts 9 th Edition Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods

More information

Software-defined Storage: Fast, Safe and Efficient

Software-defined Storage: Fast, Safe and Efficient Software-defined Storage: Fast, Safe and Efficient TRY NOW Thanks to Blockchain and Intel Intelligent Storage Acceleration Library Every piece of data is required to be stored somewhere. We all know about

More information

Chapter 12: File System Implementation

Chapter 12: File System Implementation Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods

More information

COS 318: Operating Systems. Journaling, NFS and WAFL

COS 318: Operating Systems. Journaling, NFS and WAFL COS 318: Operating Systems Journaling, NFS and WAFL Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Journaling and LFS Network

More information

SMORE: A Cold Data Object Store for SMR Drives

SMORE: A Cold Data Object Store for SMR Drives SMORE: A Cold Data Object Store for SMR Drives Peter Macko, Xiongzi Ge, John Haskins Jr.*, James Kelley, David Slik, Keith A. Smith, and Maxim G. Smith Advanced Technology Group NetApp, Inc. * Qualcomm

More information

Week 12: File System Implementation

Week 12: File System Implementation Week 12: File System Implementation Sherif Khattab http://www.cs.pitt.edu/~skhattab/cs1550 (slides are from Silberschatz, Galvin and Gagne 2013) Outline File-System Structure File-System Implementation

More information

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File

More information

A New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd.

A New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd. A New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd. 1 Agenda Introduction Background and Motivation Hybrid Key-Value Data Store Architecture Overview Design details Performance

More information

CS307: Operating Systems

CS307: Operating Systems CS307: Operating Systems Chentao Wu 吴晨涛 Associate Professor Dept. of Computer Science and Engineering Shanghai Jiao Tong University SEIEE Building 3-513 wuct@cs.sjtu.edu.cn Download Lectures ftp://public.sjtu.edu.cn

More information

Chapter 11: Implementing File

Chapter 11: Implementing File Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency

More information

Chapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition

Chapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition Chapter 11: Implementing File Systems Operating System Concepts 9 9h Edition Silberschatz, Galvin and Gagne 2013 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Security features for UBIFS. Richard Weinberger sigma star gmbh

Security features for UBIFS. Richard Weinberger sigma star gmbh Richard Weinberger sigma star gmbh /me Richard Weinberger Co-founder of sigma star gmbh Linux kernel developer and maintainer Strong focus on Linux kernel, lowlevel components, virtualization, security

More information

Backup Solution. User Guide. Issue 01 Date

Backup Solution. User Guide. Issue 01 Date Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3

More information

Strata: A Cross Media File System. Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas Anderson

Strata: A Cross Media File System. Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas Anderson A Cross Media File System Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas Anderson 1 Let s build a fast server NoSQL store, Database, File server, Mail server Requirements

More information

CA485 Ray Walshe Google File System

CA485 Ray Walshe Google File System Google File System Overview Google File System is scalable, distributed file system on inexpensive commodity hardware that provides: Fault Tolerance File system runs on hundreds or thousands of storage

More information

Cloud Computing CS

Cloud Computing CS Cloud Computing CS 15-319 Distributed File Systems and Cloud Storage Part I Lecture 12, Feb 22, 2012 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last two sessions Pregel, Dryad and GraphLab

More information

Don t stack your Log on my Log

Don t stack your Log on my Log Don t stack your Log on my Log Jingpei Yang, Ned Plasson, Greg Gillis, Nisha Talagala, Swaminathan Sundararaman Oct 5, 2014 c 1 Outline Introduction Log-stacking models Problems with stacking logs Solutions

More information

EMC VNX2 Deduplication and Compression

EMC VNX2 Deduplication and Compression White Paper VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, & VNX8000 Maximizing effective capacity utilization Abstract This white paper discusses the capacity optimization technologies delivered in the

More information

Current Topics in OS Research. So, what s hot?

Current Topics in OS Research. So, what s hot? Current Topics in OS Research COMP7840 OSDI Current OS Research 0 So, what s hot? Operating systems have been around for a long time in many forms for different types of devices It is normally general

More information

Nasuni UniFS a True Global File System

Nasuni UniFS a True Global File System Nasuni UniFS a True Global File System File systems are the time-proven way to store, share, and protect unstructured data. But traditional device-based file systems no longer meet the needs of the modern

More information

Distributed File Systems II

Distributed File Systems II Distributed File Systems II To do q Very-large scale: Google FS, Hadoop FS, BigTable q Next time: Naming things GFS A radically new environment NFS, etc. Independence Small Scale Variety of workloads Cooperation

More information

Software Defined Storage at the Speed of Flash. PRESENTATION TITLE GOES HERE Carlos Carrero Rajagopal Vaideeswaran Symantec

Software Defined Storage at the Speed of Flash. PRESENTATION TITLE GOES HERE Carlos Carrero Rajagopal Vaideeswaran Symantec Software Defined Storage at the Speed of Flash PRESENTATION TITLE GOES HERE Carlos Carrero Rajagopal Vaideeswaran Symantec Agenda Introduction Software Technology Architecture Review Oracle Configuration

More information

Remote Data Checking for Network Codingbased. Distributed Storage Systems

Remote Data Checking for Network Codingbased. Distributed Storage Systems CCSW 0 Remote Data Checking for Network Coding-based Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns New Jersey Institute of Technology Johns Hopkins University Motivation Cloud storage can release

More information

Improving I/O Bandwidth With Cray DVS Client-Side Caching

Improving I/O Bandwidth With Cray DVS Client-Side Caching Improving I/O Bandwidth With Cray DVS Client-Side Caching Bryce Hicks Cray Inc. Bloomington, MN USA bryceh@cray.com Abstract Cray s Data Virtualization Service, DVS, is an I/O forwarder providing access

More information

High-Performance Transaction Processing in Journaling File Systems Y. Son, S. Kim, H. Y. Yeom, and H. Han

High-Performance Transaction Processing in Journaling File Systems Y. Son, S. Kim, H. Y. Yeom, and H. Han High-Performance Transaction Processing in Journaling File Systems Y. Son, S. Kim, H. Y. Yeom, and H. Han Seoul National University, Korea Dongduk Women s University, Korea Contents Motivation and Background

More information

RestFS. Fabrizio Manfredi Furuholmen" Beolink.org!

RestFS. Fabrizio Manfredi Furuholmen Beolink.org! RestFS Fabrizio Manfredi Furuholmen Agenda Introduction Storage System Storage evolution RestFS Goals Architecture Internals Configuration and Deploy Samba Interaction Disaster Recovery 2 SambaXP 2012

More information

Introducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile

Introducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile Tegile Systems 1 Introducing Tegile Company Overview Product Overview Solutions & Use Cases Partnering with Tegile 2 Company Overview Company Overview Te gile - [tey-jile] Tegile = technology + agile Founded

More information

Introduction. File System Design for an NFS File Server Appliance. Introduction: WAFL. Introduction: NFS Appliance 4/1/2014

Introduction. File System Design for an NFS File Server Appliance. Introduction: WAFL. Introduction: NFS Appliance 4/1/2014 File System Design for an NFS File Server Appliance Dave Hitz, James Lau, and Michael Malcolm Technical Report TR3002 NetApp 2002 http://www.netapp.com/us/library/white papers/wp_3002.html (At WPI: http://www.wpi.edu/academics/ccc/help/unix/snapshots.html)

More information

Update for TF-Storage. TF-Storage September 22nd, 2014

Update for TF-Storage. TF-Storage September 22nd, 2014 Update for TF-Storage TF-Storage meeting @Uppsala, September 22nd, 2014 National Data Storage 2 Short reminder what is this about: Security in Cloud? April 1, 2014 The Heartbleed bug Feb 26, 2014 Is catastrophic

More information

Operating Systems CMPSC 473 File System Implementation April 10, Lecture 21 Instructor: Trent Jaeger

Operating Systems CMPSC 473 File System Implementation April 10, Lecture 21 Instructor: Trent Jaeger Operating Systems CMPSC 473 File System Implementation April 10, 2008 - Lecture 21 Instructor: Trent Jaeger Last class: File System Implementation Basics Today: File System Implementation Optimizations

More information

Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching

Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching Kefei Wang and Feng Chen Louisiana State University SoCC '18 Carlsbad, CA Key-value Systems in Internet Services Key-value

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD

TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD 1 Backup Speed and Reliability Are the Top Data Protection Mandates What are the top data protection mandates from your organization s IT leadership?

More information

Integrity Checking in Cryptographic File Systems with Constant Trusted Storage

Integrity Checking in Cryptographic File Systems with Constant Trusted Storage Integrity Checking in Cryptographic File Systems with Constant Trusted Storage Alina Oprea Michael K. Reiter November 2006 CMU-CS-06-167 School of Computer Science Carnegie Mellon University Pittsburgh,

More information

[537] RAID. Tyler Harter

[537] RAID. Tyler Harter [537] RAID Tyler Harter Review Disks/Devices Device Protocol Variants Status checks: polling vs. interrupts Data: PIO vs. DMA Control: special instructions vs. memory-mapped I/O Disks Doing an I/O requires:

More information

Example Implementations of File Systems

Example Implementations of File Systems Example Implementations of File Systems Last modified: 22.05.2017 1 Linux file systems ext2, ext3, ext4, proc, swap LVM Contents ZFS/OpenZFS NTFS - the main MS Windows file system 2 Linux File Systems

More information

Architecting Storage for Semiconductor Design: Manufacturing Preparation

Architecting Storage for Semiconductor Design: Manufacturing Preparation White Paper Architecting Storage for Semiconductor Design: Manufacturing Preparation March 2012 WP-7157 EXECUTIVE SUMMARY The manufacturing preparation phase of semiconductor design especially mask data

More information

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission

Filesystem. Disclaimer: some slides are adopted from book authors slides with permission Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Directory A special file contains (inode, filename) mappings Caching Directory cache Accelerate to find inode

More information

ZBD: Using Transparent Compression at the Block Level to Increase Storage Space Efficiency

ZBD: Using Transparent Compression at the Block Level to Increase Storage Space Efficiency ZBD: Using Transparent Compression at the Block Level to Increase Storage Space Efficiency Thanos Makatos, Yannis Klonatos, Manolis Marazakis, Michail D. Flouris, and Angelos Bilas {mcatos,klonatos,maraz,flouris,bilas}@ics.forth.gr

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine

LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine 777 LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine Hak-Su Lim and Jin-Soo Kim *College of Info. & Comm. Engineering, Sungkyunkwan University, Korea {haksu.lim,

More information

Staggeringly Large Filesystems

Staggeringly Large Filesystems Staggeringly Large Filesystems Evan Danaher CS 6410 - October 27, 2009 Outline 1 Large Filesystems 2 GFS 3 Pond Outline 1 Large Filesystems 2 GFS 3 Pond Internet Scale Web 2.0 GFS Thousands of machines

More information

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:

More information

Implementation and Performance Evaluation of RAPID-Cache under Linux

Implementation and Performance Evaluation of RAPID-Cache under Linux Implementation and Performance Evaluation of RAPID-Cache under Linux Ming Zhang, Xubin He, and Qing Yang Department of Electrical and Computer Engineering, University of Rhode Island, Kingston, RI 2881

More information

Speeding Up Cloud/Server Applications Using Flash Memory

Speeding Up Cloud/Server Applications Using Flash Memory Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta and Jin Li Microsoft Research, Redmond, WA, USA Contains work that is joint with Biplob Debnath (Univ. of Minnesota) Flash Memory

More information

Offloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces

Offloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces 2 ALWAYS ON, ENTERPRISE-CLASS FEATURES ON LESS EXPENSIVE HARDWARE ALWAYS UP SERVICES IMPROVED PERFORMANCE AND MORE CHOICE THROUGH INDUSTRY INNOVATION Storage Spaces Application storage support through

More information

Using Cohesity with Amazon Web Services (AWS)

Using Cohesity with Amazon Web Services (AWS) Using Cohesity with Amazon Web Services (AWS) Achieve your long-term retention and archival objectives for secondary data Cohesity DataPlatform is a hyperconverged secondary data and application solution

More information

Chapter 12: File System Implementation

Chapter 12: File System Implementation Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Allocation Methods Free-Space Management

More information

Deduplication and Incremental Accelleration in Bacula with NetApp Technologies. Peter Buschman EMEA PS Consultant September 25th, 2012

Deduplication and Incremental Accelleration in Bacula with NetApp Technologies. Peter Buschman EMEA PS Consultant September 25th, 2012 Deduplication and Incremental Accelleration in Bacula with NetApp Technologies Peter Buschman EMEA PS Consultant September 25th, 2012 1 NetApp and Bacula Systems Bacula Systems became a NetApp Developer

More information

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

-Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St.

-Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St. -Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St. Petersburg Introduction File System Enterprise Needs Gluster Revisited Ceph

More information

What is a file system

What is a file system COSC 6397 Big Data Analytics Distributed File Systems Edgar Gabriel Spring 2017 What is a file system A clearly defined method that the OS uses to store, catalog and retrieve files Manage the bits that

More information

ECE 598 Advanced Operating Systems Lecture 19

ECE 598 Advanced Operating Systems Lecture 19 ECE 598 Advanced Operating Systems Lecture 19 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 7 April 2016 Homework #7 was due Announcements Homework #8 will be posted 1 Why use

More information

Advanced Systems Security: Virtual Machine Systems

Advanced Systems Security: Virtual Machine Systems Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:

More information

STORAGE LATENCY x. RAMAC 350 (600 ms) NAND SSD (60 us)

STORAGE LATENCY x. RAMAC 350 (600 ms) NAND SSD (60 us) 1 STORAGE LATENCY 2 RAMAC 350 (600 ms) 1956 10 5 x NAND SSD (60 us) 2016 COMPUTE LATENCY 3 RAMAC 305 (100 Hz) 1956 10 8 x 1000x CORE I7 (1 GHZ) 2016 NON-VOLATILE MEMORY 1000x faster than NAND 3D XPOINT

More information

January 28-29, 2014 San Jose

January 28-29, 2014 San Jose January 28-29, 2014 San Jose Flash for the Future Software Optimizations for Non Volatile Memory Nisha Talagala, Lead Architect, Fusion-io Gary Orenstein, Chief Marketing Officer, Fusion-io @garyorenstein

More information

Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron

Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron Real World Cryptography Conference 2016 6-8 January 2016, Stanford, CA, USA Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron Intel Corp., Intel Development Center,

More information

The Linux Kernel Cryptographic API

The Linux Kernel Cryptographic API Published on Linux Journal (http://www.linuxjournal.com) The Linux Kernel Cryptographic API By James Morris Created 2003-04-01 02:00 This article provides a brief overview of the new cryptographic API

More information

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas Massachusetts Institute of Technology November 8th, CCSW 2013 Cloud Storage Model

More information

Storage Performance Validation for Panzura

Storage Performance Validation for Panzura Storage Performance Validation for Panzura Ensuring seamless cloud storage performance for Panzura s Quicksilver Product Suite WHITEPAPER Table of Contents Background on Panzura...3 Storage Performance

More information

See what s new: Data Domain Global Deduplication Array, DD Boost and more. Copyright 2010 EMC Corporation. All rights reserved.

See what s new: Data Domain Global Deduplication Array, DD Boost and more. Copyright 2010 EMC Corporation. All rights reserved. See what s new: Data Domain Global Deduplication Array, DD Boost and more 2010 1 EMC Backup Recovery Systems (BRS) Division EMC Competitor Competitor Competitor Competitor Competitor Competitor Competitor

More information

Secure Key Management and Data Privacy on z/tpf

Secure Key Management and Data Privacy on z/tpf z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 Secure Key Management and Data Privacy on z/tpf Name : Mark Gambino

More information

HPE SimpliVity. The new powerhouse in hyperconvergence. Boštjan Dolinar HPE. Maribor Lancom

HPE SimpliVity. The new powerhouse in hyperconvergence. Boštjan Dolinar HPE. Maribor Lancom HPE SimpliVity The new powerhouse in hyperconvergence Boštjan Dolinar HPE Maribor Lancom 2.2.2018 Changing requirements drive the need for Hybrid IT Application explosion Hybrid growth 2014 5,500 2015

More information

416 Distributed Systems. Distributed File Systems 1: NFS Sep 18, 2018

416 Distributed Systems. Distributed File Systems 1: NFS Sep 18, 2018 416 Distributed Systems Distributed File Systems 1: NFS Sep 18, 2018 1 Outline Why Distributed File Systems? Basic mechanisms for building DFSs Using NFS and AFS as examples NFS: network file system AFS:

More information

Presented by: Alvaro Llanos E

Presented by: Alvaro Llanos E Presented by: Alvaro Llanos E Motivation and Overview Frangipani Architecture overview Similar DFS PETAL: Distributed virtual disks Overview Design Virtual Physical mapping Failure tolerance Frangipani

More information

The CephFS Gateways Samba and NFS-Ganesha. David Disseldorp Supriti Singh

The CephFS Gateways Samba and NFS-Ganesha. David Disseldorp Supriti Singh The CephFS Gateways Samba and NFS-Ganesha David Disseldorp ddiss@samba.org Supriti Singh supriti.singh@suse.com Agenda Why Exporting CephFS over Samba and NFS-Ganesha What Architecture & Features Samba

More information

Azor: Using Two-level Block Selection to Improve SSD-based I/O caches

Azor: Using Two-level Block Selection to Improve SSD-based I/O caches Azor: Using Two-level Block Selection to Improve SSD-based I/O caches Yannis Klonatos, Thanos Makatos, Manolis Marazakis, Michail D. Flouris, Angelos Bilas {klonatos, makatos, maraz, flouris, bilas}@ics.forth.gr

More information

Clustering. RNA-seq: What is it good for? Finding Similarly Expressed Genes. Data... And Lots of It!

Clustering. RNA-seq: What is it good for? Finding Similarly Expressed Genes. Data... And Lots of It! RNA-seq: What is it good for? Clustering High-throughput RNA sequencing experiments (RNA-seq) offer the ability to measure simultaneously the expression level of thousands of genes in a single experiment!

More information

Storage Systems for Shingled Disks

Storage Systems for Shingled Disks Storage Systems for Shingled Disks Garth Gibson Carnegie Mellon University and Panasas Inc Anand Suresh, Jainam Shah, Xu Zhang, Swapnil Patil, Greg Ganger Kryder s Law for Magnetic Disks Market expects

More information

DATA PROTECTION FOR THE CLOUD

DATA PROTECTION FOR THE CLOUD DATA PROTECTION FOR THE CLOUD ERWIN FREISLEBEN ADVISORY SYSTEMS ENGINEER, DELL EMC Data Protection Everywhere Where You Need It Consumption Models On-Prem Continuous Availability Virtualized Converged

More information

Google File System. Arun Sundaram Operating Systems

Google File System. Arun Sundaram Operating Systems Arun Sundaram Operating Systems 1 Assumptions GFS built with commodity hardware GFS stores a modest number of large files A few million files, each typically 100MB or larger (Multi-GB files are common)

More information

DELL EMC DATA DOMAIN ENCRYPTION

DELL EMC DATA DOMAIN ENCRYPTION WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers

More information

Oracle Secure Backup 12.1 Technical Overview

Oracle Secure Backup 12.1 Technical Overview Oracle Secure Backup 12.1 Technical Overview February 12, 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay

Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay Hardware and Architectural Support for Security and Privacy (HASP 18), June 2, 2018, Los Angeles, CA, USA Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay Computing and Engineering (SCSE) Nanyang Technological

More information

Functional Partitioning to Optimize End-to-End Performance on Many-core Architectures

Functional Partitioning to Optimize End-to-End Performance on Many-core Architectures Functional Partitioning to Optimize End-to-End Performance on Many-core Architectures Min Li, Sudharshan S. Vazhkudai, Ali R. Butt, Fei Meng, Xiaosong Ma, Youngjae Kim,Christian Engelmann, and Galen Shipman

More information

SCONE: Secure Linux Container Environments with Intel SGX

SCONE: Secure Linux Container Environments with Intel SGX SCONE: Secure Linux Container Environments with Intel SGX S. Arnautov, B. Trach, F. Gregor, Thomas Knauth, and A. Martin, Technische Universität Dresden; C. Priebe, J. Lind, D. Muthukumaran, D. O'Keeffe,

More information

Resilient IoT Security: The end of flat security models

Resilient IoT Security: The end of flat security models Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security

More information

Petal and Frangipani

Petal and Frangipani Petal and Frangipani Petal/Frangipani NFS NAS Frangipani SAN Petal Petal/Frangipani Untrusted OS-agnostic NFS FS semantics Sharing/coordination Frangipani Disk aggregation ( bricks ) Filesystem-agnostic

More information

LOAD BALANCING AND DEDUPLICATION

LOAD BALANCING AND DEDUPLICATION LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such

More information

FaRM: Fast Remote Memory

FaRM: Fast Remote Memory FaRM: Fast Remote Memory Problem Context DRAM prices have decreased significantly Cost effective to build commodity servers w/hundreds of GBs E.g. - cluster with 100 machines can hold tens of TBs of main

More information

The Google File System

The Google File System The Google File System By Ghemawat, Gobioff and Leung Outline Overview Assumption Design of GFS System Interactions Master Operations Fault Tolerance Measurements Overview GFS: Scalable distributed file

More information