Lamassu: Storage-Efficient Host-Side Encryption
|
|
- Job Berry
- 6 years ago
- Views:
Transcription
1 Lamassu: Storage-Efficient Host-Side Encryption Peter Shah, Won So Advanced Technology Group 9 July, NetApp, Inc. All rights reserved.
2 Agenda 1) Overview 2) Security 3) Solution Architecture 4) Experimental Results 5) Conclusion NetApp, Inc. All rights reserved.
3 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc NetApp, Inc. All rights reserved.
4 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain NetApp, Inc. All rights reserved.
5 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain NetApp, Inc. All rights reserved.
6 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain 3) Preserve storage deduplication Use convergent encryption Focus on block-oriented deduplication NetApp, Inc. All rights reserved.
7 Overview Architectural Goals 1) Enable external / untrusted storage Public Clouds, etc. 2) Provide data security Restrict trust domain Lamassu 3) Preserve storage deduplication Use convergent encryption Focus on block-oriented deduplication 4) Work with existing applications Transparent addition No changes to app or storage systems Self-contained* NetApp, Inc. All rights reserved.
8 Security Encryption Model NetApp, Inc. All rights reserved.
9 Convergent Encryption (CE) Equality-Preserving Encryption For any given plain text, convergent encryption will always produce the same cipher text NetApp, Inc. All rights reserved.
10 Convergent Encryption Message-Locked Encryption (MLE) For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Hash Block Key Data Block AES Cipher Text Message-locked encryption path NetApp, Inc. All rights reserved.
11 Convergent Encryption Message-Locked Encryption (MLE) For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Block Key Data Block AES Cipher Block Message-locked decryption path NetApp, Inc. All rights reserved.
12 Convergent Encryption Message-Locked Encryption (MLE) For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Block Key Data Block AES Cipher Block Message-locked decryption path NetApp, Inc. All rights reserved.
13 Convergent Encryption Key Storage For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Hash Block Key? Data Block AES Cipher Block NetApp, Inc. All rights reserved.
14 Convergent Encryption Key Storage For any given plain text, convergent encryption will always produce the same cipher text. Most common form: Key derived from data Secret Key Hash Block Key AES Non-convergent Data Block AES Cipher Block NetApp, Inc. All rights reserved.
15 Metadata Storage Key Storage Architecture NetApp, Inc. All rights reserved.
16 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file File Data Keys NetApp, Inc. All rights reserved.
17 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file Store keys inside each file Preserve transparency Allow external storage to copy, rename, etc. File Data Stored NetApp, Inc. All rights reserved.
18 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file Store keys inside each file Preserve transparency Allow external storage to copy, rename, etc. Separate data from metadata Keep keys from polluting duplicate blocks Keep added data from breaking block alignment File Data Stored NetApp, Inc. All rights reserved.
19 Keys as Metadata Transparent Key Management Treat per-block hash-keys as file metadata Potentially hundreds, or thousands per file Store keys inside each file Preserve transparency Allow external storage to copy, rename, etc. Separate data from metadata Keep keys from polluting duplicate blocks Keep added data from breaking block alignment File Data Stored NetApp, Inc. All rights reserved.
20 File Structure Logical File Layout Segment 0 Segment 1 Segment 2 Segment n Fixed-Size Segment NetApp, Inc. All rights reserved.
21 File Structure Logical File Layout Segment 0 Segment 1 Segment 2 Segment n Fixed-Size Segment Physical Offset 0 Metadata Data 0 Data 1 Data 2 Data m Logical Offset 0 Fixed-Size Data Block NetApp, Inc. All rights reserved.
22 File Structure Logical File Layout Segment 0 Segment 1 Segment 2 Segment n Fixed-Size Segment Physical Offset 0 Metadata Data 0 Data 1 Data 2 Data m Logical Offset 0 Fixed-Size Data Block Meta Slot 0 Slot 1 Slot 2 Slot m Key Table Slot NetApp, Inc. All rights reserved.
23 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes NetApp, Inc. All rights reserved.
24 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N NetApp, Inc. All rights reserved.
25 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N NetApp, Inc. All rights reserved.
26 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N Write Meta N N Block N NetApp, Inc. All rights reserved.
27 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N Write Meta N N Block N Write Data N N Block N NetApp, Inc. All rights reserved.
28 Metadata Consistency Crash Detection and Recovery Data and metadata must be in sync Depends on underlying storage to prevent partial writes Starting State N Block N Update Block Block N N Write Meta N N Block N Write Data N N Block N Stale keys are cleaned up during subsequent metadata updates NetApp, Inc. All rights reserved.
29 Results Storage Efficiency & Performance NetApp, Inc. All rights reserved.
30 Overview Prototype Implementation Application FUSE Lamassu Key Manager VFS Network Linux Kernel NFS Remote Storage System NetApp, Inc. All rights reserved.
31 Comparison with other Systems Benchmarking Strategy 1) PlainFS FUSE-based (pass-through) NetApp, Inc. All rights reserved.
32 Comparison with other Systems Benchmarking Strategy 1) PlainFS FUSE-based (pass-through) 2) EncFS FUSE-based Provides AES encryption NetApp, Inc. All rights reserved.
33 Comparison with other Systems Benchmarking Strategy 1) PlainFS FUSE-based (pass-through) 2) EncFS FUSE-based Provides AES encryption 3) LamassuFS FUSE-based Provides AES encryption Provides convergent encryption NetApp, Inc. All rights reserved.
34 Deduplication Results Comparison of Deduplication Ratios 100 Relative data size after deduplication (%) PlainFS EncFS LamassuFS Percentage of redundancy in raw data NetApp, Inc. All rights reserved.
35 Deduplication Results Comparison of Deduplication Ratios 100 Relative data size after deduplication (%) PlainFS EncFS LamassuFS Percentage of redundancy in raw data NetApp, Inc. All rights reserved.
36 Singe File I/O Throughput Comparison with other FUSE systems using remote NFS storage I/O Bandwidth PlainFS EncFS LamassuFS 25 0 seq-write seq-read rand-write rand-read rand-rw NetApp, Inc. All rights reserved.
37 Single File I/O Throughput Comparison with other FUSE systems using local DRAM storage 1000 I/O Bandwidth 100 PlainFS EncFS LamassuFS 10 seq-write seq-read rand-write rand-read rand-rw NetApp, Inc. All rights reserved.
38 Conclusions Recap and Observations Strong security on shared storage Uses standard encryption techniques Preserves storage-based deduplication Transparent to both application and storage Easy to deploy Flexible user-mode architecture Can integrate with other host-side technologies NetApp, Inc. All rights reserved.
39 Conclusions Recap and Observations Strong security on shared storage Uses standard encryption techniques Preserves storage-based deduplication Transparent to both application and storage Easy to deploy Flexible user-mode architecture Can integrate with other host-side technologies Special Thanks James Kelley Questions? NetApp, Inc. All rights reserved.
40 Thank You NetApp, Inc. All rights reserved.
Lamassu: Storage-Efficient Host-Side Encryption
Lamassu: Storage-Efficient Host-Side Encryption Peter Shah and Won So, NetApp Inc. https://www.usenix.org/conference/atc15/technical-session/presentation/shah This paper is included in the Proceedings
More informationCOS 318: Operating Systems. NSF, Snapshot, Dedup and Review
COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationRio-2 Hybrid Backup Server
A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject
More informationThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationSecure Data De-Duplication With Dynamic Ownership Management In Cloud Storage
Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,
More informationOPERATING SYSTEM. Chapter 12: File System Implementation
OPERATING SYSTEM Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management
More informationStorage and File Hierarchy
COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system
More informationCOS 318: Operating Systems
COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind
More informationChapter 11: Implementing File Systems
Chapter 11: Implementing File Systems Operating System Concepts 99h Edition DM510-14 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation
More informationChapter 12: File System Implementation
Chapter 12: File System Implementation Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency
More informationDeploying Software Defined Storage for the Enterprise with Ceph. PRESENTATION TITLE GOES HERE Paul von Stamwitz Fujitsu
Deploying Software Defined Storage for the Enterprise with Ceph PRESENTATION TITLE GOES HERE Paul von Stamwitz Fujitsu Agenda Yet another attempt to define SDS Quick Overview of Ceph from a SDS perspective
More informationChapter 10: File System Implementation
Chapter 10: File System Implementation Chapter 10: File System Implementation File-System Structure" File-System Implementation " Directory Implementation" Allocation Methods" Free-Space Management " Efficiency
More informationDeduplication Storage System
Deduplication Storage System Kai Li Charles Fitzmorris Professor, Princeton University & Chief Scientist and Co-Founder, Data Domain, Inc. 03/11/09 The World Is Becoming Data-Centric CERN Tier 0 Business
More informationV. File System. SGG9: chapter 11. Files, directories, sharing FS layers, partitions, allocations, free space. TDIU11: Operating Systems
V. File System SGG9: chapter 11 Files, directories, sharing FS layers, partitions, allocations, free space TDIU11: Operating Systems Ahmed Rezine, Linköping University Copyright Notice: The lecture notes
More informationGlusterFS Architecture & Roadmap
GlusterFS Architecture & Roadmap Vijay Bellur GlusterFS co-maintainer http://twitter.com/vbellur Agenda What is GlusterFS? Architecture Integration Use Cases Future Directions Challenges Q&A What is GlusterFS?
More informationOPERATING SYSTEMS II DPL. ING. CIPRIAN PUNGILĂ, PHD.
OPERATING SYSTEMS II DPL. ING. CIPRIAN PUNGILĂ, PHD. File System Implementation FILES. DIRECTORIES (FOLDERS). FILE SYSTEM PROTECTION. B I B L I O G R A P H Y 1. S I L B E R S C H AT Z, G A L V I N, A N
More informationChapter 12: File System Implementation. Operating System Concepts 9 th Edition
Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods
More informationSoftware-defined Storage: Fast, Safe and Efficient
Software-defined Storage: Fast, Safe and Efficient TRY NOW Thanks to Blockchain and Intel Intelligent Storage Acceleration Library Every piece of data is required to be stored somewhere. We all know about
More informationChapter 12: File System Implementation
Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Directory Implementation Allocation Methods
More informationCOS 318: Operating Systems. Journaling, NFS and WAFL
COS 318: Operating Systems Journaling, NFS and WAFL Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Journaling and LFS Network
More informationSMORE: A Cold Data Object Store for SMR Drives
SMORE: A Cold Data Object Store for SMR Drives Peter Macko, Xiongzi Ge, John Haskins Jr.*, James Kelley, David Slik, Keith A. Smith, and Maxim G. Smith Advanced Technology Group NetApp, Inc. * Qualcomm
More informationWeek 12: File System Implementation
Week 12: File System Implementation Sherif Khattab http://www.cs.pitt.edu/~skhattab/cs1550 (slides are from Silberschatz, Galvin and Gagne 2013) Outline File-System Structure File-System Implementation
More informationCHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.
CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File
More informationA New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd.
A New Key-value Data Store For Heterogeneous Storage Architecture Intel APAC R&D Ltd. 1 Agenda Introduction Background and Motivation Hybrid Key-Value Data Store Architecture Overview Design details Performance
More informationCS307: Operating Systems
CS307: Operating Systems Chentao Wu 吴晨涛 Associate Professor Dept. of Computer Science and Engineering Shanghai Jiao Tong University SEIEE Building 3-513 wuct@cs.sjtu.edu.cn Download Lectures ftp://public.sjtu.edu.cn
More informationChapter 11: Implementing File
Chapter 11: Implementing File Systems Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency
More informationChapter 11: Implementing File Systems. Operating System Concepts 9 9h Edition
Chapter 11: Implementing File Systems Operating System Concepts 9 9h Edition Silberschatz, Galvin and Gagne 2013 Chapter 11: Implementing File Systems File-System Structure File-System Implementation Directory
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationSecurity features for UBIFS. Richard Weinberger sigma star gmbh
Richard Weinberger sigma star gmbh /me Richard Weinberger Co-founder of sigma star gmbh Linux kernel developer and maintainer Strong focus on Linux kernel, lowlevel components, virtualization, security
More informationBackup Solution. User Guide. Issue 01 Date
Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3
More informationStrata: A Cross Media File System. Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas Anderson
A Cross Media File System Youngjin Kwon, Henrique Fingler, Tyler Hunt, Simon Peter, Emmett Witchel, Thomas Anderson 1 Let s build a fast server NoSQL store, Database, File server, Mail server Requirements
More informationCA485 Ray Walshe Google File System
Google File System Overview Google File System is scalable, distributed file system on inexpensive commodity hardware that provides: Fault Tolerance File system runs on hundreds or thousands of storage
More informationCloud Computing CS
Cloud Computing CS 15-319 Distributed File Systems and Cloud Storage Part I Lecture 12, Feb 22, 2012 Majd F. Sakr, Mohammad Hammoud and Suhail Rehman 1 Today Last two sessions Pregel, Dryad and GraphLab
More informationDon t stack your Log on my Log
Don t stack your Log on my Log Jingpei Yang, Ned Plasson, Greg Gillis, Nisha Talagala, Swaminathan Sundararaman Oct 5, 2014 c 1 Outline Introduction Log-stacking models Problems with stacking logs Solutions
More informationEMC VNX2 Deduplication and Compression
White Paper VNX5200, VNX5400, VNX5600, VNX5800, VNX7600, & VNX8000 Maximizing effective capacity utilization Abstract This white paper discusses the capacity optimization technologies delivered in the
More informationCurrent Topics in OS Research. So, what s hot?
Current Topics in OS Research COMP7840 OSDI Current OS Research 0 So, what s hot? Operating systems have been around for a long time in many forms for different types of devices It is normally general
More informationNasuni UniFS a True Global File System
Nasuni UniFS a True Global File System File systems are the time-proven way to store, share, and protect unstructured data. But traditional device-based file systems no longer meet the needs of the modern
More informationDistributed File Systems II
Distributed File Systems II To do q Very-large scale: Google FS, Hadoop FS, BigTable q Next time: Naming things GFS A radically new environment NFS, etc. Independence Small Scale Variety of workloads Cooperation
More informationSoftware Defined Storage at the Speed of Flash. PRESENTATION TITLE GOES HERE Carlos Carrero Rajagopal Vaideeswaran Symantec
Software Defined Storage at the Speed of Flash PRESENTATION TITLE GOES HERE Carlos Carrero Rajagopal Vaideeswaran Symantec Agenda Introduction Software Technology Architecture Review Oracle Configuration
More informationRemote Data Checking for Network Codingbased. Distributed Storage Systems
CCSW 0 Remote Data Checking for Network Coding-based Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal Burns New Jersey Institute of Technology Johns Hopkins University Motivation Cloud storage can release
More informationImproving I/O Bandwidth With Cray DVS Client-Side Caching
Improving I/O Bandwidth With Cray DVS Client-Side Caching Bryce Hicks Cray Inc. Bloomington, MN USA bryceh@cray.com Abstract Cray s Data Virtualization Service, DVS, is an I/O forwarder providing access
More informationHigh-Performance Transaction Processing in Journaling File Systems Y. Son, S. Kim, H. Y. Yeom, and H. Han
High-Performance Transaction Processing in Journaling File Systems Y. Son, S. Kim, H. Y. Yeom, and H. Han Seoul National University, Korea Dongduk Women s University, Korea Contents Motivation and Background
More informationRestFS. Fabrizio Manfredi Furuholmen" Beolink.org!
RestFS Fabrizio Manfredi Furuholmen Agenda Introduction Storage System Storage evolution RestFS Goals Architecture Internals Configuration and Deploy Samba Interaction Disaster Recovery 2 SambaXP 2012
More informationIntroducing Tegile. Company Overview. Product Overview. Solutions & Use Cases. Partnering with Tegile
Tegile Systems 1 Introducing Tegile Company Overview Product Overview Solutions & Use Cases Partnering with Tegile 2 Company Overview Company Overview Te gile - [tey-jile] Tegile = technology + agile Founded
More informationIntroduction. File System Design for an NFS File Server Appliance. Introduction: WAFL. Introduction: NFS Appliance 4/1/2014
File System Design for an NFS File Server Appliance Dave Hitz, James Lau, and Michael Malcolm Technical Report TR3002 NetApp 2002 http://www.netapp.com/us/library/white papers/wp_3002.html (At WPI: http://www.wpi.edu/academics/ccc/help/unix/snapshots.html)
More informationUpdate for TF-Storage. TF-Storage September 22nd, 2014
Update for TF-Storage TF-Storage meeting @Uppsala, September 22nd, 2014 National Data Storage 2 Short reminder what is this about: Security in Cloud? April 1, 2014 The Heartbleed bug Feb 26, 2014 Is catastrophic
More informationOperating Systems CMPSC 473 File System Implementation April 10, Lecture 21 Instructor: Trent Jaeger
Operating Systems CMPSC 473 File System Implementation April 10, 2008 - Lecture 21 Instructor: Trent Jaeger Last class: File System Implementation Basics Today: File System Implementation Optimizations
More informationCascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching
Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching Kefei Wang and Feng Chen Louisiana State University SoCC '18 Carlsbad, CA Key-value Systems in Internet Services Key-value
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationTIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD
TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD 1 Backup Speed and Reliability Are the Top Data Protection Mandates What are the top data protection mandates from your organization s IT leadership?
More informationIntegrity Checking in Cryptographic File Systems with Constant Trusted Storage
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage Alina Oprea Michael K. Reiter November 2006 CMU-CS-06-167 School of Computer Science Carnegie Mellon University Pittsburgh,
More information[537] RAID. Tyler Harter
[537] RAID Tyler Harter Review Disks/Devices Device Protocol Variants Status checks: polling vs. interrupts Data: PIO vs. DMA Control: special instructions vs. memory-mapped I/O Disks Doing an I/O requires:
More informationExample Implementations of File Systems
Example Implementations of File Systems Last modified: 22.05.2017 1 Linux file systems ext2, ext3, ext4, proc, swap LVM Contents ZFS/OpenZFS NTFS - the main MS Windows file system 2 Linux File Systems
More informationArchitecting Storage for Semiconductor Design: Manufacturing Preparation
White Paper Architecting Storage for Semiconductor Design: Manufacturing Preparation March 2012 WP-7157 EXECUTIVE SUMMARY The manufacturing preparation phase of semiconductor design especially mask data
More informationFilesystem. Disclaimer: some slides are adopted from book authors slides with permission
Filesystem Disclaimer: some slides are adopted from book authors slides with permission 1 Recap Directory A special file contains (inode, filename) mappings Caching Directory cache Accelerate to find inode
More informationZBD: Using Transparent Compression at the Block Level to Increase Storage Space Efficiency
ZBD: Using Transparent Compression at the Block Level to Increase Storage Space Efficiency Thanos Makatos, Yannis Klonatos, Manolis Marazakis, Michail D. Flouris, and Angelos Bilas {mcatos,klonatos,maraz,flouris,bilas}@ics.forth.gr
More informationStorage and File System
COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File
More informationLevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine
777 LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine Hak-Su Lim and Jin-Soo Kim *College of Info. & Comm. Engineering, Sungkyunkwan University, Korea {haksu.lim,
More informationStaggeringly Large Filesystems
Staggeringly Large Filesystems Evan Danaher CS 6410 - October 27, 2009 Outline 1 Large Filesystems 2 GFS 3 Pond Outline 1 Large Filesystems 2 GFS 3 Pond Internet Scale Web 2.0 GFS Thousands of machines
More informationEI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)
EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:
More informationImplementation and Performance Evaluation of RAPID-Cache under Linux
Implementation and Performance Evaluation of RAPID-Cache under Linux Ming Zhang, Xubin He, and Qing Yang Department of Electrical and Computer Engineering, University of Rhode Island, Kingston, RI 2881
More informationSpeeding Up Cloud/Server Applications Using Flash Memory
Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta and Jin Li Microsoft Research, Redmond, WA, USA Contains work that is joint with Biplob Debnath (Univ. of Minnesota) Flash Memory
More informationOffloaded Data Transfers (ODX) Virtual Fibre Channel for Hyper-V. Application storage support through SMB 3.0. Storage Spaces
2 ALWAYS ON, ENTERPRISE-CLASS FEATURES ON LESS EXPENSIVE HARDWARE ALWAYS UP SERVICES IMPROVED PERFORMANCE AND MORE CHOICE THROUGH INDUSTRY INNOVATION Storage Spaces Application storage support through
More informationUsing Cohesity with Amazon Web Services (AWS)
Using Cohesity with Amazon Web Services (AWS) Achieve your long-term retention and archival objectives for secondary data Cohesity DataPlatform is a hyperconverged secondary data and application solution
More informationChapter 12: File System Implementation
Chapter 12: File System Implementation Silberschatz, Galvin and Gagne 2013 Chapter 12: File System Implementation File-System Structure File-System Implementation Allocation Methods Free-Space Management
More informationDeduplication and Incremental Accelleration in Bacula with NetApp Technologies. Peter Buschman EMEA PS Consultant September 25th, 2012
Deduplication and Incremental Accelleration in Bacula with NetApp Technologies Peter Buschman EMEA PS Consultant September 25th, 2012 1 NetApp and Bacula Systems Bacula Systems became a NetApp Developer
More informationCloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks
CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System
More informationCOS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy
Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients
More information-Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St.
-Presented By : Rajeshwari Chatterjee Professor-Andrey Shevel Course: Computing Clusters Grid and Clouds ITMO University, St. Petersburg Introduction File System Enterprise Needs Gluster Revisited Ceph
More informationWhat is a file system
COSC 6397 Big Data Analytics Distributed File Systems Edgar Gabriel Spring 2017 What is a file system A clearly defined method that the OS uses to store, catalog and retrieve files Manage the bits that
More informationECE 598 Advanced Operating Systems Lecture 19
ECE 598 Advanced Operating Systems Lecture 19 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 7 April 2016 Homework #7 was due Announcements Homework #8 will be posted 1 Why use
More informationAdvanced Systems Security: Virtual Machine Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
More informationSTORAGE LATENCY x. RAMAC 350 (600 ms) NAND SSD (60 us)
1 STORAGE LATENCY 2 RAMAC 350 (600 ms) 1956 10 5 x NAND SSD (60 us) 2016 COMPUTE LATENCY 3 RAMAC 305 (100 Hz) 1956 10 8 x 1000x CORE I7 (1 GHZ) 2016 NON-VOLATILE MEMORY 1000x faster than NAND 3D XPOINT
More informationJanuary 28-29, 2014 San Jose
January 28-29, 2014 San Jose Flash for the Future Software Optimizations for Non Volatile Memory Nisha Talagala, Lead Architect, Fusion-io Gary Orenstein, Chief Marketing Officer, Fusion-io @garyorenstein
More informationIntel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron
Real World Cryptography Conference 2016 6-8 January 2016, Stanford, CA, USA Intel Software Guard Extensions (Intel SGX) Memory Encryption Engine (MEE) Shay Gueron Intel Corp., Intel Development Center,
More informationThe Linux Kernel Cryptographic API
Published on Linux Journal (http://www.linuxjournal.com) The Linux Kernel Cryptographic API By James Morris Created 2003-04-01 02:00 This article provides a brief overview of the new cryptographic API
More informationAuthenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas
Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srini Devadas Massachusetts Institute of Technology November 8th, CCSW 2013 Cloud Storage Model
More informationStorage Performance Validation for Panzura
Storage Performance Validation for Panzura Ensuring seamless cloud storage performance for Panzura s Quicksilver Product Suite WHITEPAPER Table of Contents Background on Panzura...3 Storage Performance
More informationSee what s new: Data Domain Global Deduplication Array, DD Boost and more. Copyright 2010 EMC Corporation. All rights reserved.
See what s new: Data Domain Global Deduplication Array, DD Boost and more 2010 1 EMC Backup Recovery Systems (BRS) Division EMC Competitor Competitor Competitor Competitor Competitor Competitor Competitor
More informationSecure Key Management and Data Privacy on z/tpf
z/tpf EE V1.1 z/tpfdf V1.1 TPF Toolkit for WebSphere Studio V3 TPF Operations Server V1.2 IBM Software Group TPF Users Group Spring 2006 Secure Key Management and Data Privacy on z/tpf Name : Mark Gambino
More informationHPE SimpliVity. The new powerhouse in hyperconvergence. Boštjan Dolinar HPE. Maribor Lancom
HPE SimpliVity The new powerhouse in hyperconvergence Boštjan Dolinar HPE Maribor Lancom 2.2.2018 Changing requirements drive the need for Hybrid IT Application explosion Hybrid growth 2014 5,500 2015
More information416 Distributed Systems. Distributed File Systems 1: NFS Sep 18, 2018
416 Distributed Systems Distributed File Systems 1: NFS Sep 18, 2018 1 Outline Why Distributed File Systems? Basic mechanisms for building DFSs Using NFS and AFS as examples NFS: network file system AFS:
More informationPresented by: Alvaro Llanos E
Presented by: Alvaro Llanos E Motivation and Overview Frangipani Architecture overview Similar DFS PETAL: Distributed virtual disks Overview Design Virtual Physical mapping Failure tolerance Frangipani
More informationThe CephFS Gateways Samba and NFS-Ganesha. David Disseldorp Supriti Singh
The CephFS Gateways Samba and NFS-Ganesha David Disseldorp ddiss@samba.org Supriti Singh supriti.singh@suse.com Agenda Why Exporting CephFS over Samba and NFS-Ganesha What Architecture & Features Samba
More informationAzor: Using Two-level Block Selection to Improve SSD-based I/O caches
Azor: Using Two-level Block Selection to Improve SSD-based I/O caches Yannis Klonatos, Thanos Makatos, Manolis Marazakis, Michail D. Flouris, Angelos Bilas {klonatos, makatos, maraz, flouris, bilas}@ics.forth.gr
More informationClustering. RNA-seq: What is it good for? Finding Similarly Expressed Genes. Data... And Lots of It!
RNA-seq: What is it good for? Clustering High-throughput RNA sequencing experiments (RNA-seq) offer the ability to measure simultaneously the expression level of thousands of genes in a single experiment!
More informationStorage Systems for Shingled Disks
Storage Systems for Shingled Disks Garth Gibson Carnegie Mellon University and Panasas Inc Anand Suresh, Jainam Shah, Xu Zhang, Swapnil Patil, Greg Ganger Kryder s Law for Magnetic Disks Market expects
More informationDATA PROTECTION FOR THE CLOUD
DATA PROTECTION FOR THE CLOUD ERWIN FREISLEBEN ADVISORY SYSTEMS ENGINEER, DELL EMC Data Protection Everywhere Where You Need It Consumption Models On-Prem Continuous Availability Virtualized Converged
More informationGoogle File System. Arun Sundaram Operating Systems
Arun Sundaram Operating Systems 1 Assumptions GFS built with commodity hardware GFS stores a modest number of large files A few million files, each typically 100MB or larger (Multi-GB files are common)
More informationDELL EMC DATA DOMAIN ENCRYPTION
WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers
More informationOracle Secure Backup 12.1 Technical Overview
Oracle Secure Backup 12.1 Technical Overview February 12, 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationMing Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay
Hardware and Architectural Support for Security and Privacy (HASP 18), June 2, 2018, Los Angeles, CA, USA Ming Ming Wong Jawad Haj-Yahya Anupam Chattopadhyay Computing and Engineering (SCSE) Nanyang Technological
More informationFunctional Partitioning to Optimize End-to-End Performance on Many-core Architectures
Functional Partitioning to Optimize End-to-End Performance on Many-core Architectures Min Li, Sudharshan S. Vazhkudai, Ali R. Butt, Fei Meng, Xiaosong Ma, Youngjae Kim,Christian Engelmann, and Galen Shipman
More informationSCONE: Secure Linux Container Environments with Intel SGX
SCONE: Secure Linux Container Environments with Intel SGX S. Arnautov, B. Trach, F. Gregor, Thomas Knauth, and A. Martin, Technische Universität Dresden; C. Priebe, J. Lind, D. Muthukumaran, D. O'Keeffe,
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationPetal and Frangipani
Petal and Frangipani Petal/Frangipani NFS NAS Frangipani SAN Petal Petal/Frangipani Untrusted OS-agnostic NFS FS semantics Sharing/coordination Frangipani Disk aggregation ( bricks ) Filesystem-agnostic
More informationLOAD BALANCING AND DEDUPLICATION
LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such
More informationFaRM: Fast Remote Memory
FaRM: Fast Remote Memory Problem Context DRAM prices have decreased significantly Cost effective to build commodity servers w/hundreds of GBs E.g. - cluster with 100 machines can hold tens of TBs of main
More informationThe Google File System
The Google File System By Ghemawat, Gobioff and Leung Outline Overview Assumption Design of GFS System Interactions Master Operations Fault Tolerance Measurements Overview GFS: Scalable distributed file
More information