Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices

Mobile devices are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. We consider a fault-tolerance approach that exploits spontaneous interactions to implement a collaborative backup service. We define the constraints implied by the mobile environment, analyze how they translate into the storage layer of such a backup system and examine various design options. The paper concludes with a presentation of our prototype implementation of the storage layer, an evaluation of the impact of several compression methods, and directions for future work

[1]  Mahmoud Naghshineh,et al.  Bluetooth: vision, goals, and architecture , 1998, MOCO.

[2]  Andrew V. Goldberg,et al.  Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[3]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Henning Schulzrinne,et al.  A Performance Analysis of : A Peer-to-Peer Data Dissemination and Prefetching Tool for Mobile Users , 2003 .

[6]  A. Chervenak,et al.  Protecting File Systems : A Survey of Backup Techniques , 1998 .

[7]  W. Kent Fuchs,et al.  Message logging in mobile computing , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[8]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[9]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[10]  Cornelia Kappler,et al.  Enabling Mobile Peer-to-Peer Networking , 2004, EuroNGI Workshop.

[11]  Gil Utard,et al.  Data distribution in a peer to peer storage system , 2005, CCGRID.

[12]  Henning Schulzrinne,et al.  Seven degrees of separation in mobile ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[13]  David B. Johnson,et al.  Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[14]  Walter F. Tichy,et al.  An Empirical Study of Delta Algorithms , 1996, SCM.

[15]  Mario Kolberg,et al.  Tools for Peer-to-Peer Network Simulation , 2006 .

[16]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.

[17]  Mark Lillibridge,et al.  Peer-to-peer Cooperative Backup System , 2001 .

[18]  Pekka Nikander Fault Tolerance in Decentralized and Loosely Coupled Systems , 2000 .

[19]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  N. Asokan,et al.  Optimistic protocols for fair exchange , 1997, CCS '97.

[21]  Roger Dingledine,et al.  The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .

[22]  Peter A. Dinda,et al.  Wayback: A User-level Versioning File System for Linux (Awarded Best Paper!) , 2004, USENIX Annual Technical Conference, FREENIX Track.

[23]  Gerd Kortuem,et al.  When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[24]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[25]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[26]  ABS : The Apportioned Backup System , 2004 .

[27]  Jonathan S. Shapiro,et al.  CPCMS: A Configuration Management System Based on Cryptographic Names , 2002, USENIX Annual Technical Conference, FREENIX Track.

[28]  Jason Flinn,et al.  Energy-Efficiency and Storage Flexibility in the Blue File System , 2004, OSDI.

[29]  Antony I. T. Rowstron,et al.  PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[30]  Felix C. Freiling,et al.  Using Smart Cards for Fair Exchange , 2001, WELCOM.

[31]  Dhiraj K. Pradhan,et al.  Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.

[32]  Cheng Huang,et al.  STAR : An Efficient Coding Scheme for Correcting Triple Storage Node Failures , 2005, IEEE Transactions on Computers.

[33]  Peter L. Reiher,et al.  Roam: a scalable replication system for mobile computing , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[34]  Brian D. Noble,et al.  Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.

[35]  Stefan Savage,et al.  The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe , 2003, HotOS.

[36]  Jean-Yves Le Boudec,et al.  The Selfish Node: Increasing Routing Security for Mobile Ad Hoc Networks , 2001 .

[37]  Markus Jakobsson,et al.  A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks , 2003, Financial Cryptography.

[38]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[39]  Michael Isard,et al.  A Cooperative Backup System , 2003 .

[40]  Donggang Liu,et al.  Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.

[41]  L. Floridi,et al.  The tragedy of the digital commons , 2004, Ethics and Information Technology.

[42]  Roy D. Yates,et al.  The Infostations challenge: balancing cost and ubiquity in delivering wireless data , 2000, IEEE Wirel. Commun..

[43]  Michael Mitzenmacher,et al.  Accessing multiple mirror sites in parallel: using Tornado codes to speed up downloads , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[44]  Xiaoyu Ruan,et al.  S-code: new distance-3 MDS array codes , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[45]  Valérie Issarny,et al.  A Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability , 2003, Middleware.

[46]  Randy H. Katz,et al.  Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices (Special Issue on Mobile Computing) , 1997 .

[47]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[48]  Masayuki Terada,et al.  An Optimistic Fair Exchange Protocol for Trading Electronic Rights , 2004, CARDIS.

[49]  Ion Stoica,et al.  Incentives for Cooperation in Peer-to-Peer Networks , 2003 .

[50]  Pietro Michiardi,et al.  Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .

[51]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[52]  Stefan Savage,et al.  Total Recall: System Support for Automated Availability Management , 2004, NSDI.

[53]  Daniel A. Spielman,et al.  Efficient erasure correcting codes , 2001, IEEE Trans. Inf. Theory.

[54]  Jean Arlat,et al.  SURF-2: A program for dependability evaluation of complex hardware and software systems , 1993, FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing.

[55]  Dan Suciu,et al.  XMill: an efficient compressor for XML data , 2000, SIGMOD '00.

[56]  Emil Sit,et al.  A DHT-based Backup System , 2003 .

[57]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[58]  Matthieu Roy,et al.  Sauvegarde coopérative entre pairs pour dispositifs mobiles , 2005, UbiMob '05.

[59]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[60]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[61]  Christian Grothoff,et al.  An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks , 2005 .

[62]  Kwong-Sak Leung,et al.  Operation-based Update Propagation in a Mobile File System , 1999, USENIX Annual Technical Conference, General Track.

[63]  David Mazières,et al.  A low-bandwidth network file system , 2001, SOSP.

[64]  G. Hardin,et al.  The Tragedy of the Commons , 1968, Green Planet Blues.

[65]  Antoine Vernois,et al.  Data durability in peer to peer storage systems , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[66]  Valérie Issarny,et al.  AdHocFS: sharing files in WLANs , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[67]  Antony I. T. Rowstron,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.

[68]  Jehoshua Bruck,et al.  Low density MDS codes and factors of complete graphs , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[69]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[70]  Michel Banâtre,et al.  Ambient computing applications: an experience with the SPREAD approach , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[71]  Michael Mitzenmacher,et al.  Digital fountains: a survey and look forward , 2004, Information Theory Workshop.

[72]  Serge Abiteboul,et al.  Detecting changes in XML documents , 2002, Proceedings 18th International Conference on Data Engineering.

[73]  SatyanarayananMahadev Scalable, Secure, and Highly Available Distributed File Access , 1990 .

[74]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.

[75]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[76]  Marvin Theimer,et al.  Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.

[77]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.

[78]  Gaetano Borriello,et al.  Peer-To-Peer Backup for Personal Area Networks , 2003 .

[79]  Randal Burns,et al.  Ext3cow: The Design, Implementation, and Analysis of Metadata for a Time-Shifting File System , 2003 .

[80]  Christopher Batten,et al.  pStore: A Secure Peer-to-Peer Backup System∗ , 2007 .

[81]  Val Henson,et al.  An Analysis of Compare-by-hash , 2003, HotOS.

[82]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[83]  Jeff Mellen,et al.  DIBS : Distributed Backup for Local Area Networks , .

[84]  Ahmed Helmy Efficient Resource Discovery in Wireless AdHoc Networks: Contacts Do Help , 2005 .

[85]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[86]  Ethan L. Miller,et al.  Long-Term file activity patterns in a UNIX workstation environment , 1998 .

[87]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[88]  Fred Douglis,et al.  Redundancy Elimination Within Large Collections of Files , 2004, USENIX Annual Technical Conference, General Track.

[89]  Darrell D. E. Long,et al.  Deep Store: an archival storage system architecture , 2005, 21st International Conference on Data Engineering (ICDE'05).

[90]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[91]  Christian Grothoff,et al.  Efficient Sharing of Encrypted Data , 2002, ACISP.

[92]  Vladimiro Sassone,et al.  A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..

[93]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[94]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[95]  Ralph Deters,et al.  3LS - a peer-to-peer network simulator , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[96]  Oliver P. Waldhorst,et al.  A special-purpose peer-to-peer file sharing system for mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[97]  Robert Tappan Morris,et al.  Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.

[98]  Paul Mackerras,et al.  The rsync algorithm , 1996 .

[99]  Norman C. Hutchinson,et al.  Deciding when to forget in the Elephant file system , 1999, SOSP.

[100]  Tyson Condie,et al.  Simulating A File-Sharing P2P Network , 2003 .

[101]  Philipp Obreiter,et al.  A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation , 2003, AP2PC.

[102]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[103]  Michael Luby,et al.  A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.

[104]  Gerd Kortuem,et al.  Disseminating trust information in wearable communities , 2006, Personal Technologies.

[105]  D. M. Chiu,et al.  Erasure code replication revisited , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[106]  Edward Grochowski,et al.  Emerging Trends in Data Storage on Magnetic Hard Disk Drives , 1999 .

[107]  Christian Grothoff,et al.  An Encoding for Censorship-Resistant Sharing , 2005 .

[108]  Kian-Lee Tan,et al.  PeerStore: better performance by relaxing in peer-to-peer backup , 2004, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings..

[109]  Hector Garcia-Molina,et al.  Bidding for storage space in a peer-to-peer data preservation system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[110]  L. Buttyán,et al.  Toward a Formal Model of Fair Exchange - a Game Theoretic Approach , 2000 .

[111]  Heon Young Yeom,et al.  An efficient recovery scheme for mobile computing environments , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.

[112]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[113]  Kavitha Ranganathan,et al.  Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[114]  Udi Manber,et al.  Finding Similar Files in a Large File System , 1994, USENIX Winter.

[115]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[116]  Hein Meling,et al.  Anthill: a framework for the development of agent-based peer-to-peer systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[117]  Mahadev Satyanarayanan,et al.  Opportunistic Use of Content Addressable Storage for Distributed File Systems , 2003, USENIX Annual Technical Conference, General Track.

[118]  Krithi Ramamritham,et al.  Support for Recovery in Mobile Systems , 2002, IEEE Trans. Computers.

[119]  Mukesh Singhal,et al.  Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..

[120]  Scott Shenker,et al.  Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.

[121]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[122]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[123]  Michel Banâtre,et al.  Collaborative backup for dependable mobile applications , 2004, MPAC '04.

[124]  Fabrice Guillemin,et al.  Experimental analysis of the impact of peer-to-peer applications on traffic in commercial IP networks , 2004, Eur. Trans. Telecommun..

[125]  References , 1971 .

[126]  Lihao Xu,et al.  Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.

[127]  Mukesh Singhal,et al.  Mutable checkpoints: a new checkpointing approach for mobile computing systems , 1999, PODC '99.

[128]  Dennis Kügler,et al.  An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks , 2003, Privacy Enhancing Technologies.