Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems

Storage system is an important component in many data intensive applications, including data grid. Security, availability, and high performance are important issues in the storage system design. In this paper we present a peer-to-peer (P2P) storage system design based on distributed hash table (DHT) and short secret sharing (SSS) to provide highly available, secure and efficient data storage services. Existing DHTs do not consider share location and search. Also, storage systems using data partitioning schemes (including SSS) does not consider the severe problems in share update. We develop three access protocols to maintain the share consistency in spite of concurrent update, partial update and compromised storage nodes by storing a limit number of history versions of the shares. We also conducted experimental studies to evaluate the performance and data availability and compare the behaviors of the schemes.

[1]  R. Rodrigues,et al.  Full-Information Lookups for Peer-to-Peer Overlays , 2008, IEEE Transactions on Parallel and Distributed Systems.

[2]  James Megquier,et al.  DISP: Practical, Efficient, Secure, and Fault Tolerant Data Storage for Distributed Systems , 2003 .

[3]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[4]  Anjali Gupta,et al.  One Hop Lookups for Peer-to-Peer Overlays , 2003, HotOS.

[5]  Mark Crovella,et al.  Geometric Exploration of the Landmark Selection Problem , 2004, PAM.

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Arif Merchant,et al.  FAB: Enterprise Storage Systems on a Shoestring , 2003, HotOS.

[8]  Li Gong Securely replicating authentication services , 1989, [1989] Proceedings. The 9th International Conference on Distributed Computing Systems.

[9]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[10]  Peter Druschel,et al.  Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .

[11]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[12]  Daniel Ellard,et al.  DISP: Practical, efficient, secure and fault-tolerant distributed data storage , 2005, TOS.

[13]  Flavia Donno,et al.  Storage Resource Managers: Recent International Experience on Requirements and Multiple Co-Operating Implementations , 2007, 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007).

[14]  Zheng Zhang,et al.  Reperasure: replication protocol using erasure-code in peer-to-peer storage network , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..

[15]  Jay J. Wylie,et al.  A Read/Write Protocol Family for Versatile Storage Infrastructures (CMU-PDL-05-108) , 2005 .

[16]  Roger Wattenhofer,et al.  Optimizing file availability in a secure serverless distributed file system , 2001, Proceedings 20th IEEE Symposium on Reliable Distributed Systems.

[17]  Antony I. T. Rowstron,et al.  PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[18]  Arif Merchant,et al.  A decentralized algorithm for erasure-coded virtual disks , 2004, International Conference on Dependable Systems and Networks, 2004.

[19]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[20]  Hugo Krawczyk,et al.  Secret Sharing Made Short , 1994, CRYPTO.

[21]  Gregory R. Ganger,et al.  Ursa minor: versatile cluster-based storage , 2005, FAST'05.

[22]  Ramesh Govindan,et al.  An empirical evaluation of internet latency expansion , 2005, CCRV.

[23]  GhemawatSanjay,et al.  The Google file system , 2003 .

[24]  H. Venkateswaran,et al.  Responsive Security for Stored Data , 2003, IEEE Trans. Parallel Distributed Syst..

[25]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[26]  Erwin Laure,et al.  Advanced Replica Management with Reptor , 2003, PPAM.