Exploiting Rateless Codes in Cloud Storage Systems

Block-level cloud storage (BLCS) offers to users and applications the access to persistent block storage devices (virtual disks) that can be directly accessed and used as if they were raw physical disks. In this paper we devise ENIGMA, an architecture for the back-end of BLCS systems able to provide adequate levels of access and transfer performance, availability, integrity, and confidentiality, for the data it stores. ENIGMA exploits LT rateless codes to store fragments of sectors on storage nodes organized in clusters. We quantitatively evaluate how the various ENIGMA system parameters affect the performance, availability, integrity, and confidentiality of virtual disks. These evaluations are carried out by using both analytical modeling (for availability, integrity, and confidentiality) and discrete event simulation (for performance), and by considering a set of realistic operational scenarios. Our results indicate that it is possible to simultaneously achieve all the objectives set forth for BLCS systems by using ENIGMA, and that a careful choice of the various system parameters is crucial to achieve a good compromise among them. Moreover, they also show that LT coding-based BLCS systems outperform traditional BLCS systems in all the aspects mentioned before.

[1]  Matteo Sereno,et al.  An optimal partial decoding algorithm for rateless codes , 2011, 2011 IEEE International Symposium on Information Theory Proceedings.

[2]  Zhenyu Yang,et al.  LT codes-based secure and reliable cloud storage service , 2012, 2012 Proceedings IEEE INFOCOM.

[3]  F. Moore,et al.  Polynomial Codes Over Certain Finite Fields , 2017 .

[4]  Alexandros G. Dimakis,et al.  Repairable Fountain Codes , 2014, IEEE J. Sel. Areas Commun..

[5]  R. C. Hansdah,et al.  A Survey of Cloud Storage Facilities , 2011, 2011 IEEE World Congress on Services.

[6]  Matteo Sereno,et al.  On the fly gaussian elimination for LT codes , 2009, IEEE Communications Letters.

[7]  Kristin E. Lauter,et al.  Cryptographic Cloud Storage , 2010, Financial Cryptography Workshops.

[8]  Hugo Krawczyk,et al.  Secret Sharing Made Short , 1994, CRYPTO.

[9]  Alexandros G. Dimakis,et al.  Repairable Fountain codes , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[10]  Marlon E. Pierce,et al.  Supporting cloud computing with the virtual block store system , 2009, 2009 5th IEEE International Conference on E-Science Workshops.

[11]  Li Zhou,et al.  Optimize Block-Level Cloud Storage System with Load-Balance Strategy , 2012, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum.

[12]  Vinod Ganapathy,et al.  K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access , 2011, SecureComm.

[13]  Bo Zhang,et al.  Measurement-Based Analysis, Modeling, and Synthesis of the Internet Delay Space , 2006, IEEE/ACM Transactions on Networking.

[14]  Ethan L. Miller,et al.  POTSHARDS—a secure, recoverable, long-term archival storage system , 2009, TOS.

[15]  Qi Zhang,et al.  Characterization of storage workload traces from production Windows Servers , 2008, 2008 IEEE International Symposium on Workload Characterization.

[16]  Alexandros G. Dimakis,et al.  Distributed Storage Allocations , 2010, IEEE Transactions on Information Theory.

[17]  Matteo Sereno,et al.  ENIGMA: Distributed Virtual Disks for Cloud Computing , 2011, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum.

[18]  Michael Luby,et al.  LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[19]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[20]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[21]  Geoffrey C. Fox,et al.  Building a Distributed Block Storage System for Cloud Infrastructure , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[22]  Shankar Pasupathy,et al.  An analysis of latent sector errors in disk drives , 2007, SIGMETRICS '07.

[23]  Marco Grangetto,et al.  Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique , 2013, IEEE Transactions on Parallel and Distributed Systems.

[24]  Yunnan Wu,et al.  A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.

[25]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[26]  James S. Plank,et al.  AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.

[27]  M. Bouaziz,et al.  An Introduction to Computer Security , 2012 .