A management architecture for client‐defined cloud storage services

Summary Cloud service providers offer virtual resources to users, who then pay for as much as they use. High-speed networks help to overcome the limitation of geographical distances between clients and cloud servers, which encourage users to adopt cloud storage services for data backup and sharing. However, users use only a few cloud storage services because of the complexity of managing multiple accounts and distributing data to store. In this paper, we propose the client-defined management architecture (CLIMA) that redefines a storage service by coordinating multiple cloud storage services from clients. We address practical issues of coordinating multiple cloud service providers using a client-based approach. We implement a prototype as a realization of CLIMA, which achieves both reliability and privacy protection using erasure code and higher performance by optimally scheduling data transmission. We use our prototype to evaluate the benefits of CLIMA on commercial cloud storage service providers. Finally, CLIMA empowers clients to increase the manageability and flexibility of cloud storage services. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  R. J. McEliece,et al.  On sharing secrets and Reed-Solomon codes , 1981, CACM.

[2]  James S. Plank,et al.  AONT-RS: Blending Security and Performance in Dispersed Storage Systems , 2011, FAST.

[3]  Michalis Faloutsos,et al.  Transport layer identification of P2P traffic , 2004, IMC '04.

[4]  James Won-Ki Hong,et al.  An effective similarity metric for application traffic classification , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[5]  Jason Lango,et al.  Toward Software-defined SLAs , 2013 .

[6]  Adrian Farrel,et al.  A PCE-Based Architecture for Application-Based Network Operations , 2015, RFC.

[7]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[8]  Erik Brynjolfsson,et al.  Information technology, incentives and the optimal number of suppliers , 1993, Proceedings of ELECTRO '94.

[9]  Anirban Mahanti,et al.  Traffic classification using clustering algorithms , 2006, MineNet '06.

[10]  Michael K. Reiter,et al.  Secure and scalable replication in Phalanx , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[11]  Hans Peter Luhn,et al.  A Statistical Approach to Mechanized Encoding and Searching of Literary Information , 1957, IBM J. Res. Dev..

[12]  Michael Dahlin,et al.  Minimal Byzantine Storage , 2002, DISC.

[13]  Jérôme Darmont,et al.  Sharing-based Privacy and Availability of Cloud Data Warehouses , 2013, EDA.

[14]  James Won-Ki Hong,et al.  Automated classifier generation for application-level mobile traffic identification , 2012, 2012 IEEE Network Operations and Management Symposium.

[15]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[16]  Michalis Faloutsos,et al.  BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.

[17]  James Won-Ki Hong,et al.  Traffic Classification Based on Flow Similarity , 2009, IPOM.

[18]  Jian Li,et al.  On the design and implementation of a home energy management system , 2011, International Symposium on Wireless and Pervasive Computing.

[19]  Catherine D. Schuman,et al.  A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries for Storage , 2009, FAST.

[20]  Jin Li,et al.  ChunkStash: Speeding Up Inline Storage Deduplication Using Flash Memory , 2010, USENIX Annual Technical Conference.

[21]  Wilson C. Hsieh,et al.  Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.

[22]  James Won-Ki Hong,et al.  Application traffic identification based on remote subnet grouping , 2012, 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS).

[23]  Miguel Correia,et al.  SCFS: A Shared Cloud-backed File System , 2014, USENIX Annual Technical Conference.

[24]  Luis Velasco,et al.  In-operation network planning , 2014, IEEE Commun. Mag..

[25]  Patrick Haffner,et al.  ACAS: automated construction of application signatures , 2005, MineNet '05.

[26]  Konstantina Papagiannaki,et al.  Toward the Accurate Identification of Network Applications , 2005, PAM.

[27]  James Won-Ki Hong,et al.  CYRUS: towards client-defined cloud storage , 2015, EuroSys.

[28]  James Won-Ki Hong,et al.  Fine‐grained traffic classification based on functional separation , 2013, Int. J. Netw. Manag..

[29]  Anwitaman Datta,et al.  InterCloud RAIDer: A Do-It-Yourself Multi-cloud Private Data Backup System , 2014, ICDCN.

[30]  Miguel Correia,et al.  DepSky: Dependable and Secure Storage in a Cloud-of-Clouds , 2013, TOS.

[31]  Werner Vogels,et al.  Dynamo: amazon's highly available key-value store , 2007, SOSP.

[32]  Michael K. Reiter,et al.  Efficient Byzantine-tolerant erasure-coded storage , 2004, International Conference on Dependable Systems and Networks, 2004.

[33]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[34]  Stefano Tessaro,et al.  Optimal Resilience for Erasure-Coded Byzantine Distributed Storage , 2005, DISC.

[35]  Karl Aberer,et al.  Scalia: An adaptive scheme for efficient multi-cloud storage , 2012, 2012 International Conference for High Performance Computing, Networking, Storage and Analysis.

[36]  Sean Matthew Dorward,et al.  Awarded Best Paper! - Venti: A New Approach to Archival Data Storage , 2002 .

[37]  James Won-Ki Hong,et al.  Measurement analysis of mobile traffic in enterprise networks , 2011, APNOMS 2011.

[38]  Aiko Pras,et al.  Inside dropbox: understanding personal cloud storage services , 2012, Internet Measurement Conference.

[39]  Guilherme Sperb Machado,et al.  A Cloud Storage overlay to aggregate heterogeneous Cloud services , 2013, 38th Annual IEEE Conference on Local Computer Networks.

[40]  이상훈,et al.  트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템 , 2014 .

[41]  Reinaldo Penno,et al.  Application-Layer Traffic Optimization (ALTO) Protocol , 2014, RFC.

[42]  Carlos Maltzahn,et al.  Ceph: a scalable, high-performance distributed file system , 2006, OSDI '06.

[43]  KyoungSoo Park,et al.  Supporting Practical Content-Addressable Caching with CZIP Compression , 2007, USENIX Annual Technical Conference.

[44]  JoAnne Yates,et al.  Electronic markets and electronic hierarchies , 1987, CACM.

[45]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[46]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[47]  Taesang Choi,et al.  Content-aware Internet application traffic measurement and analysis , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[48]  James Won-Ki Hong,et al.  The Design of a Quality of Experience Model for Providing High Quality Multimedia Services , 2010, MACE.

[49]  Sakir Sezer,et al.  Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .

[50]  James Won-Ki Hong,et al.  Monitoring and detecting abnormal behavior in mobile cloud infrastructure , 2012, 2012 IEEE Network Operations and Management Symposium.

[51]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.

[52]  Fulvio Risso,et al.  Lightweight, Payload-Based Traffic Classification: An Experimental Evaluation , 2008, 2008 IEEE International Conference on Communications.

[53]  James Won-Ki Hong,et al.  Towards automated application signature generation for traffic identification , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.