Venti: A New Approach to Archival Storage

This paper describes a network storage system, called Venti, intended for archival data. In this system, a unique hash of a block's contents acts as the block identifier for read and write operations. This approach enforces a write-once policy, preventing accidental or malicious destruction of data. In addition, duplicate copies of a block can be coalesced, reducing the consumption of storage and simplifying the implementation of clients. Venti is a building block for constructing a variety of storage applications such as logical backup, physical backup, and snapshot file systems. We have built a prototype of the system and present some preliminary performance results. The system uses magnetic disks as the storage technology, resulting in an access time for archival data that is comparable to non-archival data. The feasibility of the write-once model for storage is demonstrated using data from over a decade's use of two Plan 9 file systems.

[1]  Abraham Lempel,et al.  A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.

[2]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[3]  Mahadev Satyanarayanan,et al.  Scale and performance in a distributed file system , 1987, SOSP '87.

[4]  Sean Quinlan,et al.  A cached WORM file system , 1991, Softw. Pract. Exp..

[5]  James Lau,et al.  File System Design for an NFS File Server Appliance , 1994, USENIX Winter.

[6]  Udi Manber,et al.  Finding Similar Files in a Large File System , 1994, USENIX Winter.

[7]  Evi Nemeth UNIX system administration handbook, 2nd Edition , 1995 .

[8]  Ken Thompson,et al.  Plan 9 from Bell Labs , 1995 .

[9]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[10]  Ethan L. Miller,et al.  Using content-derived names for configuration management , 1997, SSR '97.

[11]  Hector Garcia-Molina,et al.  Archival storage for digital libraries , 1998, DL '98.

[12]  A. Chervenak,et al.  Protecting File Systems : A Survey of Backup Techniques , 1998 .

[13]  Ethan L. Miller,et al.  Long-term File Activity and Inter-Reference Patterns (CMG Paper # 2041) , 1998 .

[14]  Norman C. Hutchinson,et al.  Deciding when to forget in the Elephant file system , 1999, SOSP.

[15]  Norman C. Hutchinson,et al.  Logical vs. physical file system backup , 1999, OSDI '99.

[16]  D. A. Thompson,et al.  The Future of Magnetic Data Storage Technology , 2000 .

[17]  MaziéresDavid,et al.  A low-bandwidth network file system , 2001 .

[18]  尚弘 島影 National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .

[19]  David Mazières,et al.  Fast and secure distributed read-only file system , 2000, TOCS.

[20]  Craig A. N. Soules,et al.  Self-securing storage: protecting data in compromised systems , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].