Sporadic decentralized resource maintenance for P2P distributed storage networks

In this paper, we propose a novel decentralized resource maintenance strategy for peer-to-peer (P2P) distributed storage networks. Our strategy relies on the Wuala overlay network architecture, (The WUALA Project). While the latter is based, for the resource distribution among peers, on the use of erasure codes, e.g., Reed-Solomon codes, here we investigate the system behavior when a simple randomized network coding strategy is applied. We propose to replace the Wuala regular and centralized strategy for resource maintenance with a decentralized strategy, where users regenerate new fragments sporadically, namely every time a resource is retrieved. Both strategies are analyzed, analytically and through simulations, in the presence of either erasure and network coding. It will be shown that the novel sporadic maintenance strategy, when used with randomized network coding, leads to a fully decentralized solution with management complexity much lower than common centralized solutions.

[1]  Vinod M. Prabhakaran,et al.  Decentralized erasure codes for distributed networked storage , 2006, IEEE Transactions on Information Theory.

[2]  Michele Amoretti,et al.  A Practical Network Coding Approach for Peer-to-Peer Distributed Storage , 2010, 2010 IEEE International Symposium on Network Coding (NetCod).

[3]  Christina Fragouli,et al.  Network Coding Applications , 2008, Found. Trends Netw..

[4]  Christina Fragouli,et al.  Network Coding Fundamentals , 2007, Found. Trends Netw..

[5]  Michele Amoretti,et al.  A decentralized smartphone based Traffic Information System , 2012, 2012 IEEE Intelligent Vehicles Symposium.

[6]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[7]  Muriel Medard,et al.  How good is random linear coding based distributed networked storage , 2005 .

[8]  Michele Amoretti,et al.  Randomized network coding in distributed storage systems with layered overlay , 2011, 2011 Information Theory and Applications Workshop.

[9]  Yeh-Ching Chung,et al.  Malugo: A peer-to-peer storage system , 2010, Int. J. Ad Hoc Ubiquitous Comput..

[10]  Arnold Neumaier,et al.  Introduction to Numerical Analysis , 2001 .

[11]  GhemawatSanjay,et al.  The Google file system , 2003 .

[12]  Rodrigo Rodrigues,et al.  High Availability in DHTs: Erasure Coding vs. Replication , 2005, IPTPS.

[13]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Michele Amoretti,et al.  DEUS: a discrete event universal simulator , 2009, SimuTools.

[15]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[16]  Alberto Blanc,et al.  Designing incentives for peer-to-peer routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[17]  Christos Gkantsidis,et al.  Network coding for large scale content distribution , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[18]  Werner Vogels,et al.  Dynamo: amazon's highly available key-value store , 2007, SOSP.

[19]  Costas Courcoubetis,et al.  Incentives for large peer-to-peer systems , 2006, IEEE Journal on Selected Areas in Communications.

[20]  Michele Amoretti,et al.  A Survey of Peer- to -Peer Overlay Schemes: Effectiveness, Efficiency and Security , 2009 .

[21]  Pietro Michiardi,et al.  A measurement study of the Wuala on-line storage service , 2012, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P).

[22]  Jon Feldman,et al.  Growth codes: maximizing sensor network data persistence , 2006, SIGCOMM.

[23]  Tracey Ho,et al.  A Random Linear Network Coding Approach to Multicast , 2006, IEEE Transactions on Information Theory.

[24]  Yunnan Wu,et al.  A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.

[25]  André Bourdoux,et al.  Dynamic Spectrum Access: From the Concept to the Implementation , 2010 .