Skip to main content
Log in

Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

We run several computing facilities for scientific purpose based on Linux clusters. These facilities process many independent tasks simultaneously and require a large amount of data as input. A facility supports a research group in which they require on-the-fly random access to data remotely distributed on the Grid. To facilitate local storage rather than random access to the source, the facility should feature download and cache of remote data on user’s demand, which is called dataset staging. However, the facility was built several years ago and its operating system as well as data management system were outdated. In order to make the facility up-to-date, we needed to implement the dataset staging process based on the latest operating system as well as the data management system. Therefore we conducted thorough analysis on the behavior of the previous dataset staging process and its logs since the source code was not opened. In this paper, we describe the dataset staging process and discuss its implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Baraket, O.L., Hashim, S.J., Raja Abdullah, R.S.A.B., Ramli, A.R., Hashim, F., Samsudin, K., Rahman, M.A.: Malware analysis performance enhancement using cloud computing. J. Comput. Virol. Hacking Tech. 10(1), 1–10 (2014)

    Article  Google Scholar 

  2. Lee, A.: Authentication scheme for smart learning system in the cloud computing environment. J. Comput. Virol. Hacking Tech. 11(3), 149–155 (2015)

    Article  Google Scholar 

  3. Vatamanu, C., Gavriluţ, D., Benchea, R.J.: Building a practical and reliable classifier for malware detection. J. Comput. Virol. Hacking Tech. 9(4), 205–214 (2013)

    Article  Google Scholar 

  4. Asquith, M.: Extremely scalable storage and clustering of malware metadata. J. Comput. Virol. Hacking Tech. 12(2), 49–58 (2016)

    Article  Google Scholar 

  5. Evans, L., Bryant, P.: LHC machine. J. Instrum. 3, S08001 (2008)

    Article  Google Scholar 

  6. Lamanna, M.: The LHC computing grid project at CERN. Nuclear Instrum. Methods Phys. Res. Sect. A: Accel. Spectrom. Detect. Assoc Equip. 534(1–2), 1–6 (2004)

    Article  Google Scholar 

  7. J. Instrum. The ALICE experiment at the CERN LHC. 3, S08002 (2008)

  8. Saiz, P., Aphecetche, L., Buncic, P., Piskac, R., Revsbech, J.-E., Sego, V.: AliEn—ALICE environment on the GRID. Nuclear Instrum. Methods Phys. Res. Sect. A: Accel. Spectrom. Detect. Assoc Equip. 502(2–3), 437–440 (2003)

    Article  Google Scholar 

  9. Hanushevsky, A., Wang, D.L.: Scalla: structured cluster architecture for low latency access. In: Parallel and distributed processing symposium workshops and Ph.D. forum, 2012 IEEE 26th international, pp. 1168–1175 (2012)

  10. Thain, D., Tannenbaum, T., Livny, M.: Distributed computing in practice: The condor experience. Concurr. Comput.: Pract. Exp. 17(2–4), 323–356 (2005)

    Article  Google Scholar 

  11. Ahn, S.U., Kim, J.: A conceptual design of job pre-processing flow for heterogeneous batch systems in data center. Wirel. Pers. Commun. 89(3), 847–861 (2016)

    Article  Google Scholar 

  12. Ahn, S.U., Yoon, H.J., Park, S.O.: Storage federations using xrootd. Int. J. Multimed. Ubiquitous Eng. 10(11), 285–292 (2015)

    Article  Google Scholar 

  13. Ahn, S.U., Yeo, I.Y., Park, S.O.: Secure and efficient high-performance PROOF-based cluster system for high-energy physics. J. Supercomput. 70(1), 166–176 (2014)

    Article  Google Scholar 

  14. Blomer, J., Buncic, P., Meusel, R., Ganis, G., Sfiligoi, I., Thain, D.: The evolution of global scale filesystems for scientific software distribution. Comput. Sci. Eng. 17(6), 61–71 (2015)

    Article  Google Scholar 

  15. Brun, R., Rademakers, F.: ROOT—an object oriented data analysis framework. Nuclear Instrum. Methods Phys. Res. Sect. A: Accel. Spectrom. Detect. Assoc. Equip. 389(1–2), 81–86 (1997)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Research Foundation of Korea (NRF) through contract N-16-NM-CR01 and the Program of Construction and Operation for Large-scale Science Data Center (K-16-L01-C06).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byungyun Kong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahn, S.U., Park, S.O., Kim, JH. et al. Implementation of dataset staging process with improved security in a new analysis facility for ALICE experiment. J Comput Virol Hack Tech 13, 305–311 (2017). https://doi.org/10.1007/s11416-017-0308-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-017-0308-4

Keywords

Navigation