skip to main content
10.1145/1103780.1103797acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Hydra: a platform for survivable and secure data storage systems

Published: 11 November 2005 Publication History

Abstract

This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to environment changes, enabling users to store and access critical data in a continuously available and highly trustable fashion. The Hydra platform uses MDS array codes that can be encoded and decoded efficiently for distributing and recovering user data. Novel uses of MDS array codes in Hydra are discussed, as well as Hydra's design goals, general structures and a set of basic operations on user data. We also explore Hydra's applications in survivable and secure data storage systems.

References

[1]
T.E. Anderson, D.E. Culler and D.A. Patterson, "A Case for NOW (Networks of Workstations)," IEEE Micro, 15(1), 54--64, 1995.
[2]
T. Anderson, M. Dahlin, J. Neefe, D. Patterson, D. Roselli and R. Wang, "Serverless Network File Systems", ACM Trans. on Computer Systems, 41--79, Feb. 1996.
[3]
A. Bhide, E. Elnozahy and S. Morgan, "A Highly Available Network File Server", Proc. of the Winter 1991 USENIX Technical Conf., 199-205, Jan. 1991.
[4]
G. R. Blakley, "Safeguarding cryptographic keys", Proc. AFIPS 1979 Nat. Computer Conf., 313--317, June 1979.
[5]
M. Blaum, J. Brady, J. Bruck and J. Menon, "EVENODD: An Efficient Scheme for Tolerating Double Disk Failures in RAID Architectures," IEEE Trans. on Computers, 44(2), 192--202, Feb. 1995.
[6]
V. Bohossian, C. Fan, P. LeMahieu, M. Riedel, L. Xu and J. Bruck, "Computing in the RAIN: A Reliable Array of Independent Node", IEEE Trans. on Parallel and Distributed Systems, Special Issue on Dependable Network Computing, 12(2), 99--114, Feb. 2001.
[7]
M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance", Operating Systems Review, ACM Press, NY, 173--186, 1999.
[8]
P.M. Chen, E.K. Lee, G.A. Gibson, R.H. Katz, D.A. Patterson, "Raid -- High-Performance, Reliable Secondary Storage," ACM Computing Surveys, 26(2), 145--185, 1994.
[9]
G.A. Gibson and R. van Meter, "Network Attached Storage Architecture", Communications of the ACM, 43(11), 37--45, Nov. 2000.
[10]
A. Gibson, D. Stodolsky, F.W. Chang, W.V. Courtright II, C.G. Demetriou, E. Ginting, M. Holland, Q. Ma, L. Neal, R.H. Patterson, J. Su, R. Youssef and J. Zelenka, "The Scotch Parallel Storage Systems," Proceedings of the IEEE CompCon Conference, 1995.
[11]
A. V. Goldberg and P. N. Yianilos, "Towards an Archival Intermemory", Proc. of IEEE Advances in Digital Libraries, Apr. 1998.
[12]
J.H. Hartman and J.K. Ousterhout, "The Zebra Striped Network File System," ACM Transactions on Computer Systems /, 13(3), 274--310, 1995.
[13]
G. H. Kim and E. H. Spafford, "The Design and Implementation of Tripwire: A File System Integrity Checker", Proc. of 2nd ACM Conf. on Computer and Communication Security, 1994.
[14]
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells and B. Zhao, "OceanStore: An Architecture for Global-Scale Persistent Storage", Proc. of the Ninth international Conference on Architectural Support for Programming Languages and Operating Systems, Nov. 2000.
[15]
E. Lee and C. Thekkath, "Petal: Distributed Virtual Disks", Proc. ACM ASPLOS, 84--92, Oct. 1996.
[16]
F. J. MacWilliams and N. J. A. Sloane, The Theory of Error Correcting Codes, Amsterdam: North-Holland, 1977.
[17]
R. J. McEliece, D. Sarwate, "On sharing secrets and Reed-Solomon codes", Comm. ACM, 24(9), 583--584, 1981.
[18]
J. Ousterhout, A. Cherenson, F. Douglis, M. Nelson and B. Welch, "The Sprite Network Operating System", IEEE Computer, 21(2): 23--26, Feb. 1988.
[19]
J. S. Plank, M. and T. Moore, "Logistical Networking Research and the Network Storage Stack," USENIX FAST 2002, Conference on File and Storage Technologies, work in progress report, January, 2002.
[20]
M. Rabin, "Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance", J. ACM, 32(4), 335--348, Apr. 1989.
[21]
I. S. Reed and G. Solomon, "Polynomial Codes over Certain Finite Fields", J. SIAM, 8(10), 300--304, 1960.
[22]
M. Satyanarayanan, "Scalable, Secure and Highly Available Distributed File Access", IEEE Computer, 9-21, May 1990.
[23]
M. Satyanarayanan, J.J. Kistler, P. Kumar, M.E. Okasaki, E.H. Siegel and D.C. Steere, "CODA - A Highly Available File System for a Distributed Workstation Environment," IEEE Transactions on Computers, 39(4), 447--459, 1990.
[24]
A. Shamir, "How to Share a Secret", Comm. ACM, 612-613, Nov. 1979.
[25]
SUN Microsystems, Inc. NFS: Network File System version 3 Protocol Specification, Feb. 1994.
[26]
M. Waldman, A. D. Rubin and L. F. Cranor, "Publius: A robust, tamper-evident, censorship-resistant, web publishing system", Proc. 9th USENIX Security Symposium, 59-72, Aug. 2000. Online at: http://www.cs.nyu.edu/~waldman/publius/publius.pdf
[27]
J. J. Wylie, M. W. Bigrigg, J. D. Strunk. G. R. Ganger, H. Kiliccote and P. K. Khosla, "Survivable Information Storage Systems", IEEE Computer, 33(8), 61-68, Aug. 2000.
[28]
L. Xu and J. Bruck, "X-Code: MDS Array Codes with Optimal Encoding," IEEE Trans. on Information Theory, 45(1), 272--276, Jan., 1999.
[29]
L. Xu, V. Bohossian, J. Bruck and D. Wagner, "Low Density MDS Codes and Factors of Complete Graphs," IEEE Trans. on Information Theory, 45(1), 1817-1826, Nov. 1999.

Cited By

View all
  • (2017)Meta-Algorithms in Cognitive ComputingIEEE Intelligent Systems10.1109/MIS.2017.312154932:4(35-39)Online publication date: 2017
  • (2017)Cider: A Case for Block Level Variable Redundancy on a Distributed Flash Array2017 26th International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2017.8038466(1-9)Online publication date: Jul-2017
  • (2014)Sector-Disk (SD) Erasure Codes for Mixed Failure Modes in RAID SystemsACM Transactions on Storage10.1145/256001310:1(1-17)Online publication date: 1-Jan-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
StorageSS '05: Proceedings of the 2005 ACM workshop on Storage security and survivability
November 2005
150 pages
ISBN:159593233X
DOI:10.1145/1103780
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MDS array codes
  2. distributed storage
  3. secure storage
  4. survivable storage

Qualifiers

  • Article

Conference

CCS05
Sponsor:

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Meta-Algorithms in Cognitive ComputingIEEE Intelligent Systems10.1109/MIS.2017.312154932:4(35-39)Online publication date: 2017
  • (2017)Cider: A Case for Block Level Variable Redundancy on a Distributed Flash Array2017 26th International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2017.8038466(1-9)Online publication date: Jul-2017
  • (2014)Sector-Disk (SD) Erasure Codes for Mixed Failure Modes in RAID SystemsACM Transactions on Storage10.1145/256001310:1(1-17)Online publication date: 1-Jan-2014
  • (2013)SD codesProceedings of the 11th USENIX conference on File and Storage Technologies10.5555/2591272.2591283(95-104)Online publication date: 12-Feb-2013
  • (2012)A Model of Survivable Storage System Based on Information HidingWireless Communications and Applications10.1007/978-3-642-29157-9_22(228-240)Online publication date: 2012
  • (2008)A Trusted Data Storage Infrastructure for Grid-Based Medical ApplicationsProceedings of the 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid10.1109/CCGRID.2008.84(627-632)Online publication date: 19-May-2008
  • (2007)Applying a Threshold Scheme to the Pseudonymization of Health DataProceedings of the 13th Pacific Rim International Symposium on Dependable Computing10.1109/PRDC.2007.21(397-400)Online publication date: 17-Dec-2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media