ABSTRACT
The most important factors that need to be taken into consideration when designing a distributed storage system are data availability, reliability and access performance. This paper introduces an architecture to meet such goals by following the framework of cloud-of-clouds, where a complex system of clouds intercommunicate to create a robust and reliable cloud system. The optimal design of this architecture encompasses a general framework for achieving effective data reliability and availability, as well as fault tolerance. A simulation tool was developed to demonstrate the concept and functionality of the proposed architecture, testing its effectiveness in providing a reliable, available, and fault-tolerant cloud storage system. Simulation results proves that such architecture met the set goals to achieve the previously mentioned factors.
- Bram Cohen. Incentives build robustness in bittorrent, 2003.Google Scholar
- Mai Alfawair and Omar Aldabbas. Qos-aware storage visualization: A framework for multi-tier infrastructures in cloud storage systems. International Journal on Recent and Innovation Trends in Computing and Communication, 3(9):5666--5672, 2015.Google Scholar
- Daniel Ford, François Labelle, Florentina I Popovici, Murray Stokely, Van-Anh Truong, Luiz Barroso, Carrie Grimes, and Sean Quinlan. Availability in globally distributed storage systems. In OSDI, volume 10, pages 1--7, 2010. Google ScholarDigital Library
- Osama Khan, Randal C Burns, James S Plank, William Pierce, and Cheng Huang. Rethinking erasure codes for cloud file systems: minimizing i/o for recovery and degraded reads. In FAST, page 20, 2012. Google ScholarDigital Library
- Liying Wu, Bo Liu, and Weiwei Lin. A dynamic data fault-tolerance mechanism for cloud storage. In Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on, pages 95--99. IEEE, 2013. Google ScholarDigital Library
- Iulia Ion, Niharika Sachdeva, Ponnurangam Kumaraguru, and Srdjan Čapkun. Home is safer than the cloud!: privacy concerns for consumer cloud storage. In Proceedings of the Seventh Symposium on Usable Privacy and Security, page 13. ACM, 2011. Google ScholarDigital Library
- Jeffrey Lawson, John Wolthuis, and Evan Cooke. System and method for mitigating a denial of service attack using cloud computing, May 8 2013. US Patent App. 13/890,010.Google Scholar
- Ronald L Krutz and Russell Dean Vines. Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing, 2010. Google ScholarDigital Library
- Subashini Subashini and Veeraruna Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1):1--11, 2011. Google ScholarDigital Library
- J Kincaid. T-mobile sidekick disaster: Dangers servers crashed, and they dont have a backup, 2009.Google Scholar
- Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando André, and Paulo Sousa. Depsky: dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage (TOS), 9(4):12, 2013. Google ScholarDigital Library
- Olivier Lafontaine, Jacques Jorda, and Abdelaziz M'zoughi. Clovis: a secured cloud virtualized storage. 2014.Google Scholar
- Hongliang Yu, Fan Zhang, and Yongwei Wu. Granary: A sharing oriented distributed storage system. Future Generation Computer Systems, 38:47--60, 2014.Google ScholarCross Ref
- Alexandros G Dimakis, P Brighten Godfrey, Yunnan Wu, Martin J Wainwright, and Kannan Ramchandran. Network coding for distributed storage systems. IEEE Transactions on Information Theory, 56(9):4539--4551, 2010. Google ScholarDigital Library
- Anne-Marie Kermarrec, Erwan Le Merrer, Gilles Straub, and Alexandre Van Kempen. Availability-based methods for distributed storage systems. In Reliable Distributed Systems (SRDS), 2012 IEEE 31st Symposium on, pages 151--160. IEEE, 2012. Google ScholarDigital Library
- Quan Yu, Kenneth W Shum, and Chi Wan Sung. Minimization of storage cost in distributed storage systems with repair consideration. In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE, pages 1--5. IEEE, 2011.Google Scholar
- Mohammad Hammoudeh, Fayez Al-Fayez, Huw Lloyd, Robert Newman, Bamidele Adebisi, Ahcène Bounceur, and Abdelrahman Abuarqoub. A wireless sensor network border monitoring system: Deployment issues and routing protocols. IEEE Sensors Journal, 2017.Google ScholarCross Ref
- Abdelrahman Abuarqoub, Mohammad Hammoudeh, Bamidele Adebisi, Sohail Jabbar, Ahcène Bounceur, and Hashem Al-Bashar. Dynamic clustering and management of mobile wireless sensor networks. Computer Networks, 117:62--75, 2017. Google ScholarDigital Library
- Mohammad Hammoudeh, Robert Newman, Christopher Dennett, Sarah Mount, and Omar Aldabbas. Map as a service: A framework for visualising and maximising information return from multi-modal wireless sensor networks. Sensors, 15(9):22970--23003, 2015.Google ScholarCross Ref
Index Terms
- A Cloud Storage Architecture for High Data Availability, Reliability, and Fault-tolerance
Recommendations
Cloud storage reliability for Big Data applications
Cloud storage systems are now mature enough to handle a massive volume of heterogeneous and rapidly changing data, which is known as Big Data. However, failures are inevitable in cloud storage systems as they are composed of large scale hardware ...
A Cost-Effective Mechanism for Cloud Data Reliability Management Based on Proactive Replica Checking
CCGRID '12: Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)In current Cloud computing environments, management of data reliability has become a challenge. For data-intensive scientific applications, storing data in the Cloud with the typical 3-replica replication strategy for managing the data reliability would ...
Research and performance evaluation of data replication technology in distributed storage systems
Replication is a key technology of distributed storage systems. In this paper, an indirect replication algorithm is proposed following the intrinsic characteristic of distributed storage systems and the peer-to-peer model. In the indirect replication ...
Comments