skip to main content
10.1145/502034.502054acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Wide-area cooperative storage with CFS

Published:21 October 2001Publication History

ABSTRACT

The Cooperative File System (CFS) is a new peer-to-peer read-only storage system that provides provable guarantees for the efficiency, robustness, and load-balance of file storage and retrieval. CFS does this with a completely decentralized architecture that can scale to large systems. CFS servers provide a distributed hash table (DHash) for block storage. CFS clients interpret DHash blocks as a file system. DHash distributes and caches blocks at a fine granularity to achieve load balance, uses replication for robustness, and decreases latency with server selection. DHash finds blocks using the Chord location protocol, which operates in time logarithmic in the number of servers.CFS is implemented using the SFS file system toolkit and runs on Linux, OpenBSD, and FreeBSD. Experience on a globally deployed prototype shows that CFS delivers data to clients as fast as FTP. Controlled tests show that CFS is scalable: with 4,096 servers, looking up a block of data involves contacting only seven servers. The tests also demonstrate nearly perfect robustness and unimpaired performance even when as many as half the servers fail.

References

  1. 1.Akamai Technologies, Inc. http://www.akamai.com/, 2001. Cambridge, MA.]]Google ScholarGoogle Scholar
  2. 2.ANDERSEN, n ., BALAKRISHNAN, H., KAASHOEK, M. F., AND MORRIS, R. Resilient overlay networks. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (Oct. 2001).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.CHANKHUNTHOD, A., DANZIG, P., NEERDAELS, C., SCHWARTZ, M., AND WORRELL, K. k hierarchical lntemet object cache. In Proc. Usenix Technical Conference (Jan. 1996), pp. 153-163.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (Feb. 1981), 84-88.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.CLARKE, I. A distributed decentralised information storage and retrieval system. Master's thesis, University of Edinburgh, 1999.]]Google ScholarGoogle Scholar
  6. 6.CLARKE, 1., SANDBERG, O., WILEY, B., AND HONG, T. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability (July 2000), pp. 46-66.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.DINGLEDINE, R., FREEDMAN, i ., AND MOLNAR, D. The Free Haven project: Distributed anonymous storage service. In Proceedings of the Workshop on Design Issues in Anonymity and Unobservability (July 2000), pp. 67-95.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.FAN, L., CAO, P., ALMEIDA, J., AND BRODER, A. Summary cache: a scalable wide-area web-cache sharing protocol. Tech. Rep. 1361, Computer Science Department, University of Wisconsin, Madison, Feb. 1998.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.FU, K., KAASHOEK, i . F., AND MAZIERES, D. Fast and secure distributed read-only file system. In Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation (OSDI) (October 2000), pp. 181-196.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.GADDE, S., CHASE, J., AND RABINOVICH, i . A taste of crispy squid. In Workshop on lnternet Server Performance (June 1998), pp. 129-136.]]Google ScholarGoogle Scholar
  11. 11.Gnutella website, http://gnutella.wego.com.]]Google ScholarGoogle Scholar
  12. 12.KARGER, D., LEHMAN, E., LEIGHTON, T., LEVINE, i ,, LEWIN, n., AND PANIGRAHY, R. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. In Proceedings of the 29th Annual ACM Symposium on Theory of Computing (May 1997), pp. 654-663.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.KUBIATOWICZ, J., BINDEL, D., CHEN, Y., CZERWINSKI, S., EATON, P., GEELS, D,, GUMMADI, R., RHEA, S., WEATHERSPOON, I-l., WEIMER, W., WELLS, C.. AND ZHAO, B. Oceanstnre: An architecture for global-scale persistent storage, in Praceeedings of the Ninth international Conference on Architectural Support for Frograraming Languages and Operating Systems (ASPLOS) (November 2000), pp. 190-201.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.LEWlN, D. Consistent hashing and random aces: Algorithms for caching in distributed networks. Master's thesis, MIT, 1998.]]Google ScholarGoogle Scholar
  15. 15.MALPANI, R., LURCH, J., AND BERGER, D. Making world wide web caching servers cooperate. In Fourth International World Wide Web Conference (1995), pp. 107-110.]]Google ScholarGoogle Scholar
  16. 16.MAZIERES, D. A toolkit for user-level file systems. In Proc. Usenix Technical Conference (June 2001), pp. 261-274.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.MAZlERES, D., KAMINSKY, M., KAASHOEK, M. F., AND WITCHEL, E. Separating key management from file system security. In Proceedings of the 17th ACM Symposium on Operating Systems Principles (SOSP) (Dee. 1999), pp. 124-139.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.MERKLE, R. C. A digital signature based on a conventional encryptioa function. In Advances in Cryptolagy--CRYPTO '87 (Berlin, 1987), C. Pomerance, Ed, vol. 293 of Lecture Notes in Computer Science, Springer-Vedag, pp. 369-378.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.Mojo nation documentation, http:l/www.mojonafion.neVducsL]]Google ScholarGoogle Scholar
  20. 20.Napster. http:/lwww.napster com.]]Google ScholarGoogle Scholar
  21. 21.NO, T. S. E., STOICA, I., AND ZHAN6, H. A waypoint service approach to connect heterogeneous internet address spaces, tn Prec. Usenix Technical Conference (June 2001), pp. 319-332.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.Ohaha. http://www., ohaha, co:a/a,,s igu. him1, as of June 17, 2001, the Ohaha application is no longer available.]]Google ScholarGoogle Scholar
  23. 23.ORAM, A., Ed. Peer-to-Peer: Harnessing the Power of Disruptive Computation. O'Reilly & Associates, 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. 24.PLAXTON, C., RAJARAMAN, R., AND RICHA. A. Accessing nearby copies of replicated objects in a dislxibuted environment, in Proceedings of the ACM SPAA (June 1997), pp. 311-320.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25.RABId, M. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36, 2 (1989), 335-348.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. 26.RATNASAMY, S., FRANOS, P., HANDLE'C, M., KARP, R., AND SIENKER, S. A sealable content-addressable network. In Proc_ ACM SUIGCOMM (San Diego, 2001).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27.REITER, M., AND RUBIN, A. Crowds: Anonymity for web transactions. ACM Transactions on Information and System Security 1, 1 (Nov. 1998), 66--92,]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28.ROWSTRON, A., AND DRUSCrtEL, P. Pastry: Scalable, distributed object location and muting for large-scale peer-to-peer systems In Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (MMdleware 2001) (Nov. 2001).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.ROWSTRON, A., AND DRUSCHEL, P. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the lgth ACM Symposium on Operating Systems Principles (Oct. 2001).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.SHERMAN, A., KARGER, D ., BERKHEIMIER, A., BOGSTAD, B., DHANIDINA, R., IWAMOTO, K., KIM, B., MATKINS, L., AND YERUSHALMI, Y. Web caeMng with consistent hashing. Computer Neavorks 31, 11-16 (May 1999), 1203-1213.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31.STOICA, I., MORRIS, R., KARGER, D., KAASHOEK. M, F., AND BALAKR1SHNAN, H. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. ACM S1GCOMM (San Diego, 2001).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. 32.STOICA, I., MORRIS, R., KARGER, D., KAASHOEK, M. F., AND BALAKRISHNAN, H. Chord: A scalable peer-to-peer lookup service for interact applications. Tech. Rep. TR-819, MIT, Cambridge, MA, March 2001.]]Google ScholarGoogle Scholar
  33. 33.TYAN, T. A case study of server selection. Master's thesis, MtT, Sept. 2001.]]Google ScholarGoogle Scholar
  34. 34.WALDMAN, M., ROBIN, A., AND CRANOR, L. F. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium (August 2000), pp. 59-72.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. 35.ZHAO, B., KUBIATOW}CZ, J., AND JOSEPH, A. Tapestry; An inflastxucture for fatflt-tolerant wide-area location and routing. Teeh. Rep. UCB/CSD-01-114I, Computer Science Division, U, C. Berkeley, Apr. 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Wide-area cooperative storage with CFS

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles
          October 2001
          254 pages
          ISBN:1581133898
          DOI:10.1145/502034

          Copyright © 2001 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 October 2001

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          SOSP '01 Paper Acceptance Rate17of85submissions,20%Overall Acceptance Rate131of716submissions,18%

          Upcoming Conference

          SOSP '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader