Visible to the public Biblio

Filters: Keyword is disk drives  [Clear All Filters]
2022-01-31
Shvidkiy, A. A., Savelieva, A. A., Zarubin, A. A..  2021.  Caching Methods Analysis for Improving Distributed Storage Systems Performance. 2021 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO. :1—5.
The object of the research is distributed software-defined storage systems, as well as methods of caching disk devices. It is important for improving the performance of storage systems, which is relevant in modern conditions. In this article, an assessment of the possibility of improving performance through the use of various caching methods is made, as well as experimental research and analysis of the results obtained. The parameters of the application's operation with the disk subsystem have been determined. The results of experiments are presented - testing was carried out on a deployed architecture of a distributed storage with two types of caching, the results are combined in graphs. Conclusions are drawn, including on the prospects for further research.
2017-12-28
Chatti, S., Ounelli, H..  2017.  Fault Tolerance in a Cloud of Databases Environment. 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA). :166–171.

We will focused the concept of serializability in order to ensure the correct processing of transactions. However, both serializability and relevant properties within transaction-based applications might be affected. Ensure transaction serialization in corrupt systems is one of the demands that can handle properly interrelated transactions, which prevents blocking situations that involve the inability to commit either transaction or related sub-transactions. In addition some transactions has been marked as malicious and they compromise the serialization of running system. In such context, this paper proposes an approach for the processing of transactions in a cloud of databases environment able to secure serializability in running transactions whether the system is compromised or not. We propose also an intrusion tolerant scheme to ensure the continuity of the running transactions. A case study and a simulation result are shown to illustrate the capabilities of the suggested system.

2015-04-30
Mingqiang Li, Lee, P.P.C..  2014.  Toward I/O-efficient protection against silent data corruptions in RAID arrays. Mass Storage Systems and Technologies (MSST), 2014 30th Symposium on. :1-12.

Although RAID is a well-known technique to protect data against disk errors, it is vulnerable to silent data corruptions that cannot be detected by disk drives. Existing integrity protection schemes designed for RAID arrays often introduce high I/O overhead. Our key insight is that by properly designing an integrity protection scheme that adapts to the read/write characteristics of storage workloads, the I/O overhead can be significantly mitigated. In view of this, this paper presents a systematic study on I/O-efficient integrity protection against silent data corruptions in RAID arrays. We formalize an integrity checking model, and justify that a large proportion of disk reads can be checked with simpler and more I/O-efficient integrity checking mechanisms. Based on this integrity checking model, we construct two integrity protection schemes that provide complementary performance advantages for storage workloads with different user write sizes. We further propose a quantitative method for choosing between the two schemes in real-world scenarios. Our trace-driven simulation results show that with the appropriate integrity protection scheme, we can reduce the I/O overhead to below 15%.