A Solution for Maintaining File Integrity within an Online Data Archive Dan Scholes PDS Geosciences Node Washington University 1.

Slides:



Advertisements
Similar presentations
11 BACKING UP AND RESTORING DATA Chapter 4. Chapter 4: BACKING UP AND RESTORING DATA2 CHAPTER OVERVIEW Describe the various types of hardware used to.
Advertisements

High Availability Group 08: Võ Đức Vĩnh Nguyễn Quang Vũ
Oracle Data Guard Ensuring Disaster Recovery for Enterprise Data
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
Chapter 12 File Management Systems
Concepts of Database Management Seventh Edition
1 Stanford Archival Repository Project Brian Cooper Arturo Crespo Hector Garcia-Molina Department of Computer Science Stanford University.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Designing Storage Architectures for Preservation Collections Library of Congress, September 17-18, 2007 Preservation and Access Repository Storage Architecture.
Agenda  Overview  Configuring the database for basic Backup and Recovery  Backing up your database  Restore and Recovery Operations  Managing your.
Exchange 2010 Project Presentation/Discussion August 12, 2015 Project Team: Mark Dougherty – Design John Ditto – Project Manager Joel Eussen – Project.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Module 8: Designing Active Directory Disaster Recovery in Windows Server 2008.
November 2009 Network Disaster Recovery October 2014.
Course 6425A Module 9: Implementing an Active Directory Domain Services Maintenance Plan Presentation: 55 minutes Lab: 75 minutes This module helps students.
Concepts of Database Management Sixth Edition
1 Chapter 12 File Management Systems. 2 Systems Architecture Chapter 12.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section 15.2 Identify guidelines.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Hands-On Microsoft Windows Server 2003 Administration Chapter 2 Managing Windows Server 2003 Hardware and Software.
DATABASE UTILITIES. D ATABASE S YSTEM U TILITIES In addition to possessing the software modules most DBMSs have database utilities that help the DBA in.
Chapter Fourteen Windows XP Professional Fault Tolerance.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
15 Copyright © 2005, Oracle. All rights reserved. Performing Database Backups.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Concepts of Database Management Eighth Edition
Software.
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
15 Copyright © 2007, Oracle. All rights reserved. Performing Database Backups.
Update from the Data Integrity & Tracking WG Management Council F2F UCLA Los Angles, CA August 13-14, 2007
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
CYBERINFRASTRUCTURE FOR THE GEOSCIENCES Data Replication Service Sandeep Chandra GEON Systems Group San Diego Supercomputer Center.
11 DISASTER RECOVERY Chapter 13. Chapter 13: DISASTER RECOVERY2 OVERVIEW  Back up server data using the Backup utility and the Ntbackup command  Restore.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Module 9: Implementing Caching. Overview Caching Overview Configuring General Cache Properties Configuring Cache Rules Configuring Content Download Jobs.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Week 7 : Chapter 7 Agenda SQL 710 Maintenance Plan:
OAIS Rathachai Chawuthai Information Management CSIM / AIT Issued document 1.0.
14 Copyright © 2005, Oracle. All rights reserved. Backup and Recovery Concepts.
18 Copyright © 2004, Oracle. All rights reserved. Backup and Recovery Concepts.
© 2014 VMware Inc. All rights reserved. Cloud Archive for vCloud ® Air™ High-level Overview August, 2015 Date.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
File-System Management
KEEPS – a system for UELMA preservation and security
Oracle Database High Availability
Local Area Networks, 3rd Edition David A. Stamper
KEEPS – a system for UELMA preservation and security
Maintaining Windows Server 2008 File Services
Self Healing and Dynamic Construction Framework:
Introduction to Operating Systems
Installation, setup and use - Ferro Backup – V1.1
Chapter 2: System Structures
Maximum Availability Architecture Enterprise Technology Centre.
A Technical Overview of Microsoft® SQL Server™ 2005 High Availability Beta 2 Matthew Stephen IT Pro Evangelist (SQL Server)
Oracle Database High Availability
Section 15.1 Section 15.2 Identify Webmastering tasks
Networking for Home and Small Businesses – Chapter 2
Operational Dataset Update Functionality Included in the NCAR Research Data Archive Management System Zaihua Ji Doug Schuster Steven Worley Computational.
Chapter 2: Operating-System Structures
Networking for Home and Small Businesses – Chapter 2
Overview Multimedia: The Role of WINS in the Network Infrastructure
Chapter 2: Operating-System Structures
Presentation transcript:

A Solution for Maintaining File Integrity within an Online Data Archive Dan Scholes PDS Geosciences Node Washington University 1

Presentation Will Discuss PDS Geosciences Node background Threats to online data archives Methods to identify corrupt files PDS Geosciences Node approach to ensuring data archive file integrity 2

Planetary Data System (PDS) A NASA organization that archives science data from NASA’s planetary missions. PDS responsibilities are: ◦ To help NASA missions and other data providers to organize and document their digital planetary data ◦ To collect complete, well-documented planetary data into archives that are peer-reviewed ◦ To make the planetary data available and useful to the science community ◦ To ensure the long-term preservation and usability of the data. 3

PDS Geosciences Node’s Data Holdings Planetary science data related to geoscience studies ◦ Surface and interior of the terrestrial planets and satellites (Moon, Mars, Mercury, Venus). Currently maintain: ◦ Archives from over 20 NASA missions ◦ Archive consists of over 40 TB of data ◦ Over 13 million files 4

Access to Geosciences Node’s Archive Direct Access ◦ FTP and HTTP Web Interfaces ◦ Providing search and retrieval capabilities Custom User Request ◦ External hard drive 5

Geosciences Node Data Storage Architecture Primary online data archive (SAN) Secondary online replication site Tape backups Deep archive at National Space Science Data Center (NSSDC) 6

Threats to Online Data Archives Accidental change by staff Software error Hardware failure Malicious threats: Hacker or Virus Natural disaster 7

Defenses Firewall settings Network security policies Proactive hardware maintenance Multiple backup copies of the data 8

Typical Recovery Restoration from offline backup ◦ Tapes ◦ External hard drive ◦ DVD/CD Restoration from online secondary copy ◦ Mirror site ◦ Replication site How do you know the recovered copy is not corrupt? 9

Bigger Question 10 How do you know if a change or corruption has occurred in the data archive?

Identifying Corrupt Files Unsatisfactory Error Discovery User Reported Problems Finding Errors By Chance Pre Release Data Review Internal Data Usage Errors Internal Data Usage Errors Web Link Checker Sweep Proactive Error Detection Manual Checksum Scan Automated Validation Sweeps Our Solution 11

Checksum Checksum – a digital signature created by a hashing algorithm ◦ File: frt000027e2_01_if156l_trr2.img ◦ MD5 Checksum: 5F393DAD7B36F A9299E605E51 The Geosciences Node uses MD5 ◦ Commonly used  Many client tools for data providers ◦ Fast calculation 12

Initial Data Integrity Study Manual Process ◦ Create and compare checksum index files of data archive Advantages ◦ Technically worked ◦ Lessons learned Disadvantages ◦ Time consuming ◦ Difficult to manage ◦ Difficult to update with new or replacement files 13

Application System Requirements Create catalog of data archive contents Track multiple archive copies Update catalog as archive grows Verify archive against cataloged contents Provide processing speed for monthly archive validations Provide an easy to use application interface 14

Archive Management System (AMS) Custom application Components ◦ Graphical user interface (GUI) ◦ Command line processing application ◦ Relational database Concept ◦ Archive baseline catalogs 15

Archive Baseline Catalog Data Set 1 Archive Baseline Catalog Concept 16 Data Set 1 Primary Archive Data Set 1 Secondary Replication Site AMS Database File & Directory Attributes: Object name Modification date Content count Size MD5 Checksum File & Directory Attributes: Object name Modification date Content count Size MD5 Checksum AMS Processing Application Verifies both copies against baseline Loads baseline from primary archive

AMS Overview 17 Data Archives AMS Database Command Line Processing Application On Servers Command Line Processing Application On Servers Data Sets GUI Interface On Workstation GUI Interface On Workstation Archive Management System Operator Requests Actions and Reports Results Queries Results/Data Stream Results Queries Updates Inserts Results Requests Actions and Data

AMS Processing Create new archive baseline catalog Monthly validation scans Baseline is updated when new data is received Data recovery situations ◦ Verify restored data against archive baseline catalog 18

AMS Monthly Validation Scans Validation Executed Archive Data Sets Are Selected for Validation Results Stored in Database Results Manually Reviewed Archive Baseline Catalog Updated Issues Investigated & Resolved Validations Marked Complete 19

Full Scan Validation File and Directory attributes scanned ◦ Object name – case sensitive ◦ Modification date ◦ Content count (directory’s file count) ◦ Size ◦ MD5 checksum (file validation only) Advantage ◦ Thorough validation Disadvantages ◦ Consumes more resources ◦ Time consuming - entire archive up to 9 days 20

Quick Scan – no checksum File and Directory attributes scanned ◦ Object name – case sensitive ◦ Modification date ◦ Content count (directory’s file count) ◦ Size Advantages ◦ Very fast processing speed - entire archive 28 hours ◦ Identifies most accidental changes Disadvantage ◦ Will not detect subtle file corruption 21

Categories of Validation Results No differences are detected File/Directory attributes are different New archive content is discovered Archive content no longer exists Differences require further review 22

Interpreting Validation Results No differences are detected ◦ Correct – no changes File/Directory attributes are different ◦ Correct – revised data deployed to the data archive ◦ Error – files were modified or corrupted New archive content is discovered ◦ Correct – data added to the archive ◦ Error - files accidently copied into archive Archive content no longer exists ◦ Correct – items removed for archive revision ◦ Error - mistakenly or maliciously removed 23

Archive Status List 24

Validation Result Screen 25

Validation Issue Resolution Screen 26

AMS Results Geosciences Node has used the AMS for nearly a year. ◦ Minimal personnel time to manage, monitor, and add new archives ◦ Full scan of the entire archive 12 times  Can take up to 9 days of processing (full scan) ◦ Two accidental archive changes ◦ No file loss or corruptions Provides the Geosciences Node with a better degree of data integrity 27

Future Geosciences Node’s data archives continue to rapidly grow with current and future missions. Further performance review ◦ Network switch configurations ◦ Server Configurations ◦ Disk Performance ◦ Simultaneous processing streams ◦ Possible code modifications 28

Questions Contact Information ◦ Dan Scholes ◦ Applications Programmer ◦ PDS Geosciences Node ◦ Washington University in St. Louis ◦ 29