Beyond the MDS Bound in Distributed Cloud Storage

Slides:



Advertisements
Similar presentations
Availability in Globally Distributed Storage Systems
Advertisements

Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
current hadoop architecture
Alex Dimakis based on collaborations with Dimitris Papailiopoulos Arash Saber Tehrani USC Network Coding for Distributed Storage.
Henry C. H. Chen and Patrick P. C. Lee
1 NCFS: On the Practicality and Extensibility of a Network-Coding-Based Distributed File System Yuchong Hu 1, Chiu-Man Yu 2, Yan-Kit Li 2 Patrick P. C.
BASIC Regenerating Codes for Distributed Storage Systems Kenneth Shum (Joint work with Minghua Chen, Hanxu Hou and Hui Li)
Self-repairing Homomorphic Codes for Distributed Storage Systems [1] Tao He Software Engineering Laboratory Department of Computer Science,
Simple Regenerating Codes: Network Coding for Cloud Storage Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, and Jin Li University.
Coding for Modern Distributed Storage Systems: Part 1. Locally Repairable Codes Parikshit Gopalan Windows Azure Storage, Microsoft.
Yuchong Hu1, Henry C. H. Chen1, Patrick P. C. Lee1, Yang Tang2
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Abstract HyFS: A Highly Available Distributed File System Jianqiang Luo, Mochan Shrestha, Lihao Xu Department of Computer Science, Wayne State University.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
Availability in Globally Distributed Storage Systems
David Choffnes, Winter 2006 OceanStore Maintenance-Free Global Data StorageMaintenance-Free Global Data Storage, S. Rhea, C. Wells, P. Eaton, D. Geels,
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
Parikshit Gopalan Windows Azure Storage, Microsoft.
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
A “Hitchhiker’s” Guide to Fast and Efficient Data Reconstruction in Erasure-coded Data Centers K. V. Rashmi, Nihar Shah, D. Gu, H. Kuang, D. Borthakur,
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
FRIENDS: File Retrieval In a dEcentralized Network Distribution System Steven Huang, Kevin Li Computer Science and Engineering University of California,
A Hybrid Approach of Failed Disk Recovery Using RAID-6 Codes: Algorithms and Performance Evaluation Yinlong Xu University of Science and Technology of.
Efficient Data Dissemination and Survivable Data Storage Lihao Xu
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Alex Dimakis based on collaborations with Dimitris Papailiopoulos Viveck Cadambe Kannan Ramchandran USC Tutorial on Distributed Storage Problems and Regenerating.
10th Canadian Workshop on Information Theory June 7, 2007 Rank-Metric Codes for Priority Encoding Transmission with Network Coding Danilo Silva and Frank.
Cooperative regenerating codes for distributed storage systems Kenneth Shum (Joint work with Yuchong Hu) 22nd July 2011.
Efficient Fine Granularity Scalability Using Adaptive Leaky Factor Yunlong Gao and Lap-Pui Chau, Senior Member, IEEE IEEE TRANSACTIONS ON BROADCASTING,
CUHK Analysis of Movie Replication and Benefits of Coding in P2P VoD Yipeng Zhou Aug 29, 2012.
NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds
Network Coding for Distributed Storage Systems IEEE TRANSACTIONS ON INFORMATION THEORY, SEPTEMBER 2010 Alexandros G. Dimakis Brighten Godfrey Yunnan Wu.
Network Coding Distributed Storage Patrick P. C. Lee Department of Computer Science and Engineering The Chinese University of Hong Kong 1.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Securing Every Bit: Authenticated Broadcast in Wireless Networks Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic, and Calvin Newport.
Failure Resilience in the Peer-to-Peer-System OceanStore Speaker: Corinna Richter.
LT Codes-based Secure and ReliableCloud Storage Service
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
Providing Transparent Security Services to Sensor Networks Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou IEEE ICC 2007 Reporter :呂天龍 1.
1 Network Coding and its Applications in Communication Networks Alex Sprintson Computer Engineering Group Department of Electrical and Computer Engineering.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian perrig, Virgil Gligor IEEE Symposium on Security and Privacy 2005.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
Taiming Feng, Chuang wang, Wensheng Zhang and Lu Ruan INFOCOM 2008 Presented by Mary Nader.
Optimal Resource Allocation for Protecting System Availability against Random Cyber Attack International Conference Computer Research and Development(ICCRD),
Exact Regenerating Codes on Hierarchical Codes Ernst Biersack Eurecom France Joint work and Zhen Huang.
20/10/ Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu Institute of Network Coding Please.
A Fast Repair Code Based on Regular Graphs for Distributed Storage Systems Yan Wang, East China Jiao Tong University Xin Wang, Fudan University 1 12/11/2013.
Coding and Algorithms for Memories Lecture 13 1.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
Secret Sharing in Distributed Storage Systems Illinois Institute of Technology Nexus of Information and Computation Theories Paris, Feb 2016 Salim El Rouayheb.
Dependable and Secure Data Storage and Retrieval in Wireless, Mobile Networks ISTI – CNR Pisa IS-MANET – WP4.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Seminar On Rain Technology
Pouya Ostovari and Jie Wu Computer & Information Sciences
CS791Aravind Elango Maintenance-Free Global Data Storage Sean Rhea, Chris Wells, Patrick Eaten, Dennis Geels, Ben Zhao, Hakim Weatherspoon and John Kubiatowicz.
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
A Tale of Two Erasure Codes in HDFS
Double Regenerating Codes for Hierarchical Data Centers
MinJi Kim, Muriel Médard, João Barros
Sindhusha Doddapaneni
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Xiaoyang Zhang1, Yuchong Hu1, Patrick P. C. Lee2, Pan Zhou1
Student: Fang Hui Supervisor: Teo Yong Meng
Presentation transcript:

Beyond the MDS Bound in Distributed Cloud Storage Jian Li, Tongtong Li, Jian Ren Michigan State University IEEE INFOCOM 2014-Conference on Computer Communications 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Performance Analysis Conclusion 2014/9/18

Introduction The distributed cloud storage can also increase data availability while reducing network congestion that leads to increased resiliency. A popular approach is to employ an (n, k) maximum distance separable (MDS) code such as an Reed-Solomon (RS) code [1], [2]. [1] S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz, “Maintenance-free global data storage,” [2] R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G. M. Voelker, “Total recall: System support for automated availability management,” 2014/9/18

Introduction For RS code, the data is stored in n storage nodes in the network. The data collector (DC) can reconstruct the data by connecting to any k healthy nodes. While RS code works perfect in reconstructing the data, it lacks scalability in repairing or regenerating a failed node. 2014/9/18

Introduction Regenerating code Minimum storage regeneration (MSR) Allow a replacement node to connect to some individual nodes directly. Instead of first recovering the original data. Regenerate a substitute of the failed node. Minimum storage regeneration (MSR) Minimum bandwidth regeneration (MBR) 2014/9/18

Introduction However, the existing research either has no error detection capability, or has the error correction capability limited by the RS code. Moreover, error correction capability are unable to determine whether the error correction is successful. 2014/9/18

Introduction In this paper, we construct the H-MSR code by combining the Hermitian code and regenerating code at the MSR point. Can detect the errors in the network while achieving the error correction capability beyond the RS code. Can determine whether the error correction is successful. 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Performance Analysis Conclusion 2014/9/18

Related Work Dimakis et al. [3] introduced the conception of {n, k, d, α, β,B} regenerating code. The contents stored in a failed node can be regenerated by the replacement node through downloading γ help symbols from d helper nodes. The bandwidth consumption for the failed node regeneration could be far less than the whole file. [3] A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, “Network coding for distributed storage systems,” 2014/9/18

Related Work A data collector (DC) can reconstruct the original file stored in the network by downloading α symbols from each of the k storage nodes. In [3], the authors proved that there is a tradeoff between bandwidth γ and per node storage α. 2014/9/18

Related Work In [10], [11], [12], discussed the safely stored, check the integrity of the data, analyzed the error resilience of the RS code. This paper’s design is based on the structural analysis of the Hermitian code and the efficient decoding algorithm proposed in [13]. [10] S. Pawar, S. El Rouayheb, and K. Ramchandran, “Securing dynamic distributed storage systems against eavesdropping and adversarial attacks,” [11] Y. Han, R. Zheng, and W. H. Mow, “Exact regenerating codes for byzantine fault tolerance in distributed storage,” [12] K. Rashmi, N. Shah, K. Ramchandran, and P. Kumar, “Regenerating codes for errors and erasures in distributed storage,” 2014/9/18 [13] J. Ren, “On the structure of hermitian codes and decoding for burst errors,”

Outline Introduction Related Work Preliminary and Assumptions Regenerating Code Hermitian Code Adversarial Model Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Performance Analysis Conclusion 2014/9/18

Preliminary and Assumptions Regenerating Code Regenerating code introduced in [3] is a linear code over 𝐺𝐹 𝑞 with a set of parameters {n, k, d, α, β,B}. A file of size B is stored in n storage nodes, each of which stores α symbols. A replacement node can regenerate the contents of a failed node by downloading β symbols from each of d randomly selected storage nodes. 2014/9/18

Preliminary and Assumptions Regenerating Code Total bandwidth needed to regenerate a failed node is γ = dβ. The data collector (DC) can reconstruct the whole file by downloading α symbols from each of k ≤ d randomly selected storage nodes. ? 2014/9/18

Preliminary and Assumptions Regenerating Code From equation (1), a tradeoff between the regeneration bandwidth γ and the storage requirement α was derived. γ and α cannot be decreased at the same time. 2014/9/18

Preliminary and Assumptions Hermitian Code A Hermitian curve H(q) over GF( 𝑞 2 ) in affine coordinates is defined by: 2014/9/18

Preliminary and Assumptions Adversarial Model In this paper Assume some network nodes can be corrupted due to hardware failure or communication errors. Be compromised by malicious users. These nodes may send out incorrect response to disrupt the data regeneration and reconstruction. Refer these symbols as bogus symbols without making distinction between the corrupted symbols and compromised symbols. 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Performance Analysis Conclusion 2014/9/18

Encoding H-MSR Code Analyze the H-MSR code for d = 2k − 2 = 2α. Let α 0 , α 1 , …, α 𝑞−1 be a strictly decreasing integer sequence LCM of α 0 , α 1 , …, α 𝑞−1 is A Suppose the data contains B = A 𝑖=0 𝑞−1 ( α 𝑖 +1). 2014/9/18

Encoding H-MSR Code We arrange the B symbols into two matrices S, T as below: 2014/9/18

Encoding H-MSR Code 𝑆 α 𝑖 ,𝑗 is a symmetric matrix of size α i × α i with the upper-triangular entries filled by data symbols. Thus 𝑆 α 𝑖 ,𝑗 contains α i ( α i + 1)/2 symbols. So it contains 𝑖=0 𝑞−1 ( α 𝑖 ( α 𝑖 +1)/2).𝐴/ α 𝑖 =(A 𝑖=0 𝑞−1 ( α 𝑖 +1))/2. 2014/9/18

Encoding H-MSR Code For distributed storage, we encode each pair of matrices (S, T) using Algorithm 1. 2014/9/18

Encoding H-MSR Code 2014/9/18

Encoding H-MSR Code Theorem 1. By processing the data symbols using Algorithm 1, we can achieve the MSR point in distributed storage. 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Regeneration in Error-free Network Regeneration in the Hostile Network Reconstruction of the H-MSR Code Performance Analysis Conclusion 2014/9/18

Regeneration of the H-MSR Code Regeneration in Error-free Network Suppose node z fails, we devise Algorithms 2 to Algorithm 4 in the network to regenerate the exact H-MSR code symbols of node z in a replacement node z ′ . 2014/9/18

Regeneration of the H-MSR Code Regeneration in Error-free Network 2014/9/18

Regeneration of the H-MSR Code Regeneration in Error-free Network 2014/9/18

Regeneration of the H-MSR Code Regeneration in Error-free Network From Algorithm 2 to Algorithm 4, we can derive the equivalent storage parameters for each symbol block of size 𝐵 𝑗 = A ( α 𝑗 + 1), 𝑑 𝑗 = 2 α 𝑗 , k 𝑗 = α 𝑗 + 1, α 𝑗 = A, β 𝑗 = A/ α 𝑗 . 2014/9/18

Regeneration of the H-MSR Code Regeneration in the Hostile Network In a hostile network, Algorithm 4 may be unable to regenerate the failed node due to the possible bogus symbols received from the responses. It also cannot verify the correctness of the result. 2014/9/18

Regeneration of the H-MSR Code Regeneration in the Hostile Network There are two modes for the helper nodes to regenerate the contents of a failed storage node in the hostile network. Detection mode Recovery mode 2014/9/18

Regeneration of the H-MSR Code Regeneration in the Hostile Network 2014/9/18

Regeneration of the H-MSR Code Regeneration in the Hostile Network 2014/9/18

Regeneration of the H-MSR Code Regeneration in the Hostile Network Recovery Mode: Once the replacement node z ′ detects errors using Algorithm 5, it will send integer j = q − 1 to all the other q 2 −1 nodes in the network requesting help symbols. Helper node i will send help symbols using Algorithm 3. z ′ can regenerate symbols using Algorithm 6. 2014/9/18

Regeneration of the H-MSR Code Regeneration in the Hostile Network 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Reconstruction in Error-free Network Reconstruction in Hostile Network Performance Analysis Conclusion 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Error-free Network 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Error-free Network [4] K. Rashmi, N. Shah, and P. Kumar, “Optimal exact-regenerating codes for distributed storage at the msr and mbr points via a productmatrix construction,” 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Hostile Network Algorithm 9 cannot verify whether the result is correct or not. H-MSR Detection mode Recovery mode 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Hostile Network 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Hostile Network 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Hostile Network 2014/9/18

Reconstruction of the H-MSR Code Reconstruction in Hostile Network 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Performance Analysis Scalable Error Correction Error Correction Capability Complexity Discussion Conclusion 2014/9/18

Performance Analysis Scalable Error Correction The RS-MSR code in [12] can correct up to τ errors by downloading symbols from d + 2τ nodes. When the number of errors is larger than τ , the decoding process will fail without being detected. 2014/9/18

Performance Analysis Scalable Error Correction(regeneration) The H-MSR code can detect the erroneous decodings using Algorithm 5. If no error is detected, the regeneration of HMSR only needs to download symbols from one more node than the regeneration in the error-free network, while the extra cost for the RS-MSR code is 2τ . The H-MSR code can correct the errors using Algorithm 6. 2014/9/18

Performance Analysis Scalable Error Correction(reconstruction) The RS-MSR code can correct up to τ errors with support from 2τ additional helper nodes. The H-MSR code only requires symbols from one additional node using Algorithm 10 to do error detection. The errors can then be corrected using Algorithm 11. 2014/9/18

Performance Analysis Error Correction Capability Theorem 4. For the data regeneration, the number of errors that the H-MSR code and the RS-MSR code can correct satisfy τ H−MSR > τ RS−MSR when q ≥ 3. Similarly, we can conclude that the number of errors that can be corrected by the H-MSR code is larger than the RSMSR code under the same code rate. 2014/9/18

Performance Analysis Complexity Discussion(regeneration) H-MSR code will slightly increase the complexity of the helper nodes. The extra operation is a matrix multiplication. The complexity is O( 𝑞 2 ) = O( ( 𝑛 1/3 ) 2 ) = O( 𝑛 2/3 ). 2014/9/18

Performance Analysis Complexity Discussion(regeneration) Similar to [13], for a replacement node, from Algorithm 4 and Algorithm 5, we can derive that the complexity to regenerate symbols for RS-MSR is O( 𝑛 2 ). While the complexity for H-MSR is only O( 𝑛 5/3 ). 2014/9/18

Performance Analysis Complexity Discussion(reconstruction) The computational complexity for DC to reconstruct the data is O( 𝑛 5/3 ) for the H-MSR code and O( 𝑛 2 ) for the RS-MSR code. 2014/9/18

Outline Introduction Related Work Preliminary and Assumptions Encoding H-MSR Code Regeneration of the H-MSR Code Reconstruction of the H-MSR Code Performance Analysis Conclusion 2014/9/18

Conclusion H-MSR code can significantly improve the performance of the regenerating code under malicious attacks. Lower complexity than (RS-MSR) code in both regeneration and reconstruction. 2014/9/18