Project Presentation Students: Yan Michalevsky Asaf Cidon Supervisors: Alexander Shraer Assoc. Prof. Idit Keidar.

Slides:



Advertisements
Similar presentations
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Advertisements

COMP 655: Distributed/Operating Systems Summer 2011 Dr. Chunbo Chu Week 7: Consistency 4/13/20151Distributed Systems - COMP 655.
What is OceanStore? - 10^10 users with files each - Goals: Durability, Availability, Enc. & Auth, High performance - Worldwide infrastructure to.
Accountable systems or how to catch a liar? Jinyang Li (with slides from authors of SUNDR and PeerReview)
SPORC: Group Collaboration using Untrusted Cloud Resources Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten Published in OSDI’2010.
Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks Marten van Dijk, Jonathan Rhodes, Luis Sarmenta Srini Devadas MIT Computer.
UDDI, Discovery and Web Services Registries. Introduction To facilitate e-commerce, companies needed a way to locate one another and exchange information.
Cloud Computing PRESENTED BY- Rajat Dixit (rd2392)
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
1 Venus: Verification for Untrusted Cloud Storage Christian Cachin Idit Keidar, Asaf Cidon, Yan Michalevsky, Dani Shaket IBM Research Zurch Technion, Israel.
CS 582 / CMPE 481 Distributed Systems Fault Tolerance.
FAUST: Fail-Aware Untrusted Storage Christian Cachin IBM Zurich Idit Keidar Technion Alex Shraer, Technion, Israel Joint work with:
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
September 24, 2007The 3 rd CSAIL Student Workshop Byzantine Fault Tolerant Cooperative Caching Raluca Ada Popa, James Cowling, Barbara Liskov Summer UROP.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Cloud Usability Framework
SaaS, PaaS & TaaS By: Raza Usmani
Distributed Databases
Addition to Networking.  There is no unique and standard definition out there  Cloud Computing is a general term used to describe a new class of network.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
ATIF MEHMOOD MALIK KASHIF SIDDIQUE Improving dependability of Cloud Computing with Fault Tolerance and High Availability.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
CLOUD COMPUTING. What is cloud computing ? History Virtualization Cloud Computing hardware Cloud Computing services Cloud Architecture Advantages & Disadvantages.
Cloud Computing By Mihir Chitnis.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Fault Tolerance via the State Machine Replication Approach Favian Contreras.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
In the name of God :).
1 The Design of a Robust Peer-to-Peer System Rodrigo Rodrigues, Barbara Liskov, Liuba Shrira Presented by Yi Chen Some slides are borrowed from the authors’
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
BFTCloud: A Byzantine Fault Tolerance Framework for Voluntary-Resource Cloud Computing Yilei Zhang, Zibin Zheng, and Michael R. Lyu
Introduction. Readings r Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edn. 3 m Note: All figures from this book.
Practical Byzantine Fault Tolerance
From Viewstamped Replication to BFT Barbara Liskov MIT CSAIL November 2007.
Presented by: Sanketh Beerabbi University of Central Florida.
Oracle's Distributed Database Bora Yasa. Definition A Distributed Database is a set of databases stored on multiple computers at different locations and.
Robustness in the Salus scalable block store Yang Wang, Manos Kapritsos, Zuocheng Ren, Prince Mahajan, Jeevitha Kirubanandam, Lorenzo Alvisi, and Mike.
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
Efficient Fork-Linearizable Access to Untrusted Shared Memory Presented by: Alex Shraer (Technion) IBM Zurich Research Laboratory Christian Cachin IBM.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Transactions and Concurrency Control. Concurrent Accesses to an Object Multiple threads Atomic operations Thread communication Fairness.
HUSKY CONSULTANTS FRANKLIN VALENCIA WIOLETA MILCZAREK ANTHONY GAGLIARDI JR. BRIAN CONNERY.
Distributed Systems CS Consistency and Replication – Part I Lecture 10, September 30, 2013 Mohammad Hammoud.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
POND: THE OCEANSTORE PROTOTYPE S. Rea, P. Eaton, D. Geels, H. Weatherspoon, J. Kubiatowicz U. C. Berkeley.
CLOUD COMPUTING RICH SANGPROM. What is cloud computing? “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a.
Hwajung Lee.  Improves reliability  Improves availability ( What good is a reliable system if it is not available?)  Replication must be transparent.
Systems Research Barbara Liskov October Replication Goal: provide reliability and availability by storing information at several nodes.
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Robustness in the Salus scalable block store Yang Wang, Manos Kapritsos, Zuocheng Ren, Prince Mahajan, Jeevitha Kirubanandam, Lorenzo Alvisi, and Mike.
Database Laboratory Regular Seminar TaeHoon Kim Article.
RANDY MODOWSKI COSC Cloud Computing. Road Map What is Cloud Computing? History of “The Cloud” Cloud Milestones How Cloud Computing is being used.
System Architecture CS 560. Project Design The requirements describe the function of a system as seen by the client. The software team must design a system.
Web 2.0: Concepts and Applications 6 Linking Data.
CMSC 818J: Privacy enhancing technologies Lecture 2.
Unit 3 Virtualization.
BChain: High-Throughput BFT Protocols
Intrusion Tolerant Architectures
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
What is Cloud Computing - How cloud computing help your Business?
Cloud Computing Cloud computing refers to “a model of computing that provides access to a shared pool of computing resources (computers, storage, applications,
Principles of Computer Security
7.1. CONSISTENCY AND REPLICATION INTRODUCTION
Design pattern for cloud Application
Distributed Transactions
Cloud Computing for Wireless Networks
Presentation transcript:

Project Presentation Students: Yan Michalevsky Asaf Cidon Supervisors: Alexander Shraer Assoc. Prof. Idit Keidar

 Users should not blindly “trust the cloud”  Users should have tools that guarantee integrity and consistency for data they store in online storage systems  Utilize research on untrusted storage for real-world mass- market applications

 Many providers now offer wide-variety of online data storage services, a.k.a. clouds: ◦ Software Collaboration ◦ Social Networking ◦ Online Archiving ◦ Document Repositories ◦ Open Source Development

 Large corporations and SMEs have started utilizing Clouds in order to save IT infrastructure costs  Online IT service providers also provide cloud-enabled products ◦ SalesForce.com ◦ Oracle ◦ SAP

 Multiple risks in releasing data to online platforms: ◦ Loss of privacy ◦ Lack of availability ◦ Data corruption ◦ Data inconsistencies between multiple clients ◦ Exposure to malicious online attacks ◦ Unauthorized access

 Byzantine fault-tolerant (BFT) replication protocol ◦ Capable of guaranteeing integrity & consistency  If used by a storage provider ◦ Need at least 2/3 correct servers on the cloud  But most servers located in the same place, run the same system  guaranteeing that servers fail independently would be very costly ◦ Require high communication overhead  Providers prefer weaker consistency ◦ Cloud providers do not currently implement BFT protocols ◦ Most importantly: clients would still need tools to check provider behavior and should not simply “trust the cloud”  If used by the client ◦ Store data on multiple (at least 4) storage providers  costly to the client

 Store a hash of the data locally ◦ Allows clients to verify server responses ◦ Use hash-trees when volume of data is large (store locally the root of the hash-tree)  Proofs of Retrievability (PORs) ◦ Allows a client to verify that the server stores its data without reading all the data  What about multiple clients?

 Strong consistency (atomicity, sequential consistency) ◦ not possible, assuming we want clients to be able to execute operations independently of each other ◦ Server can hide latest write from readers ◦ Server can split its brain (each client thinks he executes in isolation)

 Fork-Consistency  Advantages:  Linearizable view of a sub-sequence of the execution  After the server lies, if clients see new information from each other, they detect inconsistency  Disadvantages  Blocking, even when server is correct

 A weaker consistency was devised in order to enable a wait-free protocol.  Example: ◦ In Fork-Consistency, if C1 crashed during w1, C2 would be blocked while conducting r2 (even though the server was telling the truth!)

 A common cloud-computing scenario: ◦ Multiple clients working concurrently ◦ Using a commodity online storage provider (e.g. Amazon S3, Salesforce.com Force)  Our goal: ◦ Integrity and eventual consistency for client data ◦ Detection of inconsistencies / service failures

 Concept: ◦ An untrusted verification node, can quickly detect inconsistencies when it is not faulty ◦ Clients communicate directly when they suspect that storage or verifier is faulty ◦ Clients can use any unmodified commodity cloud storage provider

 Features: ◦ Operations are conducted optimistically  wait- free ◦ Clients can go offline, new clients can join ◦ All clients receive failure notifications when consistency breach is detected ◦ Operations eventually become consistent  clients know up to which point the data is consistent with other clients

 Learn about distributed computing research  Implement client-to-client communication  Deploy verification node on Google Web Apps  Assist in writing the article

 based  Authenticated (using GNUPG)  A client communicates directly with another: ◦ To request and send status updates, if no recent activity of that client was seen on storage ◦ When an inconsistencies is detected

 Verification node was initially deployed on Google Web Apps and used HTTP to communicate with Clients  We realized that Google Web Apps is not appropriate for hosting the verification node ◦ The verification node creates a sequence of client requests ◦ Maintaining such sequence with Google Apps is very costly  Instead, verifier was deployed on a regular server in MIT

 We wrote the initial versions of the Introduction and Related Works sections  Contributed to the System Design and Deployment and Implementation sections  Article was submitted to Eurosys2010 in October 23 rd 2009

 Too many to list on this slide  “Trusting the Cloud”, C. Cachin, I. Keidar, A. Shraer, 2009  “Towards a Cloud Computing Research Agenda”, K. Birman, G. Chockler, R. van Renesse, 2009  “Salesforce hits its stride”, J. Hempel, Fortune Magazine, mpel_salesforce.fortune/index.htm mpel_salesforce.fortune/index.htm  “Fail-Aware Untrusted Storage”, C. Cachin, I. Keidar, A. Shraer, 2009  Additional references included in article citations section