Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2043674.2043692acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimcsConference Proceedingsconference-collections
research-article

A novel file-level continuous data protection mechanism oriented service application

Published: 05 August 2011 Publication History

Abstract

Continuous Data Protection (CDP) technology is a good schema for ensuring the continuity and survival capability of the service applications. However, the existing continuous data protection technology is difficult to meet the requirements, which means more fine-grained, closely associated with the upper applications and efficient failure recovery capabilities. We have designed and implemented a file-level CDP mechanism oriented service applications. By monitoring the modification operation on the files associated with corresponding service, the system generates the data backup blocks sets, which increased depend on the time series. Meanwhile, the Sub-Fragment is designed to save storage overhead during the data protecting procedure. When the service failure occurs, a novel file data recovery technology will be used to recovery the file data in the manner of no-copy data recovery. The test results for the sample data sets show that the mechanism can ensure the upper users accessing the file systems transparently, reduce more than half of the data storage costs during protecting process, and greatly enhance the efficiency of service application data.

References

[1]
K. M. Khan, "Security Dynamics of Cloud Computing," CUTTER IT JOURNAL, pp. 38--43, 2009.
[2]
M. John Viega, "Cloud Computing and the Common Man," IEEE Journal ON Cloud Computing Security, vol. 42, pp. 106--108, 2009.
[3]
T. Erl, Service-Oriented Architecture:Concepts, Technology & Design: Prentice Hall PTR, 2005.
[4]
A. Ferdowsi, "S3 data corruption?." vol. 2010, 2008.
[5]
S. D. M. Forum, "Continuous Data Protection Solving the Problem of Restoration," SNIA2008.
[6]
G. Laden, P. Ta-Shma, E. Yaffe, M. Factor, and S. Fienblit, "Architectures for Controller Based CDP," in 5th USENIX Conference on File and Storage Technologies, 2007, pp. 107--121.
[7]
J. Damoulakis, "Continuous protection," Storage, vol. 3, pp. 33--39, 2004.
[8]
J. Damoulakis, "Time to say goodbye to backup?," Storage, vol. 4, pp. 64--66, 2006.
[9]
C. B. Morrey Iii and D. Grunwald, "Peabody: The time travelling disk," San Diego, CA, United states, 2003, pp. 241--253.
[10]
Q. Yang, W. Xiao, and J. Ren, "TRAP-array: A disk array architecture providing timely recovery to any point-in-time," Boston, MA, United states, 2006, pp. 289--300.
[11]
D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton, and J. Ofir, "Deciding when to forget in the Elephant file system," Operating Systems Review (ACM), vol. 33, pp. 110--123, 1999.
[12]
K.-K. Muniswamy-Reddy, P. P. Wright, A. Himmer, and P. Zadok, "A Versatile and User-Oriented Versioning File System," in Proceedings of the 3rd USENIX Conference on File and Storage Technologies, 2560 Ninth St. Suite 215 Berkeley, CA USA, 2004, pp. 115--128.
[13]
L. Maohua and T.-C. Chiueh, "File versioning for block-level continuous data protection," Montreal, QC, Canada, 2009, pp. 327--334.
[14]
N. Zhu and T.-C. Chiueh, "Portable and efficient continuous data protection for network file servers," Edinburgh, United kingdom, 2007, pp. 687--696.
[15]
M. Lu, S. Lin, and T.-C. Chiueh, "Efficient logging and replication techniques for comprehensive data protection," San Diego, CA, United states, 2007, pp. 171--184.
[16]
T.-c. Chiueh and L. Huang, "Track-Based Disk Logging," in International Conference on Dependable Systems and Networks (DSN'02), 2002, pp. 429--438.
[17]
M. D. Flouris and A. Bilas, "Clotho: Transparent Data Versioning at the Block I/O Level," in Proceedings of the 12th NASA Goddard, 21st IEEE Conference on Mass Storage Systems and Technologies (MSST 2004), College Park, Maryland, 2004, pp. 315--328.
[18]
M. B. Zhu, K. Li, and R. H. Patterson, "Efficient data storage system." vol. 6,928,526 US, 2008.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMCS '11: Proceedings of the Third International Conference on Internet Multimedia Computing and Service
August 2011
208 pages
ISBN:9781450309189
DOI:10.1145/2043674
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Sichuan University
  • Chinese Academy of Sciences
  • SCF: Sichuan Computer Federation
  • Southwest Jiaotong University
  • Beijing ACM SIGMM Chapter

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 August 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. continuous data protection
  2. file-level
  3. no-copy data recovery
  4. reconstruct the sectors
  5. sub-fragment

Qualifiers

  • Research-article

Funding Sources

Conference

ICIMCS '11
Sponsor:
  • SCF

Acceptance Rates

Overall Acceptance Rate 163 of 456 submissions, 36%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 138
    Total Downloads
  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media