[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2670979.2670991acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
tutorial

Hybris: Robust Hybrid Cloud Storage

Published: 03 November 2014 Publication History

Abstract

Besides well-known benefits, commodity cloud storage also raises concerns that include security, reliability, and consistency. We present Hybris key-value store, the first robust hybrid cloud storage system, aiming at addressing these concerns leveraging both private and public cloud resources.
Hybris robustly replicates metadata on trusted private premises (private cloud), separately from data which is dispersed (using replication or erasure coding) across multiple untrusted public clouds. Hybris maintains metadata stored on private premises at the order of few dozens of bytes per key, avoiding the scalability bottleneck at the private cloud. In turn, the hybrid design allows Hybris to efficiently and robustly tolerate cloud outages, but also potential malice in clouds without overhead. Namely, to tolerate up to f malicious clouds, in the common case of the Hybris variant with data replication, writes replicate data across f + 1 clouds, whereas reads involve a single cloud. In the worst case, only up to f additional clouds are used. This is considerably better than earlier multi-cloud storage systems that required costly 3f + 1 clouds to mask f potentially malicious clouds. Finally, Hybris leverages strong metadata consistency to guarantee to Hybris applications strong data consistency without any modifications to the eventually consistent public clouds.
We implemented Hybris in Java and evaluated it using a series of micro and macrobenchmarks. Our results show that Hybris significantly outperforms comparable multi-cloud storage systems and approaches the performance of bare-bone commodity public cloud storage.

References

[1]
CloudSpaces EU FP7 project. http://cloudspaces.eu/.
[2]
Memcached. http://memcached.org/.
[3]
I. Abraham, G. Chockler, I. Keidar, and D. Malkhi. Byzantine Disk Paxos: Optimal Resilience with Byzantine Shared Memory. Distributed Computing, 18(5):387--408, 2006.
[4]
H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon. RACS: a case for cloud storage diversity. In SoCC, pages 229--240, 2010.
[5]
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. SIGOPS Oper. Syst. Rev., 36(SI), Dec. 2002.
[6]
C. Basescu, C. Cachin, I. Eyal, R. Haas, A. Sorniotti, M. Vukolić, and I. Zachevsky. Robust data sharing with key-value stores. In Proceedings of DSN, pages 1--12, 2012.
[7]
A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia, M. Pasin, and P. Verissimo. SCFS: A shared cloud-backed file system. In Usenix ATC, 2014.
[8]
A. N. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa. DepSky: Dependable and secure storage in a cloud-of-clouds. ACM Transactions on Storage, 9(4):12, 2013.
[9]
K. D. Bowers, A. Juels, and A. Oprea. HAIL: a high-availability and integrity layer for cloud storage. In ACM CCS, pages 187--198, 2009.
[10]
C. Cachin, R. Haas, and M. Vukolić. Dependable storage in the intercloud. Technical Report RZ3783, IBM Research, 2010.
[11]
G. Chockler, D. Dobre, and A. Shraer. Brief announcement: Consistency and complexity tradeoffs for highly-available multi-cloud store. In The International Symposium on Distributed Computing (DISC), 2013.
[12]
B.-G. Chun, P. Maniatis, S. Shenker, and J. Kubiatowicz. Attested append-only memory: making adversaries stick to their word. In SOSP, pages 189--204, 2007.
[13]
B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears. Benchmarking cloud serving systems with ycsb. In SoCC, pages 143--154, 2010.
[14]
J. C. Corbett, J. Dean, M. Epstein, A. Fikes, C. Frost, J. J. Furman, S. Ghemawat, A. Gubarev, C. Heiser, P. Hochschild, W. C. Hsieh, S. Kanthak, E. Kogan, H. Li, A. Lloyd, S. Melnik, D. Mwaura, D. Nagle, S. Quinlan, R. Rao, L. Rolig, Y. Saito, M. Szymaniak, C. Taylor, R. Wang, and D. Woodford. Spanner: Google's globally distributed database. ACM Trans. Comput. Syst., 31(3):8, 2013.
[15]
M. Correia, N. F. Neves, and P. Veríssimo. How to tolerate half less one Byzantine nodes in practical distributed systems. In SRDS, pages 174--183, 2004.
[16]
C. Dwork, N. Lynch, and L. Stockmeyer. Consensus in the presence of partial synchrony. J. ACM, 35(2):288--323, Apr. 1988. ISSN 0004-5411.
[17]
R. Fan and N. Lynch. Efficient Replication of Large Data Objects. In Proceedings of DISC, pages 75--91, 2003.
[18]
S. Ghemawat, H. Gobioff, and S.-T. Leung. The google file system. In SOSP, pages 29--43, 2003.
[19]
M. Herlihy. Wait-Free Synchronization. ACM Trans. Program. Lang. Syst., 13(1), 1991.
[20]
M. P. Herlihy and J. M. Wing. Linearizability: A Correctness Condition for Concurrent Objects. ACM Trans. Program. Lang. Syst., 12(3), 1990.
[21]
P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. Zookeeper: wait-free coordination for internet-scale systems. In USENIX ATC'10, pages 11--11, 2010.
[22]
F. P. Junqueira, I. Kelly, and B. Reed. Durability with bookkeeper. Operating Systems Review, 47(1):9--15, 2013.
[23]
R. Kapitza, J. Behl, C. Cachin, T. Distler, S. Kuhnle, S. V. Mohammadi, W. Schröder-Preikschat, and K. Stengel. Cheap-BFT: resource-efficient Byzantine fault tolerance. In EuroSys, pages 295--308, 2012.
[24]
R. Kotla, L. Alvisi, and M. Dahlin. Safestore: A durable and practical storage system. In USENIX ATC, pages 129--142, 2007.
[25]
P. G. Lopez, S. Toda, C. Cotes, M. Sanchez-Artigas, and J. Lenton. Stacksync: Bringing elasticity to dropbox-like file synchronization. In ACM/IFIP/USENIX Middleware, 2014.
[26]
P. Mahajan, S. T. V. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud storage with minimal trust. ACM Trans. Comput. Syst., 29(4):12, 2011.
[27]
M. Pease, R. Shostak, and L. Lamport. Reaching Agreement in the Presence of Faults. J. ACM, 27(2), 1980.
[28]
J. S. Plank, S. Simmerman, and C. D. Schuman. Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2. Technical Report CS-08-627, University of Tennessee, August 2008.
[29]
R. Rodrigues and B. Liskov. High availability in dhts: Erasure coding vs. replication. In IPTPS, pages 226--239, 2005.
[30]
G. S. Veronese, M. Correia, A. N. Bessani, L. C. Lung, and P. Veríssimo. Efficient byzantine fault-tolerance. IEEE Trans. Computers, 62(1):16--30, 2013.
[31]
VMware Professional Services. The Snowden Leak: A Windfall for Hybrid Cloud? http://blogs.vmware.com/consulting/2013/09/the-snowden-leak-a-windfall-for-hybrid-cloud.html.
[32]
W. Vogels. Eventually consistent. Commun. ACM, 52(1):40--44, 2009.
[33]
M. Vukolić. The Byzantine empire in the intercloud. SIGACT News, 41(3):105--111, 2010.
[34]
Y. Wang, L. Alvisi, and M. Dahlin. Gnothi: separating data and metadata for efficient and available storage replication. In USENIX ATC'12, pages 38--38, 2012.
[35]
Z. Wu, M. Butkiewicz, D. Perkins, E. Katz-Bassett, and H. V. Madhyastha. Spanstore: cost-effective geo-replicated storage spanning multiple cloud services. In SOSP, 2013.
[36]
J. Yin, J.-P. Martin, A. Venkataramani, L. Alvisi, and M. Dahlin. Separating agreement from execution for byzantine fault tolerant services. In SOSP, pages 253--267, 2003.

Cited By

View all
  • (2024)Text Semantics-Driven Data Classification Storage OptimizationApplied Sciences10.3390/app1403115914:3(1159)Online publication date: 30-Jan-2024
  • (2023)BlockAIM: A Neural Network-Based Intelligent Middleware For Large-Scale IoT Data Placement DecisionsIEEE Transactions on Mobile Computing10.1109/TMC.2021.307157622:1(84-99)Online publication date: 1-Jan-2023
  • (2023)Enterprise Support Hierarchical Model with Secure Data Protocol2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)10.1109/SMARTGENCON60755.2023.10442282(1-6)Online publication date: 29-Dec-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SOCC '14: Proceedings of the ACM Symposium on Cloud Computing
November 2014
383 pages
ISBN:9781450332521
DOI:10.1145/2670979
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud storage
  2. Hybrid cloud
  3. Reliability

Qualifiers

  • Tutorial
  • Research
  • Refereed limited

Conference

SOCC '14
Sponsor:
SOCC '14: ACM Symposium on Cloud Computing
November 3 - 5, 2014
WA, Seattle, USA

Acceptance Rates

Overall Acceptance Rate 169 of 722 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)1
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Text Semantics-Driven Data Classification Storage OptimizationApplied Sciences10.3390/app1403115914:3(1159)Online publication date: 30-Jan-2024
  • (2023)BlockAIM: A Neural Network-Based Intelligent Middleware For Large-Scale IoT Data Placement DecisionsIEEE Transactions on Mobile Computing10.1109/TMC.2021.307157622:1(84-99)Online publication date: 1-Jan-2023
  • (2023)Enterprise Support Hierarchical Model with Secure Data Protocol2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)10.1109/SMARTGENCON60755.2023.10442282(1-6)Online publication date: 29-Dec-2023
  • (2022)Fog-to-MultiCloud Cooperative Ehealth Data Management With Application-Aware Secure DeduplicationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.308608919:5(3136-3148)Online publication date: 1-Sep-2022
  • (2022)Enabling Secure and Space-Efficient Metadata Management in Encrypted DeduplicationIEEE Transactions on Computers10.1109/TC.2021.306732671:4(959-970)Online publication date: 1-Apr-2022
  • (2022)Secure and efficient data storage scheme for unstructured data in hybrid cloud environmentSoft Computing10.1007/s00500-022-06977-126:23(13145-13152)Online publication date: 28-Jun-2022
  • (2021)Charon: A Secure Cloud-of-Clouds System for Storing and Sharing Big DataIEEE Transactions on Cloud Computing10.1109/TCC.2019.29168569:4(1349-1361)Online publication date: 1-Oct-2021
  • (2021)A Survey on data security challenges in multi cloud environment2021 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)10.1109/CONECCT52877.2021.9622722(1-5)Online publication date: 9-Jul-2021
  • (2021)Cost-Effective Dynamic Optimisation for Multi-Cloud Queries2021 IEEE 14th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD53861.2021.00052(387-397)Online publication date: Sep-2021
  • (2021)Design and Implementation of a Distributed Versioning File System for Cloud RenderingIEEE Access10.1109/ACCESS.2021.31190779(138716-138723)Online publication date: 2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media