Depot : Cloud storage with minimal trust ( extended version ) ∗

نویسندگان

  • Prince Mahajan
  • Srinath Setty
  • Sangmin Lee
  • Allen Clement
  • Lorenzo Alvisi
  • Mike Dahlin
  • Michael Walfish
چکیده

The paper describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by any number of clients or servers, yet it provides safety and liveness guarantees to correct clients. Depot provides these guarantees using a two-layer architecture. First, Depot ensures that the updates observed by correct nodes are consistently ordered under Fork-JoinCausal consistency (FJC). FJC is a slight weakening of causal consistency that can be both safe and live despite faulty nodes. Second, Depot implements protocols that use this consistent ordering of updates to provide other desirable consistency, staleness, durability, and recovery properties. Our evaluation suggests that the costs of these guarantees are modest and that Depot can tolerate faults and maintain good availability, latency, overhead, and staleness even when significant faults occur.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information about PIs

of prior cloud work: The PIs have built Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by any number of clients or servers, yet it provides safety and liveness guarantees to correct clients. Depot provides these guarantees using a two-layer architecture. First, Depot ensures that the updates observed by correct nodes are consistently ...

متن کامل

Securing Portable Document Format File Using Extended Visual Cryptography to Protect Cloud Data Storage

With the vast development in cloud computing model, various organizations and individuals often deploy the cloud without reviewing the security policies and procedures which can cause great risk in their business. Securing data in cloud storage becomes a challenging task not only for the cloud user but also to the Cloud Service Provider (CSP). Storing secret data in unencrypted form is suscepti...

متن کامل

Bandwidth and Delay Optimization by Integrating of Software Trust Estimator with Multi-User Cloud Resource Competence

Trust Establishment is one of the significant resources to enhance the scalability and reliability of resources in the cloud environment. To establish a novel trust model on SaaS (Software as a Service) cloud resources and to optimize the resource utilization of multiple user requests, an integrated software trust estimator with multi-user resource competence (IST-MRC) optimization mechanism is...

متن کامل

A Don’t Trust the Cloud, Verify: Integrity and Consistency for Cloud Object Stores

More and more data is outsourced to the cloud, and collaborating on a shared resource using cloud services has become easier than ever. Programmers work together on online source code repositories, global project teams produce technical deliverables, and friends share their photo albums. Nevertheless, the clients need to trust the cloud provider as they rely on it for the confidentiality and co...

متن کامل

Log-Structure Authenticated Data Storage with Minimal Trust

Today, data outsourcing to the clouds is a popular computing paradigm, and enabling efficient and trustworthy outsourcing becomes critically important as many emerging cloud applications are increasingly security-sensitive, such as healthcare, finance, etc. One of the promising techniques is authentication data structure (ADS). Most existing ADSs are not log-structured, yet cloud storage system...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010