Weak consistency vs. access control: Distributed path maintenance

نویسندگان

  • Erwan Le Merrer
  • Gilles Straub
چکیده

The proliferation of connected electronic devices, along with their possible states, rises new challenges for data maintenance in terms of efficiency, scalability and security. In the context of data replication at large, weak consistency has been adopted as a standard in uniformly trusted systems. Recently, a distributed framework has been proposed to handle untrusted systems, by adding access control at the file level. Yet, if no particular care is paid to the effective connectivity of the overlay, with respect to dynamically evolving access rights, updates of replicas may not propagate correctly anymore. This paper proposes the design and simulation of a middleware application in charge of maintaining the connectivity of the overlay used for update propagation. We propose two techniques improving the resilience of any overlay that may be disconnected as access right policies are modified or as critical nodes crash: (i) the first one detects problems due to a node blocking the propagation of updates, and propagates the alert to the application at each node; (ii) the second one, allowed to modify the overlay, reacts to a blocking node by rewiring the overlay in order to preserve at least one path between any pairs of replicas, while conserving the structural characteristics of the overlay. We illustrate the applicability of our middleware through simulations; they show that at a tunable overhead, overlay connectivity is maintained, despite local decisions that would have otherwise disrupted the replication service.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The three dimensions of data consistency

Replication and consistency are essential features of any distributed system and have been studied extensively, however a systematic comparison is lacking. Therefore, we developed the Action-Constraint Framework, which captures both the semantics of replicated data and the behaviour of a replication algorithm. It enables us to decompose the problem of ensuring consistency into three simpler, ea...

متن کامل

Transactional Cluster Computing

A lot of sophisticated techniques and platforms have been proposed to build distributed object systems. Remote method invocation and explicit message passing on top of traditional operating systems are complex and difficult to program. As an alternative the distributed memory idea simplifies and unifies memory access, but performance drawbacks caused by expensive distributed locking mechanisms ...

متن کامل

Constructive and Adaptable Distributed Shared Memory

Distributed shared memory (DSM) is a paradigm for programming distributed systems, which provides an alternative to the message passing model. DSM offers the agents of the system a shared address space through which they can communicate with each other. The main problem of a DSM implementation on top of a message passing system is performance. Performance of an implementacion is closely related...

متن کامل

CMV: File consistency maintenance through virtual servers in peer-to-peer systems

Peer-to-peer (P2P) has become a mainstream architecture in numerous diverse distributed applications. However current P2P systems do not provide consistency guarantees under multiple reader multiple writer scenarios. Such a feature is desirable as well as necessary for supporting more diverse applications thanmerely file-sharing systems. In this paper,we develop a highly scalable and efficient ...

متن کامل

Efficient Partial Replication to Improve Locality in Large-Scale Systems

This work addresses data replication and consistency maintenance in large scale systems. Based on the observation that partial replication of data allows to improve network traffic and to preserve locality, particularly in large scale systems, it focuses on the constraints necessary to maintain consistency when partial replication is used. More precisely, it points out that the transfer of info...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010