1Large-scale Decentralized Storage Systems Used by           Volunteer Computing Systems                     Iuliia Prosku...
2of central server assigns jobs to voluntarily-contributed-machines/volunteers. This configuration may lead to bottle-neck ...
3processing power when it would otherwise be idle. In addition,      where all participants share equally, to more constra...
4   The foundation of FARSITE design is built on the fact            a large scale distributed storage system, clients exp...
5                          Advantages                                main conflict arises when multiple users write to a fil...
6 Advantages                     Disadvantages                       fragments are stored among nodes for long term archiv...
7                          Advantages                                     key could be done through many data files. But he...
8 Advantages                      Disadvantages                                               Advantages A distributed key...
9                          Advantages                                  more sophisticated replication and availability tec...
10                    IV. S TATE OF THE A RTA. Introduction   WHY? In current scientific volunteer computing softwareinfras...
11           System                  Description                                                            Focus         ...
12system, is an effective way to increase and maintain highly         resources. These layers will provide several API as ...
13                               A PPENDIXFig. 5.   Decentralized Storage Systems FeaturesFig. 6.   Decentralized Storage ...
14                               R EFERENCES                                          [26] D. Bermbach, M. Klems, S. Tai, ...
Upcoming SlideShare
Loading in …5

Large-Scale Decentralized Storage Systems for Volunter Computing Systems


Published on

Final Survey report of Large-Scale Decentralized Storage Systems for Volunter Computing Systems

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Large-Scale Decentralized Storage Systems for Volunter Computing Systems

  1. 1. 1Large-scale Decentralized Storage Systems Used by Volunteer Computing Systems Iuliia Proskurnia, Arinto Murdopo, Enkhjin Bayarsaikhan and Diego Montero Facultat Informatica de Barcelona Universitat Politecnica de Catalunya Barcelona, Spain Abstract—Recently, Volunteer Computing (VC) is becoming Achieving all these goals is still a huge challenge forquite popular for providing its resources for large-scale computa- researchers. Existing decentralized storage system solutionstional problems in scientific researches. Centralized control of the only could achieve some of them while sacrificing the others.VC systems is the main bottleneck, since it introduces asymmetryto the system. Several systems are already benefitting from VC The most popular techniques to achieve all these proper-in terms of CPU sharing, e.g. SETI@home. Another side of the ties among large-scale decentralized storage systems are theproblem is storage sharing, where volunteer nodes will dedicate following:their free memory space to the system. • Consistent Hashing. In consistent hashing, the output Introduction of Decentralized Storage System that is suitable range of a hash function is treated as a fixed circularfor the VC is appropriate, mainly, to reduce possible overheadfrom the centralized part of the VC and provide available and space or ”ring”. Each node is assigned a random valueeventually consistent decentralized storage system with minimal within this space. Each data item identified by a key iscost. assigned to a node by hashing the data item’s key to yield The focus of this paper is to thoroughly survey currently its position on the ring.existing decentralized storage systems, evaluate them according • Active or passive replication. In active replication eachto its suitability for VC system, and provide a state-of-the-artsolution for this issue. client request is processed by all the servers. In passive replication there is only one server (called primary) that Index Terms—Decentralized Storage Systems, Volunteer Com-puting, Scalability, Replication. processes client requests and subsequently propagates the updates to back-up nodes. • Gossip-based protocol for failure handling. The protocol I. I NTRODUCTION is based on the gossip/virus-based information distribu- Large scale decentralized storage systems’ goals are decen- tion, including random destinations to spread the infor-tralization, reduced cost and fault tolerance. At the same time mation.decentralized storage systems provide inherent scalability and • Logging read/write operations. The main function ofavailability of resources compared to its centralized counter- logging is to store all the changes made which are readspart [4], [7], [8], [9], [10], [13], [14], [15]. and writes by all nodes during the object life. Main design issues of decentralized storage systems are the • Ring locality for load balancing. This technique should befollowings [6]: applied to deal with non-uniform data, load distribution • Decentralization. Decentralized storage systems, as the and heterogeneity of nodes performance, . name suggests, are decentralized by their nature. They Most of these properties can be found in Cassandra and Dy- could support distributed storage, processing, information namo systems. And they are partly covered by other systems sharing etc. like Ivy [4], Squirrel [5], Pastis [18], PAST [12], Riak [4], • Fault-tolerance. System should be resilient to removal Voldemort [8], OceanStore [7], [19], Farsite [11]. and failure of nodes at any moment. Volunteer Computing (VC) uses the free resources in In- • Fast Resource Location. Efficient mechanism for resource ternet and Intranet for some computational or storage pur- location is an important point. poses. It is important to discover the endless options for • Load Balancing. System should make optimal distribu- its application. One of the differences between VC and P2P tion of resources based on nodes capability and avail- systems is behavior of their nodes. Analysis of the real traces ability. from SETI@home [37] project proved clients contribution • Churn Protection. Denial of service attack from excessive consciousness. For example, SETI@home follows a typical node churns should be handled by the system. model of a volunteer computing project, in which an ”agent” • Anonymity. Resistance to censorship is important charac- is installed on the user’s machine after they register to par- teristic to be introduced by the system. ticipate. All the registered participants are contributing with • Security. Security from attacks and system failure should their CPU to complete some important computational problem: be ensured by the system. biological, chemical etc. • Scalability. Supporting millions of users are essential for However, current architectures are based on the client- decentralized storage systems. server architecture. In such VC systems, a cluster or group
  2. 2. 2of central server assigns jobs to voluntarily-contributed-machines/volunteers. This configuration may lead to bottle-neck in the group of central servers, in terms of task distri-bution or data movement between server and clients. HarvardTONIC project tried to reduce the chance of bottleneck bysplitting centralized servers into central storage system andlookup service. However, one point of failure still existsand TONIC does not support storage sharing between itsusers. P2P-Tuple [21] solution could be used to alleviateaforementioned TONIC’S problems. Until now VC popularity is focused on CPU sharing area. Fig. 1. Decentralized Storage SystemAs the volume of existing data and knowledge is growingrapidly, the necessity of new approaches for storage is critical.One of the solutions is employing scalable decentralized among nodes in the system for fast resource location, sym-storage systems in Volunteer Computing. metry design of the storage for load balancing, fault and The main goal of this survey is to provide a comprehensive security handling for reliable storage, and the scalabilitydescription of the current decentralized storage systems and feature for handling thousands of nodes. Multi-writer designsthe extent to which these systems could be combined with face numerable issues not found in read-only systems, such asVC. Finally, the last part of the paper will include proposal of maintaining consistencies among replicas, handling concurrenta state-of-the-art system that fits Volunteer Computing storage updates, and preventing malicious attacks [18]. Similarly, oneneeds. can find multiple approaches in replication techniques within The rest of the paper is organized as follows. Section II in- the storage systems, for high reliability, churn protection,troduces background information about Decentralized Storage and fast resource location. The same goes to fault tolerance;Systems and Volunteer Computing. Section III covers a review there are multiple techniques to achieve certain tolerance levelof the existing storage systems with their suitability for Volun- against faulty nodes. For example Dynamo’s sloppy quorumteer Computing, which is referred as a Volunteer Computing and hinted hand-off [15] as well as Total Recall’s redundancyExtension. Section IV provides a proposal and design of the management [10]. In addition, security is equally important inmost suitable state-of-the-art decentralized storage system for peer-to-peer storage systems for volunteer computing, consid-VC. Finally the survey will end up with conclusion and list ering the importance of data integrity and computing resourcesof references. of the volunteers in volunteer computing systems. II. BACKGROUND AND R ELATED WORKS B. Volunteer ComputingA. Decentralized Storage Systems Volunteer Computing (VC) is a distributed computing Decentralized storage systems (DSS) are growing far more paradigm based on computing and storage capabilities ofattractive over the years, as they are being employed by the computers donated by volunteer individuals via the Internet.popular networking corporations like Facebook [13], Amazon The volunteer members donate their personal computers to[15], LinkedIn [8] and etc. Behind the growing popularity is be used as hardware resources, when the computers are inthe rising number of researches and developments in the field idle status. Through this arrangement, VC environments haveof DSS. The coordination between nodes can be symmetric been very successful in harnessing idle hardware resources inas in P2P system[12] where nodes have same capabilities personal computers.or responsibilities, or in some implementation it could be Another definition of Volunteer Computing is a type ofasymmetric. Figure 1 illustrates a comparison of system Desktop Grid (DG) computing, which is one of the largestarchitectures in DSS and centralized storage systems. The distributed systems in the world. DG aims to bring largedata in DSS are stored in several coordinating nodes, whereas numbers of donated computing systems together to formin centralized storage system, the data are stored in a single computing communities with vast resource pools. They areserver. well suited to perform highly parallel computations that do The goals of decentralized storage system are an ad hoc not require any interaction between network participants.connectivity between nodes, a decentralization of the system, VC is currently being used by many scientific researchreduced cost of ownership, and anonymity [6]. In this paper projects. A well-known example of this is a project calledwe surveyed number of different decentralized storage systems SETI@home, whose main purpose is to analyze radio-with their key features and pros-and-cons, as well as evaluated telescopic signals in an attempt to detect extra-terrestrialthem according to their suitableness in storage system for activities. In this project, SETI@home employed a volunteervolunteer computing. The characteristics that are important computing platform called BOINC.for storage system in volunteer computing are availability, BOINC, which stands for Berkeley Infrastructure for Openscalability, eventual consistency, performance and security. Network Computing, relies on a publicly open system that The design issues that associate with these characteristics allows private individuals (i.e., “volunteers”) to install a soft-are implementation of read/write access, replication handling ware program, which takes advantage of their computers’
  3. 3. 3processing power when it would otherwise be idle. In addition, where all participants share equally, to more constrainedBOINC can also be used in multiple projects at once; hence and customizable unstructured networks where certain groupsa single volunteer-computer can share its resources with dif- are in charge of data distribution and discovery. Figure 3ferent projects using this platform [46]. shows decentralized data sharing technique with its relation to Another example of Volunteer Computing platforms is the Volunteer Computing.XtremWeb project. The main principle of this open sourceresearch project is not only that any participant can volunteerhis computing resources, as in BOINC, but also can use otherparticipants’ computing resources or storage. In this scenario,each participant has the ability to register new applications anddata and to submit new computational jobs [45]. Architecture of a VC middleware - BOINC From a general point of view, The BOINC architecture isbased on a strict master/worker model, as shown on the Figure2: • Client: allows platform users to interact with the platform by submitting stand-alone jobs and retrieving results. • Server: a coordination service which connects clients and workers. It receives jobs submissions from clients and Fig. 3. Decentralized Data Storage for VC distributes them to workers according to a scheduling policy. • Worker: the component running on the PC which is III. E XISTING S YSTEM R EVIEW responsible for executing jobs. In the quest for defining the state-of-the-art decentral- ized storage system for volunteer computing, the following well-known distributed storage systems were thoroughly sur- veyed: FarSite, IVY, Overnet, PAST, PASTIS, Voldemort, OceanStore, Glacier, Total Recall, Cassandra, Riak, Dynamo, and Attic. The systems are arranged in the order of least useful to most useful. The last two systems, TFS and Squirrel, are special type of decentralized storage systems, however their implementations and characteristics make them equally important for our research. The survey is based on analysis of characteristics, im- plementations and the system architecture of each storage systems. The characteristics, on which we focused, in this survey are Availability, Scalability, Eventual Consistency, Per- formance and Security. Each distributed storage system was evaluated by its advantages, disadvantages and VC compati- bility. In the end of this section, Table I shows short description for each system together with main characteristics of each system, based on five aforementioned characteristics previ-Fig. 2. VC BOINC Architecture ously ( AV = Availability, SC = Scalability, ECO = Eventual This architecture defines a Pull Model (workers pull tasks Consistency, P = Performance and SC = Security). Appendixfrom the server). The centralized server never initiates com- contains more comprehensive comparison table for surveyedmunication with worker nodes. All the communications are storage systems according to their read/write access, repli-instantiated from the worker simplifying some communication cation management, symmetry, fault tolerance and securityissues due to NAT and Firewalls. Besides, the central servers characteristics.do not have to keep track of the workers connections. Critical scaling issues with VC may arise from the fact that A. Farsiteboth VC and DG use centralized data storage, thus creating FARSITE (Federated, Available, and Reliable Storage fora potential bottleneck in the system when tasks share large an Incompletely Trusted Environment) is designed to harnessinput files or when the central server has limited bandwidth. collective resources of loosely coupled, insecure, and unre-In this paper, we surveyed the use of decentralized data sharing liable machines to provide logically centralized, secure, andtechniques that can be further introduced to VC and DG data reliable file-storage services. It tries to solve the problem ofdistribution system. The functionalities of decentralized data high cost in maintaining centralized server and its vulnerabilitysharing techniques may range from BitTorrent-style networks to geographically localized faults.
  4. 4. 4 The foundation of FARSITE design is built on the fact a large scale distributed storage system, clients expect globalthat there is a general increase in unused disk capacity and security and stability, without having to choose which clientsa decrease in computational cost of cryptographic operation to trust based on their user logs. This feature of Ivy makes itrelative to I/O. less attractive as a potentially large scale distributed storage To achieve file system capability, FARSITE should have system. Finally, [4] mentions that more work is required, inhierarchical directory namespace. FARSITE allows the flexi- order to improve IVY’s conflict resolution techniques.bility of having multiple roots (regarded as name of virtual fileserver). Each root has designated set of machines to manage it Advantages Disadvantagesand these machines forms a Byzantine-fault-tolerant group to Decentralized storage – no Security measures happenenhance their security. FARSITE manages trust in its system central point of failure. after the disaster. Not soby using public-key-cryptography, which is by introducing scalable.several types of certificates. Symmetric encryption is used toencrypt users’ private keys of their certificates. Note that in Volunteer Computing ExtensionFARSITE, once encrypted, the private key of the certificate isstored in globally readable directory in FARSITE and it only IVY is not scalable, does not provide enough securitycan be accessed upon login. tolerance. Therefore, it is not a recommended storage In relation with Volunteer Computing, the notion of direc- system for volunteer computing.tory group is a good idea. It allows the protocol to distributethe management job as well as the data into several machines.Security is also handled well with encryption and public-key-cryptography-based access list control. However, it is designedto handle up to 105 nodes and it may not be sufficientin Volunteer Computing context. Another drawback is its C. Overnet/Kademliadesign which is only intended for University or Workplaceenvironment (relatively slower churn rate and high machineavailability, as what have assumed by the writer of the paper), Overnet used to be popular decentralized peer-to-peer com-which has different characteristics with Volunteer Computing puter network in 2006. It is based on Kademlia DHT; henceenvironment (relatively higher churn rate and low machine there is no scientific paper that discuss about Overnet, we willavailability). discuss Kademlia instead. Advantages Disadvantages Kademlia is a symmetric DHT based on XOR-based metric Quantified scalability. Scal- Limited uses, current design to perform the routing functionality. It treats nodes as leaves able up to 105 nodes. Se- and implementation is suit- in binary tree; with each node position is determined by ID curity is really prioritized in able for desktop machines prefix. Kademlia ensures that every node knows of at least one the design. Mimic the cen- in academic and corporate node each of its subtrees. Node ID is represented as 160-bit tralized file system. settings. number. Volunteer Computing Extension Scalability up to 105 nodes may not enough for vol- XOR metric is used to introduce the notion of distances unteer computing environment. Volunteer computing between nodes in Kademlia. However, it doesn’t consider the environment has different characteristics to FARSITE actual location of the nodes since it uses the node ID to intended environment (University or Workplace environ- determine the “distance” between them. XOR is unidirectional. ment). Kademlia nodes store contact information about each other to route query message with maximum list of k. There are fourB. IVY RPC protocols in Kademlia: PING, STORE, FIND NODE Ivy is a read/write distributed storage system based on log and FIND VALUE. In Kademlia, the most important proce-files of each user. Each user takes periodic snapshot of all dure for each participant is called node lookup, where byother users’ logs, containing history of uploads and updates a node in Kademlia tries to find the k closest nodes toto all files in the system. When a user makes updates to any some given node ID. Kademlia employs recursive algorithmfile, its log is saved in his/her own log. This setup makes the for node-lookup. The initiator is able to send parallel, asyn-Ivy storage system suitable for smaller group of cooperating chronous FIND NODE RPCs to the nodes it has chosen. Thispeers. In addition, use of client logs slow down the system, parallelization is able to accelerate the lookup process althoughdespite that IVY uses periodic snapshots to mitigate this issue. it increases the number of messages that are circulating inNon-conflicting concurrent file update logs are merged, and the network. Nodes in Kademlia also need to periodicallyconflicting files are resolved in application level. Ivy exposes broadcast (key, value) pairs to keep them alive. The routingthe whole operation history of files to every client. Hence, table in Kademlia is in the form of binary trees and it issecurity in Ivy is achieved by peers reviewing the log files of always maintained to avoid unbalanced tree. In addition, somefaulty users, and choosing not to trust those bad users. In other optimization is performed in Kademlia to efficiently republishwords, the security measures take place after the disaster. In key.
  5. 5. 5 Advantages main conflict arises when multiple users write to a file con- The notion of symmetry using XOR metrics is good. currently, in which case Pastis’ conflict resolution mechanism The concept of learning about neighbor when receiving works by comparing each updates’ version number and the queries is interesting. It is resistant to certain degree of unique ID of users who issued the updates. PASTIS supports DoS attack. two consistency models: Close-to-open model, which is also Disadvantages used in both Andrew File System (AFS) and Network File Kademlia’s notion of distance does not consider the ac- System (NFS), and a more relaxed consistency model called tual network distance. In the current era of geolocation, Read-Your-Writes model. Pastis uses write access control and this distance notion can be improved by considering the data integrity, and does not provide read access control. Write actual network distance. Routing table in Kademlia is access control works by by allowing the owner of the file to in the form of binary trees and it needs to maintain issue write certificates to certain trustees, who must properly it periodically. This maintenance potentially has lots of sign the new version of inode and provide his own write message to exchange in the network. certificate when modifying content. This model assumes that Volunteer Computing Extension all users allowed to write to a given file trust one another [18]. High churn rate causes lot of message overhead in Kademlia and makes not really suitable for Volun- Advantages Disadvantages teer Computing system. The message overhead here is Provides high scalability Security based on trust be- caused by maintenance of binary tree and parralelization and locality. Read and tween parties. Conflict reso- of node lookup message. write access. Up to lution mechanism is not so- twice as fast as Ivy or phisticated enough for very Oceanstore. Supports large scale storage system.D. PAST multiple consistency PAST is a large-scale archival storage system based on models.Pastry P2P overlay network. Its main intended purpose is Volunteer Computing Extensionan archival storage; hence the design of PAST was focused Locally controlled write access to storage nodes requireson global balance of storage load while providing locally each storage nodes to fully trust volunteer computingavailable replicas. The overall load balance is achieved through members. This may create security concerns that are notreplica diversion, in which before a replica is stored to a node, suitable for distributed storage system used by volunteerit considers the storage load surrounding the itself. If the node computing.is located (in terms of nodeIDs) in a heavily packed area,the replication is diverted to less loaded area. In addition, bystoring highly requested files in users’ available caches, PAST F. Project Voldemortachieves a graceful degradation of global performance whenthe total storage reaches its limit. Therefore, in addition to Voldemort can be described as a big, distributed and faultstability, PAST offers fast resource locating. Security in PAST tolerant hashtable. It promises high horizontal scalability andis achieved by issuing smart cards for writing users, and public higher availability in the cost of lesser convenience in usingkey cryptography is used in the overall system [12]. PAST it due to its primitive API.became a base overlay storage system to Pastis. Voldemort consists of several layers and each layer in Voldemort implements a simple storage interface that does put, Advantages Disadvantages get, and delete operations. Generally, each layer is focused in Read and Write access. Writing users must have a performing one function such as TCP/IP network communi- Highly scalable and overall physical smart card, which cation, serialization, version reconciliation, inter-node routing. reliable storage system. is a big liability. In addi- Voldemort keeps each of these layers separate, that means they tion PAST is intended as an can be configured (by mixing and matching) at runtime to meet archival storage, which lim- different needs. its resource management. In Voldemort, anyone can derive location of a value by Volunteer Computing Extension knowing its key, and lookup is performed in peer-to-peer Although PAST is highly scalable, in terms of storage fashion. Consistent hashing is used to compute the location nodes, the use of smart cards strongly limit the physical of each key in the cluster and to prevent data shift between scalability, in terms of clients. In addition, state-of-the servers when a server is added or removed from the cluster. art distributed storage system requires more resource management service than solely archiving. Voldemort supports pluggable serialization. We can choose among these kinds of serialization procedure: json, string, java- serialization, protobuf, thrift, avro-generic/avro-specific/avro-E. Pastis reflective, and identity. It’s a distributed storage system built on top of PAST. It’s Voldemort tolerates the possibility of inconsistency, andfeatures of locality, scalability, and replication maintenance resolves inconsistencies at read time (versioning and read-are similar to those of PAST. Additional design features are repair). Versioning scheme in Voldemort uses vector clock toconflict-resolution mechanism, consistency, and security. The guarantee partial order over values.
  6. 6. 6 Advantages Disadvantages fragments are stored among nodes for long term archiving. Integrity of data is No data found for its perfor- The nodes containing fragments communicate with each other, preserved using versioning mance analysis. However, and create extra fragment copies when needed. Durability is and without compromising Voldemort has been effec- ensured by spreading redundant amount of fragments across system availability. Data tively proven in produc- randomly selected nodes in the system. Glacier uses erasure replication, data partition tion environment through codes and garbage collection for low storage cost, and loosely and server failure are LinkedIn. Only support key- coupled fragment maintenance protocol to reduce the message handled transparently. value store, that means if we costs among nodes. Voldemort layer is want to improve the usabil- A security in Glacier is achieved simply because there is built based on plug-in- ity (such as a file system), no remote write or update access to users. Since users can architecture, and we can we need to add additional only overwrite or modify their own local nodes, any mali- configure these layers to layer on top of Voldemort to cious activity cannot harm the storage system. Data integrity suit application needs. perform the job is achieved by excessive amount of erasure-coded fragment Volunteer Computing Extension replications across the system. We will need to fine-tune the module in each layer to support volunteer computing, which initially can be Similar to Tapestry and CFS, Glacier [14] uses leasing to complicated, but once it is fine-tuned, it will be suitable control the lifetime of a stored data. Objects must be renewed for volunteer computing. periodically, in order to keep them alive in the archive. Experimental results of its prototype show that Glacier is able to manage a large amount of data with low maintenance, whileG. OceanStore ensuring high scalability in data size and system size. [14] OceanStore is a two-tiered, fully read/write distributed stor-age system for any type of files and applications. The inner Advantages Disadvantagestier consists of well-connected servers for primary replications High durability. Far less No remote write/update.– Byzantine Fault Tolerant (BFT) algorithm is used in this tier. vulnerable to large scale Excessive RedundancyThe outer tier consists of loosely connected client computers failures. within the storage system,for storage and archives – aggressive replication is used for in order to ensure highclient replicas and erasure coding is used for reliable archives. fault tolerance. Lifetimes ofIn addition to being able to support all types of files and stored data are limited.applications in the system, OceanStore provides high fault Volunteer Computing Extensiontolerance through the combined use of BFT and erasure Due to its high reliability, and security, this storagecoding. With this design, they’ve achieved speedup of 4.6 system is suitable for Volunteer computing. Howeverover NFS in Read-only version, and 7.3 slower than NFS in since there’s no remote write and update, this systemread-write version. For security, it uses threshold cryptography, could be used purely as an archival storage of computedwhich allows host computers store files without knowing data.the contents. They assume that all user infrastructures areuntrusted [19]. Advantages Disadvantages Provides read and write Writing access slows down I. Total Recall access. High fault toler- the system, significantly. ance and security is assured, Total Recall is a peer-to-peer storage system that is capable since none of the nodes are of automatically managing its availability in dynamic changing trusted. environment. It is able to perform availability prediction based Volunteer Computing Extension on empirical results, and to repair itself (dynamic repair) High fault tolerance and security is achieved through the automatically when hosts leave the system and decreasing re- use of complex algorithm - BFT. This comes with the dundancy. It has redundancy management feature so that Total cost of limited scalability. Recall intelligently chooses between replication, erasure code, and hybrid techniques based on system condition. However,H. Glacier Total Recall is not symmetric. It introduces three types of Glacier is a highly durable read-only distributed storage host in its implementation: master host, storage host and clientsystem. It is designed to provide availability during cases large host. Total Recall’s lazy repair with erasure code is suitable forscale, correlated, Byzantine failures of storage nodes. As a Volunteer Computing environment since it is claimed to havetradeoff for high durability, Glacier does not support remote good performance for highly dynamic and highly unavailablewrite-access. A prototype of Glacier is built on top of Pastry environment. However, [10] does not really mention about theoverlay, and makes use of PAST distributed hash table. security aspect of this storage system except of the usage of Glacier uses a combination of full replicas and erasure cod- erasure code to protect the data. Overall, it has potential foring. A few numbers of full replicas of each files is stored for Volunteer Computing environment if the security aspect ofshort-term availability. A redundant amount of erasure-coded Total Recall is designed and implemented fully.
  7. 7. 7 Advantages key could be done through many data files. But here Peer-to-peer nature of Total Recall implies high scala- developers use bloom filter to summarize the keys in the bility. It offers flexibility for the system administrator file. to specify availability target. Able to handle highly dynamic and highly unavailable environment by using Advantages Disadvantages lazy repair with erasure code technique. Linear scalability and fault- Reads are slower than Disadvantages tolerance. No single point of writes. Limitation for Security aspect of Total Recall is not really designed failure. Map/reduce possible column and row size in the and implemented fully. with Apache Hadoop. system. Cassandra is a bad fit for large objects. Volunteer Computing Extension Volunteer Computing Extension Total Recall’s lazy repair with erasure code is suitable and has potential to be used in Volunteer Computing The main feature of the system is to perform writes system as long as the security aspect of Total Recall is faster that reads. It could be a first barrier for VC designed and implemented fully. application, as the main idea of storage systems in general to perform reads more that writes. Also, as the system is highly scalable, VC availability feature couldJ. Cassandra be solved through replication techniques. Finally, fault- Cassandra is a distributed storage system for managing tolerance could be handled quite well even with gossipvery large amount of structured data spread out across many algorithm application. From the other point of view,servers with high availability. The system doesn’t support a Cassandra has limitation on the object size, hence, bigfull relational data model. object can’t be stored in the system. That’s why all files DHT in Cassandra is a distributed multi-dimensional map should be partitioned. Overall, due to good replicationindexed by a key. The row key in a table is a string with policy and fault-tolerance techniques the system couldno size restrictions. Every operation under a single row key is be quite good platform for future VC application.atomic per replica. Columns are grouped into column families:simple and super column families. Columns could be sortedby time or by name. K. Riak API in Cassandra consists of three simple methods: insert, Riak is a Dynamo-inspired database, which scales pre-get, delete. Distributed system techniques used in the system: dictably and easily. It is a highly fault-tolerant, scalable and • Partitioning. It is done by means of consistent hashing. higly available distributed database system with no single point To deal with non-uniform data and load distribution and of failure. One important feature of Riak is the data organiza- heterogeneity of nodes performance, developers applies tion. Buckets and keys are the only way to organize data inside nodes moving in the ring, according to their load. of Riak. User data is stored and referenced by bucket/key • Replication. Each data replicated in N hosts, where N is pairs and Riak uses a backend key/value storage system. This a replication factor per instance. Coordinator is in charge feature allows the use of any kind of key/value storage system of replication. Replication policies: Rack Unaware, Rack as a backend such as Bitcask (Pluggable Backends). Buckets Aware, Datacenter Aware. For the last two policies Cas- are used to define a virtual keyspace and to provide some sandra uses Zookeeper. per-bucket configurability, such as, replication factor. Riak’s • Membership is based on Scuttlebutt, a very efficient anti- client interface speaks of buckets and keys. Internally, Riak entropy Gossip based mechanism. computes a 160-bit binary hash of the bucket/key pair, and • Failure handling. Cassandra uses a modified version of maps this value to a position on an ordered ”ring” of all such ϕ Accrual Failure Detector with Exponential Distribution values. This ring is divided into partitions and each Riak node for inter-arrival time for other nodes gossip messages. ϕ is responsible for a partition. Replication is fundamental and is a value which represent a suspicion level for each of automatic in Riak, providing security that the data will still monitored nodes. The more ϕ the less likelihood % of be there if a node on the cluster goes down. All data stored mistake we will do in the future about its failing. in Riak will be replicated to a number of nodes in the cluster • Bootstrapping. For the fault tolerance, mapping is per- according to the ”N“ property set on the bucket. It is based sisted to disk locally and also in Zookeeper. Then the on the N,R,W Dynamo values. Another feature is the object token is gossiped around the cluster. When a node needs versioning. Each update to a Riak object is tracked by a vector to join a cluster, it reads its configuration file with a few clock. Vector clocks determine causal ordering and detect contact points (seeds) within the cluster. conflicts in a distributed system. Each time an object is created • Scaling. Each new node is assigned with a token to or updated, a vector clock is generated to keep track of each alleviate a heavily loaded nodes. version and ensure that the proper value can be determined • Read/write requests. Write is a write to into a commit log. in the event that there are conflicting updates. Besides, when Writing to in-memory is performed only after successful there are update conflicts on objects, Riak allows the last write to commit log. When in-memory is full it dumps update to automatically “win” or returns both versions of the itself to disk. Read operation queries the in-memory data object to the client who has to take a decision to resolve the structure before looking into the file in disk. Lookup a conflict.
  8. 8. 8 Advantages Disadvantages Advantages A distributed key/value stor- Riak aims for Availabil- Optimized for storage system usage, whereby we need age based on Dynamo. N, R ity, and Partition (failure) highly availability for write (with consistency trade off and W configurable values. tolerance. The problem is of course). Flexibility on local persistence component, Support of pluggable back- the eventually consistency which implies that we can easily changes the storage en- end storage systems. camp gines implementation (Berkeley DB, MySQL, Berkeley Volunteer Computing Extension DB Java edition and in-memory buffer with persistent Riak could be applicable to the volunteer computing, but backing store). Dynamo is highly configurable based on there should be defined the size of files that the volunteer R, W, and N values (number of replicas needed). It has computer system uses in order to pick a suitable backend been used, deployed, tested and fine-tuned in Amazon’s storage. production environment. Disadvantages It has no security feature implemented because it is run in Amazon’s internal non-hostile environment (no malicious node). Gossip protocol to update group mem- bership status in Dynamo may not be scalable when used in thousands of nodes, due to overhead in maintaining routing table. Volunteer Computing Extension Dynamo works well if the Volunteer Computing system needs high write availability. However, it has no security feature implemented since it is assumed to be used in non-hostile environment. Therefore, current Dynamo implementation is not suitable for Volunteer Computing system unless the security feature is implemented and tested well.L. Dynamo M. Attic Attic [31] is a software project that creates a secure data distribution network applicable to projects like BOINC that Dynamo is a distributed storage system developed by Ama- employs P2P data sharing practices to share data acrosszon to support its online retail operation. Its main goals are the data distribution layer. This alternative provides a morereliability at massive scale, and scalability. It should be able lightweight and dynamic environment for distributing data.to treat failure handling as a norm. Four main elements: i) A data serving application that repli- cates data on the network. ii) Data Centers (data cacher) that cache data, providing the distributed data source overlay. iii) A Dynamo satisfies eventual consistency and target design Look up service that keeps track of which Data Centers havespace of an “always writable” data storage (highly available individual data items. iv) Client applications that downloadfor write). It allows the flexibility of deciding who performs data from Data Centers on the network.the conflict resolution, whether it is application layer or thedata store layer. It is able to perform incremental scalability Data Centers are interim storage facilities that provide a(scale out one storage host at a time). It maintains symmetry buffer between the data serving application and the clientin the network, which means there is no central server that applications. This buffer is particularly important for vol-manages everything. It should be decentralized and able to unteer computing environments because it ensures that thehandle heterogeneity of the nodes. data sources can be trusted by clients. Trust plays a crucial role in volunteer computing environments. If it is broken then the project will fail to attract volunteers. Therefore, in Dynamo uses consistent hashing to handle partitioning controlled environments, Data Centers are typically issuedproblem; it uses vector clocks for data reconciliation during with certificates signed by a trusted certificate authority al-reads. Sloppy quorum and hinted handoff are used to handle lowing client applications to verify the identity of the Datatemporary failures. Merkle trees are used to provide data Center when downloading. Attic is based on the Peer-to-Peerintegrity during failure recovery. Dynamo also it uses a gossip- Architecture for Data-Intensive Cycle Sharing (P2P-ADICS)based membership protocol and failure detector. research project.
  9. 9. 9 Advantages more sophisticated replication and availability techniques as It has been designed with volunteer computing in mind, the data could be accessed from the original server eventually. and does not require all participants to share data, or share equally, therefore differing it from other types of O. Transparent File System (TFS) P2P file-sharing systems. Secure decentralized approach and BitTorrent-like file swarming techniques to serve A key barrier to the adoption of contributory storage systems data and manage load. It uses HTTP for the transfer is that contributing a large quantity of local storage interferes data transfer layer (multiple concurrent downloads). It with the principal user of the machine. To overcome this can be integrated with BOINC projects. “Trusted” peers: barrier, the Transparent File System (TFS) [16] is introduced. secure data centers are a way of implementing a super- It provides background tasks with large amounts of unreliable peer topology for data sharing that would restrict the set storage without impacting the performance of ordinary file of peers that are allowed to propagate data. access operations. TFS is a method for contributing disk space Disadvantages in peer-to-peer storage systems. A point of failure: the Lookup Server Advantages Volunteer Computing Extension A file system that can contribute 100% of the idle Attic can be integrated with BOINC using the Attic- space on a disk while imposing a negligible performance BOINC proxy. penalty on the local user. Operates by storing files in the free space of the file system so that they are invisible toN. Squirrel ordinary files. Normal file allocation proceeds as if the It is a decentralized, P2P web cache with a behavior of a system were not contributing any space at all. Ensurecentralized web cache system. The key point is to enable web the transparency of contributed data: the presence ofbrowsers on desktop machines to share their local caches to contributed storage should have no measurable effect onform an efficient and scalable web cache, without the need the file system, either in performance, or in capacity.for dedicated hardware and the associated administrative cost. Transparent files: files that are transparent in the localOverall, Squirrel is a combination of cooperative web caching file system (local file system does not see these files).and P2P request routing. Transparent data or transparent blocks: data belong- Squirrel uses a self-organizated P2P routing substrate Pastry. ing to such transparent files. Treats transparent blocksPastry is resilient to concurrent node failures and so is Squirrel. as if they were free, overwriting whatever data mightThe system has to re-fetch a small fraction of cached objects be currently stored in them. An ordinary file can befrom the origin web server. allocated over a transparent file. TFS imposes nearly no Web caching is a different way of decentralized storage overhead on the local user. TFS is specifically designedapplication but it still uses similar techniques to provide for contributory applications. The key benefit is that itavailability to its system. The main difference of the web leaves the allocation for local files intact, avoiding issuescache system is that still there is an opportunity to data of fragmentationrecovery from the original server, so that centralized part Disadvantagessupports decentralized components in the system. Hence, in Sacrifices file persistence. When TFS allocates a blocksuch systems there is less attention to the availability side. for an ordinary file, it treats free blocks and transparent Current system Squirrel [5] is a prototype of the volunteer blocks the same, and thus may overwrite transparentcomputing application with some centralized support. The data. Files marked transparent may be overwritten andmain point of the system is a request routing and handling deleted at any time. Applications using transparent filesthe presence of files inside the system according to clients’ must ensure the correctness of all file data. Sensitiveneeds. information stored in ordinary files must be protected Advantages Disadvantages from applications trying to read transparent files. The unreliability of files in TFS produces a bandwidth con- Latency comparable to the Web-Cache storage only. sumption due to the replication that is needed to handle centralized analog. Low- System for corporate LAN. deleted files. management. Fault resilient Failures result in loss of . content. Volunteer Computing Extension Volunteer Computing Extension This technique cannot be used for storage in a volunteer system because it requires changes in the local file Decentralized Web Cache systems could be applicable systems of the volunteers. It means that the all the local to the volunteer computing, but centralized control of file systems, such as Ext3, NTFS and others must be the system should be implemented as well. In this case modified also replication and fault-tolerance techniques should be developed further. Overall, decentralized web caching in Squirrel, by its nature,is volunteer computing application as users consciously con-tribute to the system. Hence, their behavior is likely to be morereliable. That’s why, usually, there is no need for supporting
  10. 10. 10 IV. S TATE OF THE A RTA. Introduction WHY? In current scientific volunteer computing softwareinfrastructures, such as BOINC and XtremWeb, data is dis-tributed centrally from a project’s coordinating nodes orservers. In BOINC, this is achieved through a set of HTTP mir-rors, each providing clients with full copies of data input files.Similarly, in XtremWeb, clients are given the URIs of datainput files. These centralized systems require projects to notonly have the necessary network capacity needed to providedata to all volunteers, but also have data readily available andpersistent on their servers at all times to fulfill client requests.Furthermore, the network throughput requirements of servingso many client machines can prove to be an impediment Fig. 4. State-of-the-art Decentralized Storage System used by VCto projects wishing to explore new types of data intensiveapplication scenarios that are currently prohibitive in termsof their large data transfer needs. However, applying a traditional P2P network infrastructure Alternatively, a viable approach to such centralized systems to scientific computing, particularly in volunteer computing,is to employ the use of peer-to-peer (P2P) techniques to can be highly problematic. In such environments, policies andimplement data distribution. safeguards for scientific data and users’ computers become GOALS? more critical concerns for limiting consumption rather than • Offload the central network needs. P2P data storage any technical feasibility. techniques can be used to introduce a new kind of data A tailor-made solution that could take into account the re- distribution system for volunteer computing projects, one quirements of scientific communities, as opposed to a generic that takes advantage of volunteer-side network capabili- overarching P2P architecture, would have the advantage of ties. facilitating different network topologies and data distribution • Scalability not only needs to take into account the net- algorithms, whilst retaining the safety of each participant’s work bandwidth, but also the potential sizes of data with computer. Furthermore, each scientific application has dif- respect to the data and job throughput in a particular VC ferent network and data needs, and customized solutions project, and their distribution over time. would allow for tailoring the network towards individual • Security in these systems goes beyond the traditional requirements, although with the disadvantage of increased notion of simply ensuring authentication or file integrity. development effort, complexity, and code maintenance. Due to the volatile and insecure nature of volunteer As example there is ADICS [47], a customizable and networks, a product of their open participation policies, brokered Peer-to-Peer Architecture for Data-Intensive Cycle there can be reason to enforce limitations on which nodes Sharing that allows fine-grained provisioning of resources are allowed to distribute and cache data. By opening and application of project-based roles to network participants. the data distribution channels to public participation, Specifically, ADICS provides a brokered P2P system that security now becomes a larger concern for projects that offloads central network needs while limiting client exposure previously had centrally managed servers. The area of to foreign hosts. The brokered network-overlay introduced in security with respect to VCS can be roughly split into the ADICS acts as a buffer, in the form of a select group of trusted following: user security and data security. It is important data-sharing nodes, between the scheduler and the clients. to support both data integrity and reliability, whilst also providing safeguards that can limit a peer nodes’ exposure B. Characteristics to malicious attacks. In designing of the state-of-the-art distributed storage sys- – User Security: any P2P data distribution scheme that tem for VC, it is important to bear in mind that the VC is implemented must allow users to opt-out if they do members are the end users of the system. Hence, given the not wish to share their bandwidth or storage capacity. right incentives to both VC members and storage nodes, the – Data Security: find security schemes and policies following assumptions could be safely made: and how to apply them to volunteer networks when • Storage nodes in this system are relatively trust-worthier selecting and distributing data-sets to peers. than those in more hostile systems surveyed in Section All mentioned above could be presented in the following III.Figure 4. • Not only are the storage nodes trustworthy, but also they HOW? There are many ways this could be implemented, are more committed. Thus, we expect lower churn rateranging from a BitTorrent-style network, where data is cen- among the nodes, and the system should not need to taketrally tracked and all participants share relatively equal loads, into account the worst-case scenarios mentioned in [14].to KaZaa-like super-peer networks, where select nodes are By evaluating the successful deployments of other p2passigned greater responsibility in the network. storage systems in our survey, the following characteristics
  11. 11. 11 System Description Focus Farsite Large scale persistent P2P storage system SE Ivy P2P storage system based on Dhash table logs ECO, AV OverNet P2P DHT-based storage system that used XOR-based metrics for ECO routing PAST Large scale persistent P2P storage system SC, SE, AV Pastis Highly scalable P2P storage system based on trust SC, ECO Voldemort Big, distributed, fault tolerant hashtable AV OceanStore Globally persistent DSS for any-file-anywhere SC, SE Glacier Highly durable DSS for archiving, no remote write SC, AV, P Total Recall P2P storage system. Automatically manage its availability in dynamic AV, SC changing environment Cassandra DSS with no point of failure to store structured data SC, AV, ECO Riak Dynamo-inspired NOSQL storage system SC, AV Dynamo Large scale DSS developed by Amazon P, AV, ECO Attic Secure DSS and BitTorrent-like file swarming techniques to serve data SE, AC and manage load Squirrel Decentralized Web Cache P, ECO TABLE I C OMPARISON OF D IFFERENT D ECENTRALIZED S TORAGE S YSTEMwere defined for state-of-the-art distributed storage system: on popularity, access rate, and file types is used in [5],read/write access, replication and fault-tolerance, and sym- [10], and [36]. The ideal distributed storage system shouldmetry and availability. A short suggestion of incentives is use a combination of BFT, erasure coding and popularity-mentioned, since incentives strongly influence the behavior of and-locality based replication techniques. To further reduceany distributed systems. overhead from data fragment recovery, the storage system Read and Write Access: could use network coding technique as presented in [32]. A need for read/write access for distributed storage system Availability and Symmetry:depends entirely on the frequency of file updates. Implementa- We define data availability as data localization, an easytion of file updates and the maintenance of their consistencies location and acquisition of data when necessary. Therefore,among all replications in the distributed system create issues data availability and symmetry among the nodes goes hand-mentioned in [18]. Consideration of updated files as different in-hand. In the distributed storage system, however, a globalfrom their older versions, therefore adding them as new files symmetry is not necessary, as shown in systems such as [7],in the distributed system is mentioned in [11]. This method is [9],[10] and [11]. One way to achieve high availability is bymore appropriate for distributed system with nodes that do not employing geographic locality based replication techniques,frequently update data. Also, a distributed storage system can such as mentioned in [4]. The majority of the volunteersbe implemented as an archival storage for computed data from are located in USA, Germany, UK and Canada [28]. There-volunteer computing system. Such storage systems designed fore, geographic locality awareness could improve fast dataas archives are mentioned in [14], and [12]. The frequency acquisition as well as global traffic balancing. In additionof file updates from the volunteer computing nodes, such as to geography-based locality, implementation of groups hashre-submitting or correction of computational data, should be tables containing metadata of file replicas is a common methodrare. It is expected to see more of uploading of computational for increasing data acquisition. Finally, a use of BitTorrent likedata, rather than correction of one’s work. Therefore, the read swarming techniques was mentioned in [31] for data servingaccess vs. write access in our system should have a ratio of and load managing. To further improve the availability, dataabout 7:3. Implementations of this type of read/write access types classification to determine fault tolerance techniquesis very common in other distributed storage systems, such as could be employed. One example of this technique is when[11]. storing video files, the storage system could use technique Fault Tolerance & Replication Techniques: from P2P video streaming application.Several independent so- As with aforementioned assumptions, the necessity of ex- called descriptions will be created from a video file. Thistremely high fault tolerance is insignificant in the design of method is called Multiple Description Coding (MDC). Eacha distributed storage system for volunteer computing. The description is a video segment that contributes a certainassumption of extremely high churn tolerance is unneces- amount to the video quality and can be decoded independently.sary, but a reasonable amount of smart replication techniques The more descriptions are received, the higher is the receivedand fault tolerance is inevitably important. The replication quality. Hence, each data file could be divided into n amounttechnique requirements should be low memory and resource of pieces, e.g. odd and even horizontal and vertical frames forusage, and implementation of locality based load balancing. the video file, and then erasure coding/network coding couldErasure coding and Byzantine-Fault-Tolerant (BFT) algorithm be applied to each of the piece itself.provide certain amount of fault tolerance, load balancing and Incentives:lower memory usage, and they have been implemented in The use of incentives in the distributed storage system[8], [11], [14], and [19]. Also, a replication technique based nodes, as well as the volunteers in the volunteer computing
  12. 12. 12system, is an effective way to increase and maintain highly resources. These layers will provide several API as interfacecommitted members. Incentives based on credit system, in hence we will have flexibility in interchanging the implemen-which individuals are granted credits and certificates for their tation of storage layer.contribution of computing powers, have proven very effectivein systems like SETI@home [37]. These type incentives V. C ONCLUSIONSencourage users to compete among each other with their The implementation of decentralized storage system (DSS)credits, thus contributing more towards the computing system. in volunteer computing (VC) field may open doors to numer-Similarly, a credit and certificate based on amount of storage ous research ideas for both VC and DSS fields. In this survey,shared, and available time in the system would contribute DSS characteristics critical for VC integration are identified.towards a highly available distributed storage system. Another They are availability, scalability, eventual consistency, perfor-possible incentive technique is a government tax break for mance and security. In addition to those, various properties ofboth volunteer computing members as well as the storage DSS were discussed and evaluated based on VC suitability.node members. There are over 1 million volunteer computing Attic, Dynamo and Riak are the top-three most suitable DSSnodes in the world [31] and the majority of them are located for VC. Attic is built with VC in mind, and it focuses onin four countries – USA, Germany, UK and Canada. Thus, availability and security. Dynamo focuses in availability, whichit is likely that the distributed storage nodes would be also is beneficial for VC. It has also been used in productionlocated in these countries. A collaboration and support of the environment by Amazon, which brings significant advantageresponsible government bodies in these countries would be a over the other DSS. Riak is the third most useful DSS forpowerful driving force in increased number of storage nodes VC. It is inspired by Dynamo, and it focuses on scalabilityand volunteer members. and availability. The main characteristics of ideal DSS for VS are proposed.C. Challenges They are Providing the right incentive • seven-to-three (7:3) read and write ratio • VC-based membership in storage system As mentioned in Section IV-B, proposed distributed storage • BFT, erasure coding, and popularity-and-geographic lo-system for VC is based on peer-to-peer concept, which in-volves volunteer computing participants. The volunteer-nature cality based replication techniques • Credit system and certificate for incentiveof this model requires appropriate incentive system to attractparticipants. Our proposal here is to use existing models of Challenges in designing and implementing the ideal DSSincentives, with further testing to prove its effectiveness in are also discussed. It is interesting to note that current Movingvolunteer-computing-based storage sharing forward, empirical study based on this survey coule performed Security to test the proposed DSS or even designing the ideal DSS for Another challenge that may surface is security. The pro- VC environment.posed system should ensure that user data is not affected byVC data that stored in participants’ system or user securitymust be ensured [47]. Client system should not provideloophole for hackers to intrude the system. Existing securitytechniques that are currently used in sharing computationalpower need to be re-tested and re-evaluated before they arere-used for storage sharing in VC environment. VC system should also consider the security of the data thatare stored in volunteer nodes (data security), especially theintegrity of the data. It should be able to enforce and detectthe correctness of data stored in volunteer nodes and preventmalicious user to change or remove the data. For example theusage of Byzantine-Fault-Tolerant (BFT) replica in FARSITE,extensive use of erasure coding in Glacier, and MD5 checksumin Attic. Integration into current VC Environment Once we define or implement the decentralized storagesystem, we need to integrate it to an existing VC environment.Challenge in this area includes differences in programminglanguage in implementing the storage system and VC platform(such as BOINC). This challenge is highlighted in [47]. Tosolve this challenge, introduction of proxy solution to interfaceboth sides may be useful. We may also need to introduce separate layer between VCparticipants that contribute computing resources and storage
  13. 13. 13 A PPENDIXFig. 5. Decentralized Storage Systems FeaturesFig. 6. Decentralized Storage Systems Features
  14. 14. 14 R EFERENCES [26] D. Bermbach, M. Klems, S. Tai, and M. Menzel, MetaStorage: A Fed- erated Cloud Storage System to Manage Consistency-Latency Tradeoffs,[1] J.-M. Busca, F. Picconi, and P. Sens, Euro-Par 2005 Parallel Processing, 2011, pp. 452–459. vol. 3648, Springer Berlin / Heidelberg, 2005, p. 644. [27] A. L. Beberg and V. S. Pande, Storage@home: Petascale Distributed[2] Distributiveness. [Online]. Available: http://blog.proskurnia.in.ua/. [Ac- Storage, in Parallel and Distributed Processing Symposium, 2007. IPDPS cessed: 27-Mar-2012]. 2007. IEEE International, 2007, pp. 1–6.[3] A. Verma, S. Venkataraman, M. Caesar, and R. H. Campbell, Handbook [28] D. P. Anderson and G. Fedak, The Computational and Storage Potential of Data Intensive Computing, Springer New York, 2011, pp. 109–127. of Volunteer Computing, in Sixth IEEE International Symposium on[4] A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen, Ivy: a read/write Cluster Computing and the Grid, 2006. CCGRID 06, 2006, vol. 1, pp. peer-to-peer file system, SIGOPS Oper. Syst. Rev., vol. 36, no. SI, pp. 73–80. 31–44, Dec. 2002. [29] SAN. [Online]. Available: http://snia.org/education/storage networking[5] S. Iyer, A. Rowstron, and P. Druschel, Squirrel: a decentralized peer- primer/san. to-peer web cache, in Proceedings of the twenty-first annual symposium [30] J. W. Mickens and B. D. Noble, Exploiting availability prediction in on Principles of distributed computing, New York, NY, USA, 2002, pp. distributed systems, in Proceedings of the 3rd conference on Networked 213–222. Systems Design & Implementation - Volume 3, Berkeley, CA, USA, 2006,[6] R. Hasan, Z. Anwar, W. Yurcik, L. Brumbaugh, and R. Campbell, A p. 6–6. survey of peer-to-peer storage techniques for distributed file systems, [31] A. Elwaer, A. Harrison, I. Kelley, and I. Taylor, Attic: A Case Study for in International Conference on Information Technology: Coding and Distributing Data in BOINC Projects, in Parallel and Distributed Pro- Computing, 2005. ITCC 2005, 2005, vol. 2, pp. 205–213 Vol. 2. cessing Workshops and Phd Forum (IPDPSW), 2011 IEEE International[7] OceanStore. Prototype:Pond. [Online]. Available: Symposium on, 2011, pp. 1863–1870. http://static.usenix.org/events/fast03/tech/rhea/rhea html/. [32] M. Martalo and, M. Picone, M. Amoretti, G. Ferrari, and R. Raheli,[8] Voldemort, Project Voldemort. A distributed Database. [Online]. Avail- Randomized network coding in distributed storage systems with layered able: http://project-voldemort.com/. overlay, in Information Theory and Applications Workshop (ITA), 2011,[9] Riak. [Online]. Available: http://wiki.basho.com/. 2011, pp. 1–7.[10] R. Bhagwan, K. Tati, Y. C. Cheng, S. Savage, and G. M. Voelker, Total [33] An evaluation of distributed datastores using the appscale cloud plat- recall: System support for automated availability management. form, pp. 305–312, 2010.[11] A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. [34] Erasure coding vs. replication: A quantitative comparison, pp. 328–337, Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer, 2002. FARSITE: Federated, available, and reliable storage for an incompletely [35] M. Brantner, D. Graf, D. Kossmann, T. Kraska, and D. Florescu, trusted environment, ACM SIGOPS Operating Systems Review, vol. 36, Building a Database in the Cloud, ETH Z¨ rich, 2009. u no. SI, pp. 1–14, 2002. [36] Wikipedia contributors, Overnet, Wikipedia, the free encyclopedia.[12] A. Rowstron and P. Druschel, Storage management and caching in PAST, Wikimedia Foundation, Inc., 09-Apr-2012. a large-scale, persistent peer-to-peer storage utility, in Proceedings of the [37] SETI@ Home. [Online]: http://setiathome.berkeley.edu/cert print.php eighteenth ACM symposium on Operating systems principles, New York, [38] S. Androutsellis-theotokis, A Survey of Peer-to-Peer File Sharing Tech- NY, USA, 2001, pp. 188–201. nologies. 2002.[13] A. Lakshman and P. Malik, Cassandra, ACM SIGOPS Operating [39] B. Y. Zhao, J. Kubiatowicz, A. D. Joseph, and others, Tapestry: An Systems Review, vol. 44, no. 2, p. 35, Apr. 2010. infrastructure for fault-tolerant wide-area location and routing, 2001.[14] A. Haeberlen, A. Mislove, and P. Druschel, Glacier: highly durable, [40] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. decentralized storage despite massive correlated failures, in Proceedings Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, and others, of the 2nd conference on Symposium on Networked Systems Design & Oceanstore: An architecture for global-scale persistent storage, ACM Implementation - Volume 2, Berkeley, CA, USA, 2005, pp. 143–158. Sigplan Notices, vol. 35, no. 11, pp. 190–201, 2000.[15] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, [41] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ram- A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels, Dynamo: chandran, Network coding for distributed storage systems, Information Amazon’s highly available key-value store, 2007, pp. 205–220. Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539–4551, 2010.[16] J. Cipar, M. D. Corner, and E. D. Berger, Contributing storage using [42] F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica, Wide- the transparent file system, Trans. Storage, vol. 3, no. 3, Oct. 2007. area cooperative storage with CFS, ACM SIGOPS Operating Systems[17] B.-G. Chun, F. Dabek, A. Haeberlen, E. Sit, H. Weatherspoon, M. F. Review, vol. 35, no. 5, pp. 202–215, 2001. Kaashoek, J. Kubiatowicz, and R. Morris, Efficient replica maintenance [43] D. P. Anderson, BOINC: A system for public-resource computing and for distributed storage systems in Proceedings of the 3rd conference on storage, 2004, pp. 4–10. Networked Systems Design & Implementation - Volume 3, Berkeley, CA, [44] O. Costa, L. Silva, I. Kelley, I. Taylor, O. Costa, L. Silva, I. Kelley, USA, 2006, p. 4–4. I. Taylor, and C. Tr, Peer-To-Peer Techniques for Data Distribution in[18] J. Busca, F. Picconi, and P. Sens, Pastis: A highly-scalable multi-user Desktop Grid Computing Platforms. 2007. peer-to-peer file system, in in Euro-Par 2005, 2005. [45] F. Cappello, S. Djilali, G. Fedak, T. Herault, F. Magniette, V. Neri, and[19] S. Rhea, P. Eaton, D. Geels, H. Weatherspoon, B. Zhao, and J. Kubia- O. Lodygensky, Computing on large-scale distributed systems: XtremWeb towicz, Pond: the OceanStore Prototype, 2003, pp. 1–14. architecture, programming models, security, tests and convergence with[20] D. Toth, R. Mayer, and W. Nichols, Increasing Participation in Volunteer grid, Future Generation Computer Systems, vol. 21, no. 3, pp. 417–437, Computing, in 2011 IEEE International Symposium on Parallel and Mar. 2005. Distributed Processing Workshops and Phd Forum (IPDPSW), 2011, pp. [46] D. P. Anderson, BOINC: A System for Public-Resource Computing and 1878–1882. Storage, in Grid Computing, IEEE/ACM International Workshop on, Los[21] Lei Ni and A. Harwood, P2P-Tuple: Towards a Robust Volunteer Com- Alamitos, CA, USA, 2004, vol. 0, pp. 4–10. puting Platform, in 2009 International Conference on Parallel and Dis- [47] I. Kelley and I. Taylor, A peer-to-peer architecture for data-intensive tributed Computing, Applications and Technologies, 2009, pp. 217–223. cycle sharing, in Proceedings of the first international workshop on[22] D. L´ zaro, D. Kondo, and J. M. Marqu` s, Long-term availability a e Network-aware data management, New York, NY, USA, 2011, pp. 65–72. prediction for groups of volunteer resources, Journal of Parallel and [48] F. Desprez, Grids, P2P and Services Computing. Springer, 2010. Distributed Computing, vol. 72, no. 2, pp. 281–296, Feb. 2012.[23] E. M. Heien, N. Fujimoto, and K. Hagihara, Computing low latency batches with unreliable workers in volunteer computing environments, in IEEE International Symposium on Parallel and Distributed Processing, 2008. IPDPS 2008, 2008, pp. 1–8.[24] T. Ghafarian-M., H. Deldari, H. Mohhamad, and M. Yaghmaee, Proximity-Aware Resource Discovery Architecture in Peer-to-Peer Based Volunteer Computing System, in 2011 IEEE 11th International Conference on Computer and Information Technology (CIT), 2011, pp. 83–90.[25] F. Costa, L. Silva, and M. Dahlin, Volunteer Cloud Computing: MapRe- duce over the Internet, in 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011, pp. 1855–1862.