Access the full text.
Sign up today, get DeepDyve free for 14 days.
Ranjita Bhagwan, K. Tati, Yuchung Cheng, S. Savage, G. Voelker (2004)
Total Recall: System Support for Automated Availability Management
T. Ngan, D. Wallach, P. Druschel (2003)
Enforcing Fair Sharing of Peer-to-Peer Resources
Dinh Tran, F. Chiang, Jinyang Li (2008)
Friendstore: cooperative online backup using trusted nodes
A. Rowstron, P. Druschel (2001)
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
K. Tati, G. Voelker (2006)
On Object Maintenance in Peer-to-Peer Systems
Eduardo Pinheiro, W. Weber, L. Barroso (2007)
Failure Trends in a Large Disk Drive Population
Amitanand Aiyer, L. Alvisi, Allen Clement, M. Dahlin, Jean-Philippe Martin, C. Porth (2005)
BAR fault tolerance for cooperative services
M. Krohn, M. Freedman, David Mazières (2004)
On-the-fly verification of rateless erasure codes for efficient content distributionIEEE Symposium on Security and Privacy, 2004. Proceedings. 2004
Kevin Bowers, A. Juels, Alina Oprea (2009)
Proofs of retrievability: theory and implementationIACR Cryptol. ePrint Arch., 2008
Byung-Gon Chun, F. Dabek, Andreas Haeberlen, Emil Sit, Hakim Weatherspoon, M. Kaashoek, J. Kubiatowicz, R. Morris (2006)
Efficient Replica Maintenance for Distributed Storage Systems
(2003)
Proceedings of the 19th ACM Symposium on Operating System Principles (SOSP)
P. Druschel, A. Rowstron (2001)
PAST: a large-scale, persistent peer-to-peer storage utilityProceedings Eighth Workshop on Hot Topics in Operating Systems
Kelvin So, E. Sirer (2007)
Latency and bandwidth-minimizing failure detectors
A. Mislove, M. Marcon, K. Gummadi, P. Druschel, Bobby Bhattacharjee (2007)
Measurement and analysis of online social networks
Mary Baker, Mehul Shah, D. Rosenthal, M. Roussopoulos, Petros Maniatis, T. Giuli, P. Bungale (2005)
A fresh look at the reliability of long-term digital storageProceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
(2003)
A cooperative Internet backup scheme
T. Hogg, Lada Adamic (2004)
Enhancing reputation mechanisms via online social networks
Landon Cox, Brian Noble (2003)
Samsara: honor among thieves in peer-to-peer storage
S. Marti, Prasanna Ganesan, H. Garcia-Molina (2004)
DHT Routing Using Social Links
Andreas Haeberlen, A. Mislove, P. Druschel (2005)
Glacier: highly durable, decentralized storage despite massive correlated failures
Athicha Muthitacharoen, Benjie Chen, David Mazì (2001)
A low-bandwidth network file systemOperating Systems Review
M. Storer, K. Greenan, E. Miller, K. Voruganti (2007)
POTSHARDS: Secure Long-Term Storage Without Encryption
B. Ford, Jacob Strauss, Chris Lesniewski-Laas, Sean Rhea, F. Kaashoek, R. Morris (2006)
Persistent personal names for globally connected mobile devices
J. Onnela, J. Saramäki, J. Hyvönen, K. Kaski (2006)
A Model For Social NetworksPhysica A-statistical Mechanics and Its Applications, 371
RowstronAntony, DruschelPeter (2001)
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utilityOperating Systems Review
Scott Garriss, M. Kaminsky, M. Freedman, B. Karp, David Mazières, Haifeng Yu (2006)
RE: Reliable Email
A. Adya, W. Bolosky, M. Castro, Gerald Cermak, R. Chaiken, John Douceur, Jon Howell, Jacob Lorch, M. Theimer, Roger Wattenhofer
Proceedings of the 5th Symposium on Operating Systems Design and Implementation Farsite: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
B. Popescu, B. Crispo, A. Tanenbaum (2004)
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
Mao Yang, Hua Chen, Ben Zhao, Yafei Dai, Zheng Zhang (2004)
Deployment of a Large-scale Peer-to-Peer Social Network
Kevin Bowers, A. Juels, Alina Oprea (2009)
HAIL: a high-availability and integrity layer for cloud storage
R. Kotla, L. Alvisi, M. Dahlin (2007)
SafeStore: A Durable and Practical Storage System
Athicha Muthitacharoen, Benjie Chen, David Mazières (2001)
A low-bandwidth network file systemProceedings of the eighteenth ACM symposium on Operating systems principles
(2012)
ACM Transactions on Storage
J. Plank, A. Buchsbaum, R. Collins, M. Thomason (2005)
Small parity-check erasure codes - exploration and observations2005 International Conference on Dependable Systems and Networks (DSN'05)
B. Cohen (2003)
Incentives Build Robustness in Bit-Torrent
Landon Cox, C. Murray, Brian Noble (2002)
Pastiche: making backup cheap and easy
Bianca Schroeder, Garth Gibson (2007)
Disk Failures in the Real World: What Does an MTTF of 1, 000, 000 Hours Mean to You?
Sean Rhea, Patrick Eaton, Dennis Geels, Hakim Weatherspoon, Ben Zhao, J. Kubiatowicz (2003)
Pond: The OceanStore Prototype
C. Batten, K. Barr, A. Saraf, Stanley Trepetin (2007)
pStore: A Secure Peer-to-Peer Backup System∗
W. Bolosky, John Douceur, David Ely, M. Theimer (2000)
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
F. Dabek, Jinyang Li, Emil Sit, James Robertson, M. Kaashoek, R. Morris (2004)
Designing a DHT for Low Latency and High Throughput
Cheng Huang, Jin Li, K. Ross (2007)
Can internet video-on-demand be profitable?
Sriram Ramabhadran, J. Pasquale (2006)
Analysis of Long-Running Replicated SystemsProceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications
Garth Gibson, D. Patterson (1993)
Designing Disk Arrays for High Data ReliabilityJ. Parallel Distributed Comput., 17
J. Sabater-Mir, C. Sierra (2001)
Social ReGreT, a reputation model based on social relationsSIGecom Exch., 3
Harry Li, Allen Clement, Edmund Wong, Jeff Napper, Indrajit Roy, L. Alvisi, M. Dahlin (2006)
BAR gossip
C. Blake, R. Rodrigues (2003)
High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two
S. Kamvar, M. Schlosser, Hector Garcia-Molina (2003)
The Eigentrust algorithm for reputation management in P2P networks
Fay Chang, Minwen Ji, Shun-Tak Leung, John MacCormick, Sharon Perl, Li Zhang (2002)
Myriad: Cost-Effective Disaster Tolerance
Sean Rhea, Brighten Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, Harlan Yu (2005)
OpenDHT: a public DHT service and its uses
Jinyang Li, F. Dabek (2006)
F2F: Reliable Storage in Open Networks
A. Mislove, K. Gummadi, P. Druschel (2006)
Exploiting Social Networks for Internet Search
C. Ellison, Bill Frantz, B. Lampson, R. Rivest, Brian Thomas, Tatu Ylönen (1999)
SPKI Certificate TheoryRFC, 2693
(2012)
Efficient cooperative backup with decentralized trust management
Automatic offsite backup
Petros Maniatis, M. Roussopoulos, T. Giuli, D. Rosenthal, Mary Baker (2005)
The LOCKSS peer-to-peer digital preservation systemACM Trans. Comput. Syst., 23
Efficient Cooperative Backup with Decentralized Trust Management NGUYEN TRAN, FRANK CHIANG, and JINYANG LI, New York University Existing backup systems are unsatisfactory: commercial backup services are reliable but expensive while peer-to-peer systems are cheap but offer limited assurance of data reliability. This article introduces Friendstore, a system that provides inexpensive and reliable backup by giving users the choice to store backup data only on nodes they trust (typically those owned by friends and colleagues). Because it is built on trusted nodes, Friendstore is not burdened by the complexity required to cope with potentially malicious participants. Friendstore only needs to detect and repair accidental data loss and to ensure balanced storage exchange. The disadvantage of using only trusted nodes is that Friendstore cannot achieve perfect storage utilization. Friendstore is designed for a heterogeneous environment where nodes have very different access link speeds and available disk spaces. To ensure long-term data reliability, a node with limited upload bandwidth refrains from storing more data than its calculated maintainable capacity. A high bandwidth node might be limited by its available disk space. We introduce a simple coding scheme, called XOR(1,2), which doubles a node's ability to store backup information in the same
ACM Transactions on Storage (TOS) – Association for Computing Machinery
Published: Sep 1, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.