Skip to main content

Advertisement

Log in

A fault-tolerant and energy-efficient continuous data protection system

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Storage reliability of massive amounts of data is the basis for deep learning, and continuous data protection (CDP) technology is an effective means of ensuring it. The method of storing CDP historical data, represented by TRAP-Array parity logs, effectively reduces the overheads of storage capacity, but it increases the risk of historical data loss due to the absence of the RAID protection mechanism for the parity data. This paper proposes a design method for a fault-tolerant and energy-efficient continuous data protection system (FTEECDP), which is composed of SSD mirror array, TRAP parity generation logic and S-RAID disk array. Taking the SSD mirror array as the source data volume of the system to provide the I/O service of the upper applications, FTEECDP improves the throughput of the system. This method also takes S-RAID as the CDP log volume to store the TRAP parity logs. When the disk data error occurs, the error data will be recovered from the data redundancy information of S-RAID, thus protecting the TRAP parity chain from being destroyed and improving the reliability of the TRAP parity logs. The experiment shows that in the continuous data protection system, the CDP logs stored as the TRAP parity can greatly reduce the storage space overheads and reduce the system energy consumption. In addition, with the disk scheduling algorithm, S-RAID shifts the disk grouping without any data requests into a standby state, thus further reducing the energy consumption of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Chen W, Lei H, Qi K (2016) Lattice-based linearly homomorphic signatures in the standard model. Theor Comput Sci 634:47–54

    Article  MathSciNet  MATH  Google Scholar 

  • Chen T, Yeh T, Wei H, Fang Y, Shih W, Hsu T (2012) CacheRAID: an efficient adaptive write cache policy to conserve RAID disk array energy. In: IEEE/ACM fifth international conference on utility and cloud computing, Nov. 5–8, 2012, Chicago, IL, USA, pp 117–124

  • Fan L, Zhang S, Duong T, Karagiannidis GK (2016) Secure switch-and-stay combining (SSSC) for cognitive relay networks. IEEE Trans Commun 64(1):70–82

    Article  Google Scholar 

  • Ge C, Sun Z, Wang N, Xu K (2014) Energy management in cross-domain content delivery networks: a theoretical perspective. IEEE Trans Netw Serv Manag 11(3):264–277

    Article  Google Scholar 

  • Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid. IEEE Internet of Things J 4(6):1934–1944

    Article  Google Scholar 

  • Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 2(99):1–10

    Google Scholar 

  • Gupta BB, Agrawal DP (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, USA

    Book  Google Scholar 

  • Ibtihal M, Driss EO, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40

    Google Scholar 

  • Jararweh Y, Al-Ayyoub M, Fakirah M, Alawneh L, Gupta BB (2017) Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5092-0

    Google Scholar 

  • Laden G, Ta-Shma P, Yaffe E, Factor M, Fienblit S (2007) Architectures for controller based CDP. In: Usenix conference on file and storage technologies, Feb. 13–16, 2007, San Jose, CA, USA, pp 107–121

  • Lai X, Zou W, Li X, Fan L (2017) Multiuser energy harvesting relaying system with direct links. IET Commun 11(12):1846–1852

    Article  Google Scholar 

  • Li X, Tan YA, Sun Z (2011) Semi-RAID: A reliable energy-aware RAID data layout for sequential data access. In: IEEE aymposium on MASS storage systems and technologies, May 23–27, 2011. Denver, CO, USA, pp 11–22

  • Liang S, Du X (2014) Permission-combination-based scheme for Android mobile malware detection. In: IEEE international conference on communications, Jun. 10–14, 2014, Sydney, NSW, Australia, pp 2301–2306

  • Lin W, Wu Z, Lin L, Wen A, Li J (2017) An ensemble random forest algorithm for insurance big data analysis. IEEE Access 5(99):16,568–16,575

    Article  Google Scholar 

  • Morrey CB, Grunwald D (2003) Peabody: the time travelling disk. In: 20th IEEE/11th NASA goddard conference on mass storage systems and technologies, Apr. 7–10, 2003, San Diego, California, USA, pp 241–253

  • Pan G, Lei H, Deng Y, Fan L, Yang J, Chen Y, Ding Z (2016) On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans Commun 64(9):3831–3843

    Article  Google Scholar 

  • Patterson D (1988) A case for redundant arrays of inexpensive disks. In: SIGMOD international conference on management of data, Jun. 1–3, 1987, CA, USA, pp 109–116

  • Rosenblum M, Ousterhout JK (1992) The design and implementation of a log-structured file system. Trans Comput Syst 10(1):26–52

    Article  Google Scholar 

  • Shaull R, Shrira L, Xu H (2008) Skippy: a new snapshot indexing method for time travel in the storage manager. In: ACM SIGMOD international conference on management of data, Jun. 9–12, 2008, Vancouver, Canada, pp 637–648

  • Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.01.003

    Google Scholar 

  • Shen J, Zhou T, Chen X, Li J, Susilo W (2018b) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):915–925

    Google Scholar 

  • Shrira L, Xu H (2005) SNAP: efficient snapshots for back-in-time execution. In: Proceedings of the 21st international conference on data engineering, Apr. 5–8, 2005, Washington, DC, USA, pp 434–445

  • Sun Z, Zhang Q, Li Y, Tan YA (2018) DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circ Syst Video Technol 28(1):193–205

    Google Scholar 

  • Tan Y, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for Android devices. J Netw Comput Appl 107:69–82

    Article  Google Scholar 

  • Wang J, Zhu H, Li D (2008) eRAID: conserving energy in conventional disk-based RAID system. IEEE Trans Comput 57(3):359–374

    Article  MathSciNet  Google Scholar 

  • Wang X, Zhang H, Fan L, Li Y (2017) Performance of distributed switch-and-stay combining for cognitive relay networks with primary transceiver. Wirel Person Commun 97(2):3031–3042

    Article  Google Scholar 

  • Wang Y, Zhu G, Shi Y (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063–2077

    Article  MathSciNet  MATH  Google Scholar 

  • Weddle C, Oldham M, Qian J, Wang AIA, Reiher P, Kuenning G (2007) PARAID: a gear-shifting power-aware RAID. Acm Trans Storage 3(3):1–13

    Article  Google Scholar 

  • Wu J, Bisio I, Gniady C, Hossain E (2014) Context-aware networking and communications: part 2. IEEE Commun Mag 52(8):64–65

    Article  Google Scholar 

  • Wu J, Guo S, Li J, Zeng D (2016) Big data meet green challenges: greening big data. IEEE Syst J 10(3):873–887

    Article  Google Scholar 

  • Xu J, Wei L, Zhang Y, Wang A, Zhou F, Gao C (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.01.014

    Google Scholar 

  • Xue Y, Tan YA, Liang C, Zhang C, Zheng J (2017) An optimized data hiding scheme for deflate codes. Soft Comput. https://doi.org/10.1007/s00500-017-2651-2

    Google Scholar 

  • Xue Y, Tan YA, Liang C, Li Y, Zheng J, Zhang Q (2018) RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf Sci 444:36–50

    Article  MathSciNet  Google Scholar 

  • Yan F, Tan YA, Zhang Q, Wu F, Cheng Z, Zheng J (2016) An effective RAID data layout for object-based de-duplication backup system. Chin J Electron 25(5):832–840

    Article  Google Scholar 

  • Yang Q, Xiao W, Ren J (2006) TRAP-Array: a disk array architecture providing timely recovery to any point-in-time. ACM SIGARCH Comput Arch News 34(2):289–301

    Article  Google Scholar 

  • Yang J, Cao Q, Li X, Xie C, Yang Q (2012) ST-CDP: snapshots in TRAP for continuous data protection. IEEE Trans Comput 61(6):753–766

    Article  MathSciNet  MATH  Google Scholar 

  • Yu C, Li J, Li X, Ren X, Gupta BB (2017a) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4637-6

    Google Scholar 

  • Yu X, Zhang C, Xue Y, Zhu H, Li Y, Tan YA (2017b) An extra-parity energy saving data layout for video surveillance. Multimed Tools Appl 77(4):4563–4583

    Google Scholar 

  • Yu X, Tan YA, Zhang C, Liang C, Khaled A, Zheng J, Zhang Q (2018) A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin J Electron 27(1):76–85

    Article  Google Scholar 

  • Zhang X, Tan YA, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against FROST for mobile devices. Clust Comput 20(3):2393–2402

    Article  Google Scholar 

  • Zheng J, Tan YA, Zhang Q, Zhang X, Zhu L, Zhang Q (2018) Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci 61:48103:1–48103:3

    Article  MathSciNet  Google Scholar 

  • Zhu Q, Chen Z, Tan L, Zhou Y, Keeton K, Wilkes J (2005) Hibernator: helping disk arrays sleep through the winter. ACM SIGOPS Oper Syst Rev 39(5):177–190

    Article  Google Scholar 

  • Zhu H, Tan YA, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Future Gen Comput Syst 73:106–114

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the National Natural Science Foundation of China (no. U1636213), Shandong Provincial Natural Science Foundation (no. ZR2016FM37).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quanxin Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, X., Tan, Ya., Sun, Z. et al. A fault-tolerant and energy-efficient continuous data protection system. J Ambient Intell Human Comput 10, 2945–2954 (2019). https://doi.org/10.1007/s12652-018-0726-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0726-2

Keywords

Navigation