Abstract
Storage reliability of massive amounts of data is the basis for deep learning, and continuous data protection (CDP) technology is an effective means of ensuring it. The method of storing CDP historical data, represented by TRAP-Array parity logs, effectively reduces the overheads of storage capacity, but it increases the risk of historical data loss due to the absence of the RAID protection mechanism for the parity data. This paper proposes a design method for a fault-tolerant and energy-efficient continuous data protection system (FTEECDP), which is composed of SSD mirror array, TRAP parity generation logic and S-RAID disk array. Taking the SSD mirror array as the source data volume of the system to provide the I/O service of the upper applications, FTEECDP improves the throughput of the system. This method also takes S-RAID as the CDP log volume to store the TRAP parity logs. When the disk data error occurs, the error data will be recovered from the data redundancy information of S-RAID, thus protecting the TRAP parity chain from being destroyed and improving the reliability of the TRAP parity logs. The experiment shows that in the continuous data protection system, the CDP logs stored as the TRAP parity can greatly reduce the storage space overheads and reduce the system energy consumption. In addition, with the disk scheduling algorithm, S-RAID shifts the disk grouping without any data requests into a standby state, thus further reducing the energy consumption of the system.
Similar content being viewed by others
References
Chen W, Lei H, Qi K (2016) Lattice-based linearly homomorphic signatures in the standard model. Theor Comput Sci 634:47–54
Chen T, Yeh T, Wei H, Fang Y, Shih W, Hsu T (2012) CacheRAID: an efficient adaptive write cache policy to conserve RAID disk array energy. In: IEEE/ACM fifth international conference on utility and cloud computing, Nov. 5–8, 2012, Chicago, IL, USA, pp 117–124
Fan L, Zhang S, Duong T, Karagiannidis GK (2016) Secure switch-and-stay combining (SSSC) for cognitive relay networks. IEEE Trans Commun 64(1):70–82
Ge C, Sun Z, Wang N, Xu K (2014) Energy management in cross-domain content delivery networks: a theoretical perspective. IEEE Trans Netw Serv Manag 11(3):264–277
Guan Z, Li J, Wu L, Zhang Y, Wu J, Du X (2017) Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid. IEEE Internet of Things J 4(6):1934–1944
Guan Z, Si G, Zhang X, Wu L, Guizani N, Du X, Ma Y (2018) Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun Mag 2(99):1–10
Gupta BB, Agrawal DP (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, USA
Ibtihal M, Driss EO, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. Int J Cloud Appl Comput 7(2):27–40
Jararweh Y, Al-Ayyoub M, Fakirah M, Alawneh L, Gupta BB (2017) Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-5092-0
Laden G, Ta-Shma P, Yaffe E, Factor M, Fienblit S (2007) Architectures for controller based CDP. In: Usenix conference on file and storage technologies, Feb. 13–16, 2007, San Jose, CA, USA, pp 107–121
Lai X, Zou W, Li X, Fan L (2017) Multiuser energy harvesting relaying system with direct links. IET Commun 11(12):1846–1852
Li X, Tan YA, Sun Z (2011) Semi-RAID: A reliable energy-aware RAID data layout for sequential data access. In: IEEE aymposium on MASS storage systems and technologies, May 23–27, 2011. Denver, CO, USA, pp 11–22
Liang S, Du X (2014) Permission-combination-based scheme for Android mobile malware detection. In: IEEE international conference on communications, Jun. 10–14, 2014, Sydney, NSW, Australia, pp 2301–2306
Lin W, Wu Z, Lin L, Wen A, Li J (2017) An ensemble random forest algorithm for insurance big data analysis. IEEE Access 5(99):16,568–16,575
Morrey CB, Grunwald D (2003) Peabody: the time travelling disk. In: 20th IEEE/11th NASA goddard conference on mass storage systems and technologies, Apr. 7–10, 2003, San Diego, California, USA, pp 241–253
Pan G, Lei H, Deng Y, Fan L, Yang J, Chen Y, Ding Z (2016) On secrecy performance of MISO SWIPT systems with TAS and imperfect CSI. IEEE Trans Commun 64(9):3831–3843
Patterson D (1988) A case for redundant arrays of inexpensive disks. In: SIGMOD international conference on management of data, Jun. 1–3, 1987, CA, USA, pp 109–116
Rosenblum M, Ousterhout JK (1992) The design and implementation of a log-structured file system. Trans Comput Syst 10(1):26–52
Shaull R, Shrira L, Xu H (2008) Skippy: a new snapshot indexing method for time travel in the storage manager. In: ACM SIGMOD international conference on management of data, Jun. 9–12, 2008, Vancouver, Canada, pp 637–648
Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.01.003
Shen J, Zhou T, Chen X, Li J, Susilo W (2018b) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):915–925
Shrira L, Xu H (2005) SNAP: efficient snapshots for back-in-time execution. In: Proceedings of the 21st international conference on data engineering, Apr. 5–8, 2005, Washington, DC, USA, pp 434–445
Sun Z, Zhang Q, Li Y, Tan YA (2018) DPPDL: a dynamic partial-parallel data layout for green video surveillance storage. IEEE Trans Circ Syst Video Technol 28(1):193–205
Tan Y, Xue Y, Liang C, Zheng J, Zhang Q, Zheng J, Li Y (2018) A root privilege management scheme with revocable authorization for Android devices. J Netw Comput Appl 107:69–82
Wang J, Zhu H, Li D (2008) eRAID: conserving energy in conventional disk-based RAID system. IEEE Trans Comput 57(3):359–374
Wang X, Zhang H, Fan L, Li Y (2017) Performance of distributed switch-and-stay combining for cognitive relay networks with primary transceiver. Wirel Person Commun 97(2):3031–3042
Wang Y, Zhu G, Shi Y (2018) Transportation spherical watermarking. IEEE Trans Image Process 27(4):2063–2077
Weddle C, Oldham M, Qian J, Wang AIA, Reiher P, Kuenning G (2007) PARAID: a gear-shifting power-aware RAID. Acm Trans Storage 3(3):1–13
Wu J, Bisio I, Gniady C, Hossain E (2014) Context-aware networking and communications: part 2. IEEE Commun Mag 52(8):64–65
Wu J, Guo S, Li J, Zeng D (2016) Big data meet green challenges: greening big data. IEEE Syst J 10(3):873–887
Xu J, Wei L, Zhang Y, Wang A, Zhou F, Gao C (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2018.01.014
Xue Y, Tan YA, Liang C, Zhang C, Zheng J (2017) An optimized data hiding scheme for deflate codes. Soft Comput. https://doi.org/10.1007/s00500-017-2651-2
Xue Y, Tan YA, Liang C, Li Y, Zheng J, Zhang Q (2018) RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf Sci 444:36–50
Yan F, Tan YA, Zhang Q, Wu F, Cheng Z, Zheng J (2016) An effective RAID data layout for object-based de-duplication backup system. Chin J Electron 25(5):832–840
Yang Q, Xiao W, Ren J (2006) TRAP-Array: a disk array architecture providing timely recovery to any point-in-time. ACM SIGARCH Comput Arch News 34(2):289–301
Yang J, Cao Q, Li X, Xie C, Yang Q (2012) ST-CDP: snapshots in TRAP for continuous data protection. IEEE Trans Comput 61(6):753–766
Yu C, Li J, Li X, Ren X, Gupta BB (2017a) Four-image encryption scheme based on quaternion fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. https://doi.org/10.1007/s11042-017-4637-6
Yu X, Zhang C, Xue Y, Zhu H, Li Y, Tan YA (2017b) An extra-parity energy saving data layout for video surveillance. Multimed Tools Appl 77(4):4563–4583
Yu X, Tan YA, Zhang C, Liang C, Khaled A, Zheng J, Zhang Q (2018) A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin J Electron 27(1):76–85
Zhang X, Tan YA, Xue Y, Zhang Q, Li Y, Zhang C, Zheng J (2017) Cryptographic key protection against FROST for mobile devices. Clust Comput 20(3):2393–2402
Zheng J, Tan YA, Zhang Q, Zhang X, Zhu L, Zhang Q (2018) Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci China Inf Sci 61:48103:1–48103:3
Zhu Q, Chen Z, Tan L, Zhou Y, Keeton K, Wilkes J (2005) Hibernator: helping disk arrays sleep through the winter. ACM SIGOPS Oper Syst Rev 39(5):177–190
Zhu H, Tan YA, Zhang X, Zhu L, Zhang C, Zheng J (2017) A round-optimal lattice-based blind signature scheme for cloud services. Future Gen Comput Syst 73:106–114
Acknowledgements
This research was supported by the National Natural Science Foundation of China (no. U1636213), Shandong Provincial Natural Science Foundation (no. ZR2016FM37).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, X., Tan, Ya., Sun, Z. et al. A fault-tolerant and energy-efficient continuous data protection system. J Ambient Intell Human Comput 10, 2945–2954 (2019). https://doi.org/10.1007/s12652-018-0726-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0726-2