Replication Strategies for Highly Available Peer-to-Peer Storage
In the past few years, peer-to-peer networks have become an extremely popular mechanism for large-scale content sharing. Unlike traditional client-server applications, which centralize the management of data in a few highly reliable servers, peer-to-peer systems distribute the burden of data storage, computation, communications and administration among thousands of individual client workstations. While the popularity of this approach, exemplified by systems such as Gnutella [28.3], was driven by the popularity of unrestricted music distribution, newer work has expanded the potential application base to generalized distributed file systems [28.1], [28.4], persistent anonymous publishing [28.5], as well as support for high-quality video distribution [28.2]. The wide-spread attraction of the peer-to-peer model arises primarily from its potential for both low-cost scalability and enhanced availability. Ideally a peer-to-peer system could efficiently multiplex the resources and connectivity of its workstations across all of its users while at the same time protecting its users from transient or persistent failures in a subset of its components.
KeywordsDiurnal Pattern Replication Strategy Erasure Code Replica Placement USENIX Security Symposium
Unable to display preview. Download preview PDF.
- 28.1F. Dabek, M. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with cfs. In proceedings of the 18th ACM Symposium on Operating System Principles (SOSP), 2001.Google Scholar
- 28.4J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS, 2000.Google Scholar
- 28.5A. D. R. MarcWaldman and L. F. Cranor. Publius: A robust, tamper-evident, censorshipresistant, web publishing system. In Proc. 9th USENIX Security Symposium, pages 59–72, August 2000.Google Scholar
- 28.6D. Moore. Caida analysis of code-red, http://www.caida.org/analysis/security/code-red/, 2001.
- 28.7V. Pless. Introduction to the theory of error-correcting codes. John Wiley and Sons, 3rd edition, 1998.Google Scholar
- 28.8S. Saroiu, P. K. Gummadi, and S. D. Gribble. A measurement study of peer-to-peer file sharing systems. In MMCN, 2002.Google Scholar
- 28.9I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM, 2001.Google Scholar
- 28.10H. Weatherspoon and J. Kubiatowicz. Erasure coding v/s replication: a quantitative approach. In Proceedings of the First InternationalWorkshop on Peer-to-peer Systems, 2002.Google Scholar
- 28.11B. Y. Zhao, J. D. Kubiatowicz, and A. D. Joseph. Tapestry: An infrastructure for faulttolerant wide-area location and routing. Technical Report UCB-CSD-01-1141, U. C. Berkeley, April 2000.Google Scholar