ACM DL

Storage (TOS)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Storage (TOS), Volume 12 Issue 4, August 2016

TrueErase: Leveraging an Auxiliary Data Path for Per-File Secure Deletion
Sarah Diesburg, Christopher Meyers, Mark Stanovich, An-I Andy Wang, Geoff Kuenning
Article No.: 18
DOI: 10.1145/2854882

One important aspect of privacy is the ability to securely delete sensitive data from electronic storage in such a way that it cannot be recovered; we call this action secure deletion. Short of physically destroying the entire storage...

Efficient Memory-Mapped I/O on Fast Storage Device
Nae Young Song, Yongseok Son, Hyuck Han, Heon Young Yeom
Article No.: 19
DOI: 10.1145/2846100

In modern operating systems, memory-mapped I/O (mmio) is an important access method that maps a file or file-like resource to a region of memory. The mapping allows applications to access data from files through memory semantics (i.e.,...

Efficient Deduplication in a Distributed Primary Storage Infrastructure
João Paulo, José Pereira
Article No.: 20
DOI: 10.1145/2876509

A large amount of duplicate data typically exists across volumes of virtual machines in cloud computing infrastructures. Deduplication allows reclaiming these duplicates while improving the cost-effectiveness of large-scale multitenant...

Write Skew and Zipf Distribution: Evidence and Implications
Yue Yang, Jianwen Zhu
Article No.: 21
DOI: 10.1145/2908557

Understanding workload characteristics is essential to storage systems design and performance optimization. With the emergence of flash memory as a new viable storage medium, the new design concern of flash endurance arises, necessitating a...

LDM: Log Disk Mirroring with Improved Performance and Reliability for SSD-Based Disk Arrays
Suzhen Wu, Bo Mao, Xiaolan Chen, Hong Jiang
Article No.: 22
DOI: 10.1145/2892639

With the explosive growth in data volume, the I/O bottleneck has become an increasingly daunting challenge for big data analytics. Economic forces, driven by the desire to introduce flash-based Solid-State Drives (SSDs) into the high-end storage...

FlexDPDP: Flexlist-Based Optimized Dynamic Provable Data Possession
Ertem Esiner, Adilet Kachkeev, Samuel Braunfeld, Alptekin Küpçü, Öznur Özkasap
Article No.: 23
DOI: 10.1145/2943783

With increasing popularity of cloud storage, efficiently proving the integrity of data stored on an untrusted server has become significant. Authenticated skip lists and rank-based authenticated skip lists (RBASL) have been used to provide support...

Tools for Predicting the Reliability of Large-Scale Storage Systems
Robert J. Hall
Article No.: 24
DOI: 10.1145/2911987

Data-intensive applications require extreme scaling of their underlying storage systems. Such scaling, together with the fact that storage systems must be implemented in actual data centers, increases the risk of data loss from failures of...