enter search term and/or author name
One important aspect of privacy is the ability to securely delete sensitive data from electronic storage in such a way that it cannot be recovered; we call this action secure deletion. Short of physically destroying the entire storage...
Efficient Memory-Mapped I/O on Fast Storage Device
Nae Young Song, Yongseok Son, Hyuck Han, Heon Young Yeom
Article No.: 19
In modern operating systems, memory-mapped I/O (mmio) is an important access method that maps a file or file-like resource to a region of memory. The mapping allows applications to access data from files through memory semantics (i.e.,...
Efficient Deduplication in a Distributed Primary Storage Infrastructure
João Paulo, José Pereira
Article No.: 20
A large amount of duplicate data typically exists across volumes of virtual machines in cloud computing infrastructures. Deduplication allows reclaiming these duplicates while improving the cost-effectiveness of large-scale multitenant...
Write Skew and Zipf Distribution: Evidence and Implications
Yue Yang, Jianwen Zhu
Article No.: 21
Understanding workload characteristics is essential to storage systems design and performance optimization. With the emergence of flash memory as a new viable storage medium, the new design concern of flash endurance arises, necessitating a...
LDM: Log Disk Mirroring with Improved Performance and Reliability for SSD-Based Disk Arrays
Suzhen Wu, Bo Mao, Xiaolan Chen, Hong Jiang
Article No.: 22
With the explosive growth in data volume, the I/O bottleneck has become an increasingly daunting challenge for big data analytics. Economic forces, driven by the desire to introduce flash-based Solid-State Drives (SSDs) into the high-end storage...
With increasing popularity of cloud storage, efficiently proving the integrity of data stored on an untrusted server has become significant. Authenticated skip lists and rank-based authenticated skip lists (RBASL) have been used to provide support...
Tools for Predicting the Reliability of Large-Scale Storage Systems
Robert J. Hall
Article No.: 24
Data-intensive applications require extreme scaling of their underlying storage systems. Such scaling, together with the fact that storage systems must be implemented in actual data centers, increases the risk of data loss from failures of...