Investigation of Optimal Data Encoding Parameters Based on User Preference for Cloud Storage

被引:5
作者
Chouhan, Vikas [1 ]
Peddoju, Sateesh K. [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Roorkee 247667, Uttar Pradesh, India
关键词
Cloud computing; cloud storage; availability; storage cost; Reed-Solomon; erasure coding; reliability; ERASURE CODES; RELIABILITY; FAILURES;
D O I
10.1109/ACCESS.2020.2987999
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The erasure encoding scheme creates multiple coded data and parity fragments to protect the data from the losses. Nowadays, most storage systems like cloud storage utilize the erasure coding scheme to attain superior data consistency, reliability, and availability. Most of the existing literature focuses on either the cost of recovery or overhead due to the redundant storage without considering the interests of the users, such as high reliability and lower storage cost. We believe that the storage service provider should choose an appropriate encoding scheme with optimal values of two encoding parameters, i.e., data fragments and parity fragments. The values of these encoding parameters depend on the size of the input data and the Quality of Service (QoS) requirements of the users, such as storage efficiency, availability, and recoverability. These parameters play a crucial role in providing higher reliability and lower storage costs. Therefore, in this paper, we investigate to identify optimal parameters to provide higher reliability and lower storage cost while considering the user's preferences. We present the analysis of the Reed-Solomon coding scheme from the perspective of storage overhead, the probability of data availability, data recoverability, and storage efficiency to identify the optimal values of encoding parameters. We performed the experiments on the Reed-Solomon encoding schemes, and results are reported.
引用
收藏
页码:75105 / 75118
页数:14
相关论文
共 46 条
[1]  
Alon N, 1995, AN S FDN CO, P512, DOI 10.1109/SFCS.1995.492581
[2]  
[Anonymous], TR95048 INT COMP SCI
[3]  
[Anonymous], 1977, THEORY ERROR CORRECT
[4]  
Baker Mary, 2006, P 1 ACM SIGOPS EUROS, P221, DOI [DOI 10.1145/1217935.1217957, 10.1145/1218063.]
[5]  
BLAUM M, 1994, CONF PROC INT SYMP C, P245
[6]  
Bowers K.D., 2009, Workshop on Cloud computing Security (CCSW), P43, DOI DOI 10.1145/1655008.1655015
[7]  
Burkhardt W. A., 1993, Digest of Papers FTCS-23 The Twenty-Third International Symposium on Fault-Tolerant Computing, P432, DOI 10.1109/FTCS.1993.627346
[8]  
Calder B, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P143
[9]   Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation [J].
Chen, Henry C. H. ;
Lee, Patrick P. C. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :407-416
[10]  
Corbett P, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE 3RD USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES, P1