skip to main content
10.1145/2038916.2038930acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article

Policy expressivity in the Anzere personal cloud

Published:26 October 2011Publication History

ABSTRACT

We present a technique for partially replicating data items at scale according to expressive policy specifications. Recent projects have addressed the challenge of policy-based replication of personal data (photos, music, etc.) within a network of devices, as an alternative to centralized online services. To date, the policies supported by such systems have been relatively simple, in order to facilitate scaling the policy calculation to large numbers of items.

In this paper, we show how such replication systems can scale while supporting much more expressive policies than previous schemes: item replication expressed as constraints, devices referred to by predicates rather than explicitly named, and replication to storage nodes acquired on-demand from the cloud. These extensions introduce considerable complexity in policy evaluation, but we show a system can scale well by using equivalence classes to reduce the problem space. We validate our approach via deployment on an ensemble of devices (phones, PCs, cloud virtual machines, etc.), and show that it supports rich policies and high data volumes using simulations and real data based on personal usage in our group.

References

  1. Amazon: Some data won't be recovered after cloud outage. http://www.theregister.co.uk/2011/04/26/amazon_says_some_volumes_lost_in_cloud_outage_not_recoverable/.Google ScholarGoogle Scholar
  2. K. R. Apt and M. G. Wallace. Constraint Logic Programming using ECL i PS e . Cambridge University Press, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. M. Belaramani, M. Dahlin, L. Gao, A. Nayate, A. Venkataramani, P. Yalagandula, and J. Zheng. PRACTI Replication. In Proceedings of the 3rd symposium on Networked Systems Design & Implementation (NSDI '06), pages 5--5. USENIX Association, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Dearman and J. S. Pierce. It's on my other computer!: computing with multiple devices. In Proceedings of the 26th international conference on Human factors in computing systems (CHI '08), pages 767--776. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Delaet, P. Anderson, and W. Joosen. Managing real-world system configurations with constraints. In Proceedings of the 7th International Conference on Networking (ICN '08), pages 594--601, April 13--18 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. DropBox. http://www.dropbox.com.Google ScholarGoogle Scholar
  7. ExifTool. http://www.sno.phy.queensu.ca/~phil/exiftool.Google ScholarGoogle Scholar
  8. Gecode. http://www.gecode.org.Google ScholarGoogle Scholar
  9. I. P. Gent, C. Jefferson, and I. Miguel. MINION: A Fast, Scalable, Constraint Solver. In Proceedings of ECAI '06, pages 98--102, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Google desktop. http://desktop.google.com.Google ScholarGoogle Scholar
  11. Google Docs. http://www.docs.google.com.Google ScholarGoogle Scholar
  12. R. G. Guy. FICUS: a very large scale reliable distributed file system. PhD thesis, University of California, Los Angeles, June 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. IBM. Tivoli enterprise console rule developers guide, Aug 2003. 1st edition. SC32-1234-00.Google ScholarGoogle Scholar
  14. J. J. Kistler and M. Satyanarayanan. Disconnected operation in the coda file system. ACM TOCS, 10(1):3--25, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Kotthoff. Constraint solvers: An empirical evaluation of design decisions. CIRCA preprint 2009/7, University of St Andrews, 2009. http://www-circa.mcs.st-and.ac.uk/Preprints/solver-design.pdf.Google ScholarGoogle Scholar
  16. L. Lamport. The part-time parliament. ACM TOCS, 16(2):133--169, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. Mazières. Paxos Made Practical. Technical report, 2007. http://www.scs.stanford.edu/~dm/home/papers/.Google ScholarGoogle Scholar
  18. M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the 28th international conference on Human factors in computing systems (CHI '10), pages 645--654. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Microsoft Solver Foundation. http://www.solverfoundation.com.Google ScholarGoogle Scholar
  20. S. Narain. Network configuration management via model finding. In Proceedings of the 19th conference on Large Installation System Administration Conference (LISA '05), pages 15--15. USENIX Association, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. OSGi Alliance. OSGi Service Platform, Core Specification Release 4, Version 4.1, Draft, 2007.Google ScholarGoogle Scholar
  22. A. Oulasvirta and L. Sumari. Mobile kits and laptop trays: managing multiple devices in mobile information work. In Proceedings of the 25th international conference on Human factors in computing systems (CHI '07), pages 1127--1136. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Peek and J. Flinn. EnsemBlue: integrating distributed storage and consumer electronics. In Proceedings of OSDI '06, pages 219--232, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Post, P. Kuznetsov, and P. Druschel. PodBase: transparent storage management for personal devices. In Proceedings of the 7th international workshop on Peer-to-Peer systems (IPTPS '08), pages 1--1. USENIX Association, February 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Post, J. Navarro, P. Kuznetsov, and P. Druschel. Autonomous storage management for personal devices with PodBase. In Proceedings of the 2011 USENIX annual technical conference (USENIXATC '10). USENIX Association, June 23--25 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. V. Ramasubramanian, T. L. Rodeheffer, D. B. Terry, M. Walraed-Sullivan, T. Wobber, C. C. Marshall, and A. Vahdat. Cimbiosys: a platform for content-based partial replication. In Proceedings of the 6th USENIX symposium on Networked Systems Design and Implementation (NSDI '09), pages 261--276. USENIX Association, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. RightScale. http://www.rightscale.com.Google ScholarGoogle Scholar
  28. Y. Saito, C. Karamanolis, M. Karlsson, and M. Mahalingam. Taming aggressive replication in the pangaea wide-area file system. SIGOPS Oper. Syst. Rev., 36(SI):15--30, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. B. Salmon. Putting Home Data Management into Perspective. PhD thesis, Carnegie Mellon University, August 17 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. B. Salmon, S. W. Schlosser, L. F. Cranor, and G. R. Ganger. Perspective: Semantic data management for the home. In Proceedings of 7th USENIX Conference on File and Storage Technologies (FAST '09), pages 167--182, February 24--27 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Strauss, C. Lesniewski-Laas, J. M. Paluska, B. Ford, R. Morris, and F. Kaashoek. Device-Transparency: a New Model for Mobile Storage. In Proceedings of HotStorage '09, October 2009.Google ScholarGoogle Scholar
  32. J. Strauss, J. M. Paluska, C. Lesniewski-Laas, B. Ford, R. Morris, and F. Kaashoek. Eyo: Device-transparent personal storage. In Proceedings of the 2011 USENIX annual technical conference (USENIXATC '10). USENIX Association, June 23--25 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. D. B. Terry, M. M. Theimer, K. Petersen, A. J. Demers, M. J. Spreitzer, and C. H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the 15th ACM symposium on Operating systems principles (SOSP '95), pages 172--182. ACM, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. M. Wawrzoniak, L. Peterson, and T. Roscoe. Sophia: an Information Plane for networked systems. SIGCOMM Comput. Comm. Rev., 34(1):15--20, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Windows Live. http://explore.live.com.Google ScholarGoogle Scholar
  36. T. Wobber, T. L. Rodeheffer, and D. B. Terry. Policy-based access control for weakly consistent replication. In Proceedings of the 5th European conference on Computer systems (EuroSys '10), pages 293--306. ACM, April 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Xsan. http://www.apple.com/xsan.Google ScholarGoogle Scholar
  38. Q. Yin, J. Cappos, A. Baumann, and T. Roscoe. Dependable Self-Hosting Distributed Systems Using Constraints. In Proceedings of 4th Workshop on Hot Topics in Systems Dependability, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Q. Yin, A. Schüpbach, J. Cappos, A. Baumann, and T. Roscoe. Rhizoma: A Runtime for Self-deploying, Self-managing Overlays. In Proceedings of Middleware '09, volume 5896 of LNCS, pages 184--204, 2009. Google ScholarGoogle Scholar
  40. H. Yu and A. Vahdat. Design and evaluation of a conit-based continuous consistency model for replicated services. ACM TOCS, 20(3):239--282, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Policy expressivity in the Anzere personal cloud

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SOCC '11: Proceedings of the 2nd ACM Symposium on Cloud Computing
            October 2011
            377 pages
            ISBN:9781450309769
            DOI:10.1145/2038916

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 26 October 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate169of722submissions,23%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader