ABSTRACT
We present a technique for partially replicating data items at scale according to expressive policy specifications. Recent projects have addressed the challenge of policy-based replication of personal data (photos, music, etc.) within a network of devices, as an alternative to centralized online services. To date, the policies supported by such systems have been relatively simple, in order to facilitate scaling the policy calculation to large numbers of items.
In this paper, we show how such replication systems can scale while supporting much more expressive policies than previous schemes: item replication expressed as constraints, devices referred to by predicates rather than explicitly named, and replication to storage nodes acquired on-demand from the cloud. These extensions introduce considerable complexity in policy evaluation, but we show a system can scale well by using equivalence classes to reduce the problem space. We validate our approach via deployment on an ensemble of devices (phones, PCs, cloud virtual machines, etc.), and show that it supports rich policies and high data volumes using simulations and real data based on personal usage in our group.
- Amazon: Some data won't be recovered after cloud outage. http://www.theregister.co.uk/2011/04/26/amazon_says_some_volumes_lost_in_cloud_outage_not_recoverable/.Google Scholar
- K. R. Apt and M. G. Wallace. Constraint Logic Programming using ECL i PS e . Cambridge University Press, 2007. Google ScholarDigital Library
- N. M. Belaramani, M. Dahlin, L. Gao, A. Nayate, A. Venkataramani, P. Yalagandula, and J. Zheng. PRACTI Replication. In Proceedings of the 3rd symposium on Networked Systems Design & Implementation (NSDI '06), pages 5--5. USENIX Association, 2006. Google ScholarDigital Library
- D. Dearman and J. S. Pierce. It's on my other computer!: computing with multiple devices. In Proceedings of the 26th international conference on Human factors in computing systems (CHI '08), pages 767--776. ACM, 2008. Google ScholarDigital Library
- T. Delaet, P. Anderson, and W. Joosen. Managing real-world system configurations with constraints. In Proceedings of the 7th International Conference on Networking (ICN '08), pages 594--601, April 13--18 2008. Google ScholarDigital Library
- DropBox. http://www.dropbox.com.Google Scholar
- ExifTool. http://www.sno.phy.queensu.ca/~phil/exiftool.Google Scholar
- Gecode. http://www.gecode.org.Google Scholar
- I. P. Gent, C. Jefferson, and I. Miguel. MINION: A Fast, Scalable, Constraint Solver. In Proceedings of ECAI '06, pages 98--102, 2006. Google ScholarDigital Library
- Google desktop. http://desktop.google.com.Google Scholar
- Google Docs. http://www.docs.google.com.Google Scholar
- R. G. Guy. FICUS: a very large scale reliable distributed file system. PhD thesis, University of California, Los Angeles, June 1992. Google ScholarDigital Library
- IBM. Tivoli enterprise console rule developers guide, Aug 2003. 1st edition. SC32-1234-00.Google Scholar
- J. J. Kistler and M. Satyanarayanan. Disconnected operation in the coda file system. ACM TOCS, 10(1):3--25, 1992. Google ScholarDigital Library
- L. Kotthoff. Constraint solvers: An empirical evaluation of design decisions. CIRCA preprint 2009/7, University of St Andrews, 2009. http://www-circa.mcs.st-and.ac.uk/Preprints/solver-design.pdf.Google Scholar
- L. Lamport. The part-time parliament. ACM TOCS, 16(2):133--169, 1998. Google ScholarDigital Library
- D. Mazières. Paxos Made Practical. Technical report, 2007. http://www.scs.stanford.edu/~dm/home/papers/.Google Scholar
- M. L. Mazurek, J. P. Arsenault, J. Bresee, N. Gupta, I. Ion, C. Johns, D. Lee, Y. Liang, J. Olsen, B. Salmon, R. Shay, K. Vaniea, L. Bauer, L. F. Cranor, G. R. Ganger, and M. K. Reiter. Access Control for Home Data Sharing: Attitudes, Needs and Practices. In Proceedings of the 28th international conference on Human factors in computing systems (CHI '10), pages 645--654. ACM, 2010. Google ScholarDigital Library
- Microsoft Solver Foundation. http://www.solverfoundation.com.Google Scholar
- S. Narain. Network configuration management via model finding. In Proceedings of the 19th conference on Large Installation System Administration Conference (LISA '05), pages 15--15. USENIX Association, 2005. Google ScholarDigital Library
- OSGi Alliance. OSGi Service Platform, Core Specification Release 4, Version 4.1, Draft, 2007.Google Scholar
- A. Oulasvirta and L. Sumari. Mobile kits and laptop trays: managing multiple devices in mobile information work. In Proceedings of the 25th international conference on Human factors in computing systems (CHI '07), pages 1127--1136. ACM, 2007. Google ScholarDigital Library
- D. Peek and J. Flinn. EnsemBlue: integrating distributed storage and consumer electronics. In Proceedings of OSDI '06, pages 219--232, 2006. Google ScholarDigital Library
- A. Post, P. Kuznetsov, and P. Druschel. PodBase: transparent storage management for personal devices. In Proceedings of the 7th international workshop on Peer-to-Peer systems (IPTPS '08), pages 1--1. USENIX Association, February 2008. Google ScholarDigital Library
- A. Post, J. Navarro, P. Kuznetsov, and P. Druschel. Autonomous storage management for personal devices with PodBase. In Proceedings of the 2011 USENIX annual technical conference (USENIXATC '10). USENIX Association, June 23--25 2011. Google ScholarDigital Library
- V. Ramasubramanian, T. L. Rodeheffer, D. B. Terry, M. Walraed-Sullivan, T. Wobber, C. C. Marshall, and A. Vahdat. Cimbiosys: a platform for content-based partial replication. In Proceedings of the 6th USENIX symposium on Networked Systems Design and Implementation (NSDI '09), pages 261--276. USENIX Association, 2009. Google ScholarDigital Library
- RightScale. http://www.rightscale.com.Google Scholar
- Y. Saito, C. Karamanolis, M. Karlsson, and M. Mahalingam. Taming aggressive replication in the pangaea wide-area file system. SIGOPS Oper. Syst. Rev., 36(SI):15--30, 2002. Google ScholarDigital Library
- B. Salmon. Putting Home Data Management into Perspective. PhD thesis, Carnegie Mellon University, August 17 2009. Google ScholarDigital Library
- B. Salmon, S. W. Schlosser, L. F. Cranor, and G. R. Ganger. Perspective: Semantic data management for the home. In Proceedings of 7th USENIX Conference on File and Storage Technologies (FAST '09), pages 167--182, February 24--27 2009. Google ScholarDigital Library
- J. Strauss, C. Lesniewski-Laas, J. M. Paluska, B. Ford, R. Morris, and F. Kaashoek. Device-Transparency: a New Model for Mobile Storage. In Proceedings of HotStorage '09, October 2009.Google Scholar
- J. Strauss, J. M. Paluska, C. Lesniewski-Laas, B. Ford, R. Morris, and F. Kaashoek. Eyo: Device-transparent personal storage. In Proceedings of the 2011 USENIX annual technical conference (USENIXATC '10). USENIX Association, June 23--25 2011. Google ScholarDigital Library
- D. B. Terry, M. M. Theimer, K. Petersen, A. J. Demers, M. J. Spreitzer, and C. H. Hauser. Managing update conflicts in Bayou, a weakly connected replicated storage system. In Proceedings of the 15th ACM symposium on Operating systems principles (SOSP '95), pages 172--182. ACM, 1995. Google ScholarDigital Library
- M. Wawrzoniak, L. Peterson, and T. Roscoe. Sophia: an Information Plane for networked systems. SIGCOMM Comput. Comm. Rev., 34(1):15--20, 2004. Google ScholarDigital Library
- Windows Live. http://explore.live.com.Google Scholar
- T. Wobber, T. L. Rodeheffer, and D. B. Terry. Policy-based access control for weakly consistent replication. In Proceedings of the 5th European conference on Computer systems (EuroSys '10), pages 293--306. ACM, April 2010. Google ScholarDigital Library
- Xsan. http://www.apple.com/xsan.Google Scholar
- Q. Yin, J. Cappos, A. Baumann, and T. Roscoe. Dependable Self-Hosting Distributed Systems Using Constraints. In Proceedings of 4th Workshop on Hot Topics in Systems Dependability, 2008. Google ScholarDigital Library
- Q. Yin, A. Schüpbach, J. Cappos, A. Baumann, and T. Roscoe. Rhizoma: A Runtime for Self-deploying, Self-managing Overlays. In Proceedings of Middleware '09, volume 5896 of LNCS, pages 184--204, 2009. Google Scholar
- H. Yu and A. Vahdat. Design and evaluation of a conit-based continuous consistency model for replicated services. ACM TOCS, 20(3):239--282, 2002. Google ScholarDigital Library
Index Terms
- Policy expressivity in the Anzere personal cloud
Recommendations
A virtual cloud computing provider for mobile devices
MCS '10: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and BeyondA mobile device like a smart phone is becoming one of main information processing devices for users these days. Using it, a user not only receives and makes calls, but also performs information tasks. However, a mobile device is still resource ...
Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications
A distributed mobile cloud service model called "POEM" is presented to manage the mobile cloud resource and compose mobile cloud applications. POEM provides the following salient features: (a) it considers resource management not only between mobile ...
Data mobile cloud technology: mVDI
SoICT '13: Proceedings of the 4th Symposium on Information and Communication TechnologyRecently, with the overwhelming growth of Cloud Computing (CC) and mobile devices, Mobile Cloud Computing (MCC) has emerged and become an attractive area of research. Unlike CC, MCC is formed from the properties of mobile devices such as hardware ...
Comments