FASTEN: Towards a FAult-tolerant and STorage EfficieNt Cloud: Balancing Between Replication and Deduplication (2312.08309v1)
Abstract: With the surge in cloud storage adoption, enterprises face challenges managing data duplication and exponential data growth. Deduplication mitigates redundancy, yet maintaining redundancy ensures high availability, incurring storage costs. Balancing these aspects is a significant research concern. We propose FASTEN, a distributed cloud storage scheme ensuring efficiency, security, and high availability. FASTEN achieves fault tolerance by dispersing data subsets optimally across servers and maintains redundancy for high availability. Experimental results show FASTEN's effectiveness in fault tolerance, cost reduction, batch auditing, and file and block-level deduplication. It outperforms existing systems with low time complexity, strong fault tolerance, and commendable deduplication performance.
- H. Yuan, X. Chen, T. Jiang, X. Zhang, Z. Yan, and Y. Xiang, “Dedupdum: secure and scalable data deduplication with dynamic user management,” Information Sciences, vol. 456, pp. 159–173, 2018.
- H. Abu-Libdeh, L. Princehouse, and H. Weatherspoon, “Racs: a case for cloud storage diversity,” in Proceedings of the 1st ACM symposium on Cloud computing, 2010, pp. 229–240.
- K. D. Bowers, A. Juels, and A. Oprea, “Hail: A high-availability and integrity layer for cloud storage,” in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 187–198.
- Y. Hu, H. C. Chen, P. P. Lee, and Y. Tang, “Nccloud: applying network coding for the storage repair in a cloud-of-clouds.” in FAST, vol. 21, 2012.
- R. Steans, G. Krumholz, and D. Hanken-Kurtz, “Duracloud™ and flexible digital preservation at the texas digital librar,” Texas Conference of Digital Libraries, 2015.
- A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, “Depsky: dependable and secure storage in a cloud-of-clouds,” Acm transactions on storage (tos), vol. 9, no. 4, pp. 1–33, 2013.
- B. Mao, S. Wu, and H. Jiang, “Improving storage availability in cloud-of-clouds with hybrid redundant data distribution,” in 2015 IEEE International Parallel and Distributed Processing Symposium. IEEE, 2015, pp. 633–642.
- D. T. Meyer and W. J. Bolosky, “A study of practical deduplication,” ACM Transactions on Storage (ToS), vol. 7, no. 4, pp. 1–20, 2012.
- W. Xia, H. Jiang, D. Feng, F. Douglis, P. Shilane, Y. Hua, M. Fu, Y. Zhang, and Y. Zhou, “A comprehensive study of the past, present, and future of data deduplication,” Proceedings of the IEEE, vol. 104, no. 9, pp. 1681–1710, 2016.
- L. DuBois, M. Amaldas, and E. Sheppard, “Key considerations as deduplication evolves into primary storage,” White Paper, vol. 223310, 2011.
- J. R. Douceur, A. Adya, W. J. Bolosky, P. Simon, and M. Theimer, “Reclaiming space from duplicate files in a serverless distributed file system,” in Proceedings 22nd international conference on distributed computing systems. IEEE, 2002, pp. 617–624.
- N. Jayapandian and A. Md Zubair Rahman, “Secure deduplication for cloud storage using interactive message-locked encryption with convergent encryption, to reduce storage space,” Brazilian Archives of Biology and Technology, vol. 61, 2018.
- X. Yang, R. Lu, J. Shao, X. Tang, and A. Ghorbani, “Achieving efficient secure deduplication with user-defined access control in cloud,” IEEE Transactions on Dependable and Secure Computing, 2020.
- P. Singh, N. Agarwal, and B. Raman, “Secure data deduplication using secret sharing schemes over cloud,” Future Generation Computer Systems, vol. 88, pp. 156–167, 2018.
- H. Yuan, X. Chen, J. Li, T. Jiang, J. Wang, and R. H. Deng, “Secure cloud data deduplication with efficient re-encryption,” IEEE Transactions on Services Computing, vol. 15, no. 1, pp. 442–456, 2019.
- S. Li, C. Xu, and Y. Zhang, “Csed: Client-side encrypted deduplication scheme based on proofs of ownership for cloud storage,” Journal of Information Security and Applications, vol. 46, pp. 250–258, 2019.
- D. Gale and L. S. Shapley, “College admissions and the stability of marriage,” The American Mathematical Monthly, vol. 69, no. 1, pp. 9–15, 1962.
- V. Sathiyamoorthi, P. Keerthika, P. Suresh, Z. J. Zhang, A. P. Rao, and K. Logeswaran, “Adaptive fault tolerant resource allocation scheme for cloud computing environments,” Journal of Organizational and End User Computing (JOEUC), vol. 33, no. 5, pp. 135–152, 2021.
- M. Wang and Q. Zhang, “Optimized data storage algorithm of iot based on cloud computing in distributed system,” Computer Communications, vol. 157, pp. 124–131, 2020.
- W. Luo, W. Ma, and J. Gao, “Mhb* t based dynamic data integrity auditing in cloud storage,” Cluster Computing, vol. 24, pp. 2115–2132, 2021.
- D. Yue, R. Li, Y. Zhang, W. Tian, and Y. Huang, “Blockchain-based verification framework for data integrity in edge-cloud storage,” Journal of Parallel and Distributed Computing, vol. 146, pp. 1–14, 2020.