cooperative data backup for mobile devices
play

Cooperative Data Backup for Mobile Devices Ludovic Courts Advisors - PowerPoint PPT Presentation

Cooperative Data Backup for Mobile Devices Ludovic Courts Advisors : David Powell, Marc-Olivier Killijian 23 November 2007 2 Context Thesis at LAAS-CNRS, Dependable & Fault-Tolerant Computing Team The MoSAIC Project 3-year project


  1. Cooperative Data Backup for Mobile Devices Ludovic Courtès Advisors : David Powell, Marc-Olivier Killijian 23 November 2007

  2. 2 Context Thesis at LAAS-CNRS, Dependable & Fault-Tolerant Computing Team The MoSAIC Project • 3-year project started in Sept. 2004 • French national program: IRISA, Eurecom and LAAS-CNRS The Hidenets Project • 3-year EU IST project , FP6, started in Jan. 2006 • resilience for mobility-aware services ⇒ Improve Mobile Device Data Availability

  3. 3 • Introduction • Redundancy Management • Storage Mechanisms • Secure Cooperation • Implementation • Conclusions

  4. 4 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Problem Statement Mobile Devices are Subject to Damage, Loss, etc. Typical Data Backup Techniques… • “synchronization” betweenmobile device and desktop machine • requires access to desktop machine … Are Constraining or Costly • only intermittent access to one’s desktop machine • potentially costly communications (e.g., GPRS, UMTS) ⇒ Backup opportunities are rare, data is at risk

  5. 5 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Cooperative Approach to Data Backup Key Ideas • leverage computing device ubiquity • opportunistic replication to neighboring devices • … using wireless ad hoc networking (Wi-Fi, Bluetooth) Salient Points • adapted to intermittent connectivity scenarios • continuous backup & replication • protected against common-mode failures

  6. 6 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes

  7. 7 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes

  8. 8 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes

  9. 9 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes Internet

  10. 10 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes Internet

  11. 11 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes Internet Store Contributors Data Owner Internet

  12. 12 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes Internet

  13. 13 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Cooperative Backup and Recovery Processes Internet

  14. 14 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Storage Challenges Unpredictable Connection Encounters & Lifetime ⇒ limited transfer size ⇒ data must be fragmented ⇒ data blocks are scattered Limited Resources • minimize storage cost • optimize energy consumption

  15. 15 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Security Challenges Trustworthy Data Storage • ensure data confidentiality, integrity, authenticity • provide appropriate backup redundancy Secure Cooperation • participants have no a priori trust relationship • participants are mutually suspicious • protect against Denial-of-Service attacks

  16. 16 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Related Work Peer-to-Peer Backup • Pastiche , Samsara , PeerStore , etc. on the Internet ⇒ different connectivity assumptions • Personal Area Network Cooperative Backup • Flashback • devices are mutually trusted Persistent Stores for Sensor Networks (e.g., tinyPEDS ) Delay-Tolerant Networks • different evaluation criteria (e.g., delay) • usually assumes that devices are well-behaved

  17. 17 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Major Contributions of the Thesis • Definition of Dependability Goals & Backup Framework • Identification of Distributed Storage Requirements • Design of Core Security Mechanisms • Prototype Implementation of a Cooperative Backup Service

  18. 18 • Introduction • Redundancy Management • Storage Mechanisms • Secure Cooperation • Implementation • Conclusions

  19. 19 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Distributed Storage & Redundancy Management

  20. 20 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Improving Data Availability Problem Statement • contributors may fail • contributors are not trusted ⇒ Need for Data Replication Data Replication Goals • maximize storage efficiency … • … and data availability Methodology • devise replication strategies • evaluate the efficiency/availability tradeoff

  21. 21 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Simple Replication Strategy Algorithm send a total of n copies of each data item 1. 2. send 1 copy per contributor recover from any 1 contributor out of n 3. Dependability & Storage Cost Analysis tolerate f contributor faults ⇒ storage cost f + 1 times the input data size • n = 3, f = 2

  22. 22 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Simple Replication Strategy Algorithm send a total of n copies of each data item 1. 2. send 1 copy per contributor recover from any 1 contributor out of n 3. Dependability & Storage Cost Analysis tolerate f contributor faults ⇒ storage cost f + 1 times the input data size • n = 3, f = 2

  23. 23 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Simple Replication Strategy Algorithm send a total of n copies of each data item 1. 2. send 1 copy per contributor recover from any 1 contributor out of n 3. Dependability & Storage Cost Analysis tolerate f contributor faults ⇒ storage cost f + 1 times the input data size • n = 3, f = 2

  24. 24 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Using Erasure Codes for Replication k = 4 source blocks Erasure Codes at a Glance k -block input → n coded blocks , n > k • m blocks suffice to recover input data k < m < n • storage cost : S = n / k • k = 1 ⇔ simple replication • Optimal Codes when m = k • • notation: ( n , k ) code n and k are user-defined parameters • n = 6 coded blocks

  25. 25 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Replication Strategy Using Erasure Codes Algorithm ( n , k ) erasure coding → n coded blocks 1. 2. send 1 coded block per contributor recover from any k contributors out of n 3. Dependability & Storage Cost Analysis tolerate f contributor faults ⇒ storage cost k + f • times the input data size! k n = 5, k = 3 f = n − k = 2

  26. 26 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Replication Strategy Using Erasure Codes Algorithm ( n , k ) erasure coding → n coded blocks 1. 2. send 1 coded block per contributor recover from any k contributors out of n 3. Dependability & Storage Cost Analysis tolerate f contributor faults ⇒ storage cost k + f • times the input data size! k n = 5, k = 3 f = n − k = 2

  27. 27 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions A Replication Strategy Using Erasure Codes Algorithm ( n , k ) erasure coding → n coded blocks 1. 2. send 1 coded block per contributor recover from any k contributors out of n 3. Dependability & Storage Cost Analysis tolerate f contributor faults ⇒ storage cost k + f • times the input data size! k n = 5, k = 3 f = n − k = 2

  28. 28 Introduction > Redundancy Management > Storage Mechanisms > Secure Cooperation > Implementation > Conclusions Example Erasure Code-Based Strategies Examples (3,1) code: f = 2 failures tolerated; storage cost: S = 3 • (5,3) code: f = 2 failures tolerated; storage cost: S = 1 . 67 • 2 failures tolerated: n = k + 2 3 stretch factor S S = k + 2 2 k 1 0 1 2 4 6 8 10 parameter k

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend