pass pass provenance aware storage system provenance
play

PASS PASS Provenance-Aware Storage System Provenance-Aware Storage - PowerPoint PPT Presentation

PASS PASS Provenance-Aware Storage System Provenance-Aware Storage System Margo Seltzer, David Holland, Kiran-Kumar Muniswamy-Reddy, Uri Braun, and Jonathan Ledlie Harvard University What is Provenance? What is Provenance? What did the


  1. PASS PASS Provenance-Aware Storage System Provenance-Aware Storage System Margo Seltzer, David Holland, Kiran-Kumar Muniswamy-Reddy, Uri Braun, and Jonathan Ledlie Harvard University

  2. What is Provenance? What is Provenance?  What did the President know and when What did the President know and when  did he know it? did he know it?  What the President knew What the President knew – – data data   When he knew it When he knew it – – provenance provenance   Provenance is metadata about the Provenance is metadata about the  history of an object history of an object Systems Research At Harvard Systems Research At Harvard

  3. What is Provenance? (contd contd) ) What is Provenance? (  For computer objects, provenance is the For computer objects, provenance is the  complete history or lineage of a object complete history or lineage of a object  On what is this object based? On what is this object based?   How was this object created? How was this object created?   How can it be re-created? How can it be re-created?  Systems Research At Harvard Systems Research At Harvard

  4. Example Example read A write P C d a e r B Provenance of C Provenance of C  Input Files A, B Input Files A, B   Application P Application P   Command line Command line Args Args   Environment Environment   Processor type, OS, etc Processor type, OS, etc  Systems Research At Harvard Systems Research At Harvard

  5. Sample Applications Sample Applications  Science: how did I (or they) get this Science: how did I (or they) get this  result? result?  ILM: tweak ILM policies for data ILM: tweak ILM policies for data  belonging to a particular application belonging to a particular application  Homeland Security: from what sources Homeland Security: from what sources  did I derive this conclusion? did I derive this conclusion? Systems Research At Harvard Systems Research At Harvard

  6. The State of Provenance Today The State of Provenance Today  Many provenance systems are domain- Many provenance systems are domain-  specific. specific.  Most provenance is entered manually. Most provenance is entered manually.   In many fields, provenance support is simply In many fields, provenance support is simply  lacking. lacking. Systems Research At Harvard Systems Research At Harvard

  7. Provenance-Aware Storage Systems Provenance-Aware Storage Systems (PASS) (PASS)  Storage systems (e.g., file systems) in Storage systems (e.g., file systems) in  which provenance is a first class entity. which provenance is a first class entity.  Provenance: Provenance:   is generated and maintained as is generated and maintained as  transparently as possible. transparently as possible.  can be indexed and queried. can be indexed and queried.  Systems Research At Harvard Systems Research At Harvard

  8. Research Questions: Research Questions:  Storing provenance: What is the most Storing provenance: What is the most  appropriate way to represent provenance? appropriate way to represent provenance?  Security: what is the right security model Security: what is the right security model  for provenance? for provenance?  The wire: how do we implement a The wire: how do we implement a  distributed PASS? distributed PASS?  Evaluation: how do we evaluate PASS? Evaluation: how do we evaluate PASS?  Systems Research At Harvard Systems Research At Harvard

  9. Research Questions (contd contd): ): Research Questions (  What is the most appropriate query What is the most appropriate query  interface? interface?  Search: can we do better than general- Search: can we do better than general-  purpose search? purpose search?  Pruning: when do you delete provenance Pruning: when do you delete provenance  (or change history) (or change history) Systems Research At Harvard Systems Research At Harvard

  10. PASS Prototype PASS Prototype  Linux 2.4.29, Linux 2.4.29, RedHat RedHat 7.3 7.3   In-kernel transactional data store In-kernel transactional data store   Port of Berkeley DB into the kernel Port of Berkeley DB into the kernel   Provided by SUNY Stony Brook Provided by SUNY Stony Brook   Provenance And Storage Layer: PASTA Provenance And Storage Layer: PASTA   Stacked file system Stacked file system   Constructed using Constructed using FiST FiST  Systems Research At Harvard Systems Research At Harvard

  11. PASS Architecture PASS Architecture USER User process Syscall Layer KERNEL Intercept Collector Syscalls VFS Layer Provenance KBDB Pasta Provenance Provenance Data Native FS Systems Research At Harvard Systems Research At Harvard

  12. Questions? Questions? Contact: Contact: pass@eecs.harvard.edu pass@eecs.harvard.edu www.eecs.harvard.edu/syrah/pass /syrah/pass www.eecs.harvard.edu Prototype Available in January Prototype Available in January Thanks to our Sponsors: Thanks to our Sponsors: Systems Research At Harvard Systems Research At Harvard

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend