NileStore : (Record no. 9063)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 09252nam a22002537a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 210830s2011 |||||||f mb|| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| 041 0# - Language Code | |
| Language code of text | eng |
| Language code of abstract | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 610 |
| 100 0# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Mahmoud Ahmed Ismail Ahmed |
| 245 1# - TITLE STATEMENT | |
| Title | NileStore : |
| Remainder of title | Secure and Fault-Tolerant Distributed Storage System / |
| Statement of responsibility, etc. | Mahmoud Ahmed Ismail Ahmed |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Date of publication, distribution, etc. | 2011 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 87 p. |
| Other physical details | ill. |
| Dimensions | 21 cm. |
| 500 ## - GENERAL NOTE | |
| Materials specified | Supervisor: Sameh Elansary |
| 502 ## - Dissertation Note | |
| Dissertation type | Thesis (M.A.)—Nile University, Egypt, 2011 . |
| 504 ## - Bibliography | |
| Bibliography | "Includes bibliographical references" |
| 505 0# - Contents | |
| Formatted contents note | Contents:<br/>Acknowledgements v<br/>Table of Contents viii<br/>List of Figures xi<br/>List of Tables xiii<br/>Abstract xv<br/>1 Introduction 1<br/>1.1 Why do we need distributed storage systems? . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.2 Distributed Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1<br/>1.2.1 Classication of Distributed Storage Systems . . . . . . . . . . . . . . . . . . . . . 2<br/>1.2.2 Cloud Storage Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4<br/>1.2.3 P2P Storage Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6<br/>1.2.4 Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9<br/>1.2.5 Key Aspects in designing a Distributed storage system . . . . . . . . . . . . . . . . 9<br/>1.3 Nilestore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br/>1.3.1 Thesis Goal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br/>1.3.2 Nilestore as a Validation of Tahoe . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br/>1.3.3 Results Obtained . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br/>1.4 Thesis Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br/>2 Tahoe: Least Authority File System (LAFS) 13<br/>2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br/>2.1.1 System Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13<br/>2.2 Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br/>2.3 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>2.3.1 File Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16<br/>2.3.2 Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br/>2.3.3 Tahoe Grid . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br/>2.3.4 Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br/>2.4 Immutable File Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br/>2.4.1 Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br/>2.4.2 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br/>2.4.3 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br/>2.4.4 Peer Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22<br/>2.4.5 Servers of Happiness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23<br/>2.4.6 Uploading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br/>2.4.7 Share File Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26<br/>2.4.8 Downloading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28<br/>2.4.9 Checking and Repairing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32<br/>2.5 Mutable File Life Cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br/>2.5.1 Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br/>vii<br/>viii TABLE OF CONTENTS<br/>2.5.2 Types of Mutable les . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br/>2.5.3 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br/>2.5.4 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br/>2.5.5 Publishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33<br/>2.5.6 Share File Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35<br/>2.5.7 Retrieving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35<br/>2.6 Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>2.7 Garbage Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36<br/>2.8 Front Ends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br/>2.8.1 WebApi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br/>2.8.2 CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37<br/>3 Nilestore Design 39<br/>3.1 Kompics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br/>3.1.1 Concepts in Kompics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39<br/>3.1.2 Component life-cycle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br/>3.1.3 Advanced . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42<br/>3.2 Nilestore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>3.2.1 Common Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44<br/>3.2.2 NilestorePeer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47<br/>3.2.3 Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>3.2.4 Introducer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>3.2.5 Simulator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58<br/>3.3 Tahoe vs. Nilestore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60<br/>4 Performance Evaluation 61<br/>4.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61<br/>4.2 Performance of 3rd-party Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61<br/>4.2.1 Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61<br/>4.2.2 Encryption/Decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62<br/>4.2.3 Erasure Coding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62<br/>4.2.4 Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63<br/>4.3 Entire System Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br/>4.3.1 Uploading Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68<br/>4.3.2 Downloading Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75<br/>4.3.3 Entire System Perforamance Summary . . . . . . . . . . . . . . . . . . . . . . . . . 77<br/>5 Conclusion and Future Work 79<br/>A Implementation Details 81<br/>A.1 Hashing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81<br/>A.1.1 SHA256d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81<br/>A.1.2 Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81<br/>A.2 Encoding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81<br/>A.3 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82<br/>A.3.1 AES Cipher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82<br/>A.4 Benchmark . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82<br/>A.4.1 Benchmark Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82<br/>Bibliography 84 |
| 520 3# - Abstract | |
| Abstract | Abstract:<br/>In this thesis we present Nilestore. Nilestore is a secure and fault tolerant distributed storage system<br/>that allows users to save their data remotely while security and privacy are preserved. Under the hood<br/>Nilestore save users' data on multiple machines to increase the availability of the data and to limit<br/>the probability of data loss due to hardware failures. Nilestore is a redesign and reimplementation of<br/>an open source decentralized lesystem called Tahoe-LAFS using a component model framework called<br/>Kompics. Finally, we evaluate the Nilestore implementation against Tahoe implementation where we<br/>were able to show that Nilestore outperforms Tahoe during the dierent operations such as uploading<br/>and downloading. |
| 546 ## - Language Note | |
| Language Note | Text in English, abstracts in English . |
| 650 #4 - Subject | |
| Subject | Informatics-IFM |
| 655 #7 - Index Term-Genre/Form | |
| Source of term | NULIB |
| focus term | Dissertation, Academic |
| 690 ## - Subject | |
| School | Informatics-IFM |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Thesis |
| 650 #4 - Subject | |
| -- | 266 |
| 655 #7 - Index Term-Genre/Form | |
| -- | 187 |
| 690 ## - Subject | |
| -- | 266 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Not For Loan | Main library | Main library | 08/30/2021 | 610 / M.I.N 2011 | 08/30/2021 | 08/30/2021 | Thesis |