期刊文献+

分布式key-value系统错误污染检测

Taint Tracking in Distributed Key-Value System
下载PDF
导出
摘要 随着key-value存储系统的广泛使用,越来越多的研究开始关注分布式系统中的可信问题,其中一个重要的问题是,如何在系统被入侵或者管理员配置错误并运行一段时间后,检测出受污染的数据,从而可以在恢复错误数据的同时保留系统的合法更新.文中提出了一种基于key-value存储系统的错误污染检测方法,该方法允许在客户端不可信的前提下,检测客户端之间的污染扩散.文中设计了一种基于各服务器逻辑时钟的向量时钟,该时钟以用户关联操作为更新规则,记录了跨服务器的读写请求逻辑关系,用以进行错误污染跟踪;同时为了减少大规模系统中污染检测的开销,基于该向量时钟,文中进一步提出了一种在分布式系统中由操作序列构成有向无环图的污染分析方法.基于广泛使用的Voldmort key-value系统,文中实现了一个错误污染检测系统,Tracker Store.在集群测试环境下,文中对引入新的检测系统后产生的额外延迟开销进行了测试. With the widely adoption of key-value system, there have been many researches on reliability of distributed systems. One of the most important problems is the detection of taint data caused by legal user who has accessed untrustworthy data after intrusions by hackers or miscon- figurations by administrators, which enables preserving legitimate data while recovering taint data. This paper has proposed a mechanism for taint tracking based on key-value store, in the case where clients are not trustable. The vector clock based on logical clocks on servers is used to track relationships between cross-server accesses. Furthermore, in order to decrease the overhead incurred by the new system, this paper has explored a mechanism to construct DAG(Directed Acyclic Graph) s with operation sequences under distributed environment. A taint tracking system called Tracker Store is implemented upon the Voldemort key-value system, and overhead on read latency is evaluated on the new system.
出处 《计算机学报》 EI CSCD 北大核心 2014年第7期1570-1579,共10页 Chinese Journal of Computers
基金 国家自然科学基金(60925006) 国家"八六三"高技术研究发展计划重大课题(2009AA01A403)资助~~
关键词 污染检测 分布式key-value系统 向量时钟 taint tracking distributed key-value store vector clock
  • 相关文献

参考文献16

  • 1Voldemort.http://project-voldemort.com.
  • 2Beaver D,Kumar S,Li H C,et al.Finding a needle in haystack:Facebook's photo storage//Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI' 10).Vancouver,Canada,2010:47-60.
  • 3DeCandia G,Hastorun D,Jampani M,et al.Dynamo:Amazon's highly available key-value store//Proceedings of the 21th ACM SIGOPS Symposium on Operating Systems Principles (SOSP ' 07).Skamania Lodge,USA,2007:205-220.
  • 4Lakshman A,Malik P.Cassandra:A decentralized structured storage system.ACM SIGOPS Operating Systems Review,2010,44(2):35-40.
  • 5Feldman A J,Zeller W P,Freedman M J,Felten E W.SPORC:Group collaboration using untrusted cloud resources// Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI' 10).Vancouver,Canada,2010:337-350.
  • 6Li J,Mazières D.Beyond one-third faulty replicas in byzantine fault tolerant systems//Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation (NSDU07).Cambridge,USA,2007:131-144.
  • 7Goel A,Po K,Farhadi K,et al.The taser intrusion recovery system//Proceedings of the 20th ACM Symposium on Operating Systems Principles (SOSP' 05).Brighton,UK,2005:163-176.
  • 8Kim T,Wang Xi,Zeldovich N,Kaashoek M F.Intrusion recovery using selective re execution//Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation(OSDI' 10).Vancouver,Canada,2010:89-104.
  • 9Chandra R,Kim T,Shah M,et al.Intrusion recovery for database backed web applications//Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11).Cascais,Portugal,2011:101-114.
  • 10Hasan R,Sion R,Winslett M.Preventing history forgery with secure provenance.ACM Transactions on Storage (TOS),2009,5(4):No.12.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部