期刊文献+

大数据存储中的容错关键技术综述 被引量:15

Fault Tolerance Technology for Big Data Storage
下载PDF
导出
摘要 不断增长的海量数据需要被可靠存储,而分布式存储系统庞大的节点规模和数据规模,大大提升了发生节点失效的概率,容错技术成为大数据存储中不可忽视的关键技术。文中介绍了数据容错的两种基本策略:复制和纠删码,并分别总结了将这两种容错策略具体应用于大数据存储时所面对的问题和相关解决技术,如与基于复制的容错技术相关的副本系数设置、副本放置策略、副本一致性策略、副本修复策略和纠删码领域的再生码技术等。 The growing massive data needs to be reliably stored,but the large scale of the nodes and data of distributed storage system greatly enhance the probability of node failure.The fault tolerance technology has become the key technology which cannot be ignored in big data storage.This paper introduces two basic strategies of data fault tolerance:replication and erasure codes,and summarizes related technology using these two strategies for big data storage.Technologies include the coefficient setting of duplicates,the replica placement strategy,the replica consistency and the repair strategy related to replication technology,and regenerative code technology related to erasure codes.
作者 宫婧 王文君
出处 《南京邮电大学学报(自然科学版)》 北大核心 2014年第4期20-25,共6页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
基金 国家自然科学基金(60973140 61170276 61373135 ) 江苏省产学研项目(BY2013011) 江苏省科技型企业创新基金(BC2013027) 江苏省高校自然科学研究重大项目(12KJA520003)资助项目
关键词 大数据存储 分布式存储 容错 复制 纠删码 再生码 big data storage distributed storage fault tolerant replication erasure code regenerating code
  • 相关文献

参考文献33

  • 1孙鹏,赵军锁,张文君.软件容错:技术与展望[J].计算机工程与科学,2007,29(8):88-93. 被引量:7
  • 2VON NEUMANN J.Probabilistic logics and the synthesis of reliable organisms from unreliable components[J].Auromata Studies,1956,10:43-98.
  • 3百度百科:容错技术[EB/OL].[2014-02-16].http:∥baike.baidu.com/link? url=5ArUGJpLBLQgd1Q1eOrhgK0WaIuNwEE-4FJdZylRXl1 XeM-pZr7 PSNYBFIoc5 E7_j.
  • 4覃雄派,王会举,杜小勇,王珊.大数据分析——RDBMS与MapReduce的竞争与共生[J].软件学报,2012,23(1):32-45. 被引量:386
  • 5GANTZ J A E R.Extracting Value from Chaos[EB/OL].[2011-06-30].http://www.emc.com/digital_universe.
  • 6ZHANG Xiaoxue,XU Feng.Survey of research on big data storage[C]//12th International Symposium on Distributed Computing and Applications to Business,Engineering & Science(DCABES).2013:76-80.
  • 7胡燏翀.基于网络编码的分布式存储容错机制研究[D].合肥:中国科学技术大学,2010.
  • 8宫学庆,金澈清,王晓玲,张蓉,周傲英.数据密集型科学与工程:需求和挑战[J].计算机学报,2012,35(8):1563-1578. 被引量:79
  • 9陈玲玲.基于副本管理的P2P存储系统模型建立[D].秦皇岛:燕山大学,2012.
  • 10DABEK F,KAASHOEK M F.Wide-area cooperative storage with cfs[C]//SOSP.2001:202-215.

二级参考文献151

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献580

同被引文献94

引证文献15

二级引证文献67

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部