期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
PRS:Predication-Based Replica Selection Algorithm for Key-Value Stores
1
作者 Liyuan Fang Xiangqian Zhou +1 位作者 Haiming Xie Wanchun Jiang 《国际计算机前沿大会会议论文集》 2017年第1期79-81,共3页
The tail latency of end-user requests,which directly impacts the user experience and the revenue,is highly related to its corresponding numerous accesses in key-value stores.The replica selection algorithm is crucial ... The tail latency of end-user requests,which directly impacts the user experience and the revenue,is highly related to its corresponding numerous accesses in key-value stores.The replica selection algorithm is crucial to cut the tail latency of these key-value accesses.Recently,the C3 algorithm,which creatively piggybacks the queue-size of waiting keys from replica servers for the replica selection at clients,is proposed in NSDI 2015.Although C3 improves the tail latency a lot,it suffers from the timeliness issue on the feedback information,which directly influences the replica selection.In this paper,we analysis the evaluation of queuesize of waiting keys of C3,and some findings of queue-size variation were made.It motivate us to propose the Prediction-Based Replica Selection(PRS)algorithm,which predicts the queue-size at replica servers under the poor timeliness condition,instead of utilizing the exponentially weighted moving average of the state piggybacked queue-size as in C3.Consequently,PRS can obtain more accurate queue-size at clients than C3,and thus outperforms C3 in terms of cutting the tail latency.Simulation results confirm the advantage of PRS over C3. 展开更多
关键词 Prediction REPLICA selection Tail-latency key-value stores
下载PDF
Key-Value Store Coupled with an Operating System for Storing Large-Scale Values
2
作者 Jeonghwan Im Hyuk-Yoon Kwon 《Computers, Materials & Continua》 SCIE EI 2022年第11期3333-3350,共18页
The key-value store can provide flexibility of data types because it does not need to specify the data types to be stored in advance and can store any types of data as the value of the key-value pair.Various types of ... The key-value store can provide flexibility of data types because it does not need to specify the data types to be stored in advance and can store any types of data as the value of the key-value pair.Various types of studies have been conducted to improve the performance of the key-value store while maintaining its flexibility.However,the research efforts storing the large-scale values such as multimedia data files(e.g.,images or videos)in the key-value store were limited.In this study,we propose a new key-value store,WR-Store++aiming to store the large-scale values stably.Specifically,it provides a new design of separating data and index by working with the built-in data structure of the Windows operating system and the file system.The utilization of the built-in data structure of the Windows operating system achieves the efficiency of the key-value store and that of the file system extends the limited space of the storage significantly.We also present chunk-based memory management and parallel processing of WR-Store++to further improve its performance in the GET operation.Through the experiments,we show that WR-Store++can store at least 32.74 times larger datasets than the existing baseline key-value store,WR-Store,which has the limitation in storing large-scale data sets.Furthermore,in terms of processing efficiency,we show that WR-Store++outperforms not only WR-Store but also the other state-ofthe-art key-value stores,LevelDB,RocksDB,and BerkeleyDB,for individual key-value operations and mixed workloads. 展开更多
关键词 key-value stores large-scale values chunk-based memory management parallel processing
下载PDF
抗恶意敌手的线性门限隐私集合交集协议
3
作者 贾正坤 张恩 王梦涛 《计算机应用研究》 CSCD 北大核心 2024年第9期2846-2853,共8页
门限隐私集合交集(TPSI)是安全多方计算中的一种特例,其在机器学习、共享拼车、指纹识别等多个领域有广泛的应用。然而,目前存在的方案均基于计算复杂度较高的算法,并且仅在半诚实模型下实现,导致协议计算开销较大且无法抵抗恶意敌手的... 门限隐私集合交集(TPSI)是安全多方计算中的一种特例,其在机器学习、共享拼车、指纹识别等多个领域有广泛的应用。然而,目前存在的方案均基于计算复杂度较高的算法,并且仅在半诚实模型下实现,导致协议计算开销较大且无法抵抗恶意敌手的攻击。为了解决以上问题,首先提出了一个向量不经意匹配测试(VOMT)协议,并基于VOMT和布谷鸟哈希设计了一个高效的半诚实TPSI协议。此外,结合VOMT与对称密钥加密方案构造出向量不经意解密匹配测试(VODMT)协议,并基于VODMT与不经意伪随机函数设计了一个可以抵抗恶意敌手的TPSI协议。随后,分别在半诚实模型和恶意模型下证明了协议的安全性,并分析得出两个协议的计算复杂度和通信复杂度均为线性。在集合大小为4096时,提出的两个协议的在线运行时间分别为0.81 s和1.81 s,而先前的工作则需要5627 s,所以两个协议均是高效的。 展开更多
关键词 隐私计算 门限隐私集合交集 不经意键值对存储 不经意伪随机函数 布谷鸟哈希
下载PDF
MyWAL:performance optimization by removing redundant input/output stack in key-value store
4
作者 Xiao ZHANG Mengyu LI +2 位作者 Michael NGULUBE Yonghao CHEN Yiping ZHAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第7期980-993,共14页
Based on a log-structured merge(LSM)tree,the key-value(KV)storage system can provide high reading performance and optimize random writing performance.It is widely used in modern data storage systems like e-commerce,on... Based on a log-structured merge(LSM)tree,the key-value(KV)storage system can provide high reading performance and optimize random writing performance.It is widely used in modern data storage systems like e-commerce,online analytics,and real-time communication.An LSM tree stores new KV data in the memory and flushes to disk in batches.To prevent data loss in memory if there is an unexpected crash,RocksDB appends updating data in the write-ahead log(WAL)before updating the memory.However,synchronous WAL significantly reduces writing performance.In this paper,we present a new WAL mechanism named MyWAL.It directly manages raw devices(or partitions)instead of saving data on a traditional file system.These can avoid useless metadata updating and write data sequentially on disks.Experimental results show that MyWAL can significantly improve the data writing performance of RocksDB compared to the traditional WAL for small KV data on solid-state disks(SSDs),as much as five to eight times faster.On non-volatile memory express soild-state drives(NVMe SSDs)and non-volatile memory(NVM),MyWAL can improve data writing performance by 10%–30%.Furthermore,the results of YCSB(Yahoo!Cloud Serving Benchmark)show that the latency decreased by 50%compared with SpanDB. 展开更多
关键词 key-value(KV)store Log-structured merge(LSM)tree Non-volatile memory(NVM) Non-volatile memory express soild-state drive(NVMe SSD) Write-ahead log(WAL)
原文传递
R-Memcached: A Reliable In-Memory Cache for Big Key-Value Stores
5
作者 Chengjian Liu Kai Ouyang +2 位作者 Xiaowen Chu Hai Liu Yiu-Wing Leung 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第6期560-573,共14页
Large-scale key-value stores are widely used in many Web-based systems to store huge amount of data as(key, value) pairs. In order to reduce the latency of accessing such(key, value) pairs, an in-memory cache system i... Large-scale key-value stores are widely used in many Web-based systems to store huge amount of data as(key, value) pairs. In order to reduce the latency of accessing such(key, value) pairs, an in-memory cache system is usually deployed between the front-end Web system and the back-end database system. In practice, a cache system may consist of a number of server nodes, and fault tolerance is a critical feature to maintain the latency Service-Level Agreements(SLAs). In this paper, we present the design, implementation, analysis, and evaluation of R-Memcached, a reliable in-memory key-value cache system that is built on top of the popular Memcached software. R-Memcached exploits coding techniques to achieve reliability, and can tolerate up to two node failures.Our experimental results show that R-Memcached can maintain very good latency and throughput performance even during the period of node failures. 展开更多
关键词 in-memory cache fault tolerance key-value store
原文传递
RS-store:RDMA-enabled skiplist-based key-value store for efficient range query
6
作者 Chenchen HUANG Huiqi HU +2 位作者 Xuecheng Qi Xuan ZHOU Aoying ZHOU 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第6期133-146,共14页
Many key-value stores use RDMA to optimize the messaging and data transmission between application layer and the storage layer,most of which only provide point-wise operations.Skiplist-based store can support both poi... Many key-value stores use RDMA to optimize the messaging and data transmission between application layer and the storage layer,most of which only provide point-wise operations.Skiplist-based store can support both point operations and range queries,but its CPU-intensive access operations combined with the high-speed network will easily lead to the storage layer reaches CPU bottlenecks.The common solution to this problem is offloading some operations into the application layer and using RDMA bypassing CPU to directly perform remote access,but this method is only used in the hash tablebased store.In this paper,we present RS-store,a skiplist-based key-value store with RDMA,which can overcome the CPU handle of the storage layer by enabling two access modes:local access and remote access.In RS-store,we redesign a novel data structure R-skiplist to save the communication cost in remote access,and implement a latch-free concurrency control mechanism to ensure all the concurrency during two access modes.RS-store also supports client-active range query which can reduce the storage layer’s CPU consumption.At last,we evaluate RS-store on an RDMA-capable cluster.Experimental results show that RS-store achieves up to 2x improvements over RDMA-enabled RocksDB on the throughput and application’s scalability. 展开更多
关键词 key-value store skiplist RDMA
原文传递
dCompaction: Speeding up Compaction of the LSM-Tree via Delayed Compaction 被引量:3
7
作者 Feng-Feng Pan Yin-Liang Yue Jin Xiong 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第1期41-54,共14页
Key-value (KV) stores have become a backbone of large-scale applications in today's data centers. Write- optimized data structures like the Log-Structured Merge-tree (LSM-tree) and their variants are widely used ... Key-value (KV) stores have become a backbone of large-scale applications in today's data centers. Write- optimized data structures like the Log-Structured Merge-tree (LSM-tree) and their variants are widely used in KV storage systems like BigTable and RocksDB. Conventional LSM-tree organizes KV items into multiple, successively larger components, and uses compaction to push KV items from one smaller component to another adjacent larger component until the KV items reach the largest component. Unfortunately, current compaction scheme incurs significant write amplification due to repeated KV item reads and writes, and then results in poor throughput. We propose a new compaction scheme, delayed compaction (dCompaction) that decreases write amplification, dCompaction postpones some compactions and gathers them into the following compaction. In this way, it avoids KV item reads and writes during compaction, and consequently improves the throughput of LSM-tree based KV stores. We implement dCompaction on RocksDB, and conduct extensive experiments. Validation using YCSB framework shows that compared with RocksDB, dCompaction has about 40% write performance improvements and also comparable read performance. 展开更多
关键词 key-value store Log-Structured Merge-tree (LSM-tree) write amplification delayed compaction
原文传递
MobSafe:Cloud Computing Based Forensic Analysis for Massive Mobile Applications Using Data Mining 被引量:2
8
作者 Jianlin Xu Yifan Yu +4 位作者 Zhen Chen Bin Cao Wenyu Dong Yu Guo Junwei Cao 《Tsinghua Science and Technology》 SCIE EI CAS 2013年第4期418-427,共10页
With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Int... With the explosive increase in mobile apps, more and more threats migrate from traditional PC client to mobile device. Compared with traditional Win+Intel alliance in PC, Android+ARM alliance dominates in Mobile Internet, the apps replace the PC client software as the major target of malicious usage. In this paper, to improve the security status of current mobile apps, we propose a methodology to evaluate mobile apps based on cloud computing platform and data mining. We also present a prototype system named MobSafe to identify the mobile app's virulence or benignancy. Compared with traditional method, such as permission pattern based method, MobSafe combines the dynamic and static analysis methods to comprehensively evaluate an Android app. In the implementation, we adopt Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF), the two representative dynamic and static analysis methods, to evaluate the Android apps and estimate the total time needed to evaluate all the apps stored in one mobile app market. Based on the real trace from a commercial mobile app market called AppChina, we can collect the statistics of the number of active Android apps, the average number apps installed in one Android device, and the expanding ratio of mobile apps. As mobile app market serves as the main line of defence against mobile malwares, our evaluation results show that it is practical to use cloud computing platform and data mining to verify all stored apps routinely to filter out malware apps from mobile app markets. As the future work, MobSafe can extensively use machine learning to conduct automotive forensic analysis of mobile apps based on the generated multifaceted data in this stage. 展开更多
关键词 Android platform mobile malware detection cloud computing forensic analysis machine learning redis key-value store big data hadoop distributed file system data mining
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部