Specifying data availability in multi-device file systems
ACM SIGOPS Operating Systems Review
Reliable computer systems (3rd ed.): design and evaluation
Reliable computer systems (3rd ed.): design and evaluation
Deciding when to forget in the Elephant file system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Minerva: An automated resource provisioning tool for large-scale storage systems
ACM Transactions on Computer Systems (TOCS)
Lessons from Giant-Scale Services
IEEE Internet Computing
Hippodrome: Running Circles Around Storage Administration
FAST '02 Proceedings of the Conference on File and Storage Technologies
Traveling to Rome: QoS Specifications for Automated Storage System Management
IWQoS '01 Proceedings of the 9th International Workshop on Quality of Service
A Backup Appliance Composed of High-Capacity Disk Drives
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
A Modular, Analytical Throughput Model for Modern Disk Arrays
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
A utility-centered approach to building dependable infrastructure services
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Self-securing storage: protecting data in compromised system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Towards availability benchmarks: a case study of software raid systems
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
Improving storage system availability with D-GRAID
ACM Transactions on Storage (TOS)
Mining block correlations to improve storage performance
ACM Transactions on Storage (TOS)
Awarded Best Student Paper! -- Improving Storage System Availability with D-GRAID
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
C-Miner: Mining Block Correlations in Storage Systems
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
A utility-centered approach to building dependable infrastructure services
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
Lessons and challenges in automating data dependability
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Database-aware semantically-smart storage
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Total recall: system support for automated availability management
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Policy-driven management of data sets
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
SQCK: a declarative file system checker
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Improving storage system availability with D-GRAID
FAST'04 Proceedings of the 3rd USENIX conference on File and storage technologies
FAST'04 Proceedings of the 3rd USENIX conference on File and storage technologies
C-Miner: mining block correlations in storage systems
FAST'04 Proceedings of the 3rd USENIX conference on File and storage technologies
Ffsck: The Fast File-System Checker
ACM Transactions on Storage (TOS)
Ffsck: the fast file system checker
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |
If you can't make your data dependable, then you can't make your computing dependable, either. The good news is that the list of data protection techniques is long, and growing. The bad news is that the choices they offer are getting more complicated: how many copies of data to keep? whether to use full or partial redundancy? how often to make snapshots? how to schedule full and incremental backups? what combination of techniques to use? The stakes are getting higher: web access means that services must have 24x7 availability, and users are willing to switch if services are unavailable. Finally, human administrators can (and often do) make mistakes. These factors compel us to simplify and automate data dependability decisions as much as possible.We are developing a system that will automatically select which data protection techniques to use, and how to apply them, to meet user-specified dependability (i.e., reliability and availability) goals. This paper describes our approach and outlines our initial descriptions for user requirements, failure characteristics and data protection techniques.