Concurrent and Robust End-to-End Data Integrity Verification Scheme for Flash-Based Storage Devices

被引:2
|
作者
Kim, Hwajung [1 ]
Hwang, Inhwi [1 ]
Lee, Jeongeun [1 ]
Yeom, Heon Y. [1 ]
Sung, Hanul [2 ]
机构
[1] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul 08826, South Korea
[2] Sangmyung Univ, Dept Game Design & Dev, Seoul 03016, South Korea
来源
IEEE ACCESS | 2022年 / 10卷
基金
新加坡国家研究基金会;
关键词
Data transfer; Flash memories; Data integrity; Receivers; Prototypes; Performance evaluation; Random access memory; I; O scheduling; parallel processing; data integrity;
D O I
10.1109/ACCESS.2022.3163729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amount of data generated by scientific applications on high-performance computing systems is growing at an ever-increasing pace. Most of the generated data are transferred to storage in remote systems for various purposes such as backup, replication, or analysis. To detect data corruption caused by network or storage failures during data transfer, the receiver system verifies data integrity by comparing the checksum of the data. However, the internal operation of the storage device is not sufficiently investigated in the existing end-to-end integrity verification techniques. In this paper, we propose a concurrent and reliable end-to-end data integrity verification scheme considering the internal operation of the storage devices for data transfer between high-performance computing systems with flash-based storage devices. To perform data integrity verification including data corruptions that occurred inside the storage devices, we control the order of I/O operations considering the internal operations of the storage devices. Also, to prove the effectiveness of the proposed scheme, we devise a prototype that injects faults on the specific layer of the storage stack and examines detection of faults. We parallelize checksum computation and overlap it with I/O operations to mitigate the overhead caused by I/O reordering. The experimental results show that the proposed scheme reduces the entire data transfer time by up to 62% compared with the existing schemes while ensuring robust data integrity. With the prototype implementation, our scheme detects failures on NAND flash memory inside storage devices that cannot be detected with the existing schemes.
引用
收藏
页码:36350 / 36361
页数:12
相关论文
共 50 条
  • [1] High-Performance End-to-End Integrity Verification on Big Data Transfer
    Jung, Eun-Sung
    Liu, Si
    Kettimuthu, Rajkumar
    Chung, Sungwook
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (08) : 1478 - 1488
  • [2] Efficient and Robust Data Integrity Verification Scheme for High-Performance Storage Devices
    Kim, Hwajung
    Hwang, Inhwi
    Yeom, Heon Y.
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 1199 - 1202
  • [3] Towards Optimizing Large-Scale Data Transfers with End-to-End Integrity Verification
    Liu, Si
    Jung, Eun-Sung
    Kettimuthu, Rajkumar
    Sun, Xian-He
    Papka, Michael
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3002 - 3007
  • [4] Adversarial Regularization for End-to-end Robust Speaker Verification
    Wang, Qing
    Guo, Pengcheng
    Sun, Sining
    Xie, Lei
    Hansen, John H. L.
    INTERSPEECH 2019, 2019, : 4010 - 4014
  • [5] Robust End-to-End Speaker Verification Using EEG
    Han, Yan
    Krishna, Gautam
    Tran, Co
    Carnahan, Mason
    Tewfik, Ahmed H.
    28TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2020), 2021, : 1170 - 1174
  • [6] An end-to-end delivery scheme for robust video streaming
    Ding, JW
    Huang, YM
    Chu, CC
    ADVANCES IN MUTLIMEDIA INFORMATION PROCESSING - PCM 2001, PROCEEDINGS, 2001, 2195 : 375 - 382
  • [7] Breaking Message Integrity of an End-to-End Encryption Scheme of LINE
    Isobe, Takanori
    Minematsu, Kazuhiko
    COMPUTER SECURITY (ESORICS 2018), PT II, 2018, 11099 : 249 - 268
  • [8] Towards Secure End-to-End Data Aggregation in AMI through Delayed-Integrity-Verification
    Keoh, Sye Loong
    Tang, Zhaohui
    2014 10TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2014, : 6 - 11
  • [9] Zettabyte Reliability with Flexible End-to-end Data Integrity
    Zhang, Yupu
    Myers, Daniel S.
    Arpaci-Dusseau, Andrea C.
    Arpaci-Dusseau, Remzi H.
    2013 IEEE 29TH SYMPOSIUM ON MASS STORAGE SYSTEMS AND TECHNOLOGIES (MSST), 2013,
  • [10] Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios
    Han, Bing
    Wang, Hao
    Fang, Min
    Zhang, Yongchao
    Zhou, Lu
    Ge, Chunpeng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (10): : 2467 - 2481