Concurrent and Robust End-to-End Data Integrity Verification Scheme for Flash-Based Storage Devices

被引:2
|
作者
Kim, Hwajung [1 ]
Hwang, Inhwi [1 ]
Lee, Jeongeun [1 ]
Yeom, Heon Y. [1 ]
Sung, Hanul [2 ]
机构
[1] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul 08826, South Korea
[2] Sangmyung Univ, Dept Game Design & Dev, Seoul 03016, South Korea
来源
IEEE ACCESS | 2022年 / 10卷
基金
新加坡国家研究基金会;
关键词
Data transfer; Flash memories; Data integrity; Receivers; Prototypes; Performance evaluation; Random access memory; I; O scheduling; parallel processing; data integrity;
D O I
10.1109/ACCESS.2022.3163729
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The amount of data generated by scientific applications on high-performance computing systems is growing at an ever-increasing pace. Most of the generated data are transferred to storage in remote systems for various purposes such as backup, replication, or analysis. To detect data corruption caused by network or storage failures during data transfer, the receiver system verifies data integrity by comparing the checksum of the data. However, the internal operation of the storage device is not sufficiently investigated in the existing end-to-end integrity verification techniques. In this paper, we propose a concurrent and reliable end-to-end data integrity verification scheme considering the internal operation of the storage devices for data transfer between high-performance computing systems with flash-based storage devices. To perform data integrity verification including data corruptions that occurred inside the storage devices, we control the order of I/O operations considering the internal operations of the storage devices. Also, to prove the effectiveness of the proposed scheme, we devise a prototype that injects faults on the specific layer of the storage stack and examines detection of faults. We parallelize checksum computation and overlap it with I/O operations to mitigate the overhead caused by I/O reordering. The experimental results show that the proposed scheme reduces the entire data transfer time by up to 62% compared with the existing schemes while ensuring robust data integrity. With the prototype implementation, our scheme detects failures on NAND flash memory inside storage devices that cannot be detected with the existing schemes.
引用
收藏
页码:36350 / 36361
页数:12
相关论文
共 50 条
  • [21] KEY MANAGEMENT SCHEME FOR END-TO-END ENCRYPTION AND A FORMAL VERIFICATION OF ITS SECURITY.
    Kasami, Tadao
    Yamamura, Saburo
    Mori, Kenichi
    Systems, computers, controls, 1982, 13 (03): : 59 - 69
  • [22] GENERATIVE ADVERSARIAL SPEAKER EMBEDDING NETWORKS FOR DOMAIN ROBUST END-TO-END SPEAKER VERIFICATION
    Bhattacharya, Gautam
    Monteiro, Joao
    Alam, Jahangir
    Kenny, Patrick
    2019 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2019, : 6226 - 6230
  • [23] Efficient and Robust LiDAR-Based End-to-End Navigation
    Liu, Zhijian
    Amini, Alexander
    Zhu, Sibo
    Karaman, Sertac
    Han, Song
    Rus, Daniela L.
    2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, : 13247 - 13254
  • [24] A Reference Resource Based End-to-End Image Compression Scheme
    Yin, Wenbin
    Fan, Xiaopeng
    Shi, Yunhui
    Zuo, Wangmeng
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING, PT I, 2018, 11164 : 534 - 544
  • [25] Data Forwarding Scheme to Minimize End-to-End Delay in Opportunistic Networks
    Arastouie, Narges
    Sabaei, Masoud
    2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 1 - 5
  • [26] A robust and interpretable, end-to-end deep learning model for cytometry data
    Hu, Zicheng
    Tang, Alice
    Singh, Jaiveer
    Bhattacharya, Sanchita
    Butte, Atul
    JOURNAL OF IMMUNOLOGY, 2020, 204 (01):
  • [27] A robust and interpretable end-to-end deep learning model for cytometry data
    Hu, Zicheng
    Tang, Alice
    Singh, Jaiveer
    Bhattacharya, Sanchita
    Butte, Atul J.
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 2020, 117 (35) : 21373 - 21380
  • [28] MQTT-I: Achieving End-to-End Data Flow Integrity in MQTT
    Buccafurri, Francesco
    De Angelis, Vincenzo
    Lazzaro, Sara
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4717 - 4734
  • [29] A new FTL-based flash memory management scheme for flash-based storage systems
    Yang, Yin
    Li, Wenyi
    Wang, Kai
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1000 - +
  • [30] END-TO-END ATTENTION BASED TEXT-DEPENDENT SPEAKER VERIFICATION
    Zhang, Shi-Xiong
    Chen, Zhuo
    Zhao, Yong
    Li, Jinyu
    Gong, Yifan
    2016 IEEE WORKSHOP ON SPOKEN LANGUAGE TECHNOLOGY (SLT 2016), 2016, : 171 - 178