Architectural Choices in LOCKSS Networks

Total Page:16

File Type:pdf, Size:1020Kb

Architectural Choices in LOCKSS Networks Architectural Choices in LOCKSS Networks David S. H. Rosenthal Stanford University Libraries Abstract 2 Existing Networks The LOCKSS digital preservation technology collects, To illustrate the differences between the various net- preserves and disseminates content in peer-to-peer net- works we describe three examples, the GLN and the works. Many such networks are in use. The Global CLOCKSS network, both preserving e-journals and e- LOCKSS Network (GLN) is an open network with many books, and Data-PASS, a PLN preserving social science nodes in which libraries preserve academic journals and data. Social science data has to be preserved in confor- books that they purchase. The CLOCKSS network is mity with one set of laws, governing for example the a closed network, managed by a non-profit consortium storage and dissemination of personal information. E- of publishers and libraries to form a dark archive of e- journals and e-books have to be preserved in conformity journal content. There are also many Private LOCKSS with a different legal framework, copyright law. This is Networks (PLNs) preserving various genres of content. one major reason for the differences between the config- Each of these networks is configured to meet the urations of these networks. specific requirements of its community and the content it preserves. This paper describes these architectural 2.1 The Global LOCKSS Network choices and discusses a development that could enable other configurations. The LOCKSS technology was invented in 1997 as a re- sponse to librarians’ concerns about long-term access to the journal content to which they subscribe [10]. The transition of this content from paper to the Web, while 1 Introduction greatly improving the reader’s experience, forced li- braries to switch from owning a copy of the content to The LOCKSS (Lots Of Copies Keep Stuff Safe) digital leasing access to the publisher’s copy. Future readers’ preservation technology collects, preserves and dissemi- access would be at the mercy of the publisher’s whim. nates content in peer-to-peer networks. Many such net- The idea behind the LOCKSS technology was to repli- works are in use. The Global LOCKSS Network (GLN) cate in the Web world the way that the system worked in is an open network with many nodes in which libraries the paper world. Each library would run a LOCKSS box, preserve academic journals and books that they purchase. the Web analog of its stacks. The library’s box would ob- The CLOCKSS network is a closed network, currently of tain a copy of the subscribed content from the publisher 12 nodes, managed by a non-profit consortium of pub- and keep it for as long as the library wanted. If, for any lishers and libraries to form a dark archive of e-journal reason, the library’s readers were unable to access the content. There are also many Private LOCKSS Networks publisher’s copy they would instead be provided access (PLNs) preserving various genres of content. to the library’s copy. Each of these networks is configured to meet the spe- In principle, the engineering to implement this model cific requirements of its community and the content it was simple. The Web pipeline from the publisher to preserves. We describe these architectural choices and the reader’s browser already contained a number of Web discuss a development under investigation in a number caches with temporary copies of Web content. All that of countries that could enable alternative configurations was needed was to build a Web cache with two additional that might be more suitable in some circumstances. properties: 1 • It would be pre-loaded; content would arrive in avoided this. The LOCKSS team negotiated with the the cache not because a human had requested their publishers on behalf of all libraries using the system. By browser to display it, but because a specialized Web amortizing one negotiation across all the libraries wish- crawler designed to exhaustively visit every page ing to preserve a publisher’s content, the system was eco- of each subscribed journal had requested it. This nomically viable even for small and open access publish- was necessary to ensure that the library acquired a ers. It did not have to charge the publishers fees to have copy of all the content to which it subscribed, much their content preserved. of which the library’s readers would never actually Very early in the LOCKSS Program’s history it was read. In the paper world libraries had a process one of six initial e-journal projects funded by the Mel- called ”claiming the serials” in which staff ensured lon Foundation. The other five all envisaged a central, that the library had received every issue of every third-party archive obtaining a copy from the publisher journal they purchased. and supplying it to a library’s reader if, for example, the library’s subscription had lapsed. Obtaining permission • It would be persistent; content that arrived in the to take the publisher’s content and re-publish it for the cache would stay there instead of being displaced financial benefit of the third-party archive proved very by more recent content. This was necessary to en- difficult. Eventually, the difficulty was overcome with sure the library continued to own a copy of the con- the advent of the Portico archive [9]. tent to which it subscribed; it meant that the cache On the other hand, because the LOCKSS system re- would grow steadily in size as new content was pub- quired each library to use the content they collected only lished. In the paper world journal content gradually for their own readers, publishers understood that this did accumulated along shelves in the stacks. not compete with them or materially increase the risk of Even in 1998, Web crawlers and persistent storage were leakage. This made the negotiation much easier, and less off-the-shelf techniques. The innovative part of the expensive. LOCKSS technology was to combine them in a way that Publishers agreeing to their journals being preserved minimized the cost to a library of deploying the technol- put a statement on the journal’s Web site, visible only ogy. It did so in two ways: by reducing the up-front cost to readers with a valid subscription, granting permis- of obtaining permission from the publisher for the sys- sion. Each LOCKSS box, before attempting to collect tem to make and keep copies of their copyright content, any content from the journal, checks that the permission and by reducing the capital and operational costs of sub- statement is visible, and preserves it along with the con- sequently keeping those copies safe from harm. tent to which it relates as evidence that those copies were made with permission. 2.1.1 Obtaining Permission In this way, the collected content at each library serves as a database showing which libraries had valid access In the US the Digital Millennium Copyright Act to which content when, in addition to its use in provid- (DMCA) means that libraries and, more to the point, the ing the library’s readers with access if they cannot obtain developers of the software, would be criminally liable if it from the publisher. There is no need for an external they kept a copy of content obtained from the Web longer database of access rights. This was essential, since at than specified by the HTTP Cache-Control header. This that time (and in most cases even now) no such database threat was the most important factor in the architecture was available. of the LOCKSS software. There are two ways to avoid the DMCA liability. Web archives such as the Internet Archive use the ”safe har- 2.1.2 Preserving the Copies bor” provision, under which they are required to delete Libraries subscribe to journals that serve their readers’ the copy if the copyright owner sends them a take-down interests. Because these interests overlap, library sub- 1 notice . This provision would not provide libraries ade- scriptions overlap. The overlap is greater for important quate assurance against disputes with journal publishers. journals, and lower for less important journals. As each The alternative is to obtain permission from the pub- library kept its own copy of the content to which it sub- lisher. A system in which each library had to negotiate scribed, the system as a whole had many copiesof impor- individually with each journal would clearly be too ex- tant journals, and fewer for less important journals. But pensive to be viable. The architecture of the GLN in overall, in comparison to the levels of replication found which each library’s LOCKSS box obtains its content in other reliable distributed systems, the LOCKSS sys- from the publisher using the library’s subscription access tem had an abundance of replicas of the content it was 1In practice, anyone representing themselves as the copyright owner preserving. can do this; the archive lacks the resources to verify ownership. Both because libraries’ resources are under stress, and 2 because the system envisaged an abundance of copies, it a strong business model, their journals are at low risk of was important to minimize the per-copy cost of the sys- loss. tem. As the number of replicas in a system increases, The less important journals are typically published in- the effect on the reliability of the system of an individual dividually from an idiosyncratic Web server. Thus one replica’s failure decreases. Because the GLN had a large negotiation and one technical effort results in one jour- numberof replicas, it did not need each replica to be very nal being preserved.
Recommended publications
  • The Persistence of Open Access Electronic Journals Elizabeth A
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by DigitalCommons@Florida International University Florida International University FIU Digital Commons Works of the FIU Libraries FIU Libraries 2016 The persistence of open access electronic journals Elizabeth A. Lightfoot Florida International University, [email protected] Follow this and additional works at: http://digitalcommons.fiu.edu/glworks Part of the Collection Development and Management Commons, and the Scholarly Publishing Commons Recommended Citation Elizabeth A. Lightfoot , (2016),"The persistence of open access electronic journals", New Library World, Vol. 117 Iss 11/12 pp. 746 - 755 This work is brought to you for free and open access by the FIU Libraries at FIU Digital Commons. It has been accepted for inclusion in Works of the FIU Libraries by an authorized administrator of FIU Digital Commons. For more information, please contact [email protected]. The Persistence of Open Access Electronic Journals Author Details: Elizabeth A. Lightfoot University Libraries; Florida International University; Miami; Florida; USA [email protected] Biographical Details: Elizabeth Lightfoot is the electronic resources librarian and serials coordinator at Florida International University. She has a background in serials acquisitions, with primary interest in the management and sustainability of serials and e-resources. Structured Abstract: Purpose – Open access (OA) electronic journals have been identified as potentially at risk of loss without more coordinated preservation efforts. The purpose of this paper is to test the current availability of OA electronic journals indexed in the Directory of Open Access Journals (DOAJ). Design/methodology/approach – Using publicly available journal metadata downloaded from DOAJ, individual journal URLs were tested for validity and accessibility using a Microsoft Excel Visual Basic for Applications macro.
    [Show full text]
  • A Guide to Distributed Digital Preservation
    A Guide to Distributed Digital Preservation Copyright © 2010 This collection is covered by the following Creative Commons License: Attribution-NonCommercial-NoDerivs 3.0 License You are free to copy, distribute, and display this work under the following conditions: Attribution. You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). Specifically, you must state that the work was originally published in A Guide to Distributed Digital Preservation (2010), Katherine Skinner and Matt Schultz, eds., and you must attribute the individual author(s). Noncommercial. You may not use this work for commercial purposes. No Derivative Works. You may not alter, transform, or build upon this work. For any reuse or distribution, you must make clear to others the license terms of this work. Any of these conditions can be waived if you get permission from the copyright holder. Nothing in this license impairs or restricts the author’s moral rights. The above is a summary of the full license, which is available at the following URL: http://creativecommons.org/licenses/by-nc-nd/3.0/legalcode Publication and Cataloging Information: ISBN: 978-0-9826653-0-5 Editors: Katherine Skinner Matt Schultz Copyeditor: Susan Wells Parham Publisher: Educopia Institute Atlanta, GA 30309 TABLE OF CONTENTS Acknowledgements ................................................................................................... vii Road Map ....................................................................................................................ix
    [Show full text]
  • States of Sustainability:A Review of State Projects
    States of Sustainability: A Review of State Projects funded by the National Digital Information Infrastructure and Preservation Program (NDIIPP) May 2012 Christopher A. Lee University of North Carolina at Chapel Hill Lee, Christopher A. “States of Sustainability: A Review of State Projects funded by the National Digital Information Infrastructure and Preservation Program (NDIIPP).” Chapel Hill, NC: University of North Carolina, 2012. Attribution-NonCommercial CC BY-NC Revision History Final review draft distributed to all project partners February 6, 2012 Final report completed March 22, 2012 Final report published April 2, 2012 Final report updated - two sentences revised to clarify PeDALS May 8, 2012 project licensing arrangements and implementation of LOCKSS 1 Contents Executive Summary ........................................................................................................................ 5 Overview of the Four NDIIPP States Projects ................................................................................ 8 Geospatial Multistate Archive and Preservation Partnership (GeoMAPP) ................................ 9 A Model Technological and Social Architecture for the Preservation of State Government Digital Information (MTSA) ....................................................................................................... 9 Multi-State Preservation Partnership (MSPP)........................................................................... 10 Persistent Digital Archives and Library System (PeDALS) ....................................................
    [Show full text]
  • LOCKSS: Lots of Copies Keep Stuff Safe
    LOCKSS: Lots Of Copies Keep Stuff Safe David S. H. Rosenthal LOCKSS Program, Stanford University Libraries, CA Abstract Journal of Biological Chemistry. The sudden advent and im- Over the last 12 years the LOCKSS Program at Stanford mediate popularity of the Web versions of expensive and impor- has developed and deployed an open source, peer-to-peer tant academic journals forced an unexpected and unwelcome transition upon librarians: from purchasing a copy of the jour- system now comprising about 200 LOCKSS boxes in li- nal to renting access to the publisher’s copy. While rental sat- braries around the world preserving a wide range of web- isfied the librarians’ responsibility to current readers, it did not published content. Initially supported by NSF, and sub- satisfy their responsibility to future readers. It did not provide sequently by the Mellon Foundation, Sun Microsystems “perpetual access”. and NDIIPP, the program has since 2004 been sustain- able, funded by the libraries using it. The program won 2 Design an ACM award for breakthrough research in fault and at- One way to satisfy the goal of providing libraries with perpet- tack resistance in peer-to-peer systems. ual access to the e-journal content to which they subscribed Since it was designed initially for e-journals, the sys- was commonly suggested. This involved the concept of a third- tem’s design is unusual; it is driven primarily by copy- party archive, which would acquire e-journal content from the right law. The design principles were: publisher and re-publish it. In addition to subscribing to the journal itself, libraries would subscribe to the archive.
    [Show full text]
  • A Model for Integrating the Publication and Preservation of Journal Articles
    A Model for Integrating the Publication and Preservation of Journal Articles © Kevin S. Hawkins University of Michigan, Ann Arbor [email protected] Abstract [4], and Portico [5] in order to guarantee that one or more copy of the content will become available if it is There are policy, technical, and workflow gaps no longer available from the publisher. Similarly, the in library efforts to preserve online journal Koninklijke Bibliotheek and Elsevier reached an literature. Since libraries are increasingly agreement in 2002 whereby the KB will preserve involved in journal publishing, HathiTrust, a Elsevier journals under terms similar to those governing shared preservation-quality digital repository, journals that use LOCKSS, CLOCKSS, and Portico [6]. is a natural place to archive and provide access Still, there are problems with these models. LOCKSS to journal literature to ensure its long-term and CLOCKSS use web crawling, which captures only preservation and discoverability. The U-M the appearance of webpages but not their underlying Library is funding the creation of mPach, an structure or search functionality. Portico and the KB, on open-source, end-to-end publishing system in the other hand, rely on publishers to deliver journal which archiving in HathiTrust happens as a articles in valid file formats, and not just the version byproduct of publication rather than being first published but also any corrected versions of these carried out after the fact. The architecture of articles. mPach, its envisioned workflow, and plans for One way to ensure that a library always has access creating a shared infrastructure for publishing to the latest content is for the library to operate the very open-access journals are all summarized.
    [Show full text]
  • Abstract Systems Interoperability and Collaborative Development for Web
    Abstract Systems Interoperability and Collaborative Development for Web Archiving As the Web becomes the medium of record for many types of information, web archiving is an increasingly vital function of memory institutions. In furtherance of the National Digital Platform priority of IMLS, this project seeks funding to expand national web archiving capacity by undertaking research that will build a foundation for collaborative technology development, improved systems interoperability, and an Application Programming Interface (API) based model for enhanced access to, and research use of, web archives. The project team consists of Internet Archive (Archive-It) as lead institution partnering with Stanford University Libraries (both DLSS and LOCKSS), University of North Texas, and Rutgers University. This two-year research project will outline successful community models for cooperative technology development work, prototype and test API-based interoperability, and explore how interoperability can enable new access models, improve discoverability, and expand shared digital services. The practice of archiving web content poses severe programmatic and technical challenges to institutions, given its considerable infrastructure and engineering requirements; the dynamic, evolving nature of the Web; and the sheer volume and complexity of born-digital materials being collected. These high barriers to entry help explain why Archive-It (https://archive-it.org) is the overwhelming web archiving solution of choice. Yet, the ease of entry into web archiving via Archive-It has not spurred investment in local preservation or sustained collaborative technology development. Given this landscape, the assembled project partners would pursue design-based research and development to prototype API-enabled interoperability and research and test economic and community models to support collaborative development.
    [Show full text]
  • Maintaining the Integrity of Digital Archives
    Maintaining the Integrity of Digital Archives June M. Besek, Philippa S. Loengard and Jane C. Ginsburg Kernochan Center for Law, Media and the Arts 435 West 116th Street, Box A-17 New York, NY 10027 (212) 854-9869 MAINTAINING THE INTEGRITY OF DIGITAL ARCHIVES June M. Besek, Philippa S. Loengard and Jane C. Ginsburg1 Table of Contents Acknowledgements iii Executive Summary v 1.0 Introduction 1 2.0 Material Removed from Databases and Archives 4 3.0 Archives and Digital Archives 9 4.0 The Legal Landscape 12 Copyright Law and Archives Legislation 12 Moral Rights 43 Defamation 46 Mistake of Fact 55 Invasion of Privacy 57 Censorship 61 Internet Service Provider Limitation of Liability 64 Summary and Conclusions; International Law Considerations 65 5.0 How Libraries and Archives Encounter Removal 66 6.0 Development of Guidelines to Govern Publisher Retraction and Removal 70 7.0 Libraries’ Contracts with Publishers 73 8.0 Digital Archives: Reducing the Risk of Removal 80 9.0 Other Challenges to the Integrity of the Scholarly Record 89 10.0 Recommendations 90 Appendices App.-1 i ii Acknowledgements We would also like to acknowledge the many people who generously shared their time and expertise with us during the course of our study, including Joseph Branin, Ohio State University Libraries; Beverly Brown, NRC-CISTI; Mimi Calter, Stanford University Libraries; Stephen Chapman, Preservation Librarian for Digital Initiatives, Harvard University Library; Kenneth Crews, Professor of Law and Director, Copyright Management Center, IUPUI; Patricia Cruse,
    [Show full text]
  • Building and Preserving Library Digital Collections Through Community Collaboration
    Building and Preserving Library Digital Collections Through Community Collaboration Victoria Reich Executive Director, LOCKSS Program, Stanford University Libraries Abstract Traditionally, libraries in the paper world were responsible for the safekeeping of much of society’s cultural memory. They did this by building local collections, primarily to provide current local readers with rapid, convenient access to content. However, an important side effect of these local collections was a robust system for preserving the printed, and paper-based record for future readers. There were many copies of the content, on a durable, tamper-evident medium, under many separate administrations, with catalogue systems capable of directing a reader to a nearby copy. Over the last two decades, the transition from paper-based publishing to Web publishing changed models for access and preservation for libraries. Instead of purchasing a copy, libraries now lease access to the publisher's copy. This has made preserving the contemporary published record more difficult, in these ways: Unlike paper, the publisher maintains the only legal long-term copies, and the publisher can alter or destroy them at will; Copyright law makes it problematic, if not impossible, to maintain other copies without specific permission from the publisher; Unlike paper, the copies are on a fragile, easily alterable medium with a short service life (magnetic disk or tape); Unlike paper, the format of the copies is expected to become rapidly obsolete. Preparations for this eventuality are expensive. The paper reviews these challenges, describing how the collaboration between libraries underlying the LOCKSS program enables each challenge to be addressed successfully. Author Victoria Reich is Executive Director of the LOCKSS Program, Stanford University Library, [www.lockss.org].
    [Show full text]
  • Preserving Our Digital Heritage: the National
    Preserving Our Digital Heritage: The National Digital Information Infrastructure and Preservation Program 2010 Report A Collaborative Initiative of The Library of Congress First issued, January 2011 ii Contents I. Executive Summary ....................................................................................... 1 A. What Is at Stake ...................................................................................... 1 B. NDIIPP Legislation ................................................................................ 1 C. Key Outcomes and Findings ................................................................ 2 D. Moving Forward .................................................................................... 4 E. Securing Knowledge for the Future .................................................... 7 II. Understanding the Digital Information Needs of the Nation .............. 9 A. The Preservation Challenge for the Nation ...................................... 10 B. Congressional Charge to the Library ................................................ 13 C. National Plan for Preservation ........................................................... 15 D. Implementing the Plan ........................................................................ 16 III. Building the National Digital Preservation Network .......................... 21 A. Stewardship Network ......................................................................... 21 B. National Digital Collection ................................................................
    [Show full text]
  • LOCKSS Boxes in the Cloud
    LOCKSS Boxes in the Cloud David S. H. Rosenthal Daniel L. Vargas LOCKSS Program, Stanford University Libraries, CA Abstract These and other libraries asked whether they could use “afford- The LOCKSS system is a leading technology in the able cloud storage” for their LOCKSS boxes. The Library of field of Distributed Digital Preservation. Libraries run Congress funded the LOCKSS team to investigate this ques- tion, and this is the final report of this work. LOCKSS boxes to collect and preserve content published on the Web in PC servers with local disk storage. They We first describe the relevant features of typical cloud ser- vices, then discuss the various possible technical architectures form nodes in a network that continually audits their by which a LOCKSS box could use such a service, ruling content and repairs any damage. Libraries wondered some out for performance reasons. Applying the typical ser- whether they could use cloud storage for their LOCKSS vice’s charging model to the remaining architectures rules oth- boxes instead of local disks. We review the possible ers out for economic reasons. We then describe an experiment configurations, evaluate their technical feasibility, assess in which we implemented the most cost-effective architecture their economic feasibility, report on an experiment in and ran a production LOCKSS box preserving GLN content which we ran a production LOCKSS box in Amazon’s in Amazon’s cloud service for several months. We report on cloud, and describe some simulations of future costs of the pricing history of cloud storage, using it and the costs from cloud and local storage.
    [Show full text]
  • Open Is Not Forever: a Study of Vanished Open Access Journals
    Received: 3 September 2020 Revised: 28 December 2020 Accepted: 25 January 2021 DOI: 10.1002/asi.24460 RESEARCH ARTICLE Open is not forever: A study of vanished open access journals Mikael Laakso1 | Lisa Matthias2 | Najko Jahn3 1Information Systems Science, Hanken School of Economics, Helsinki, Finland Abstract 2Department of Political Science, John The preservation of the scholarly record has been a point of concern since the F. Kennedy Institute, Freie Universität beginning of knowledge production. With print publications, the responsibility Berlin, Berlin, Germany rested primarily with librarians, but the shift toward digital publishing and, in 3Göttingen State and University Library, particular, the introduction of open access (OA) have caused ambiguity and University of Göttingen, Göttingen, Germany complexity. Consequently, the long-term accessibility of journals is not always guaranteed, and they can even disappear from the web completely. The focus Correspondence Mikael Laakso, Information Systems of this exploratory study is on the phenomenon of vanished journals, some- Science, Hanken School of Economics, thing that has not been carried out before. For the analysis, we consulted sev- Arkadiankatu 22, 00100 Helsinki, eral major bibliographic indexes, such as Scopus, Ulrichsweb, and the Finland. Email: [email protected] Directory of Open Access Journals, and traced the journals through the Inter- net Archive's Wayback Machine. We found 174 OA journals that, through lack of comprehensive and open archives, vanished from the web between 2000 and 2019, spanning all major research disciplines and geographic regions of the world. Our results raise vital concern for the integrity of the scholarly record and highlight the urgency to take collaborative action to ensure contin- ued access and prevent the loss of more scholarly knowledge.
    [Show full text]