De Casa a La Nube: Cloud Comunitaria Y Servicios Distribuidos IPFS

Total Page:16

File Type:pdf, Size:1020Kb

De Casa a La Nube: Cloud Comunitaria Y Servicios Distribuidos IPFS De casa a la nube: Cloud comunitaria y servicios distribuidos IPFS Leopoldo Álvarez Huerta Grado de Tecnologías de Telecomunicación Área de Aplicaciones y Sistemas Distribuidos Félix Freitag Joan Manuel Marquès Puig Enero 2019 i Esta obra está sujeta a una licencia de Reconocimiento-NoComercial- SinObraDerivada 3.0 España de Creative Commons ii A Aida, a mis padres y a mi hermano: Por darme todo su apoyo. Por soportarme, tanto en los buenos momentos como en los menos buenos. A Juan Alonso y a Fernando: Por prestarme su ayuda siempre que la he necesitado. Por cederme una RPI remota. A mis amigos y compañeros: Por tener paciencia y aguantar mis locuras. A Félix Freitag: Por sus consejos, valoraciones, y haberme dado luz en momentos de oscuridad. Porque sin todos vosotros, no hubiese sido posible. iii FICHA DEL TRABAJO FINAL De casa a la nube: Cloud comunitaria y Título del trabajo: servicios distribuidos con IPFS Nombre del autor: Leopoldo Álvarez Huerta Nombre del consultor: Félix Freitag Fecha de entrega (mm/aaaa): 01/2019 Área del Trabajo Final: Aplicaciones y Sistemas Distribuidos Titulación: Grado de Tecnologías de Telecomunicación Resumen del Trabajo (máximo 250 palabras): En los últimos años, el número de dispositivos conectados a la red ha crecido notablemente, y ligado a ello, han evolucionado las infraestructuras y los servicios desplegados sobre las mismas. Los requisitos de accesibilidad, disponibilidad, adaptabilidad, y, en definitiva, la manera continua, y de forma remota, de explotar los servicios; desde visualización de contenidos, almacenamiento compartido, hasta soluciones distribuidas de ofimática o servicios de mensajería, han impactado directamente sobre los centros de datos. La tendencia conocida como Edge Computing ha generado una descentralización de los datacenter, propiciando la creación de microcentros más cerca de los datos, los cuales utilizan servicios que recogen y procesan la información prácticamente en tiempo real y, cada vez más, apoyándose en una cloud. Este modelo favorece el envío de la información, a un único punto virtual, logrando que los datos estén distribuidos en varios centros, en una infraestructura distribuida y flexible, siendo objetivo de este trabajo extrapolar este modelo a entornos domésticos, de uso acotado y colaborativo. Este trabajo está formado por una componente práctica; instalación, despliegue, y evaluación de una microcloud en un entorno de Smart Home, basada en productos abiertos como Cloudy, Docker, Orbit, IPFS-Cluster, Stack ELK, sobre iv hardware ARM como son las Raspberry PI, y otra componente teórica, de investigación. En el aspecto teórico, se realiza un acercamiento a IPFS y su campo de aplicación desde entornos computacionales reducidos, como el desplegado en el trabajo, hasta Internet 3.0. Abstract (in English, 250 words or less): Nowadays, the number of devices connected to the network has grown significantly, and linked to this, the infrastructures and services which have deployed on them have evolved. The requirements of accessibility, availability, adaptability, and the continuous and remotely way of exploiting the services; from content visualization, shared storage, to distributed office automation solutions or messaging services, have directly impacted on the datacenters. The trend known as Edge computing has generated a decentralization of the datacenter, favoring the creation of microcenters closer to the data, which use services that collect and process information practically in real time and, increasingly, relying on a cloud. This model favors the sending of information to a single virtual point, achieving that the data is distributed in several centers, in a distributed and flexible infrastructure, being the objective of this work to extrapolate this model to domestic environments, of limited and collaborative use. This work is formed by a practical component; installation, deployment, and evaluation of a microcloud in a Smart Home environment, based on open products such as Cloudy, Docker, Orbit, IPFS-Cluster, Stack ELK, on ARM hardware such as Raspberry PI, and another theoretical, research component. The theoretical aspect is an approach to IPFS, and its field of application, from small computational environments, such as the one that has deployed at work, to Internet 3.0. Palabras clave (entre 4 y 8): Cloudy, microCloud, Docker, Raspberry, IPFS, Orbit, Edge Computing v Índice Lista de figuras ................................................................................................. 7 1. Introducción .................................................................................................... 1 1.1 Contexto y justificación del Trabajo ........................................................... 1 1.2 Objetivos del Trabajo ................................................................................. 3 1.3 Enfoque y método seguido ........................................................................ 4 1.4 Planificación del Trabajo ........................................................................... 4 1.4.1 Planificación del Trabajo. EDT ............................................................... 5 1.4.2 Planificación del Trabajo. Gantt .............................................................. 5 1.5 Breve sumario de productos obtenidos ..................................................... 6 1.6 Breve descripción de los otros capítulos de la memoria............................ 6 2. Estado actual. ................................................................................................. 8 3. Diseño del sistema ....................................................................................... 15 3.1 Diseño físico ............................................................................................ 15 3.1.1 Rasperry PI 3B ..................................................................................... 16 3.1.2 Rasperry PI 3B+ ................................................................................... 17 3.1.2 AMD Athlon 2400 XP ............................................................................ 18 3.1.3 Cisco EPC 3925 EuroDocsis ................................................................ 18 3.2 Diseño lógico ........................................................................................... 19 3.2.1 Cloudy .................................................................................................. 20 3.2.1.1 Motivaciones de la distribución Cloudy .............................................. 21 3.2.1.2 Arquitectura Cloudy ........................................................................... 22 4. Servicios distribuidos e IPFS ........................................................................ 23 4.1 Diseño IPFS ............................................................................................ 26 4.2 IPFS e Internet ........................................................................................ 28 4.3 Servicio IPFS Cluster .............................................................................. 30 4.4 Servicio IPFS-Log ................................................................................... 33 4.5 IPFS en Cloudy ....................................................................................... 34 4.6 Servicio Orbit ........................................................................................... 34 4.7 Servicio OrbitDB ...................................................................................... 36 4.8 Servicio eChat ......................................................................................... 37 4.9 Serf .......................................................................................................... 38 4.10 Serf en Cloudy ....................................................................................... 39 5. Implantación: Instalación, configuración y despliegue .................................. 39 5.1 Instalación del sistema operativo ............................................................ 39 5.2 Instalación Cloudy. “Cloudynizar” ............................................................ 41 5.3 Instalación Docker ................................................................................... 43 5.4 Instalación software adicional .................................................................. 44 5.4.1 OpenVPN ............................................................................................. 44 5.4.2 XRDP y TightVNC ................................................................................ 45 5.4.3 NPM ..................................................................................................... 46 5.5 Instalación IPFS ...................................................................................... 47 5.6.1 Instalación IPFS-Cluster ....................................................................... 48 5.6.2 Configuración clúster privado con IPFS-Cluster ................................... 51 5.6.2 Instalación Go IPFS.............................................................................. 53 5.7 Despliegue servicios Docker. “Dockerización” ........................................ 53 5.7.1 Despliegue ELK (ElasticSearch) .......................................................... 53 5.7.2 Despliegue OrbitDB .............................................................................. 56 vi 5.7.3 Despliegue Orbit ................................................................................... 59 5.7.4
Recommended publications
  • High Velocity Kernel File Systems with Bento
    High Velocity Kernel File Systems with Bento Samantha Miller, Kaiyuan Zhang, Mengqi Chen, and Ryan Jennings, University of Washington; Ang Chen, Rice University; Danyang Zhuo, Duke University; Thomas Anderson, University of Washington https://www.usenix.org/conference/fast21/presentation/miller This paper is included in the Proceedings of the 19th USENIX Conference on File and Storage Technologies. February 23–25, 2021 978-1-939133-20-5 Open access to the Proceedings of the 19th USENIX Conference on File and Storage Technologies is sponsored by USENIX. High Velocity Kernel File Systems with Bento Samantha Miller Kaiyuan Zhang Mengqi Chen Ryan Jennings Ang Chen‡ Danyang Zhuo† Thomas Anderson University of Washington †Duke University ‡Rice University Abstract kernel-level debuggers and kernel testing frameworks makes this worse. The restricted and different kernel programming High development velocity is critical for modern systems. environment also limits the number of trained developers. This is especially true for Linux file systems which are seeing Finally, upgrading a kernel module requires either rebooting increased pressure from new storage devices and new demands the machine or restarting the relevant module, either way on storage systems. However, high velocity Linux kernel rendering the machine unavailable during the upgrade. In the development is challenging due to the ease of introducing cloud setting, this forces kernel upgrades to be batched to meet bugs, the difficulty of testing and debugging, and the lack of cloud-level availability goals. support for redeployment without service disruption. Existing Slow development cycles are a particular problem for file approaches to high-velocity development of file systems for systems.
    [Show full text]
  • Comparison of Kernel and User Space File Systems
    Comparison of kernel and user space file systems — Bachelor Thesis — Arbeitsbereich Wissenschaftliches Rechnen Fachbereich Informatik Fakultät für Mathematik, Informatik und Naturwissenschaften Universität Hamburg Vorgelegt von: Kira Isabel Duwe E-Mail-Adresse: [email protected] Matrikelnummer: 6225091 Studiengang: Informatik Erstgutachter: Professor Dr. Thomas Ludwig Zweitgutachter: Professor Dr. Norbert Ritter Betreuer: Michael Kuhn Hamburg, den 28. August 2014 Abstract A file system is part of the operating system and defines an interface between OS and the computer’s storage devices. It is used to control how the computer names, stores and basically organises the files and directories. Due to many different requirements, such as efficient usage of the storage, a grand variety of approaches arose. The most important ones are running in the kernel as this has been the only way for a long time. In 1994, developers came up with an idea which would allow mounting a file system in the user space. The FUSE (Filesystem in Userspace) project was started in 2004 and implemented in the Linux kernel by 2005. This provides the opportunity for a user to write an own file system without editing the kernel code and therefore avoid licence problems. Additionally, FUSE offers a stable library interface. It is originally implemented as a loadable kernel module. Due to its design, all operations have to pass through the kernel multiple times. The additional data transfer and the context switches are causing some overhead which will be analysed in this thesis. So, there will be a basic overview about on how exactly a file system operation takes place and which mount options for a FUSE-based system result in a better performance.
    [Show full text]
  • Software Defined Storage Overview
    Software Defined Storage Overview August 2019 Juan Jose Floristan Cloud Specialist Solution Architect 1 AGENDA 1. Why Red Hat Storage? 2. Red Hat Ceph Storage 3. Red Hat Gluster Storage 4. Red Hat Openshift Container Storage 2 Why Red Hat Storage? 3 Why Red Hat Storage? STORAGE IS EVOLVING TRADITIONAL STORAGE OPEN, SOFTWARE-DEFINED STORAGE Complex proprietary silos Standardized, unified, open platforms USER USER USER USER ADMIN Control Plane (API, GUI) ADMIN ADMIN ADMIN Software Ceph Gluster +++ Open Source Custom GUI Custom GUI Custom GUI Proprietary Hardware Proprietary Hardware Proprietary Hardware Standard Computers and Disks Proprietary Proprietary Proprietary Standard Hardware Software Software Software 4 Why Red Hat Storage? WHY THIS MATTERS PROPRIETARY Common, Lower cost, standardized supply chain HARDWARE off-the-shelf hardware SCALE-UP Scale-out Increased operational flexibility ARCHITECTURE architecture HARDWARE-BASED Software-based More programmability, agility, INTELLIGENCE intelligence and control CLOSED DEVELOPMENT Open development More flexible, well-integrated PROCESS process technology 5 Why Red Hat Storage? A RISING TIDE Software-Defined Storage is leading SDS-P MARKET SIZE BY SEGMENT $1,395M a shift in the global storage industry, Block Storage File Storage $1,195M with far-reaching effects. Object Storage $1,029M Hyperconverged “By 2020, between 70%-80% of unstructured $859M data will be held on lower-cost storage managed $705M $592M by SDS.” $475M Innovation Insight: Separating Hype From Hope for Software-Defined Storage “By 2019, 70% of existing storage array products will also be available as software-only versions.” 2013 2014 2015 2016 2017 2018 Innovation Insight: Separating Hype From Hope for Software-Defined Storage 2019 Source: IDC 6 Why Red Hat Storage? THE RED HAT STORAGE MISSION To offer a unified, open software-defined storage portfolio that delivers a range of data services for next generation workloads, thereby accelerating the transition to modern IT infrastructures.
    [Show full text]
  • Lamassu: Storage-Efficient Host-Side Encryption
    Lamassu: Storage-Efficient Host-Side Encryption Peter Shah and Won So NetApp Inc. Abstract moves downstream through the stack. This strategy can Many storage customers are adopting encryption solu- take many forms, such as built-in application encryption, tions to protect critical data. Most existing encryption OS-based file system encryption or VM-level encryp- solutions sit in, or near, the application that is the source tion [3, 19, 22]. We term any encryption that runs on of critical data, upstream of the primary storage system. the same physical hardware as the primary application Placing encryption near the source ensures that data re- data-source encryption. mains encrypted throughout the storage stack, making it In general, existing data-source encryption solutions easier to use untrusted storage, such as public clouds. interfere with content-driven data management features Unfortunately, such a strategy also prevents down- provided by storage systems — in particular, deduplica- stream storage systems from applying content-based fea- tion. If a storage controller does not have access to the tures, such as deduplication, to the data. In this paper, we keys used to secure data, it cannot compare the contents present Lamassu, an encryption solution that uses block- of encrypted data to determine which sections, if any, are oriented, host-based, convergent encryption to secure duplicates. data, while preserving storage-based data deduplication. In this paper, we present an alternative encryption Unlike past convergent encryption systems, which typi- strategy that provides the benefits of upstream encryp- cally store encryption metadata in a dedicated store, our tion while preserving storage-based data deduplication system transparently inserts its metadata into each file’s on downstream storage.
    [Show full text]
  • D3.5 Design and Implementation of P2P Infrastructure
    INNOVATION ACTION H2020 GRANT AGREEMENT NUMBER: 825171 WP3 – Vision Materialisation and Technical Infrastructure D3.5 – Design and implementation of P2P infrastructure Document Info Contractual Delivery Date: 31/12/2019 Actual Delivery Date: 31/12/2019 Responsible Beneficiary: INOV Contributing Beneficiaries: UoG Dissemination Level: Public Version: 1.0 Type: Final This project has received funding from the European Union’s H2020 research and innovation programme under the grant agreement No 825171 ` DOCUMENT INFORMATION Document ID: D3.5: Design and implementation of P2P infrastructure Version Date: 31/12/2019 Total Number of Pages: 36 Abstract: This deliverable describes the EUNOMIA P2P infrastructure, its design, the EUNOMIA P2P APIs and a first implementation of the P2P infrastructure and the corresponding APIs made available for the remaining EUNOMIA modules to start integration (for the 1st phase). Keywords: P2P design, P2P infrastructure, IPFS AUTHORS Full Name Beneficiary / Organisation Role INOV INESC INOVAÇÃO INOV Overall Editor University of Greenwich UoG Contributor REVIEWERS Full Name Beneficiary / Organisation Date University of Nicosia UNIC 23/12/2019 VERSION HISTORY Version Date Comments 0.1 13/12/2019 First internal draft 0.6 22/12/2019 Complete draft for review 0.8 29/12/2019 Final draft following review 1.0 31/12/2019 Final version to be released to the EC Type of deliverable PUBLIC Page | ii H2020 Grant Agreement Number: 825171 Document ID: WP3 / D3.5 EXECUTIVE SUMMARY This deliverable describes the P2P infrastructure that has been implemented during the first phase of the EUNOMIA to provide decentralized support for storage, communication and security functions. It starts with a review of the main existing P2P technologies, where each one is analysed and a selection of candidates are selected to be used in the project.
    [Show full text]
  • Encrypted File System Based on Distributed Key-Value Stores and FUSE
    International Journal of Network Security & Its Applications (IJNSA) Vol.11, No.2, March 2019 KVEFS: Encrypted File System based on Distributed Key-Value Stores and FUSE Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh Le Quy Don Technical University No 236 Hoang Quoc Viet Street , Hanoi, Vietnam [email protected] Abstract. File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store.
    [Show full text]
  • The Evolution of File Systems
    The Evolution of File Systems Thomas Rivera, Hitachi Data Systems Craig Harmer, April 2011 SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the Author nor the Presenter is an attorney and nothing in this presentation is intended to be nor should be construed as legal advice or opinion. If you need legal advice or legal opinion please contact an attorney. The information presented herein represents the Author's personal opinion and current understanding of the issues involved. The Author, the Presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. The Evolution of File Systems 2 © 2012 Storage Networking Industry Association. All Rights Reserved. 2 Abstract The File Systems Evolution Over time additional file systems appeared focusing on specialized requirements such as: data sharing, remote file access, distributed file access, parallel files access, HPC, archiving, security, etc. Due to the dramatic growth of unstructured data, files as the basic units for data containers are morphing into file objects, providing more semantics and feature- rich capabilities for content processing This presentation will: Categorize and explain the basic principles of currently available file system architectures (e.g.
    [Show full text]
  • Refuse: Userspace FUSE Reimplementation Using Puffs
    ReFUSE: Userspace FUSE Reimplementation Using puffs Antti Kantee Alistair Crooks Helsinki University of Technology The NetBSD Foundation [email protected].fi [email protected] Abstract for using Gmail as a file system storage backend and FUSEPod [5] which facilitaties iPod access and man- In an increasingly diverse and splintered world, agement. interoperability rules. The ability to leverage code Userspace file systems operate by attaching an in- written for another platform means more time and re- kernel file system to the kernel’s virtual file system sources for doing new and exciting research instead layer, vfs [17]. This component transforms incoming of reinventing the wheel. Interoperability requires requests into a form suitable for delivery to userspace, standards, and as the saying goes, the best part of sends the request to userspace, waits for a response, standards is that everyone can have their own. How- interprets the result and feeds it back to caller in the ever, in the userspace file system world, the Linux- kernel. The kernel file system calling conventions originated FUSE is the clear yardstick. dictate how to interface with the virtual file system In this paper we present ReFUSE, a userspace layer, but other than that the userspace file systems implementation of the FUSE interface on top of the framework is free to decide how to operate and what NetBSD native puffs (Pass-to-Userspace Framework kind of interface to provide to userspace. File System) userspace file systems framework. We While extending the operating system to userspace argue that an additional layer of indirection is the is not a new idea [12, 21], the FUSE [2] userspace right solution here, as it allows for a more natural file systems interface is the first to become a veri- export of the kernel file system interface instead of table standard.
    [Show full text]
  • How High School Students Can Write a Filesystem Prototype
    ALMA MATER STUDIORUM · UNIVERSITÀ DI BOLOGNA Scuola di Scienze Corso di Laurea in Informatica TgFuseFs: How High School Students Can Write a Filesystem Prototype Tesi di laurea Relatore: Presentata da: Chiar.mo Prof. Riccardo Maffei Renzo Davoli Correlatori: Dott. Marco Sbaraglia Dott. Michael Lodi Sessione III Anno Accademico 2018-2019 Information about licenses and credits can be found in AppendixA. ii To those I love and those who love me... iii iv Abstract Italian high school students who are majoring in Computer Science usually study subjects like programming, databases, networks, system engineering, electronics and operating systems. While most of these subjects let the stu- dents practice with projects, operating systems usually is taught in a more the- oretical way because practical projects either are too simple to be didactically useful or require too many prerequisites. Hence, components like filesystems are only studied in theory from an high level point of view. We think that building a filesystem prototype could be considered active learn- ing and could improve the operating systems learning experience. For this reason in this work we will show how fifth year students with very few pre- requisites can build their first working prototype of a remote filesystem in userspace using Python, FUSE and Telegram. Since the activity is designed for high school students, the prototype won’t be perfect but we will present some of the issues that students should be aware of and more advanced students should address. v vi Contents Introduction1 1 General Concepts3 1.1 Requirements...............................3 1.2 Python...................................4 1.2.1 asyncio ..............................4 1.3 FUSE and libfuse ............................8 1.3.1 pyfuse3 .............................
    [Show full text]
  • Linux Kernel Series
    Linux Kernel Series By Devyn Collier Johnson More Linux Related Stuff on: http://www.linux.org Linux Kernel – The Series by Devyn Collier Johnson (DevynCJohnson) [email protected] Introduction In 1991, a Finnish student named Linus Benedict Torvalds made the kernel of a now popular operating system. He released Linux version 0.01 on September 1991, and on February 1992, he licensed the kernel under the GPL license. The GNU General Public License (GPL) allows people to use, own, modify, and distribute the source code legally and free of charge. This permits the kernel to become very popular because anyone may download it for free. Now that anyone can make their own kernel, it may be helpful to know how to obtain, edit, configure, compile, and install the Linux kernel. A kernel is the core of an operating system. The operating system is all of the programs that manages the hardware and allows users to run applications on a computer. The kernel controls the hardware and applications. Applications do not communicate with the hardware directly, instead they go to the kernel. In summary, software runs on the kernel and the kernel operates the hardware. Without a kernel, a computer is a useless object. There are many reasons for a user to want to make their own kernel. Many users may want to make a kernel that only contains the code needed to run on their system. For instance, my kernel contains drivers for FireWire devices, but my computer lacks these ports. When the system boots up, time and RAM space is wasted on drivers for devices that my system does not have installed.
    [Show full text]
  • FUSE? Implementierung Anwendungen
    Was ist FUSE? Implementierung Anwendungen FUSE Filesystem in Userspace Michael Burian Bernhard Guillon Stefan Huber Institut für Computerwissenschaften Universität Salzburg Wissenschaftliche Arbeitstechniken und Präsentation Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Implementierung Anwendungen Gliederung 1 Was ist FUSE? Allgemein Wh. Betriebssysteme und FUSE-Ansatz Motivation 2 Implementierung concatfs Source Code 3 Anwendungen Überblick Beispiele ntfs-3g, sshfs, gmailfs, clamfs Kurioses Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation Gliederung 1 Was ist FUSE? Allgemein Wh. Betriebssysteme und FUSE-Ansatz Motivation 2 Implementierung concatfs Source Code 3 Anwendungen Überblick Beispiele ntfs-3g, sshfs, gmailfs, clamfs Kurioses Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation FUSE stellt sich vor FUSE ist ein Userspace Dateisystem Framework FUSE besteht aus Kernel Modul (fuse.ko) Userspace Library (libfuse.*) Userspace mount (fusermount) FUSE öffnet neue Möglichkeiten für Dateisysteme Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation Monolithischer- vs. Micro-Kernel Monolithic Kernel Microkernel Application System Call user mode VFS IPC, File System Application UNIX Device File IPC Server Driver Server Scheduler, Virtual Memory kernel mode Device Drivers, Dispatcher, ... Basic IPC, Virtual Memory, Scheduling Hardware Hardware Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh. Betriebssysteme und FUSE-Ansatz Anwendungen Motivation Kernelmode Dateisystem Treiber ls -l /etc/fstab glibc Userspace Kernel FUSE NFS VFS Ext3 ... Michael Burian, Bernhard Guillon und Stefan Huber Was ist FUSE? Allgemein Implementierung Wh.
    [Show full text]
  • Efficient Data Retrieval from a Secure, Durable, Append-Only
    Efficient Data Retrieval from a Secure, Durable, Append-Only Log ∗ Sam Kumar, Andrew M. Chen, Paul R. Bramsen, John D. Kubiatowicz {samkumar, andrewmchen, paulbramsen, kubitron}@berkeley.edu Electrical Engineering and Computer Sciences, UC Berkeley ABSTRACT viously much more well-suited to storing their data than The Global Data Plane (GDP) [1] provides a secure, verifi- a traditional DBMS, for the simple reason that a DBMS able, append-only, single-writer log interface where logs are must support much richer data semantics than are needed replicated across a range of possibly untrusted hosts. A ma- for this task. Beyond being more efficient, the GDP enables jor advantage of such a log interface is that it is possible to a new paradigm for building complex distributed data sys- provide atomicity and consistent replication with little over- tems; rather than first building the system and then adding head, while scaling at a global level. However, expressing locking or logging schemes to achieve the desired consistency mutable objects in append-only logs, while simultaneously and durability properties, one may choose to build a system providing efficient access to data within those objects, is a on top of GDP, which can cheaply achieve these properties, nontrivial task. In this paper, we present the Global Data in such a way that some of these properties shine through Plane File System (GDPFS), a distributed filesystem that in the final system. expresses mutable files within append-only logs and provides efficient data access within files. Because it is built on top The main difficulty in this approach is one of the advantages of the GDP, the GDPFS has the potential to scale very well mentioned earlier: the append-only nature of logs in the and run securely on untrusted hardware.
    [Show full text]