Font Size: a A A

Based On Erasure Codes Distributed Storage System Design And Implementation

Posted on:2011-11-11Degree:MasterType:Thesis
Country:ChinaCandidate:C SunFull Text:PDF
GTID:2208360308965739Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
On one hand, data explodes with the rapid development of the computer power and computer network. The application mode of computer system lays more importance in processing and storage of client data gradually. So the value of the data are mostly more important than the software and hardware equipment. On the other hand, in the real world, the data storage security is facing a variety of challenges, client data is threatened by kinds of man-made accidents and natural disaters. Therefore, how to store the data reliability and efficiently is the essential issue. As with distributed computing, distributed storage is coming of age as a good solution to achieve scalability, fault tolerance and efficiency.Instead of the replication scheme in traditional storage system,As a redundancy mechanism, erasure code is introduced in this paper. Eradure code technology is a good balance between storage space overhead and fault- tolerant capability; it provides space-optimal data redundancy to promote the security and availability of storage system. The main contributions are as following:Firstly, this paper sdudys the principle of erasure code, analyses the advantages of erasure code in storage system, summarizes the status quo of storage system and data diversification strategy.Secondly, this paper analyses and implements the erasure code algorithms based on the Vandermonde matrix and Cauchy matrix. Test result shows that Cauchy RS code is performance much better than Vandermonde RS code.Thirdly, this paper designs and implements a distributed storage system based on erasure code. Analyses in detail the file en-decoding module, block storage and download module, file update module and some other function module, and analyses the performance of this system.Fourthly, this paper proposes a technology of identity authentication in insecure and public computer network. Through security analysis we know that this technology of identity authentication is secure.From what has been done above, this paper designs and implementes of a new distributed storage system based on erasure code, which is more efficient in terms of both space and performance than the conventional storage system, it achieves the target of scalability, fault tolerance and efficiency.
Keywords/Search Tags:Erasure Code, Distributed Storage, High Availability, Identity Authentication
PDF Full Text Request
Related items