Graph based model for Object Access Analysis at OSD Client
نویسندگان
چکیده
In client-server based storage systems, the knowledge of access behavior of client results in better quality of service. One of its uses is in prefetching to reduce the response time. In this paper, we propose a graph based model for access analysis of objects in the Object based device (OSD) system [1,2]. OSD technology promises to satisfy requirements of enterprise’s rapidly growing storage requirements. OSD provides abstraction at the object level, granting object access only after authentication of security tokens which are issued by the OSD manager. We look particularly for prefetching of the object security tokens by an OSD client and perform analysis based on this model. Graph based techniques are commonly used to solve many real world problems [5]-[9]. We present a graph-based client-initiated mechanism for the analysis of object accesses to achieve effective prefetching of objects. We have also devised an access algorithm that works on these graphs and generates an ordered set of objects which are suitable candidates for prefetching along with a given object. We also discuss design and implementation of an OSD client, and its integration with the graph-based model.
منابع مشابه
JAS: JVM-Based Active Storage Framework for Object-based Storage Systems
We propose JAS, a JVM-based active storage framework for object-based storage systems. JAS programs the active storage functions of users as Java codes, and allows them to be executed on different OSD platforms (Operating systems and hardware) without recompiling. JAS offloads the active storage code from a client to the OSD by extending the standard OSD command set, and execute the Java code o...
متن کاملEmploying Object-Based Storage Devices to Embed File Access Control in Storage
This paper presents a proposal to em bed the file access control into object-based storage devices (OSD) to achieve powerf ul storage security with rich semantics; and two application pr ototypes, the OSD-based intrusion detection ( ID) and the f iner-grained (than the f ile-level) acce ss control, are im plemented to show its feasibility. To embed file access control into st orage, one of vita...
متن کاملClass-based Visibility from an MDA Perspective: From Access Graphs to Eiffel Code
Encapsulation is one of the main principles in object-oriented software construction. Reducing software component coupling and enforcing interface definition facilitates maintenance, reusability and incremental development, thus increasing software quality. Encapsulation is usually supported by specific access control (visibility) mechanisms as private or protected in Java and C++ or Eiffel’s e...
متن کاملEnforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control
This work is concerned with the security of the standard T10 OSD protocol, a capabilitybased protocol for object stores designed by the OSD SNIA working group. The Object Store security protocol is designed to provide access control enforcement in a distributed storage setting such as a Storage Area Network (SAN) environment. In this work we consider in particular the ability of the OSD protoco...
متن کاملOasa: An Active Storage Architecture for Object-based Storage System
Active storage can largely reduce the network traffic and application execution time. In this paper, we present the design and implementation of an active storage architecture called Oasa for object-based storage system. Compared with previous work, Oasa has the following features.(1) It provides a flexible and efficient way for user to process data. User functions can process data of one user ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008