Storage Hardware

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 37968 Experts worldwide ranked by ideXlab platform

Steven Swanson - One of the best experts on this subject based on the ideXlab platform.

  • This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by On the Energy Ove
    2020
    Co-Authors: San Diego, Anirudh Badam, Ranveer Chandra, Bruce Worthington, Microsoft Qi Zhang, Steven Swanson
    Abstract:

    Abstract Secure digital cards and embedded multimedia cards are pervasively used as secondary Storage devices in portable electronics, such as smartphones and tablets. These devices cost under 70 cents per gigabyte. They deliver more than 4000 random IOPS and 70 MBps of sequential access bandwidth. Additionally, they operate at a peak power lower than 250 milliwatts. However, software Storage stack above the device level on most existing mobile platforms is not optimized to exploit the low-energy characteristics of such devices. This paper examines the energy consumption of the Storage stack on mobile platforms. We conduct several experiments on mobile platforms to analyze the energy requirements of their respective Storage stacks. Software Storage stack consumes up to 200 times more energy when compared to Storage Hardware, and the security and privacy requirements of mobile apps are a major cause. A Storage energy model for mobile platforms is proposed to help developers optimize the energy requirements of Storage intensive applications. Finally, a few optimizations are proposed to reduce the energy consumption of Storage systems on these platforms

  • on the energy overhead of mobile Storage systems
    File and Storage Technologies, 2014
    Co-Authors: Anirudh Badam, Ranveer Chandra, Steven Swanson, Bruce L Worthington, Qi Zhang
    Abstract:

    Secure digital cards and embedded multimedia cards are pervasively used as secondary Storage devices in portable electronics, such as smartphones and tablets. These devices cost under 70 cents per gigabyte. They deliver more than 4000 random IOPS and 70 MBps of sequential access bandwidth. Additionally, they operate at a peak power lower than 250 milliwatts. However, software Storage stack above the device level on most existing mobile platforms is not optimized to exploit the low-energy characteristics of such devices. This paper examines the energy consumption of the Storage stack on mobile platforms. We conduct several experiments on mobile platforms to analyze the energy requirements of their respective Storage stacks. Software Storage stack consumes up to 200 times more energy when compared to Storage Hardware, and the security and privacy requirements of mobile apps are a major cause. A Storage energy model for mobile platforms is proposed to help developers optimize the energy requirements of Storage intensive applications. Finally, a few optimizations are proposed to reduce the energy consumption of Storage systems on these platforms.

  • providing safe user space access to fast solid state disks
    Architectural Support for Programming Languages and Operating Systems, 2012
    Co-Authors: Adrian M Caulfield, Todor Mollov, Louis Alex Eisner, Arup De, Joel Coburn, Steven Swanson
    Abstract:

    Emerging fast, non-volatile memories (e.g., phase change memories, spin-torque MRAMs, and the memristor) reduce Storage access latencies by an order of magnitude compared to state-of-the-art flash-based SSDs. This improved performance means that software overheads that had little impact on the performance of flash-based systems can present serious bottlenecks in systems that incorporate these new technologies. We describe a novel Storage Hardware and software architecture that nearly eliminates two sources of this overhead: Entering the kernel and performing file system permission checks. The new architecture provides a private, virtualized interface for each process and moves file system protection checks into Hardware. As a result, applications can access file data without operating system intervention, eliminating OS and file system costs entirely for most accesses. We describe the support the system provides for fast permission checks in Hardware, our approach to notifying applications when requests complete, and the small, easily portable changes required in the file system to support the new access model. Existing applications require no modification to use the new interface. We evaluate the performance of the system using a suite of microbenchmarks and database workloads and show that the new interface improves latency and bandwidth for 4 KB writes by 60% and 7.2x, respectively, OLTP database transaction throughput by up to 2.0x, and Berkeley-DB throughput by up to 5.7x. A streamlined asynchronous file IO interface built to fully utilize the new interface enables an additional 5.5x increase in throughput with 1 thread and 2.8x increase in efficiency for 512 B transfers.

P Varalakshmi - One of the best experts on this subject based on the ideXlab platform.

  • enabling ternary hash tree based integrity verification for secure cloud data Storage
    IEEE Transactions on Knowledge and Data Engineering, 2020
    Co-Authors: M Thangavel, P Varalakshmi
    Abstract:

    Cloud Computing enables the remote users to access data, services, and applications in on-demand from the shared pool of configurable computing resources, without the consideration of Storage, Hardware, and software management. On the other hand, it is not easy for cloud users to identify whether Cloud Service Provider's (CSP) tag along with the data security legal expectations. So, cloud users could not rely on CSP's in terms of trust. So, it is significant to build a secure and efficient data auditing framework for increasing and maintaining cloud users trust with CSP. Researchers suggested introducing Third Party Auditor (TPA) on behalf of cloud user for verifying the outsourced data integrity, which may reduce the computation overhead of cloud users. In this work, we proposed a novel integrity verification framework for securing cloud Storage based on Ternary Hash Tree (THT) and Replica based Ternary Hash Tree (R-THT), which will be used by TPA to perform data auditing. Differing from existing work, the proposed framework performs Block-level, File-level and Replica-level auditing with tree block ordering, Storage block ordering for verifying the data integrity and ensuring data availability in the cloud. We further extend our framework to support error localization with data correctness, dynamic updates with block update, insert, and delete operations in the cloud. The structure of THT and R-THT will reduce the computation cost and provide efficiency in data updates compared to the existing schemes. The security analysis of the proposed public auditing framework indicates the achievement of desired properties and performance has been evaluated with the detailed experiment set. The results show that the proposed secure cloud auditing framework is highly secure and efficient in Storage, communication, and computation costs.

Anirudh Badam - One of the best experts on this subject based on the ideXlab platform.

  • This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by On the Energy Ove
    2020
    Co-Authors: San Diego, Anirudh Badam, Ranveer Chandra, Bruce Worthington, Microsoft Qi Zhang, Steven Swanson
    Abstract:

    Abstract Secure digital cards and embedded multimedia cards are pervasively used as secondary Storage devices in portable electronics, such as smartphones and tablets. These devices cost under 70 cents per gigabyte. They deliver more than 4000 random IOPS and 70 MBps of sequential access bandwidth. Additionally, they operate at a peak power lower than 250 milliwatts. However, software Storage stack above the device level on most existing mobile platforms is not optimized to exploit the low-energy characteristics of such devices. This paper examines the energy consumption of the Storage stack on mobile platforms. We conduct several experiments on mobile platforms to analyze the energy requirements of their respective Storage stacks. Software Storage stack consumes up to 200 times more energy when compared to Storage Hardware, and the security and privacy requirements of mobile apps are a major cause. A Storage energy model for mobile platforms is proposed to help developers optimize the energy requirements of Storage intensive applications. Finally, a few optimizations are proposed to reduce the energy consumption of Storage systems on these platforms

  • on the energy overhead of mobile Storage systems
    File and Storage Technologies, 2014
    Co-Authors: Anirudh Badam, Ranveer Chandra, Steven Swanson, Bruce L Worthington, Qi Zhang
    Abstract:

    Secure digital cards and embedded multimedia cards are pervasively used as secondary Storage devices in portable electronics, such as smartphones and tablets. These devices cost under 70 cents per gigabyte. They deliver more than 4000 random IOPS and 70 MBps of sequential access bandwidth. Additionally, they operate at a peak power lower than 250 milliwatts. However, software Storage stack above the device level on most existing mobile platforms is not optimized to exploit the low-energy characteristics of such devices. This paper examines the energy consumption of the Storage stack on mobile platforms. We conduct several experiments on mobile platforms to analyze the energy requirements of their respective Storage stacks. Software Storage stack consumes up to 200 times more energy when compared to Storage Hardware, and the security and privacy requirements of mobile apps are a major cause. A Storage energy model for mobile platforms is proposed to help developers optimize the energy requirements of Storage intensive applications. Finally, a few optimizations are proposed to reduce the energy consumption of Storage systems on these platforms.

Yolande Berbers - One of the best experts on this subject based on the ideXlab platform.

  • power reduction techniques for data center Storage systems
    ACM Computing Surveys, 2013
    Co-Authors: Tom Bostoen, Sape J Mullender, Yolande Berbers
    Abstract:

    As data-intensive, network-based applications proliferate, the power consumed by the data-center Storage subsystem surges. This survey summarizes, organizes, and integrates a decade of research on power-aware enterprise Storage systems. All of the existing power-reduction techniques are classified according to the disk-power factor and Storage-stack layer addressed. A majority of power-reduction techniques is based on dynamic power management. We also consider alternative methods that reduce disk access time, conserve space, or exploit energy-efficient Storage Hardware. For every energy-conservation technique, the fundamental trade-offs between power, capacity, performance, and dependability are uncovered. With this survey, we intend to stimulate integration of different power-reduction techniques in new energy-efficient file and Storage systems.

Ranveer Chandra - One of the best experts on this subject based on the ideXlab platform.

  • This paper is included in the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14). Open access to the Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST '14) is sponsored by On the Energy Ove
    2020
    Co-Authors: San Diego, Anirudh Badam, Ranveer Chandra, Bruce Worthington, Microsoft Qi Zhang, Steven Swanson
    Abstract:

    Abstract Secure digital cards and embedded multimedia cards are pervasively used as secondary Storage devices in portable electronics, such as smartphones and tablets. These devices cost under 70 cents per gigabyte. They deliver more than 4000 random IOPS and 70 MBps of sequential access bandwidth. Additionally, they operate at a peak power lower than 250 milliwatts. However, software Storage stack above the device level on most existing mobile platforms is not optimized to exploit the low-energy characteristics of such devices. This paper examines the energy consumption of the Storage stack on mobile platforms. We conduct several experiments on mobile platforms to analyze the energy requirements of their respective Storage stacks. Software Storage stack consumes up to 200 times more energy when compared to Storage Hardware, and the security and privacy requirements of mobile apps are a major cause. A Storage energy model for mobile platforms is proposed to help developers optimize the energy requirements of Storage intensive applications. Finally, a few optimizations are proposed to reduce the energy consumption of Storage systems on these platforms

  • on the energy overhead of mobile Storage systems
    File and Storage Technologies, 2014
    Co-Authors: Anirudh Badam, Ranveer Chandra, Steven Swanson, Bruce L Worthington, Qi Zhang
    Abstract:

    Secure digital cards and embedded multimedia cards are pervasively used as secondary Storage devices in portable electronics, such as smartphones and tablets. These devices cost under 70 cents per gigabyte. They deliver more than 4000 random IOPS and 70 MBps of sequential access bandwidth. Additionally, they operate at a peak power lower than 250 milliwatts. However, software Storage stack above the device level on most existing mobile platforms is not optimized to exploit the low-energy characteristics of such devices. This paper examines the energy consumption of the Storage stack on mobile platforms. We conduct several experiments on mobile platforms to analyze the energy requirements of their respective Storage stacks. Software Storage stack consumes up to 200 times more energy when compared to Storage Hardware, and the security and privacy requirements of mobile apps are a major cause. A Storage energy model for mobile platforms is proposed to help developers optimize the energy requirements of Storage intensive applications. Finally, a few optimizations are proposed to reduce the energy consumption of Storage systems on these platforms.