dc.contributor.author | Bowers, Kevin D. | |
dc.contributor.author | van Dijk, Marten | |
dc.contributor.author | Juels, Ari | |
dc.contributor.author | Oprea, Alina | |
dc.contributor.author | Rivest, Ronald L. | |
dc.date.accessioned | 2012-08-28T20:56:16Z | |
dc.date.available | 2012-08-28T20:56:16Z | |
dc.date.issued | 2011-10 | |
dc.identifier.isbn | 978-1-4503-0948-6 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/72402 | |
dc.description.abstract | This paper presents a new challenge--verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe an approach called the Remote Assessment of Fault Tolerance (RAFT). The key technique in a RAFT is to measure the time taken for a server to respond to a read request for a collection of file blocks. The larger the number of hard drives across which a file is distributed, the faster the read-request response. Erasure codes also play an important role in our solution. We describe a theoretical framework for RAFTs and offer experimental evidence that RAFTs can work in practice in several settings of interest. | en_US |
dc.language.iso | en_US | |
dc.publisher | Association for Computing Machinery | en_US |
dc.relation.isversionof | http://dx.doi.org/ 10.1145/2046707.2046766 | en_US |
dc.rights | Creative Commons Attribution-Noncommercial-Share Alike 3.0 | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/ | en_US |
dc.source | Other Repository | en_US |
dc.title | How to tell if your cloud files are vulnerable to drive crashes | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Bowers, Kevin D. et al. “How to Tell If Your Cloud Files Are Vulnerable to Drive Crashes.” Proceedings of the 18th ACM conference on Computer and Communications Security, CCS'11, October 17–21, 2011, Chicago, Illinois, USA. pp.501-514. ACM Press, 2011.Web. | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science | en_US |
dc.contributor.approver | Rivest, Ronald L. | |
dc.contributor.mitauthor | Rivest, Ronald L. | |
dc.relation.journal | Proceedings of the 18th ACM conference on Computer and Communications Security, CCS '11 | en_US |
dc.eprint.version | Author's final manuscript | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
dspace.orderedauthors | Bowers, Kevin D.; van Dijk, Marten; Juels, Ari; Oprea, Alina; Rivest, Ronald L. | en |
dc.identifier.orcid | https://orcid.org/0000-0002-7105-3690 | |
mit.license | OPEN_ACCESS_POLICY | en_US |
mit.metadata.status | Complete | |