-
Notifications
You must be signed in to change notification settings - Fork 8
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
413 changed files
with
331 additions
and
98 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Empty file.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Empty file modified
0
Paper Reading Note/The Quantcast File System-VLDB'13/1523365611372.png
100755 → 100644
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file modified
0
Paper Reading Note/The Quantcast File System-VLDB'13/1523504685432.png
100755 → 100644
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Empty file.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Chunking/FrequencyBasedChunking-MASCOTS'10.md
100755 → 100644
Empty file.
Empty file.
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Dedup-Estmation/ContentBasedSampling-ATC'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Dedup-Estmation/EstimateDedupRatio-MSST'12.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Dedup-Estmation/Rangoli-SYSTOR'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Dedup-Estmation/SketchDeduplication-FAST'19.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Dedup-Estmation/UnseenDeduplication-FAST'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/CloudTier-ATC'19.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/Dedup-ATC'11.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/DedupDesignTradeoff-FAST'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/DiskBottleneck-FAST'08.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/ExtremeBining-MASCOTS'09.md
100755 → 100644
Empty file.
126 changes: 126 additions & 0 deletions
126
StoragePaperNote/Deduplication/Deduplication-System-Design/MFDedup-FAST'21.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,126 @@ | ||
--- | ||
typora-copy-images-to: ../paper_figure | ||
--- | ||
The Dilemma between Deduplication and Locality: Can Both be Achieved? | ||
------------------------------------------ | ||
| Venue | Category | | ||
| :------------------------: | :------------------: | | ||
| FAST'21 | Deduplication System Design | | ||
[TOC] | ||
|
||
## 1. Summary | ||
### Motivation of this paper | ||
- Motivation | ||
- restore and GC issues in deduplication system | ||
- locality issue | ||
- eliminate random I/O | ||
- most duplicate chunks in a backup are directly from its previous backup. | ||
- a novel management-friendly deduplication framework | ||
- Neighbor-Duplicate-Focus indexing (NDF): perform duplicate detection against a previous backup. | ||
- Across-Version-Aware Reorganization scheme (AVAR): rearrange chunks with an offline and iterative algorithm into a compact, sequential layout. | ||
- GC issues | ||
- includes two stages: | ||
- selecting which containers have unreferenced chunks | ||
- migrating referenced chunks into new containers, so selected containers can be freed | ||
|
||
- The main difference between previous deduplication system | ||
- previous deduplication system: **write-friendly**, mainly focus on write path, rarely manages the location and placement of chunks | ||
- this deduplication system: **management-friendly**, use **offline** method to iteratively redesign the data layout of deduplicated chunks to improve chunk locality. | ||
- argue the cost of this offline approach is acceptable. | ||
|
||
### MFDedup | ||
|
||
- Main observation | ||
- Fragmentation is dependent on the backup version and associated with chunks' reference relationship. | ||
- can use this to reduce the fragmentation issue (classification-based data layout) | ||
- change to **variable-sized** containers | ||
-  | ||
- Main challenges | ||
- The space of classification is very large, may generate more small containers | ||
- 2^n - 1 categories, (n is the number of versions) | ||
- OPT data layout solves the read amplification problem but requires more seek operations for these very small containers, which causes poor data locality. | ||
- Derivation relationship of backups | ||
- In backup system, the duplicate chunks of each backup are not randomly distributed but are derived from the chunks of the last backup | ||
- consecutive pattern of duplicates | ||
- adjacent and internal duplicate chunks account for more than 99.5% in most datasets | ||
- can greatly decrease the number of categories needed for the OPT data layout. | ||
- ${n \choose 1} + {n \choose 2} = n(n+1)/2$ | ||
- Neighbor-Duplicates-Focus indexing (NDF) | ||
- only removes duplicates between neighboring backup version. | ||
- need to build a **local** fingerprint index | ||
- lower memory overhead compared with traditional **global** fingerprint index. | ||
- current version and previous version | ||
- Across-Version-Aware reorganization (AVAR) | ||
- Deduplicating stage: store unique chunks of the latest new backup version into a new **active** category. | ||
- chunks in active category may be referenced by future backup versions | ||
- Arranging stage: analyze the reference relationship between chunks and backup versions. | ||
- need to iteratively update the existing OPT with new unique chunks of the incoming version. | ||
- Each category has two states: | ||
- Active: can be further arranged after future backups. | ||
- Archived: immutable. | ||
- Grouping: store the new archived categories into a **Volume** by the order of their name | ||
- achieve sequential reads during the restore process | ||
-  | ||
|
||
- Restore | ||
- need to read the required categories on the OPT data layout, which is referenced by the to-be-restored version. | ||
- Grouping: required categories are always grouped in the same volume :arrow_right_hook: sequential reads. | ||
- Deletion and GC | ||
- delete the last category in the corresponding volume. | ||
|
||
### Implementation and Evaluation | ||
|
||
- Implementation: | ||
- based on Destor, open-sourced | ||
- SHA-1 as the fingerprint | ||
- FastCDC: as the chunking method | ||
- Compared with: | ||
- HAR: History-Aware rewriting algorithm (FAST'14) | ||
- CAM: Container-Marker algorithm (TPDS'14) | ||
- Capping: FAST'13 | ||
- Evaluation | ||
- Trace: sina, source code of Chromium project, ubuntu VM, SYN | ||
- SSD user space + HDD store space | ||
- Actual deduplication ratio | ||
- compare with exact deduplication and other rewrite scheme | ||
- Backup throughput | ||
- hashing is the bottleneck | ||
- indexing overhead is better than keeping a global index | ||
- Restore throughput | ||
- Restore throughput | ||
- Seek number | ||
- Read amplification factor | ||
- Arranging vs. Traditional GC | ||
- compared with Perfect GC | ||
- processing period (s) | ||
- Size distribution of volumes/categories | ||
- the size of volumes: 90MB - 1.3GB | ||
- can estimate how much more can be written to the deduplication system | ||
- volumes represent the difference between neighboring versions. | ||
|
||
## 2. Strength (Contributions of the paper) | ||
|
||
1. Neighbor-Duplicate-Focus (NDF) indexing: only detect duplicates of a backup version with its previous version | ||
2. Across-Version-Aware Reorganization (AVAR): classify and group according to the simplified reference relationship between chunks and versions. | ||
3. Good discussion in the limitation of current prototype. | ||
|
||
## 3. Weakness (Limitations of the paper) | ||
1. This paper only considers two state-of-art rewriting techniques, however, there exists many works to solve the rewriting issues (FAST'18, FAST'19) | ||
> capping-FAST'13 | ||
> HAR -FAST'14 | ||
|
||
## 4. Some Insights (Future work) | ||
1. Why focuses on hard-drive based deduplication | ||
|
||
For backup storage, it remains one of the most significant use cases. | ||
|
||
2. Key insights | ||
|
||
change the container from fixed-sized containers to variable-sized containers | ||
|
||
3. the discuss of the backup size: | ||
|
||
VM backups: 100GB | ||
|
||
the majority of backups are 50-500GB in Data Domain. |
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/Redesigning-ATC'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/SparseIndex-FAST'09.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Deduplication-System-Design/dedupv1-MSST'10.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Distributed-Dedup/ClusterSingle-ToS'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Distributed-Dedup/EDP-IWQoS'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Distributed-Dedup/GoSeed-FAST'20.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Distributed-Dedup/Produck-SoCC'12.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Distributed-Dedup/TradeoffDataRouting-FAST'11.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/GC/AcceleratingRestore-ATC'14.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/GC/MemorySanitization-FAST'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Mem-Dedup/HintsDeduplication-FAST'16.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Metadata-Management/FileRecipeCompression-FAST'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Metadata-Management/MetadataHarmful-HotStorage'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Metadata-Management/Metadedup.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Metadata-Management/REED-DSN'16.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Restore-Performance/ALACC-FAST'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Restore-Performance/ImproveRestore-FAST'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Restore-Performance/LookBackWindow-FAST'19.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Restore-Performance/RevDedup-APSys'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/BloomFilterDedup-ICSP'19.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/CAONT-RS-HotStorage'14.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/ClearBox-CCS'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/DistributedKeyGen-CCSW'14.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/DupLESS-Security'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/EnhancedThreshold-TDSC'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/FrequencyAnalysis-DSN'17.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/IndependentServer-CCS'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/InformationLeakage-CCSW'16.md
100755 → 100644
Empty file.
99 changes: 99 additions & 0 deletions
99
StoragePaperNote/Deduplication/Secure-Dedup/MLE-EuroCrypto'13.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,99 @@ | ||
--- | ||
typora-copy-images-to: ../paper_figure | ||
--- | ||
Message-Locked Encryption and Secure Deduplication | ||
------------------------------------------ | ||
| Venue | Category | | ||
| :------------------------: | :------------------: | | ||
| EuroCrypto'13 | Secure Deduplication | | ||
[TOC] | ||
|
||
## 1. Summary | ||
### Motivation of this paper | ||
- The formulation of MLE | ||
- the key under which encryption and decryption are performed is itself derived from the message. | ||
- definitions both for privacy and for a form of integrity (tag consistency). | ||
|
||
- There is an absence of a theoretical treatment for MLE in secure deduplication deployment. | ||
- It is not clear what precisely is the underlying security goal and whether deployed schemes achieve it. | ||
|
||
### MLE definitions | ||
|
||
- General MLE syntax | ||
- key generation algorithm: K | ||
- encryption algorithm: E | ||
- decryption algorithm: D | ||
- tagging algorithm: T | ||
- For convergent encryption: | ||
- K = H(M) | ||
- C = E(K, M) | ||
- T = H(C) | ||
- Privacy: | ||
- No MLE scheme can achieve semantic-security-style privacy | ||
- if the target message $M$ is drawn from a space of $s$ | ||
- given an encryption $C$ of $M$, it can recover $M$ in $O(s)$ trials. | ||
- the best possible privacy: semantic security when message are **unpredictable** (have high min-entropy) | ||
- Tag consistency: (how to against the duplicate faking attacks) | ||
- **TC**: an adversary cannot make an honest client recover an incorrect message, meaning one different from the one it uploaded. (cannot protect the message integrity) | ||
- **STC**: an adversary cannot erase an honest client's message. | ||
- **STC** is strictly stronger than **TC**. | ||
- If an MLE scheme is deterministic, letting the tag equal the ciphertext will result in a scheme that is **STC** secure. | ||
- CR-hashing the ciphertext preserves **STC**, but the performance is not good. | ||
- Discussion: for upload operation | ||
- the client stores $K$ securely (may store $K$ encrypted under its password on the server, but the implementation is not relevant here). | ||
- the client sends the $C$ to the server. | ||
- the server computes tag $T$. (the main issue) | ||
- Fast MLE schemes | ||
- CE: convergent encryption | ||
- HCE1 (Hash-and-CE 1, in TahoeFS) | ||
- compute the tags during encryption by hashing the per-message key ($T = H(P, K)$), and including the result in the ciphertext. | ||
- offload the work from the server to the client and reduces th e number of passes needed to encrypt and generate a tag from three to two. | ||
- HCE2 | ||
- include the guarded decryption | ||
- recomputing the tag using the just-decrypted message. | ||
- RCE | ||
- randomized convergent encryption | ||
 | ||
|
||
- Performance of each MLE scheme | ||
|
||
 | ||
|
||
|
||
### Implementation and Evaluation | ||
|
||
## 2. Strength (Contributions of the paper) | ||
1. Practical contribution | ||
ROM security analyses of a natural family of MLE schemes (include deployed schemes). | ||
|
||
2. Theoretical contribution | ||
Standard model solution, the connection with deterministic encryption, hash functions. | ||
> different trade-offs between assumptions made and the message distributions for which security is proven. | ||
3. Provide four MLE schemes with different trade-offs between the security and performance. | ||
> CE, HCE1, HCE2. RCE | ||
|
||
## 3. Weakness (Limitations of the paper) | ||
|
||
## 4. Some Insights (Future work) | ||
1. This paper mentions the issue that how to generate the tag? | ||
> $CE$: $K=H(M)$, $C=SE(K, M)$, $T=H(C)$ | ||
> $HCE1$: $K=H(M)$, $C=SE(K, M)|| H(K)$, $T=H(K)$ | ||
The $HCE1$ can offer better performance for the server who can simply read the tag as the second part of the ciphertext rather than needing to compute it by hashing the possibly long ciphertext. | ||
|
||
> vulnerable to duplicate faking attacks | ||
|
||
2. the length of the key | ||
It insists that an MLE scheme have keys that are shorter than the message. | ||
|
||
3. Tag consistency theorem | ||
|
||
- Any deterministic scheme is **STC**-secure when tags are CR-hashes of the ciphertext. | ||
- If $H$ is **CR**-secure then HCE2 and REC are **TC**-secure. | ||
|
||
|
||
|
||
|
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/MitigatingSideChannel-IPDPS'18.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/PrivacyPreservingDedup-CLOUD'17.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/RARE-INFOCOM'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/SideChannel-S&P'10.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/SideChannelTradeOffs-AsiaCCS'17.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Secure-Dedup/TappingPotential-CNS'18.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Summary/99DeduplicationProblem-HotStorage'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Workload-Analysis/BackupWorkloads-FAST'12.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Workload-Analysis/CapacityForecasting-LISA'11.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Workload-Analysis/PracticalDedup-FAST'11.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Deduplication/Workload-Analysis/SimRedundancy-TC'18.md
100755 → 100644
Empty file.
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Background/Availability-OSDI'10.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Background/Erasure-Code-Summary.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Background/Facebook Warehouse Cluster-HotStorage'13.md
100755 → 100644
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Comparison/LRC-Comparison-ATC'18.md
100755 → 100644
Empty file.
Empty file.
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Basics/Dimakis-TIT'09.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Basics/Plank-FAST'09.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Basics/Plank-USENIX login'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/Alpha-Entanglement-Codes-DSN'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/ButterflyCode-FAST'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/DRC-ISIT'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/Galloper-ICDCS'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/Hitchhiker-SIGCOMM'14.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/LRC-ATC'12.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/NCCloud-FAST'12.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/Pyramid Codes-ToS'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/XORing-PVLDB'13.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Erasure Coding Deployment/product-matrix-MSR-FAST'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/JunLi's paper/Beehive-HotStorage'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/JunLi's paper/Carousel-ICDCS'17.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/JunLi's paper/JunLi-INFOCOM'14.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/JunLi's paper/Pipelined_Regeneration-NetCod'11.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/JunLi's paper/Zebra-IWQoS'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/CAR-DSN'16.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/CORE-TC'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/Clay Codes-FAST'18.md
100755 → 100644
Empty file.
Empty file modified
0
...PaperNote/ErasureCoding/Techniques for Erasure Coding/Degraded-First-Scheduling-DSN'14.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/EC Store-ICDCS'18.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/ECPipe-ATC'17.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/Encoding-aware-DSN'15.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/Lazy Means Smart-SYSTOR'14.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/OpenEC-FAST'19.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/ProactiveLatency-SoCC'17.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/RAFI-ATC'18.md
100755 → 100644
Empty file.
Empty file modified
0
...PaperNote/ErasureCoding/Techniques for Erasure Coding/RotatedReed-SolomonCodes-FAST'12.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/SpeedupXOR-MSST'12 .md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/ErasureCoding/Techniques for Erasure Coding/Two_Tale_in_HDFS-FAST'15.md
100755 → 100644
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Security/QuantifyingInformationLeakage-CCSW'19.md
100755 → 100644
Empty file.
Empty file.
Empty file.
Empty file.
Empty file modified
0
StoragePaperNote/Security/SGX-Storage/ShieldStore-EuroSys'19.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Security/SGX-Storage/StorageDataPathSGX-arxiv.md
100755 → 100644
Empty file.
Empty file modified
0
StoragePaperNote/Security/SGX-Technique/SGXPerf-Middleware'18.md
100755 → 100644
Empty file.
Oops, something went wrong.