• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Li Yong, Wang Ran, Feng Dan, Shi Zhan. A Cache Management Algorithm for the Heterogeneous Storage Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 1953-1963. DOI: 10.7544/issn1000-1239.2016.20150157
Citation: Li Yong, Wang Ran, Feng Dan, Shi Zhan. A Cache Management Algorithm for the Heterogeneous Storage Systems[J]. Journal of Computer Research and Development, 2016, 53(9): 1953-1963. DOI: 10.7544/issn1000-1239.2016.20150157

A Cache Management Algorithm for the Heterogeneous Storage Systems

More Information
  • Published Date: August 31, 2016
  • The scale of storage system is becoming larger with the rapid increase of the amount of produced data. Along with the development of computer technologies, such as cloud computing, cloud storage and big data, higher requirements are put forward to storage systems: higher capacity, higher performance and higher reliability. In order to satisfy the increasing requirement of capacity and performance, modern data center widely adopts multi technologies to implement the dynamic increasing of storage and performance, such as virtualization, hybrid storage and so on, which makes the storage systems trend more and more heterogeneous. The heterogeneous storage system introduces multiple new problems, of which one key problem is the degradation of performance as load unbalance. Thats because the difference of capacity and performance between heterogeneous storage devices make the parallelism technologies hardly to obtain high performance, such as RAID, Erasure code. For this problem, we propose a caching algorithm based on performance prediction and identification of workload characteristic, named Caper (access-pattern aware and performance prediction-based cache allocation algorithm). The main idea of Caper algorithm is to allocate the load according to the capacity of the storage devices, which aims to alleviate the load unbalance or eliminate the performance bottleneck in the heterogeneous storage systems. The Caper algorithm is composed of three parts: prediction of performance for I/O request, analysis of caching requirement for storage device, and caching replacement policy. The algorithm also classifies the application workload into three types: random access, sequential access, and looping access. In order to ensure high caching utility, the algorithm adjusts the size of logic cache partition based on the analysis of the caching requirement. Besides, in order to adapt to the heterogeneous storage system, the Caper algorithm improves the Clock cache replacement algorithm. The experimental results also show that the Caper algorithm can significantly improve the performance about 26.1% compared with Charkraborty algorithm under mixed workloads, 28.1% compared with Forney algorithm, and 30.3% compared with Clock algorithm. Even adding prefetching operation, Caper algorithm also improves the performance about 7.7% and 17.4% compared with Charkraborty algorithm and Forney algorithm respectively.
  • Related Articles

    [1]Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei. Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme[J]. Journal of Computer Research and Development, 2024, 61(10): 2448-2466. DOI: 10.7544/issn1000-1239.202440453
    [2]Wang Chenxu, Cheng Jiacheng, Sang Xinxin, Li Guodong, Guan Xiaohong. Data Privacy-Preserving for Blockchain: State of the Art and Trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119. DOI: 10.7544/issn1000-1239.2021.20210804
    [3]Song Xiangfu, Gai Min, Zhao Shengnan, Jiang Han. Privacy-Preserving Statistics Protocol for Set-Based Computation[J]. Journal of Computer Research and Development, 2020, 57(10): 2221-2231. DOI: 10.7544/issn1000-1239.2020.20200444
    [4]Zhou Jun, Shen Huajie, Lin Zhongyun, Cao Zhenfu, Dong Xiaolei. Research Advances on Privacy Preserving in Edge Computing[J]. Journal of Computer Research and Development, 2020, 57(10): 2027-2051. DOI: 10.7544/issn1000-1239.2020.20200614
    [5]Liu Junxu, Meng Xiaofeng. Survey on Privacy-Preserving Machine Learning[J]. Journal of Computer Research and Development, 2020, 57(2): 346-362. DOI: 10.7544/issn1000-1239.2020.20190455
    [6]Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi. Privacy-Preserving Logistic Regression on Vertically Partitioned Data[J]. Journal of Computer Research and Development, 2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    [7]Zhou Jun, Dong Xiaolei, Cao Zhenfu. Research Advances on Privacy Preserving in Recommender Systems[J]. Journal of Computer Research and Development, 2019, 56(10): 2033-2048. DOI: 10.7544/issn1000-1239.2019.20190541
    [8]Zhu Liehuang, Gao Feng, Shen Meng, Li Yandong, Zheng Baokun, Mao Hongliang, Wu Zhen. Survey on Privacy Preserving Techniques for Blockchain Technology[J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. DOI: 10.7544/issn1000-1239.2017.20170471
    [9]Fang Weiwei, Ren Jiang, Xia Hongke. Heterogeneous Distributed Linear Regression Privacy-Preserving Modeling[J]. Journal of Computer Research and Development, 2011, 48(9): 1685-1692.
    [10]Zhang Zhancheng, Wang Shitong, Fu-Lai Chung. Collaborative Classification Mechanism for Privacy-Preserving[J]. Journal of Computer Research and Development, 2011, 48(6): 1018-1028.

Catalog

    Article views (1625) PDF downloads (794) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return