• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiao Zhongzheng, Chen Ningjiang, Wei Jun, Zhang Wenbo. A High Performance Management Schema of Metadata Clustering for Large-Scale Data Storage Systems[J]. Journal of Computer Research and Development, 2015, 52(4): 929-942. DOI: 10.7544/issn1000-1239.2015.20131911
Citation: Xiao Zhongzheng, Chen Ningjiang, Wei Jun, Zhang Wenbo. A High Performance Management Schema of Metadata Clustering for Large-Scale Data Storage Systems[J]. Journal of Computer Research and Development, 2015, 52(4): 929-942. DOI: 10.7544/issn1000-1239.2015.20131911

A High Performance Management Schema of Metadata Clustering for Large-Scale Data Storage Systems

More Information
  • Published Date: March 31, 2015
  • An efficient, decentralized metadata management schema plays a vital role in large-scale distributed storage systems. The Hash-based partition schema and tree-based partition schema pay huge cost for expansion, and are sensitive to changes in cluster. In response to these problems, CH-MMS(consistent Hash based metadata management schema), is proposed. Virtual MDS (metadata server) is introduced in CH-MMS, and good effect for the cluster’s load balance is proved. Combining the standby mechanism with lazy-update policy, CH-MMS achieves fast failover and zero migration when the cluster changes. Due to its distributed metadata structure, CH-MMS has fast metadata lookup speed. In order to solve the problem that the Hash structure will cause damage to file system hierarchical semantics, a simple and flexible mechanism based on regular expression matching has been introduced. The following work is presented in the paper: 1)Expound the architecture of CH-MMS; 2)Introduce the core data structure of layout-table, virtual MDS and lazy-update policy, and their relevant algorithms; 3)Qualitatively analyze scalability and fault tolerance. The prototype system and simulation show that, CH-MMS is metadata-balancing and has fast failover, flexible expansion and zero migration when cluster changes. CH-MMS can meet the needs of flexible, efficient metadata management of large-scale storage systems with increasing data.
  • Related Articles

    [1]Zhou Yuanding, Gao Guopeng, Fang Yaodong, Qin Chuan. Perceptual Authentication Hashing with Image Feature Fusion Based on Window Self-Attention[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202330669
    [2]Huang Yicai, Yu Bin, Li Sensen. A Searchable Symmetric Encryption Scheme Based on SRE[J]. Journal of Computer Research and Development, 2023, 60(12): 2725-2736. DOI: 10.7544/issn1000-1239.202220267
    [3]Yao Hailong, Wang Caifen, Xu Qinbai, Li Wenting. A Distributed Biometric Authentication Protocol Based on Homomorphic Encryption[J]. Journal of Computer Research and Development, 2019, 56(11): 2375-2383. DOI: 10.7544/issn1000-1239.2019.20190293
    [4]Wei Songjie, Li Shuai, Mo Bing, Wang Jiahe. Regional Cooperative Authentication Protocol for LEO Satellite Networks Based on Consensus Mechanism[J]. Journal of Computer Research and Development, 2018, 55(10): 2244-2255. DOI: 10.7544/issn1000-1239.2018.20180431
    [5]Wu Libing, Fan Jing, Wang Jing, Nie Lei, Wang Hao. Emergency Message Broadcast Method Based on Huffman-Like Coding[J]. Journal of Computer Research and Development, 2017, 54(11): 2475-2486. DOI: 10.7544/issn1000-1239.2017.20170368
    [6]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [7]Zhang Qikun, Wang Ruifang, Tan Yu'an. Identity-Based Authenticated Asymmetric Group Key Agreement[J]. Journal of Computer Research and Development, 2014, 51(8): 1727-1738. DOI: 10.7544/issn1000-1239.2014.20121165
    [8]Dai Hua, Yang Geng, Qin Xiaolin, Liu Liang. Privacy-Preserving Top-k Query Processing in Two-Tiered Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2013, 50(6): 1239-1252.
    [9]Xu Jian, Zhou Fucai, Yang Muzhou, Li Fuxiang, Zhu Zhiliang. Hierarchical Hash List for Distributed Query Authentication[J]. Journal of Computer Research and Development, 2012, 49(7): 1533-1544.
    [10]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.

Catalog

    Article views (1410) PDF downloads (879) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return