Title :
Designing Dependable Storage Solutions for Shared Application Environments
Author :
Gaonkar, Shravan ; Keeton, Kimberly ; Merchant, Arif ; Sanders, William H.
Author_Institution :
Coordinated Sci. Lab., Univ. of Illinois, Urbana, IL, USA
Abstract :
The costs of data loss and unavailability can be large, so businesses use many data protection techniques such as remote mirroring, snapshots, and backups to guard against failures. Choosing an appropriate combination of techniques is difficult because there are numerous approaches for protecting data and allocating resources. Storage system architects typically use ad hoc techniques, often resulting in overengineered expensive solutions or underprovisioned inadequate ones. In contrast, this paper presents a principled automated approach for designing dependable storage solutions for multiple applications in shared environments. Our contributions include search heuristics for intelligent exploration of the large design space and modeling techniques for capturing interactions between applications during recovery. Using realistic storage system requirements, we show that our design tool produces designs that cost up to two times less in initial outlays and expected data penalties than the designs produced by an emulated human design process. Additionally, we compare our design tool to a random search heuristic and a genetic algorithm metaheuristic, and show that our approach consistently produces better designs for the cases we have studied. Finally, we study the sensitivity of our design tool to several input parameters.
Keywords :
security of data; storage management; data protection techniques; dependable storage solutions; genetic algorithm metaheuristic; principled automated approach; random search heuristic; shared application environments; storage system; Algorithm design and analysis; Costs; Discrete event simulation; Genetic algorithms; Humans; Process design; Protection; Resource management; Space exploration; Storage automation; Backup procedures; Data protection techniques; Maintenance; Reliability; Secondary storage; Testing; and Fault-Tolerance; design space exploration; discrete-event simulation; genetic algorithm; search heuristic; storage system design.;
Journal_Title :
Dependable and Secure Computing, IEEE Transactions on
DOI :
10.1109/TDSC.2008.38