Exploring heterogeneity of unreliable machines for P2P backup

@article{Skowron2013ExploringHO,
  title={Exploring heterogeneity of unreliable machines for P2P backup},
  author={Piotr Skowron and Krzysztof Rzadca},
  journal={2013 International Conference on High Performance Computing & Simulation (HPCS)},
  year={2013},
  pages={91-98}
}
  • Piotr Skowron, Krzysztof Rzadca
  • Published 2013
  • Computer Science
  • 2013 International Conference on High Performance Computing & Simulation (HPCS)
  • P2P architecture is a viable option for enterprise backup. In contrast to dedicated backup servers, nowadays a standard solution, making backups directly on organization's workstations should be cheaper (as existing hardware is used), more efficient (as there is no single bottleneck server) and more reliable (as the machines are geographically dispersed). We present the architecture of a p2p backup system that uses pairwise replication contracts between a data owner and a replicator. In… CONTINUE READING
    4 Citations
    Dfuntest: A Testing Framework for Distributed Applications
    • 1
    • PDF
    Resource allocation in selfish and cooperative distributed systems

    References

    SHOWING 1-10 OF 79 REFERENCES
    Data transfer scheduling for P2P storage
    • 20
    • PDF
    Efficient peer-to-peer backup services through buffering at the edge
    • 16
    • PDF
    Efficient Replica Maintenance for Distributed Storage Systems
    • 304
    • PDF
    HYDRAstor: A Scalable Secondary Storage
    • 244
    • Highly Influential
    • PDF
    Online Data Backup: A Peer-Assisted Approach
    • 53
    • PDF
    A measurement study of the Wuala on-line storage service
    • 53
    • PDF
    Availability and Redundancy in Harmony: Measuring Retrieval Times in P2P Storage Systems
    • 16
    Taming aggressive replication in the Pangaea wide-area file system
    • 191
    • PDF
    Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses
    • 85
    • PDF
    Enforcing fairness in P2P storage systems using asymmetric reciprocal exchanges
    • 8