Cloud Key-Value Storage

dc.citation.epage141
dc.citation.issue2
dc.citation.spage133
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorPykulytsky, Oleh
dc.contributor.authorHavano, Bohdan
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2024-02-19T09:44:35Z
dc.date.available2024-02-19T09:44:35Z
dc.date.created2023-02-28
dc.date.issued2023-02-28
dc.description.abstractThe paper represents all the stages of designing, architecting, and developing cloud-based key-value storage. This work aims to bring new approaches to distributed data systems. The authors focus on the security and productivity of the project as well as security and maintainability. The authors have studied the use of hash tables in a multithreaded environment. Architectural approaches and tools have been described. The general structure of the keyvalue storage server has been presented. The server algorithm has been presented. Our research delves into the intricate nuances of utilizing hash tables in a multithreaded environment, shedding light on the intricacies and challenges of managing concurrent access to keyvalue data structures. The authors have explored the tradeoffs between lock-free designs and traditional locking approaches.
dc.format.extent133-141
dc.format.pages9
dc.identifier.citationPykulytsky O. Cloud Key-Value Storage / Oleh Pykulytsky, Bohdan Havano // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 8. — No 2. — P. 133–141.
dc.identifier.citationenPykulytsky O. Cloud Key-Value Storage / Oleh Pykulytsky, Bohdan Havano // Advances in Cyber-Physical Systems. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 8. — No 2. — P. 133–141.
dc.identifier.doidoi.org/10.23939/acps2023.02.133
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/61341
dc.language.isoen
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofAdvances in Cyber-Physical Systems, 2 (8), 2023
dc.relation.referencesA. Melnyk, Y. Morozov, B. Havano and P. Hupalo, (2021). Protection of Biometric Data Transmission and Storage in the Human State Remote Monitoring Tools. 11th IEEE In- ternational Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applica- tions (IDAACS), Cracow, Poland, vol. 1, pp. 301–306, DOI: 10.1109/IDAACS53288.2021.9661047
dc.relation.referencesMazumdar, S., Seybold, D., Kritikos, K., & Verginadis, G., (2019). A survey on data storage and placement method- ologies for Cloud-Big Data ecosystem. Journal of Big Data, vol. 6, pp. 1–37. DOI: https://doi.org/10.1186/s40537-019-0178-3
dc.relation.referencesAwan, I., Younas, M., & Benbernou, S., (2021). Conver- gence of cloud, Internet of Things, and big data: new plat- forms and applications. Concurrency and Computation: Practice and Experience, vol. 33, no. 23, pp. 1–3. DOI: 10.1002/cpe.6668
dc.relation.referencesSadeeq, M.A., Abdulkareem, N.M., Zeebaree, S.R., Ah-med, D.M., Sami, A.S., & Zebari, R.R., (2021). IoT and Cloud Computing Issues, Challenges and Opportunities: A Review. Qubahan Academic Journal, vol. 1, no. 2, pp. 1–7. DOI: https://doi.org/10.48161/qaj.v1n2a36
dc.relation.referencesGan, Y., Zhang, Y., Cheng, D., Shetty, A., Rathi, P., Katarki, N., Bruno, A., Hu, J., Ritchken, B., Jackson, B., Hu, K., Pancholi, M., He, Y., Clancy, B., Colen, C., Wen, F., Leung, C., Wang, S., Zaruvinsky, L., Espinosa Zar- lenga, M., Lin, R., Liu, Z., Padilla, J., & Delimitrou, C., (2019). An Open-Source Benchmark Suite for Microser- vices and Their Hardware-Software Implications for Cloud & Edge Systems. Proceedings of the Twenty-Fourth Inter- national Conference on Architectural Support for Pro- gramming Languages and Operating Systems, pp. 3–18.DOI: https://doi.org/10.1145/3297858.3304013
dc.relation.referencesVladyslav Kotyk, Yevhenii Vavruk, (2022). Comparative Analysis of Server and Serverless Cloud Computing Plat- forms, Advances in Cyber-Physical Systems, vol. 7, no. 2, pp. 115–120. DOI: https://doi.org/10.23939/acps2022.02.115
dc.relation.referencesTaehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh, (2019). ShieldStore: Shielded In- memory Key-value Storage with SGX. Proceedings of the Fourteenth EuroSys Conference 2019, March 25–28, 2019, Dresden, Germany. ACM, New York, NY, USA, pp. 1–15. DOI: https://doi.org/10.1145/3302424.3303951
dc.relation.referencesChen, Y., Lu, Y., Yang, F., Wang, Q., Wang, Y., & Shu, J., (2020). FlatStore: An Efficient Log-Structured Key-Value Storage Engine for Persistent Memory. Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Sys- tems, pp. 1077–1091. DOI: https://doi.org/10.1145/3373376.3378515
dc.relation.referencesLim, H., Han, D., Andersen, D.G., & Kaminsky, M., (2014). MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. 11th USENIX Symposium on Net- worked Systems Design and Implementation (NSDI ’14), vol. 39, no. 4, pp. 429–444. DOI: 10.5555/2616448.
dc.relation.referencesenA. Melnyk, Y. Morozov, B. Havano and P. Hupalo, (2021). Protection of Biometric Data Transmission and Storage in the Human State Remote Monitoring Tools. 11th IEEE In- ternational Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applica- tions (IDAACS), Cracow, Poland, vol. 1, pp. 301–306, DOI: 10.1109/IDAACS53288.2021.9661047
dc.relation.referencesenMazumdar, S., Seybold, D., Kritikos, K., & Verginadis, G., (2019). A survey on data storage and placement method- ologies for Cloud-Big Data ecosystem. Journal of Big Data, vol. 6, pp. 1–37. DOI: https://doi.org/10.1186/s40537-019-0178-3
dc.relation.referencesenAwan, I., Younas, M., & Benbernou, S., (2021). Conver- gence of cloud, Internet of Things, and big data: new plat- forms and applications. Concurrency and Computation: Practice and Experience, vol. 33, no. 23, pp. 1–3. DOI: 10.1002/cpe.6668
dc.relation.referencesenSadeeq, M.A., Abdulkareem, N.M., Zeebaree, S.R., Ah-med, D.M., Sami, A.S., & Zebari, R.R., (2021). IoT and Cloud Computing Issues, Challenges and Opportunities: A Review. Qubahan Academic Journal, vol. 1, no. 2, pp. 1–7. DOI: https://doi.org/10.48161/qaj.v1n2a36
dc.relation.referencesenGan, Y., Zhang, Y., Cheng, D., Shetty, A., Rathi, P., Katarki, N., Bruno, A., Hu, J., Ritchken, B., Jackson, B., Hu, K., Pancholi, M., He, Y., Clancy, B., Colen, C., Wen, F., Leung, C., Wang, S., Zaruvinsky, L., Espinosa Zar- lenga, M., Lin, R., Liu, Z., Padilla, J., & Delimitrou, C., (2019). An Open-Source Benchmark Suite for Microser- vices and Their Hardware-Software Implications for Cloud & Edge Systems. Proceedings of the Twenty-Fourth Inter- national Conference on Architectural Support for Pro- gramming Languages and Operating Systems, pp. 3–18.DOI: https://doi.org/10.1145/3297858.3304013
dc.relation.referencesenVladyslav Kotyk, Yevhenii Vavruk, (2022). Comparative Analysis of Server and Serverless Cloud Computing Plat- forms, Advances in Cyber-Physical Systems, vol. 7, no. 2, pp. 115–120. DOI: https://doi.org/10.23939/acps2022.02.115
dc.relation.referencesenTaehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh, (2019). ShieldStore: Shielded In- memory Key-value Storage with SGX. Proceedings of the Fourteenth EuroSys Conference 2019, March 25–28, 2019, Dresden, Germany. ACM, New York, NY, USA, pp. 1–15. DOI: https://doi.org/10.1145/3302424.3303951
dc.relation.referencesenChen, Y., Lu, Y., Yang, F., Wang, Q., Wang, Y., & Shu, J., (2020). FlatStore: An Efficient Log-Structured Key-Value Storage Engine for Persistent Memory. Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Sys- tems, pp. 1077–1091. DOI: https://doi.org/10.1145/3373376.3378515
dc.relation.referencesenLim, H., Han, D., Andersen, D.G., & Kaminsky, M., (2014). MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. 11th USENIX Symposium on Net- worked Systems Design and Implementation (NSDI ’14), vol. 39, no. 4, pp. 429–444. DOI: 10.5555/2616448.
dc.relation.urihttps://doi.org/10.1186/s40537-019-0178-3
dc.relation.urihttps://doi.org/10.48161/qaj.v1n2a36
dc.relation.urihttps://doi.org/10.1145/3297858.3304013
dc.relation.urihttps://doi.org/10.23939/acps2022.02.115
dc.relation.urihttps://doi.org/10.1145/3302424.3303951
dc.relation.urihttps://doi.org/10.1145/3373376.3378515
dc.rights.holder© Національний університет “Львівська політехніка”, 2023
dc.rights.holder© Pykulytskyi O., Havano B., 2023
dc.subjectcloud storage
dc.subjectmultithreading
dc.subjectkey-value storage
dc.subjectlock-free
dc.titleCloud Key-Value Storage
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Thumbnail Image
Name:
2023v8n2_Pykulytsky_O-Cloud_Key_Value_Storage_133-141.pdf
Size:
246.72 KB
Format:
Adobe Portable Document Format
Thumbnail Image
Name:
2023v8n2_Pykulytsky_O-Cloud_Key_Value_Storage_133-141__COVER.png
Size:
544.78 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.76 KB
Format:
Plain Text
Description: