Dynamic Storlets in Storage System Data Path

作者: Simona Cohen , Ealan Abraham Henis , John Michael Marberg , Kenneth Gideon Nagin , None

DOI:

关键词: Computer networkComputer scienceInformation repositoryComputer data storageService (systems architecture)Node (networking)Data accessData storage systemData pathAuthentication

摘要: Machines, systems and methods for dynamically implementing storlets in a storage data path. The method comprises receiving request to perform storage-related function on stored first medium system; verifying the by way of an authentication authorization mechanism prevent unauthorized access utilizing storlet service request, wherein is deployed node system such that has sufficient resources support request.

参考文章(18)
Edmund B. Nightingale, Owen Hofmann, Yutaka Suzue, Jeremy Elson, Jon Howell, Jinliang Fan, Flat datacenter storage operating systems design and implementation. pp. 1- 15 ,(2012) , 10.5555/2387880.2387882
Matthew C. Pierret, Chris Stillwell, William Sprott Greene, James A. Robertson, System and method for creating and managing survivable, service hosting networks ,(2002)
Elliot K Kolodner, Sivan Tal, Dimosthenis Kyriazis, Dalit Naor, Miriam Allalouf, Lucia Bonelli, Per Brand, Albert Eckert, Erik Elmroth, Spyridon V Gogouvitis, Danny Harnik, Francisco Hernandez, Michael C Jaeger, Ewnetu Bayuh Lakew, Jose Manuel Lopez, Mirko Lorenz, Alberto Messina, Alexandra Shulman-Peleg, Roman Talyansky, Athanasios Voulodimos, Yaron Wolfsthal, None, A Cloud Environment for Data-intensive Storage Services ieee international conference on cloud computing technology and science. pp. 357- 366 ,(2011) , 10.1109/CLOUDCOM.2011.55
S. Rabinovici-Cohen, D.L. Giaretta, P. Reshef, L. Ramati, J. Satran, M. Factor, D. Naor, Preservation DataStores: Architecture for Preservation Aware Storage ieee conference on mass storage systems and technologies. pp. 3- 15 ,(2007) , 10.1109/MSST.2007.27
James Ivan Stafford, Jun Shan Wey, Devices, Systems, and Methods Regarding Advertisement on Demand ,(2008)
Paul Durrant, Data encryption and decryption ,(2002)
Jan Heiler, Frank Brunswig, Martin Helm, Wolfgang Nieswand, Joerg Rosbach, Co-execution of objects from divergent runtime environments ,(2007)