A Collision-Mitigation Cuckoo Hashing Scheme for Large-Scale Storage Systems

作者: Yuanyuan Sun , Yu Hua , Dan Feng , Ling Yang , Pengfei Zuo

DOI: 10.1109/TPDS.2016.2594763

关键词:

摘要: With the rapid growth of amount information, cloud computing servers need to process and analyze large amounts high-dimensional unstructured data timely accurately. This usually requires many query operations. Due simplicity ease use, cuckoo hashing schemes have been widely used in real-world cloud-related applications. However, due potential hash collisions, suffers from endless loops high insertion latency, even risks re-construction entire table. In order address these problems, we propose a cost-efficient scheme, called MinCounter. The idea behind MinCounter is alleviate occurrence by selecting unbusy kicking-out routes. selects “cold” (infrequently accessed), rather than random, buckets handle collisions. We further improve concurrency scheme pursue higher performance adapt concurrent has salient features offering efficient services delivering servers, as well enhancing experiences for users. implemented large-scale testbed examined using three traces. Extensive experimental results demonstrate efficacy efficiency

参考文章(58)
Paul E. McKenney, Jonathan Walpole, Josh Triplett, Resizable, scalable, concurrent hash tables via relativistic programming usenix annual technical conference. pp. 11- 11 ,(2011)
Reinhard Kutzelnigg, Bipartite Random Graphs and Cuckoo Hashing Discrete Mathematics & Theoretical Computer Science. pp. 403- 406 ,(2006)
Bin Fan, David G. Andersen, Michael Kaminsky, MemC3: compact and concurrent MemCache with dumber caching and smarter hashing networked systems design and implementation. ,vol. 2013, pp. 371- 384 ,(2013)
Eyal Kushilevitz, Rafail Ostrovsky, Steve Lu, On the (in)security of hash-based oblivious RAM and a new balancing scheme symposium on discrete algorithms. pp. 143- 156 ,(2012) , 10.5555/2095116.2095129
Chuck Pheatt, Intel® threading building blocks Journal of Computing Sciences in Colleges. ,vol. 23, pp. 298- 298 ,(2008)
Michael Mitzenmacher, Some Open Questions Related to Cuckoo Hashing european symposium on algorithms. pp. 1- 10 ,(2009) , 10.1007/978-3-642-04128-0_1
Sudipta Sengupta, Biplob Debnath, Jin Li, ChunkStash: speeding up inline storage deduplication using flash memory usenix annual technical conference. pp. 16- 16 ,(2010)
John Kelsey, Bruce Schneier, Second preimages on n -bit hash functions for much less than 2 n work theory and application of cryptographic techniques. pp. 474- 490 ,(2005) , 10.1007/11426639_28
Jeffrey S. Vitter, Wen-Chin Chen, Design and Analysis of Coalesced Hashing ,(1986)
J. Ian Munro, Pedro Celis, Techniques for collision resolution in hash tables with open addressing fall joint computer conference. pp. 601- 610 ,(1986) , 10.5555/324493.324618