Open Access   Article Go Back

Amazon Backed File System: A Review

S.Malhotra 1 , V. Bali2

  1. Department of CSE, Panipat Institute of Engineering and Technology, Samalkha, Haryana, India.
  2. Department of CSE, Panipat Institute of Engineering and Technology, Samalkha, Haryana, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-4 , Page no. 317-321, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i4.317321

Online published on Apr 30, 2018

Copyright © S.Malhotra, V. Bali . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.Malhotra, V. Bali, “Amazon Backed File System: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.4, pp.317-321, 2018.

MLA Style Citation: S.Malhotra, V. Bali "Amazon Backed File System: A Review." International Journal of Computer Sciences and Engineering 6.4 (2018): 317-321.

APA Style Citation: S.Malhotra, V. Bali, (2018). Amazon Backed File System: A Review. International Journal of Computer Sciences and Engineering, 6(4), 317-321.

BibTex Style Citation:
@article{Bali_2018,
author = {S.Malhotra, V. Bali},
title = {Amazon Backed File System: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2018},
volume = {6},
Issue = {4},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {317-321},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1892},
doi = {https://doi.org/10.26438/ijcse/v6i4.317321}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i4.317321}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1892
TI - Amazon Backed File System: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - S.Malhotra, V. Bali
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 317-321
IS - 4
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
492 328 downloads 200 downloads
  
  
           

Abstract

Cloud Computing is one of the major emerging IT technologies and is highly promising in terms of resources provisioning, unlimited data storage, remote access to applications, easy data backup amenity etc. One of its emerging platforms is AWS S3. It provides storage for the web. It serves developers/users with easy web-scale computing platform. This platform is reliable, scalable, inexpensive and efficient and provides persistent cloud storage. Amazon S3 and amazon.com share common scalable storage root in terms of their infrastructure. The data here is stored in fundamental containers called buckets. A bucket has the capacity to store limitless data. Infinite objects can be stored in a bucket, with each object being able to store a maximum of 5 TB of data. These objects require a unique developer-assigned key to be stored and retrieved by the developers. The data stored this way can be downloaded any instant of time by any user. Permissions to upload or download data to one’s own bucket can be granted or denied. The web service always keeps the data secure from unauthorized access using its invulnerable authentication mechanism. Various operations can be executed through the API such as Read an object, delete an object, list keys etc. Amazon S3 associates REST and SOAP API interfaces.

Key-Words / Index Term

Cloud Computing, Cloud Storage, Amazon Web Services, Bucket, Folder, File, Hierarchy, Flat File System

References

[1] R. Uhlig et. al., Microsoft Cloud Technology, IEEE Internet Computing, May 2005, Vol. 38, No. 5.

[2] Shivlal Mewada, Umesh Kumar Singh and Pradeep Sharma, "Security Enhancement in Cloud Computing (CC)", ISROSET-International Journal of Scientific Research in Computer Science and Engineering, Vol.-01, Issue-01, pp (31- 37), Jan -Feb 2013.

[3] A. Bessani, M. Correia, B. Quaresma, F. Andr´e, and P. Sousa. DepSky: Dependable and Secure Storage in a Cloud-of-Clouds. In EuroSys 2011, Apr. 2011.

[4] Parneet Kaur and Sachin Majithia, "Various Aspects for Data Migration in Cloud Computing and Related Reviews", International Journal of Computer Sciences and Engineering, Volume-02, Issue-07, Page No (83-85), Jul -2014, E-ISSN: 2347-2693

[5] N. Zhu, J. Chen, and T.-C. Chiueh. TBBT: Scalable and Accurate Trace Replay for File Server Evaluation. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST), Dec. 2005.

[6] A. Muthitacharoen, R. Morris, T. M. Gil, and B. Chen. Ivy: A Read/Write Peer-to-Peer File System. In Proceedings of the 5th Conference on Symposium on Operating Systems Design and Implementation (OSDI), Dec. 2002.

[7] Omer Y. Adam, Young Choon Lee, and Albert Y. Zomaya, “Constructing Performance-Predictable Clusters with Performance-Varying Resources of Clouds”, 2016.

[8]S. Narula. “CLOUD COMPUTING SECURITY:
AMAZON WEB SERVICE”. 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015.

[9]J. Howard, M. Kazar, S. Nichols, D. Nichols, M. Satyanarayanan, R. Sidebotham, and M. West. Scale and Performance in a Distributed File System. ACM Transactions on Computer Systems (TOCS), 6(1):51–81, Feb. 1988.

[10] Jesús Hernández Martin, Ioan Raicu. Performance evaluation of AWS; Exploring storage alternatives in Amazon Web Services. http://datasys.cs.iit.edu/reports/2012_AWS-storage-benchmarks-TR.pdf.

[11] R. Kotla, L. Alvisi, and M. Dahlin. SafeStore: A Durable and Practical Storage System. In Proceedings of the 2007 USENIX Annual Technical Conference, June 2007.

[12] J. Li, M. Krohn, D. Mazi`eres, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proceedings of the 6th Conference on Symposium on Operating Systems Design and Implementation (OSDI), Dec. 2004.

[13] P. Mahajan, S. Setty, S. Lee, A. Clement, L. Alvisi, M. Dahlin, and M. Walfish. Depot: Cloud Storage with Minimal Trust. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (OSDI), Oct. 2010.

[14] Meiko Jensen, JorgSehwenk et al. “ 2015 Fifth International Conference on Advanced Computing & Communication Technologies, 2015.

[15] Yibin Li, Keke Gai, Longfei Qiu, Meikang Qiu, Hui Zhao, “Intelligent cryptography approach for secure distributed big data storage in cloud computing”, 2017.

[16] Simson L. Garfinkel. An Evaluation of Amazon’s Grid Computing Services: EC2, S3 and SQS. https://dash.harvard.edu/bitstream/handle/1/24829568/tr-08-07.pdf?sequence=1

[17] R. Pike, D. Presotto, S. Dorward, B. Flandrena,
K. Thompson, H. Trickey, and P. Winterbottom. Plan 9
From Bell Labs. USENIX Computing Systems, 8(3):221–254, Summer 1995.

[18] S. Quinlan and S. Dorward. Venti: a new approach to archival storage. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST), 2002.

[19] P.Shanthi Bala,” Intensification of Educational Cloud Computing and Crisis of Data Security in Public Clouds”,IJCSE Vol. 02, No. 03, 2010, 741-745.

[21] M. Rosenblum and J. K. Ousterhout. The Design and Implementation of a Log-Structured File System. ACM Transactions on Computer Systems (TOCS), 10(1):26–52, 1992.

[22] C. Ruemmler and J. Wilkes. A trace-driven analysis of disk working set sizes. Technical Report HPL-OSR-93-23, HP Labs, Apr. 1993.

[23] R. Sandberg, D. Goldberg, S. Kleirnan, D. Walsh, and B. Lyon. Design and Implementation of the Sun Network Filesystem. In Proceedings of the Summer USENIX Technical Conference, pages 119–130, 1985.

[24] J. Satran, K. Meth, C. Sapuntzakis, M. Chadalapaka,and E. Zeidner. Internet Small Computer Systems Interface(iSCSI), Apr. 2004. RFC 3720, http://tools.ietf.org/html/rfc3720.

[25] M. Vrable, S. Savage, and G. M. Voelker. Cumulus:Filesystem Backup to the Cloud. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST), Feb. 2009.