Towards securing data transfers against silent data corruption

Batyr Charyyev, Ahmed Alhussen, Hemanta Sapkota, Eric Pouyoul, Mehmet Hadi Gunes, Engin Arslan

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations

    Abstract

    Scientific applications generate large volumes of data that often needs to be moved between geographically distributed sites for collaboration or backup which has led to a significant increase in data transfer rates. As an increasing number of scientific applications are becoming sensitive to silent data corruption, end-to-end integrity verification has been proposed. It minimizes the likelihood of silent data corruption by comparing checksum of files at the source and the destination using secure hash algorithms such as MD5 and SHA1. In this paper, we investigate the robustness of existing end-to-end integrity verification approaches against silent data corruption and propose a Robust Integrity Verification Algorithm (RIVA) to enhance data integrity. Extensive experiments show that unlike existing solutions, RIVA is able to detect silent disk corruptions by invalidating file contents in page cache and reading them directly from disk. Since RIVA clears page cache and reads file contents directly from the disk, it incurs delay to execution time. However, by running transfer, cache invalidation, and checksum operations concurrently, RIVA is able to keep its overhead below 15% in most cases compared to the state-of-the-art solutions in exchange of increasing the robustness to silent data corruption. We also implemented dynamic transfer and checksum parallelism to overcome performance bottlenecks and observed more than 5x increase in RIVA's speed.

    Original languageEnglish
    Title of host publicationProceedings - 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2019
    Pages262-271
    Number of pages10
    ISBN (Electronic)9781728109121
    DOIs
    StatePublished - May 2019
    Event19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2019 - Larnaca, Cyprus
    Duration: 14 May 201917 May 2019

    Publication series

    NameProceedings - 19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2019

    Conference

    Conference19th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2019
    Country/TerritoryCyprus
    CityLarnaca
    Period14/05/1917/05/19

    Keywords

    • End to end integrity
    • Silent data corruption
    • Undetected read error
    • Undetected write error

    Fingerprint

    Dive into the research topics of 'Towards securing data transfers against silent data corruption'. Together they form a unique fingerprint.

    Cite this