{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T03:25:09Z","timestamp":1740108309650,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T00:00:00Z","timestamp":1553817600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s00607-019-00714-7","type":"journal-article","created":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T08:02:23Z","timestamp":1553846543000},"page":"1861-1884","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient techniques of parallel recovery for erasure-coding-based distributed file systems"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9576-3163","authenticated-orcid":false,"given":"Dong-Oh","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hong-Yeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Young-Kyun","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0125-1907","authenticated-orcid":false,"given":"Jeong-Joon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,29]]},"reference":[{"key":"714_CR1","unstructured":"Nicloe H (2017) An Exascale timeline for storage and I\/O systems. The Next Platform. \n                    https:\/\/www.nextplatform.com\/2017\/08\/16\/exascale-timeline-storage-io-systems\/\n                    \n                  . Accessed 21 Mar 2019"},{"issue":"1","key":"714_CR2","doi-asserted-by":"publisher","first-page":"116","DOI":"10.14529\/jsfi140106","volume":"1","author":"JM Kunkel","year":"2014","unstructured":"Kunkel JM, Kuhn M, Ludwig T (2014) Exascale storage systems\u2014an analytical study of expenses. Supercomput Front Innov 1(1):116\u2013134. \n                    https:\/\/doi.org\/10.14529\/jsfi140106","journal-title":"Supercomput Front Innov"},{"key":"714_CR3","unstructured":"Bergman K, Borkar S, Campbell D, Carlson W, Dally W, Denneau M, Franzon P, Harrod W, Hill K, Hiller J, Karp S, Keckler S, Klein D, Lucas R, Richards M, Scarpelli A, Scott S, Snavely A, Sterling T, Williams RS, Yelick K (2018) ExaScale computing study: technology challenges in achieving exascale systems, Defense Advanced Research Projects Agency Information Processing Techniques Office (DARPA IPTO). Tech., vol 15. \n                    http:\/\/www.cse.nd.edu\/Reports\/2008\/TR-2008-13.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR4","unstructured":"Chun BG, Dabek F, Haeberlen A, Sit E, Weatherspoon H, Kaashoek MF, Kubiatowicz J, Morris R (2006) Efficient replica maintenance for distributed storage systems. In: NSDI\u201906 Proceedings of the 3rd conference on networked systems design & implementation, vol 6, pp 45\u201358. \n                    http:\/\/usenix.org\/events\/nsdi06\/tech\/full_papers\/chun\/chun.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR5","first-page":"304","volume":"63","author":"JD Cook","year":"2014","unstructured":"Cook JD, Primmer R, de Kwant A (2014) Compare cost and performance of replication and erasure coding. Hitachi Rev 63:304","journal-title":"Hitachi Rev"},{"issue":"5","key":"714_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.14778\/2535573.2488339","volume":"6","author":"M Sathiamoorthy","year":"2013","unstructured":"Sathiamoorthy M, Asteris M, Papailiopoulos D, Dimakis AG, Vadali R, Chen S, Borthakur D (2013) Xoring elephants: novel erasure codes for big data. Proc VLDB Endow 6(5):325\u2013336. \n                    https:\/\/doi.org\/10.14778\/2535573.2488339","journal-title":"Proc VLDB Endow"},{"key":"714_CR7","doi-asserted-by":"crossref","unstructured":"Rodrigues R, Liskov B (2005) High availability in DHTs: erasure coding vs. replication. In: International workshop on peer-to-peer systems. Springer, pp 226\u2013239. \n                    http:\/\/dx.doi.org\/10.1007\/11558989_21","DOI":"10.1007\/11558989_21"},{"key":"714_CR8","unstructured":"Shenoy A (2015) The Pros and Cons of erasure coding & replication vs. RAID in. Next-Gen Storage Platforms, HEDVIG. \n                    http:\/\/www.snia.org\/sites\/default\/files\/SDC15_presentations\/datacenter_infra\/Shenoy_The_Pros_and_Cons_of_Erasure_v3-rev.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR9","doi-asserted-by":"crossref","unstructured":"Gligoroski D, Kralevska K, Jensen RE, Simonsen P (2017) Repair duality with locally repairable and locally regenerating codes. In: 3rd International conference on big data intelligence and computing and cyber science and technology congress, pp 979\u2013984. \n                    http:\/\/dx.doi.org\/10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.162","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.162"},{"issue":"3","key":"714_CR10","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/TST.2013.6522585","volume":"18","author":"J Li","year":"2013","unstructured":"Li J, Li B (2013) Erasure coding for cloud storage systems: a survey. Tsinghua Sci Technol 18(3):259\u2013272. \n                    https:\/\/doi.org\/10.1109\/TST.2013.6522585","journal-title":"Tsinghua Sci Technol"},{"issue":"4","key":"714_CR11","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TBDATA.2017.2749255","volume":"4","author":"K Kralevska","year":"2018","unstructured":"Kralevska K, Gligoroski D, Jensen RE, \u00d8verby H (2018) HashTag erasure codes: from theory to practice. IEEE Trans Big Data 4(4):516\u2013529. \n                    https:\/\/doi.org\/10.1109\/TBDATA.2017.2749255","journal-title":"IEEE Trans Big Data"},{"key":"714_CR12","unstructured":"Pamies-Juarez L, Blagojevic F, Mateescu R, Gyuot C, Gad EE, Bandic Z (2016) Opening the chrysalis: On the real repair performance of MSR codes, In 14th USENIX conference on file and storage technologies (FAST 16). USENIX Association, pp 81\u201394"},{"key":"714_CR13","unstructured":"Apache Hadoop 3.0.0. Apache \n                    http:\/\/hadoop.apache.org\/docs\/r3.0.0-alpha4"},{"key":"714_CR14","unstructured":"Erasure Coding Support inside HDFS, Apache. \n                    https:\/\/issues.apache.org\/jira\/browse\/HDFS-7285\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR15","unstructured":"Li R, Zhang Z, Zheng K, Wang A (2016) Progress report: bringing erasure coding to Apache Hadoop. Cloudera Engineering Blog. \n                    http:\/\/blog.cloudera.com\/blog\/2016\/02\/progress-report-bringing-erasure-coding-to-apache-hadoop\/\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR16","unstructured":"Ceph Storage Cluster, ceph. \n                    http:\/\/docs.ceph.com\/docs\/master\/rados\/\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR17","unstructured":"Red Hat Gluster Storage, redhat. \n                    https:\/\/access.redhat.com\/products\/red-hat-storage\/\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR18","unstructured":"Huang C, Simitci H, Xu Y, Ogus A, Calder B, Gopalan P, Li J, Yekhanin S (2012) Erasure coding in windows Azure storage. In: 2012 USENIX annual technical conference, pp 15\u201326. \n                    https:\/\/www.usenix.org\/system\/files\/conference\/atc12\/atc12-final181_0.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR19","unstructured":"Plank JS, Simmerman S, Schuman CD (2008) Jerasure: a library in C\/C++ facilitating erasure coding for storage applications\u2014version 1.2, University of Tennessee, Technical Report CS-08-627, vol 23. \n                    https:\/\/web.eecs.utk.edu\/~plank\/plank\/papers\/CS-08-627.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR20","doi-asserted-by":"crossref","unstructured":"Esmaili KS, Pamies-Juarez L, Datta A (2013) The CORE storage primitive: cross-object redundancy for efficient data repair & access in erasure coded storage. arXiv preprint \n                    arXiv:1302.5192\n                    \n                  . \n                    https:\/\/arxiv.org\/pdf\/1302.5192.pdf","DOI":"10.1109\/BigData.2013.6691581"},{"issue":"9","key":"714_CR21","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"56","author":"AG Dimakis","year":"2010","unstructured":"Dimakis AG, Godfrey PB, Wu Y, Wainwright MJ, Ramchandran K (2010) Network coding for distributed storage systems. IEEE Trans Inf Theory 56(9):4539\u20134551. \n                    https:\/\/doi.org\/10.1109\/TIT.2010.2054295","journal-title":"IEEE Trans Inf Theory"},{"key":"714_CR22","doi-asserted-by":"crossref","unstructured":"Sun D, Xu Y, Li Y, Wu S, Tian C (2016) Efficient parity update for scaling RAID-like storage systems. In: 2016 IEEE international conference on networking, architecture and storage (NAS), pp 1\u201310. \n                    http:\/\/dx.doi.org\/10.1109\/NAS.2016.7549400","DOI":"10.1109\/NAS.2016.7549400"},{"key":"714_CR23","doi-asserted-by":"crossref","unstructured":"Rashmi KV, Shah NB, Gu D, Kuang H, Borthakur D, Ramchandran K (2014) A \u201chitchhiker\u2019s\u201d guide to fast and efficient data reconstruction in erasure-coded data centers. In: Proceedings of the 2014 ACM conference on SIGCOMM, vol 44, no 4, pp 331\u2013342. \n                    http:\/\/dx.doi.org\/10.1145\/2619239.2626325","DOI":"10.1145\/2619239.2626325"},{"key":"714_CR24","unstructured":"Rashmi KV, Shah NB, Gu D, Kuang H, Borthakur D, Ramchandran K (2013) A solution to the network challenges of data recovery in erasure-coded distributed storage systems: a study on the Facebook Warehouse cluster. In: 5th USENIX workshop on Hot Topics in Storage and File Systems (HotStorage). \n                    https:\/\/www.usenix.org\/system\/files\/conference\/hotstorage13\/hotstorage13-rashmi.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR25","doi-asserted-by":"publisher","unstructured":"Mohan LJ, Harold RL, Caneleo PIS, Parampalli U, Harwood A (2015) Benchmarking the performance of Hadoop triple replication and erasure coding on a nation-wide distributed cloud. In: 2015 international symposium on Network Coding (NetCod), pp 61\u201365. \n                    https:\/\/doi.org\/10.1109\/netcod.2015.7176790","DOI":"10.1109\/netcod.2015.7176790"},{"key":"714_CR26","volume-title":"Red Hat Gluster storage on supermicro storage servers powered by Intel Xeon processors","author":"B Dustin","year":"2017","unstructured":"Dustin B (2017) Red Hat Gluster storage on supermicro storage servers powered by Intel Xeon processors. Super Micro Computer, San Jose"},{"key":"714_CR27","unstructured":"Miyamae T, Nakao T, Shiozawa K (2014) Erasure code with shingled local parity groups for efficient recovery from multiple disk failures. In: 10th workshop on hot topics in system dependability. \n                    https:\/\/www.usenix.org\/system\/files\/conference\/hotdep14\/hotdep14-miyamae.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR28","doi-asserted-by":"crossref","unstructured":"Luo X, Shu J (2013) Load-balanced recovery schemes for single-disk failure in storage systems with any erasure code. In: 2013 42nd international conference on parallel processing, pp 552\u2013561. \n                    http:\/\/dx.doi.org\/10.1109\/ICPP.2013.69","DOI":"10.1109\/ICPP.2013.69"},{"key":"714_CR29","unstructured":"Considerations for RAID-6 Availability and Format\/Rebuild Performance on the DS5000, Redpaper. \n                    http:\/\/www.redbooks.ibm.com\/redpapers\/pdfs\/redp4484.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"issue":"3","key":"714_CR30","first-page":"9","volume":"10","author":"A Miranda","year":"2014","unstructured":"Miranda A, Effert S, Kang Y, Miller EL, Popov I, Brinkmann A, Friedetzky T, Cortes T (2014) Random slicing: efficient and scalable data placement for large-scale storage systems. ACM Trans Storage (TOS) 10(3):9","journal-title":"ACM Trans Storage (TOS)"},{"key":"714_CR31","doi-asserted-by":"crossref","unstructured":"Liu C, Chu X, Liu H, Leung YW (2016) ESet: placing data towards efficient recovery for large-scale erasure-coded storage systems. In: 2016 25th international conference on computer communication and networks (ICCCN), pp 1\u20139. \n                    http:\/\/dx.doi.org\/10.1109\/ICCCN.2016.7568521","DOI":"10.1109\/ICCCN.2016.7568521"},{"key":"714_CR32","doi-asserted-by":"crossref","unstructured":"Chu X, Liu C, Ouyang K, Yung LS, Liu H, Leung Y-W (2015) PErasure: a parallel Cauchy Reed-Solomon coding library for GPUs. In: 2015 IEEE international conference on communications (ICC), pp 436\u2013441. \n                    http:\/\/dx.doi.org\/10.1109\/ICC.2015.7248360","DOI":"10.1109\/ICC.2015.7248360"},{"key":"714_CR33","doi-asserted-by":"crossref","unstructured":"Mitra S, Panta R, Ra MR, Bagchi S (2016) Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. In: Proceedings of the eleventh European conference on computer systems, p 30. \n                    http:\/\/dx.doi.org\/10.1145\/2901318.2901328","DOI":"10.1145\/2901318.2901328"},{"key":"714_CR34","unstructured":"Erasure Code Support, Sheepdog Wiki. \n                    https:\/\/github.com\/sheepdog\/sheepdog\/wiki\/Erasure-Code-Support\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR35","unstructured":"Plank JS (2013) Erasure codes for storage systems, login The Usenix Magazine Sysadmin Section, vol 38, no 6. \n                    https:\/\/www.usenix.org\/system\/files\/login\/articles\/10_plank-online.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR36","unstructured":"Filesystem in Userspace, SourceForge. \n                    https:\/\/sourceforge.net\/projects\/fuse\/\n                    \n                  . Accessed 21 Mar 2019"},{"issue":"2","key":"714_CR37","doi-asserted-by":"publisher","first-page":"91","DOI":"10.3745\/KTSDE.2013.2.2.091","volume":"2","author":"YC Kim","year":"2013","unstructured":"Kim YC, Kim DO, Kim HY, Kim YK, Choi W (2013) MAHA-FS: a distributed file system for high performance metadata processing and random IO. KIPS Trans Softw Data Eng 2(2):91\u201396. \n                    https:\/\/doi.org\/10.3745\/KTSDE.2013.2.2.091","journal-title":"KIPS Trans Softw Data Eng"},{"issue":"8","key":"714_CR38","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.9717\/kmms.2016.19.8.1487","volume":"19","author":"CY Kim","year":"2016","unstructured":"Kim CY, Kim DO, Kim HY, Kim YK, Seo DW (2016) Torus network based distributed storage system for massive multimedia contents. J Korea Multimed Soc 19(8):1487\u20131497. \n                    https:\/\/doi.org\/10.9717\/kmms.2016.19.8.1487","journal-title":"J Korea Multimed Soc"},{"issue":"9","key":"714_CR39","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1002\/(SICI)1097-024X(199709)27:93.0.CO;2-6","volume":"27","author":"JS Plank","year":"1997","unstructured":"Plank JS (1997) A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw Pract Exp 27(9):995\u20131012. \n                    https:\/\/doi.org\/10.1002\/(SICI)1097-024X(199709)27:93.0.CO;2-6","journal-title":"Softw Pract Exp"},{"key":"714_CR40","doi-asserted-by":"publisher","unstructured":"Plank JS, Xu L (2016) Optimizing Cauchy Reed-solomon codes for fault-tolerant network storage applications. In: Fifth IEEE international symposium on network computing and applications (NCA\u201906), pp 173\u2013180. \n                    https:\/\/doi.org\/10.1109\/nca.2006.43","DOI":"10.1109\/nca.2006.43"},{"issue":"3","key":"714_CR41","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1177\/1094342009106191","volume":"23","author":"JS Plank","year":"2009","unstructured":"Plank JS (2009) The RAID-6 liberation codes. Int J High Perform Comput Appl 23(3):242\u2013251. \n                    https:\/\/doi.org\/10.1177\/1094342009106191","journal-title":"Int J High Perform Comput Appl"},{"key":"714_CR42","unstructured":"Patterson DA, Hennessy JL (1998) Computer organization and design. In: The hardware\/software interface, 2nd edn. Elsevier Science, Waltham, MA, USA.  ISBN:978-0-12-407726-3"},{"key":"714_CR43","unstructured":"Intel\u00ae Intelligent Storage Acceleration Library (Intel\u00ae ISA-L) Open Source Version, API Reference Manual\u2014Version 2.10, April 8, 2014. \n                    https:\/\/01.org\/sites\/default\/files\/documentation\/isa-l_open_src_2.10.pdf\n                    \n                  . Accessed 21 Mar 2019"},{"key":"714_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2663-4","author":"DO Kim","year":"2018","unstructured":"Kim DO, Kim HY, Kim YK, Kim JJ (2018) Cost analysis of erasure coding for exa-scale storage. J Supercomput. \n                    https:\/\/doi.org\/10.1007\/s11227-018-2663-4","journal-title":"J Supercomput"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00714-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-019-00714-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-019-00714-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,28]],"date-time":"2020-03-28T00:15:40Z","timestamp":1585354540000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-019-00714-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,29]]},"references-count":44,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["714"],"URL":"https:\/\/doi.org\/10.1007\/s00607-019-00714-7","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2019,3,29]]},"assertion":[{"value":"16 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}