{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:39:35Z","timestamp":1740123575554,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T00:00:00Z","timestamp":1540944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11227-018-2663-4","type":"journal-article","created":{"date-parts":[[2018,10,31]],"date-time":"2018-10-31T01:16:28Z","timestamp":1540948588000},"page":"4638-4656","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Cost analysis of erasure coding for exa-scale storage"],"prefix":"10.1007","volume":"75","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9576-3163","authenticated-orcid":false,"given":"Dong-Oh","family":"Kim","sequence":"first","affiliation":[]},{"given":"Hong-Yeon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Young-Kyun","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0125-1907","authenticated-orcid":false,"given":"Jeong-Joon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,31]]},"reference":[{"key":"2663_CR1","unstructured":"Apache Hadoop 3.0.0 (2017) \n                    https:\/\/hadoop.apache.org\/"},{"key":"2663_CR2","unstructured":"Ceph (2016) \n                    http:\/\/docs.ceph.com\/docs\/master\/rados\/"},{"key":"2663_CR3","doi-asserted-by":"crossref","unstructured":"Chu X, Liu C, Ouyang K, Yung LS, Liu H, Leung YW (2015) PErasure: a parallel Cauchy Reed\u2013Solomon coding library for GPUs. In: Proceedings of the 2015 IEEE International Conference on Communications (ICC), London","DOI":"10.1109\/ICC.2015.7248360"},{"key":"2663_CR4","unstructured":"Cook JD, Robert P, Kwant A (2014) Compare cost and performance of replication and erasure coding. Hitachi Review. \n                    http:\/\/www.hitachi.com\/rev\/pdf\/2014\/r2014_july.pdf"},{"key":"2663_CR5","unstructured":"Dustin B (2017) Red hat gluster storage on supermicro storage servers powered by intel xeon processors. Super Micro computer. \n                    https:\/\/www.supermicro.com\/white_paper\/white_paper_Redhat_Gluster_Storage.pdf"},{"key":"2663_CR6","unstructured":"Filesystem in Userspace (2015) \n                    https:\/\/sourceforge.net\/projects\/fuse"},{"key":"2663_CR7","unstructured":"Glusterfs (2018) \n                    https:\/\/access.redhat.com\/products\/red-hat-storage\/"},{"key":"2663_CR8","doi-asserted-by":"crossref","unstructured":"Haddock W, Curry ML, Bangalore PV, Skjellum A (2017) GPU erasure coding for campaign storage. In: Proceedings of the International Conference on High Performance Computing. ISC High Performance 2017, Frankfurt","DOI":"10.1007\/978-3-319-67630-2_13"},{"issue":"4","key":"2663_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1504\/IJBDI.2017.086959","volume":"4","author":"Y Huining","year":"2017","unstructured":"Huining Y, Yiming Z, Huaimin W, Bo D, Haibo M (2017) S3R: storage-sensitive services redeployment in the cloud. Int J Big Data Intell 4(4):250\u2013262","journal-title":"Int J Big Data Intell"},{"key":"2663_CR10","unstructured":"Hsing-bung C, Song F (2016) Parallel erasure coding: exploring task parallelism in erasure coding for enhanced bandwidth and energy efficiency. In: Proceedings of the 2016 IEEE International Conference of Networking, Architecture and Storage (NAS), California"},{"key":"2663_CR11","unstructured":"Intel Intelligent Storage Acceleration Library (Intel ISA-L) Open Source Version, API Reference Manual-Version 2.10 (2014) \n                    https:\/\/01.org\/sites\/default\/files\/documentation\/isa-l_open_src_2.10.pdf"},{"key":"2663_CR12","unstructured":"Intel Storage Acceleration Library (2017) \n                    https:\/\/software.intel.com\/en-us\/storage\/ISA-L"},{"key":"2663_CR13","unstructured":"Iozone Filesystem Benchmark (2017) \n                    http:\/\/www.iozone.org\/docs\/IOzone_msword_98.pdf"},{"issue":"13","key":"2663_CR14","first-page":"259","volume":"18","author":"L Jun","year":"2013","unstructured":"Jun L, Baochun L (2013) Erasure Coding for cloud storage systems: a survey. Tsinghua Sci Technol 18(13):259\u2013272","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"2663_CR15","doi-asserted-by":"publisher","first-page":"70","DOI":"10.4018\/IJGHPC.2018040106","volume":"10","author":"L Jun","year":"2018","unstructured":"Jun L, Mengshu H (2018) Improving data availability for deduplication in cloud storage. Int J Grid High Perform Comput 10(2):70\u201389","journal-title":"Int J Grid High Perform Comput"},{"key":"2663_CR16","unstructured":"Khan O, Burns RC, Plank JS, Pierce W, Huang C (2012) Rethinking erasure codes for cloud file systems: minimizing I\/O for recovery and degraded reads. In: Proceedings of the 10th USENIX Conference on File and Storage Technologies, California"},{"issue":"10","key":"2663_CR17","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.9717\/kmms.2016.19.8.1487","volume":"19","author":"CY Kim","year":"2016","unstructured":"Kim CY, Kim DO, Kim HY, Kim YK, Seo DW (2016) Torus network based distributed storage system for massive multimedia contents. J. Korea Multimed Soc 19(10):1487\u20131497","journal-title":"J. Korea Multimed Soc"},{"issue":"11","key":"2663_CR18","first-page":"1515","volume":"41","author":"CY Kim","year":"2016","unstructured":"Kim CY, Kim YC, Kim DO, Kim HY, Kim YK, Seo DW (2016) Implementation and performance measuring of erasure coding of distributed file system. J. Korean Inst Commun Inf Sci 41(11):1515\u20131527","journal-title":"J. Korean Inst Commun Inf Sci"},{"issue":"2","key":"2663_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.3745\/KTSDE.2013.2.2.091","volume":"2","author":"YC Kim","year":"2013","unstructured":"Kim YC, Kim DO, Kim HY, Kim YK, Choi W (2013) MAHA-FS: a distributed file system for high performance metadata processing and random IO. KIPS Trans Softw Data Eng 2(2):91\u201396","journal-title":"KIPS Trans Softw Data Eng"},{"issue":"1","key":"2663_CR20","first-page":"116","volume":"1","author":"JM Kunkel","year":"2014","unstructured":"Kunkel JM, Michael K, Thomas L (2014) Exascale storage systems\u2014an analytical study of expenses. Supercomput Front Innov 1(1):116\u2013134","journal-title":"Supercomput Front Innov"},{"key":"2663_CR21","doi-asserted-by":"crossref","unstructured":"Mohan LJ, Harold RL, Caneleo PIS, Parampalli U, Harwood A (2015) Benchmarking the performance of hadoop triple replication and erasure coding on a nation-wide distributed cloud. In: Proceedings of the 2015 International Symposium on Network Coding (NetCod), Sydney","DOI":"10.1109\/NETCOD.2015.7176790"},{"key":"2663_CR22","unstructured":"Nicloe H (2017) An exascale timeline for storage and I\/O systems. The Next Platform. \n                    https:\/\/www.nextplatform.com\/2017\/08\/16\/exascale-timeline-storage-io-systems\/"},{"key":"2663_CR23","unstructured":"Peter S (2012) Parallel coding for storage systems\u2014an OpenMP and OpenCL capable framework, In: Proceedings of ARCS 2012 Workshops, Muenchen"},{"key":"2663_CR24","doi-asserted-by":"crossref","unstructured":"Plank J. S. (1997) A tutorial on Reed-Solomon coding for fault-tolerance in RAID-like systems. Softw.-Pract. Exper 27(9):995-1012","DOI":"10.1002\/(SICI)1097-024X(199709)27:9<995::AID-SPE111>3.0.CO;2-6"},{"key":"2663_CR25","doi-asserted-by":"crossref","unstructured":"Plank JS (2013) Erasure codes for storage systems. The Usenix magazine. \n                    https:\/\/www.usenix.org\/system\/files\/login\/articles\/10_plank-online.pdf","DOI":"10.1145\/2560013"},{"key":"2663_CR26","unstructured":"Plank JS, Scott S, Schuman CD (2008) Jerasure: a library in C\/C\u2009++\u2009facilitating erasure coding for storage applications\u2014version 1.2. Technical report. Department of Electrical Engineering and Computer Science University of Tennessee. \n                    https:\/\/web.eecs.utk.edu\/~plank\/plank\/papers\/CS-08-627.pdf"},{"key":"2663_CR27","unstructured":"Plank J. S. (2008) The RAID-6 liberation codes. In: Proceedings of the 6th Usenix Conference on File and Storage Technologies, California"},{"key":"2663_CR28","unstructured":"Plank JS, Xu L (2006) Optimizing Cauchy Reed\u2013Solomon codes for fault-tolerant network storage applications. In: Proceedings of 2006 Fifth IEEE International Symposium on Network Computing and Applications (NCA), Massachusetts"},{"key":"2663_CR29","unstructured":"Patterson David A, Hennessy John L (1998) Computer organization and design. In: The hardware\/software interface (2nd ed.). Elsevier Science, ISBN 155860491X"},{"key":"2663_CR30","unstructured":"Red Hat (2014) Technology detail: Red Hat Ceph storage hardware configuration guide\u2014Designing scalable workload-optimized Ceph clusters. \n                    https:\/\/www.redhat.com\/cms\/managed-files\/st-rhcs-config-guide-technology-detail-inc0387897-201604-en.pdf"},{"key":"2663_CR31","doi-asserted-by":"crossref","unstructured":"Sun D, Xu Y, Li Y, Wu S, Tian C (2016) Efficient parity update for scaling RAID-like storage systems. In: Proceedings of 2016 IEEE International Conference on Networking, Architecture and Storage (NAS)","DOI":"10.1109\/NAS.2016.7549400"},{"key":"2663_CR32","unstructured":"Takeshi M, Takanori N, Kensuke S (2014) Erasure code with shingled local parity groups for efficient recovery from multiple disk failures. In: Proceedings of the 10th USENIX Conference on Hot Topics in System Dependability, California"},{"key":"2663_CR33","unstructured":"The Pros and Cons of Erasure Coding & Replication vs. RAID in. Next-Gen storage platforms (2017) \n                    http:\/\/www.snia.org\/sites\/default\/files\/SDC15_presentations\/datacenter_infra\/Shenoy_The_Pros_and_Cons_of_Erasure_v3-rev.pdf"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2663-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-018-2663-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-018-2663-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T12:19:50Z","timestamp":1576498790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-018-2663-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,31]]},"references-count":33,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["2663"],"URL":"https:\/\/doi.org\/10.1007\/s11227-018-2663-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2018,10,31]]},"assertion":[{"value":"31 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}