{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:25Z","timestamp":1750221265478,"version":"3.41.0"},"reference-count":77,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T00:00:00Z","timestamp":1504137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EU projects CloudSpaces","award":["FP7-317555"],"award-info":[{"award-number":["FP7-317555"]}]},{"name":"SECCRIT","award":["FP7-312758"],"award-info":[{"award-number":["FP7-312758"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2017,8,31]]},"abstract":"<jats:p>\n            Besides well-known benefits, commodity cloud storage also raises concerns that include security, reliability, and consistency. We present Hybris key-value store, the first\n            <jats:italic>robust<\/jats:italic>\n            hybrid cloud storage system, aiming at addressing these concerns leveraging both private and public cloud resources.\n          <\/jats:p>\n          <jats:p>\n            Hybris robustly replicates metadata on trusted private premises (private cloud), separately from data, which are dispersed (using replication or erasure coding) across multiple untrusted public clouds. Hybris maintains metadata stored on private premises at the order of few dozens of bytes per key, avoiding the scalability bottleneck at the private cloud. In turn, the hybrid design allows Hybris to efficiently and robustly tolerate cloud outages but also potential malice in clouds without overhead. Namely, to tolerate up to\n            <jats:italic>f<\/jats:italic>\n            malicious clouds, in the common case of the Hybris variant with data replication, writes replicate data across\n            <jats:italic>f<\/jats:italic>\n            +1 clouds, whereas reads involve a single cloud. In the worst case, only up to\n            <jats:italic>f<\/jats:italic>\n            additional clouds are used. This is considerably better than earlier multi-cloud storage systems that required costly 3\n            <jats:italic>f<\/jats:italic>\n            +1 clouds to mask\n            <jats:italic>f<\/jats:italic>\n            potentially malicious clouds. Finally, Hybris leverages strong metadata consistency to guarantee to Hybris applications strong data consistency without any modifications to the eventually consistent public clouds.\n          <\/jats:p>\n          <jats:p>We implemented Hybris in Java and evaluated it using a series of micro and macro-benchmarks. Our results show that Hybris significantly outperforms comparable multi-cloud storage systems and approaches the performance of bare-bone commodity public cloud storage.<\/jats:p>","DOI":"10.1145\/3119896","type":"journal-article","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T12:44:38Z","timestamp":1506689078000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Hybris"],"prefix":"10.1145","volume":"13","author":[{"given":"Paolo","family":"Viotti","sequence":"first","affiliation":[{"name":"Eurecom"}]},{"given":"Dan","family":"Dobre","sequence":"additional","affiliation":[{"name":"NEC Labs Europe"}]},{"given":"Marko","family":"Vukoli\u0107","sequence":"additional","affiliation":[{"name":"IBM Research - Zurich, Ruschlikon, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2017,9,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0151-6"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060291"},{"key":"e_1_2_1_4_1","unstructured":"Amazon. 2016. Amazon DynamoDB Pricing. (2016). Retrieved from https:\/\/aws.amazon.com\/dynamodb\/pricing\/.  Amazon. 2016. Amazon DynamoDB Pricing. (2016). Retrieved from https:\/\/aws.amazon.com\/dynamodb\/pricing\/."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14472-6_6"},{"key":"e_1_2_1_6_1","unstructured":"Apache. 2016. Apache JClouds. Retrieved from http:\/\/jclouds.apache.org\/.  Apache. 2016. Apache JClouds. Retrieved from http:\/\/jclouds.apache.org\/."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2447976.2447992"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263920"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.37"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201914)","year":"2014","author":"Bessani Alysson","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535929"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.41"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.37"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11764-5_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987584"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2012.56"},{"volume-title":"Proceedings of the International Symposium on Distributed Computing (DISC\u201913)","year":"2013","author":"Chockler Gregory","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_2_1_21_1","unstructured":"CloudSpaces. 2015. CloudSpaces EU FP7 project. Retrieved from http:\/\/cloudspaces.eu\/.  CloudSpaces. 2015. CloudSpaces EU FP7 project. Retrieved from http:\/\/cloudspaces.eu\/."},{"key":"e_1_2_1_22_1","unstructured":"Consul. 2016a. Consul\u2014Consensus protocol. Retrieved from https:\/\/www.consul.io\/docs\/internals\/consensus.html.  Consul. 2016a. Consul\u2014Consensus protocol. Retrieved from https:\/\/www.consul.io\/docs\/internals\/consensus.html."},{"key":"e_1_2_1_23_1","unstructured":"Consul. 2016b. Consul \u2014Distributed service discovery and configuration. Retrieved from https:\/\/www.consul.io\/.  Consul. 2016b. Consul \u2014Distributed service discovery and configuration. Retrieved from https:\/\/www.consul.io\/."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2518037.2491245"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference.","year":"2012","author":"Correia Miguel","key":"e_1_2_1_26_1"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2004.1353018"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504762"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_2_1_31_1","unstructured":"Eurecom. 2016. Hybris\u2014Robust hybrid cloud storage library. Retrieved from https:\/\/github.com\/pviotti\/hybris.  Eurecom. 2016. Hybris\u2014Robust hybrid cloud storage library. Retrieved from https:\/\/github.com\/pviotti\/hybris."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39989-6_6"},{"volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST\u201917)","author":"Ganesan Aishwarya","key":"e_1_2_1_33_1"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291029"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993806.1993834"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2014.41"},{"key":"e_1_2_1_40_1","unstructured":"James Hamilton. 2009. The cost of latency. Retreived from http:\/\/perspectives.mvdirona.com\/2009\/10\/the-cost-of-latency\/.  James Hamilton. 2009. The cost of latency. Retreived from http:\/\/perspectives.mvdirona.com\/2009\/10\/the-cost-of-latency\/."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/114005.102808"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201910)","year":"2010","author":"Hunt Patrick","key":"e_1_2_1_43_1"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433140.2433144"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168866"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201907)","year":"2007","author":"Kotla Ramakrishna","key":"e_1_2_1_46_1"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","year":"2016","author":"Liu Shengyun","key":"e_1_2_1_48_1"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663332"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36108-1_12"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"volume-title":"Available online at http:\/\/memcached.org\/","year":"2016","key":"e_1_2_1_52_1"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201914)","author":"Ongaro Diego","key":"e_1_2_1_53_1"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"volume-title":"Jerasure: A Library in C\/C++ Facilitating Erasure Coding for Storage Applications\u2014Version 1.2. Technical Report CS-08-627","year":"2008","author":"Plank J. S.","key":"e_1_2_1_55_1"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529974.1529978"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_21"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737981"},{"key":"e_1_2_1_59_1","unstructured":"SoftLayer. 2016. IBM SoftLayer. Retrieved from http:\/\/www.softlayer.com\/.  SoftLayer. 2016. IBM SoftLayer. Retrieved from http:\/\/www.softlayer.com\/."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_2_1_61_1","unstructured":"Syncany. 2016. Secure file synchronization software for arbitrary storage backends. Retrieved from https:\/\/www.syncany.org\/.  Syncany. 2016. Secure file synchronization software for arbitrary storage backends. Retrieved from https:\/\/www.syncany.org\/."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDIS.1994.331722"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522731"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/301308.301350"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926965"},{"volume-title":"The Snowden Leak: A Windfall for Hybrid Cloud?","year":"2013","key":"e_1_2_1_67_1"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201912)","year":"2012","author":"Wang Yang","key":"e_1_2_1_70_1"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31"},{"volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI\u201906)","year":"2006","author":"Weil Sage A.","key":"e_1_2_1_72_1"},{"volume-title":"Proceedings of the ACM Symposium on Operating Systems Principles (SOSP\u201913)","author":"Wu Zhe","key":"e_1_2_1_73_1"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945470"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2011.6168469"},{"volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST\u201916)","year":"2016","author":"Zhang Heng","key":"e_1_2_1_76_1"},{"key":"e_1_2_1_77_1","unstructured":"Observers ZooKeeper. 2009. Observers\u2014Making ZooKeeper scale even further. Retrieved from https:\/\/blog.cloudera.com\/blog\/2009\/12\/observers-making-zookeeper-scale-even-further\/.  Observers ZooKeeper. 2009. Observers\u2014Making ZooKeeper scale even further. Retrieved from https:\/\/blog.cloudera.com\/blog\/2009\/12\/observers-making-zookeeper-scale-even-further\/."}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3119896","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3119896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:10:58Z","timestamp":1750212658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3119896"}},"subtitle":["Robust Hybrid Cloud Storage"],"short-title":[],"issued":{"date-parts":[[2017,8,31]]},"references-count":77,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8,31]]}},"alternative-id":["10.1145\/3119896"],"URL":"https:\/\/doi.org\/10.1145\/3119896","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"type":"print","value":"1553-3077"},{"type":"electronic","value":"1553-3093"}],"subject":[],"published":{"date-parts":[[2017,8,31]]},"assertion":[{"value":"2016-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}