{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:46:18Z","timestamp":1773153978142,"version":"3.50.1"},"reference-count":243,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,1,8]],"date-time":"2025-01-08T00:00:00Z","timestamp":1736294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2022YFB4501200"],"award-info":[{"award-number":["2022YFB4501200"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research Grants Council of Hong Kong","award":["AoE\/P-404\/18"],"award-info":[{"award-number":["AoE\/P-404\/18"]}]},{"name":"Major Research Plan of the National Natural Science Foundation of China","award":["92373114"],"award-info":[{"award-number":["92373114"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62072381, 62302175, and 62272185"],"award-info":[{"award-number":["62072381, 62302175, and 62272185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Fujian Province of China","award":["2023J06001"],"award-info":[{"award-number":["2023J06001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2025,2,28]]},"abstract":"<jats:p>Erasure coding is a known redundancy technique that has been popularly deployed in modern storage systems to protect against failures. By introducing a small portion of coded redundancy into data storage, erasure coding is shown to provide higher reliability guarantees than replication under the same storage overhead. Despite its storage efficiency, erasure coding incurs high-performance overhead in repair and updates, and its reliability also depends on the amount of redundancy. How to resolve the tensions among storage efficiency, performance, and reliability has been the major research direction in the literature for decades.<\/jats:p>\n          <jats:p>In this article, we present an in-depth survey of the past, present, and future of erasure coding in storage systems. We conduct our survey from a systems perspective, with an emphasis on how erasure coding is deployed in practical storage systems. Specifically, we first review the use of erasure coding in storage systems from both academia and industry and state the challenges of deploying erasure coding in practice. We then review the topics of erasure coding in three aspects: (i) new erasure code constructions, (ii) algorithmic techniques for efficient erasure coding operations, and (iii) erasure coding for emerging architectures. Finally, we provide future research directions for erasure coding.<\/jats:p>","DOI":"10.1145\/3708994","type":"journal-article","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T08:34:39Z","timestamp":1735634079000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A Survey of the Past, Present, and Future of Erasure Coding for Storage Systems"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2673-5868","authenticated-orcid":false,"given":"Zhirong","family":"Shen","sequence":"first","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0760-9707","authenticated-orcid":false,"given":"Yuhui","family":"Cai","sequence":"additional","affiliation":[{"name":"Xiamen University, Xiamen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8301-9633","authenticated-orcid":false,"given":"Keyun","family":"Cheng","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4501-4364","authenticated-orcid":false,"given":"Patrick P. C.","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3582-0792","authenticated-orcid":false,"given":"Xiaolu","family":"Li","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1265-7141","authenticated-orcid":false,"given":"Yuchong","family":"Hu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7362-2789","authenticated-orcid":false,"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,1,8]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Accessed in March 2024. Backblaze Vaults: Zettabyte-Scale Cloud Storage Architecture. Retrieved March 2024 from https:\/\/www.backblaze.com\/blog\/vault-cloud-storage-architecture\/"},{"key":"e_1_3_1_3_2","unstructured":"Accessed in March 2024. DNA: The Ultimate Data-Storage Solution. Retrieved March 2024 from https:\/\/www.scientificamerican.com\/article\/dna-the-ultimate-data-storage-solution\/."},{"key":"e_1_3_1_4_2","unstructured":"Accessed in March 2024. HDFS Erasure Coding. Retrieved March 2024 from https:\/\/hadoop.apache.org\/docs\/stable\/hadoop-project-dist\/hadoop-hdfs\/HDFSErasureCoding.html"},{"key":"e_1_3_1_5_2","unstructured":"Accessed in March 2024. Meeting the Operational Challenges of Training LLMs. Retrieved March 2024 from https:\/\/thenewstack.io\/meeting-the-operational-challenges-of-training-llms\/"},{"key":"e_1_3_1_6_2","unstructured":"Accessed in March 2024. Tencent Ultra-cold Storage System Optimization with Intel ISA-L - a Case Study. Retrieved March 2024 from https:\/\/www.intel.cn\/content\/dam\/develop\/external\/us\/en\/documents\/case-study-of-tencent-ultra-cold-storage-system-optimization-720747.pdf"},{"key":"e_1_3_1_7_2","unstructured":"Accessed in March 2024. Yahoo Cloud Object Store - Object Storage at Exabyte Scale. Retrieved March 2024 from https:\/\/yahooeng.tumblr.com\/post\/116391291701\/yahoo-cloud-object-store-object-storage-at"},{"key":"e_1_3_1_8_2","first-page":"59","volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST\u201905)","author":"Abd-El-Malek Michael","year":"2005","unstructured":"Michael Abd-El-Malek, William V. Courtright II, Chuck Cranor, Gregory R. Ganger, James Hendricks, Andrew J. Klosterman, Michael Mesnier, Manish Prasad, Brandon Salmon, Raja R. Sambasivan, et al.2005. Ursa minor: Versatile cluster-based storage. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST\u201905). 59\u201372."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.96"},{"key":"e_1_3_1_10_2","doi-asserted-by":"crossref","unstructured":"R. Ahlswede N. Cai S.-Y. R. Li and R. W. Yeung. 2000. Network information flow. IEEE Transactions on Information Theory 46 4 (2000) 1204\u20131216.","DOI":"10.1109\/18.850663"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592816"},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Philipp L. Antkowiak Jory Lietard Mohammad Zalbagi Darestani Mark M. Somoza Wendelin J. Stark Reinhard Heckel and Robert N. Grass. 2020. Low cost DNA data storage using photolithographic synthesis and advanced information reconstruction and error correction. Nature Communications 11 1 (2020) 5345.","DOI":"10.1038\/s41467-020-19148-3"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3337821.3337831"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","unstructured":"S. B. Balaji M. Nikhil Krishnan Myna Vajha Vinayak Ramkumar Birenjith Sasidharan and P. Vijay Kumar. 2018. Erasure coding for distributed storage: An overview. Science China Information Sciences 61 100301 (2018) 100301:1\u2013100301:45.","DOI":"10.1007\/s11432-018-9482-6"},{"key":"e_1_3_1_15_2","first-page":"351","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Balakrishnan Shobana","year":"2014","unstructured":"Shobana Balakrishnan, Richard Black, Austin Donnelly, Paul England, Adam Glass, Dave Harper, Sergey Legtchenko, Aaron Ogus, Eric Peterson, and Antony Rowstron. 2014. Pelican: A building block for exascale cold data storage. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914). 351\u2013365."},{"key":"e_1_3_1_16_2","first-page":"337","volume-title":"Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI\u201904)","author":"Bhagwan Ranjita","year":"2004","unstructured":"Ranjita Bhagwan, Kiran Tati, Yuchung Cheng, Stefan Savage, and Geoffrey M. Voelker. 2004. Total recall: System support for automated availability management. In Proceedings of the 1st Symposium on Networked Systems Design and Implementation (NSDI\u201904). 337\u2013350."},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Mario Blaum Jim Brady Jehoshua Bruck and Jai Menon. 1995. EVENODD: An efficient scheme for tolerating double disk failures in RAID architectures. IEEE Transactions on Computers 44 2 (1995) 192\u2013202.","DOI":"10.1109\/12.364531"},{"key":"e_1_3_1_18_2","volume-title":"The EVENODD Code and its Generalization: An Efficient Scheme for Tolerating Multiple Disk Failures in RAID Architectures","author":"Blaum Mario","year":"2002","unstructured":"Mario Blaum, Jim Brady, Jehoshua Bruck, Jai Menon, and Alexander Vardy. 2002. The EVENODD Code and its Generalization: An Efficient Scheme for Tolerating Multiple Disk Failures in RAID Architectures. Wiley-IEEE."},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Mario Blaum James Lee Hafner and Steven Hetzler. 2013. Partial-MDS codes and their application to RAID type of architectures. IEEE Transactions on Information Theory 59 7 (2013) 4510\u20134519.","DOI":"10.1109\/TIT.2013.2252395"},{"key":"e_1_3_1_20_2","volume-title":"An XOR-Based Erasure-Resilient Coding Scheme","author":"Bl\u00f6mer Johannes","year":"1995","unstructured":"Johannes Bl\u00f6mer, Malik Kalfane, Richard Karp, Marek Karpinski, Michael Luby, and David Zuckerman. 1995. An XOR-Based Erasure-Resilient Coding Scheme. Technical Report ICSI TR-95-048. International Computer Sciences Institute."},{"key":"e_1_3_1_21_2","unstructured":"Eric Burgener and John Rydning. 2022. High Data Growth and Modern Applications Drive New Storage Requirements in Digitally Transformed Enterprises. Retrieved from https:\/\/www.delltechnologies.com\/asset\/en-my\/products\/storage\/industry-market\/h19267-wp-idc-storage-reqs-digital-enterprise.pdf Accessed in 2024."},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Ben Cao Xiaokang Zhang Shuang Cui and Qiang Zhang. 2022. Adaptive coding for DNA storage with high storage density and low coverage. NPJ Systems Biology and Applications 8 1 (2022) 23.","DOI":"10.1038\/s41540-022-00233-w"},{"key":"e_1_3_1_23_2","first-page":"163","volume-title":"Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST\u201914)","author":"Chan Jeremy C. W.","year":"2014","unstructured":"Jeremy C. W. Chan, Qian Ding, Patrick P. C. Lee, and Helen H. W. Chan. 2014. Parity logging with reserved space: Towards efficient updates and recovery in erasure-coded clustered storage. In Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST\u201914). 163\u2013176."},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Haibo Chen Heng Zhang Mingkai Dong Zhaoguo Wang Yubin Xia Haibing Guan and Binyu Zang. 2017. Efficient and available in-memory KV-store with hybrid erasure coding and replication. ACM Transactions on Storage 13 3 (2017) 167\u2013180.","DOI":"10.1145\/3129900"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Henry C. H. Chen Yuchong Hu Patrick P. C. Lee and Yang Tang. 2014. NCCloud: A network-coding-based storage system in a cloud-of-clouds. IEEE Transactions on Computers 63 1 (2014) 31\u201344.","DOI":"10.1109\/TC.2013.167"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3480852"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362713"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS55811.2022.00032"},{"key":"e_1_3_1_29_2","first-page":"1","volume-title":"Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST\u201904)","author":"Corbett Peter","year":"2004","unstructured":"Peter Corbett, Bob English, Atul Goel, Tomislav Grcanac, Steven Kleiman, James Leong, and Sunitha Sankar. 2004. Row-diagonal parity for double disk failure correction. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST\u201904). 1\u201314."},{"key":"e_1_3_1_30_2","first-page":"649","volume-title":"Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904)","author":"Dabek Frank","year":"2004","unstructured":"Frank Dabek, Jinyang Li, Emil Sit, James Robertson, M. Frans Kaashoek, and Robert Morris. 2004. Designing a DHT for low latency and high throughput. In Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201904). 649\u2013667."},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Anwitaman Datta and Fr\u00e9d\u00e9rique Oggier. 2013. An overview of codes tailor-made for better repairability in networked distributed storage systems. ACM SIGACT News 44 1 (2013) 89\u2013105.","DOI":"10.1145\/2447712.2447735"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3472456.3472502"},{"key":"e_1_3_1_33_2","doi-asserted-by":"crossref","unstructured":"Alexandros G. Dimakis P. Brighten Godfrey Yunnan Wu Martin J. Wainwright and Kannan Ramchandran. 2010. Network coding for distributed storage systems. IEEE Transactions on Information Theory 56 9 (2010) 4539\u20134551.","DOI":"10.1109\/TIT.2010.2054295"},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Alexandros G. Dimakis Kannan Ramchandran Yunnan Wu and Changho Suh. 2011. A survey on network codes for distributed storage. Proceedings of the IEEE 99 3 (2011) 476\u2013489.","DOI":"10.1109\/JPROC.2010.2096170"},{"key":"e_1_3_1_35_2","doi-asserted-by":"crossref","unstructured":"Shaohua Duan Pradeep Subedi Philip Davis Keita Teranishi Hemanth Kolla Marc Gamell and Manish Parashar. 2020. CoREC: Scalable and resilient in-memory data staging for in-situ workflows. ACM Transactions on Parallel Computing 7 2 (2020) 12:1\u201312:29.","DOI":"10.1145\/3391448"},{"key":"e_1_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Ahmed Elkelesh Moustafa Ebada Sebastian Cammerer and Stephan Ten Brink. 2019. Decoder-tailored polar code design using the genetic algorithm. IEEE Transactions on Communications 67 7 (2019) 4521\u20134534.","DOI":"10.1109\/TCOMM.2019.2908870"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2016.042"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2013.6691581"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00030"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/1713072.1713075"},{"key":"e_1_3_1_41_2","unstructured":"Andrew Fikes. 2010. Storage Architecture and Challenges. Retrieved from http:\/\/cloud.google.com\/files\/storage_architecture_and_challenges.pdf Accessed in 2024."},{"key":"e_1_3_1_42_2","first-page":"61","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910)","author":"Ford Daniel","year":"2010","unstructured":"Daniel Ford, Fran\u00e7ois Labelle, Florentina I. Popovici, Murray Stokely, Van-Anh Truong, Luiz Barroso, Carrie Grimes, and Sean Quinlan. 2010. Availability in globally distributed storage systems. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201910). 61\u201374."},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311883"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.46"},{"key":"e_1_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Atul Goel and Peter Corbett. 2012. RAID triple parity. ACM SIGOPS Operating Systems Review 46 3 (2012) 41\u201349.","DOI":"10.1145\/2421648.2421655"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488813"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311884"},{"key":"e_1_3_1_48_2","volume-title":"Reliability and Power-efficiency in Erasure-coded Storage Systems","author":"Greenan Kevin M.","year":"2009","unstructured":"Kevin M. Greenan. 2009. Reliability and Power-efficiency in Erasure-coded Storage Systems. Technical Report. University of California, Santa Cruz."},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2008.4770564"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630083"},{"key":"e_1_3_1_51_2","volume-title":"Proceedings of the 2nd Workshop on Hot Topics in Storage and File Systems (HotStorage\u201910)","author":"Greenan Kevin M.","year":"2010","unstructured":"Kevin M. Greenan, James S. Plank, and Jay J. Wylie. 2010. Mean time to meaningless: MTTDL, Markov models, and storage system reliability. In Proceedings of the 2nd Workshop on Hot Topics in Storage and File Systems (HotStorage\u201910)."},{"key":"e_1_3_1_52_2","first-page":"649","volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201917)","author":"Gu Juncheng","year":"2017","unstructured":"Juncheng Gu, Youngmoon Lee, Yiwen Zhang, Mosharaf Chowdhury, and Kang G. Shin. 2017. Efficient memory disaggregation with infiniswap. In Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201917). 649\u2013667."},{"key":"e_1_3_1_53_2","first-page":"143","volume-title":"Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI\u201905)","author":"Haeberlen Andreas","year":"2005","unstructured":"Andreas Haeberlen and Alan Mislove. 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI\u201905). 143\u2013158."},{"key":"e_1_3_1_54_2","volume-title":"Proceendings of the 4th USENIX Conference on File and Storage Technologies (FAST\u201905)","author":"Hafner James Lee","year":"2005","unstructured":"James Lee Hafner. 2005. WEAVER codes: Highly fault tolerant erasure codes for storage systems. In Proceendings of the 4th USENIX Conference on File and Storage Technologies (FAST\u201905)."},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.40"},{"key":"e_1_3_1_56_2","first-page":"15","volume-title":"Proceedings of the 4th Conference on USENIX Conference on File and Storage Technologies (FAST\u201905)","author":"Hafner James Lee","year":"2005","unstructured":"James Lee Hafner, Veera Deenadhayalan, KK Rao, and John A. Tomlin. 2005. Matrix methods for lost data reconstruction in erasure codes. In Proceedings of the 4th Conference on USENIX Conference on File and Storage Technologies (FAST\u201905). 15\u201330."},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.97"},{"key":"e_1_3_1_58_2","doi-asserted-by":"crossref","unstructured":"Robert J. Hall. 2016. Tools for predicting the reliability of large-scale storage systems. ACM Transactions on Storage 12 4 (2016) 1\u201330.","DOI":"10.1145\/2911987"},{"key":"e_1_3_1_59_2","first-page":"417","volume-title":"Proceedings of the 19th USENIX Conference on File and Storage Technologies (FAST\u201921)","author":"Han Shujie","year":"2021","unstructured":"Shujie Han, Patrick P. C. Lee, Fan Xu, Yi Liu, Cheng He, and Jiongzhou Liu. 2021. An in-depth study of correlated failures in production SSD-based data centers. In Proceedings of the 19th USENIX Conference on File and Storage Technologies (FAST\u201921). 417\u2013429."},{"key":"e_1_3_1_60_2","first-page":"263","volume-title":"Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916)","author":"Hao Mingzhe","year":"2016","unstructured":"Mingzhe Hao, Gokul Soundararajan, Deepak Kenchammana-Hosekote, Andrew A. Chien, and Haryadi S. Gunawi. 2016. The tail at store: A revelation from millions of hours of disk and SSD deployments. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916). 263\u2013276."},{"key":"e_1_3_1_61_2","doi-asserted-by":"crossref","unstructured":"Mark Holland Garth A. Gibson and Daniel P. Siewiorek. 1994. Architectures and algorithms for on-line failure recovery in redundant disk arrays. Distributed Parallel Databases 2 3 (1994) 295\u2013335.","DOI":"10.1007\/BF01266332"},{"key":"e_1_3_1_62_2","first-page":"233","volume-title":"Proceeding of the 19th USENIX Conference on File and Storage Technologies (FAST\u201921)","author":"Hu Yuchong","year":"2021","unstructured":"Yuchong Hu, Liangfeng Cheng, Qiaori Yao, Patrick P. C. Lee, Weichun Wang, and Wei Chen. 2021. Exploiting combined locality for wide-stripe erasure coding in distributed storage. In Proceeding of the 19th USENIX Conference on File and Storage Technologies (FAST\u201921). 233\u2013248."},{"key":"e_1_3_1_63_2","doi-asserted-by":"crossref","unstructured":"Yuchong Hu Xiaolu Li Mi Zhang Patrick P. C. Lee Xiaoyang Zhang Pan Zhou and Dan Feng. 2017. Optimal repair layering for erasure-coded data centers: From theory to practice. ACM Transactions on Storage 13 4 (2017) 1\u201324.","DOI":"10.1145\/3149349"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3131623"},{"key":"e_1_3_1_65_2","doi-asserted-by":"crossref","unstructured":"Yuchong Hu Xiaoyang Zhang Patrick P. C. Lee and Pan Zhou. 2022. NCScale: Toward optimal storage scaling via network coding. IEEE\/ACM Transactions on Networking 30 1 (2022) 271\u2013284.","DOI":"10.1109\/TNET.2021.3106394"},{"key":"e_1_3_1_66_2","doi-asserted-by":"crossref","unstructured":"Cheng Huang Minghua Chen and Jin Li. 2013. Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems. ACM Transactions on Storage 9 1 (2013) 1\u201328.","DOI":"10.1145\/2435204.2435207"},{"key":"e_1_3_1_67_2","first-page":"15","volume-title":"Proceedings of the 2012 USENIX Annual Technical Conference (USENIX ATC\u201912)","author":"Huang Cheng","year":"2012","unstructured":"Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brads Calder, Parikshit Gopalan, Jin Li, and Sergey Yekhanin. 2012. Erasure coding in windows azure storage. In Proceedings of the 2012 USENIX Annual Technical Conference (USENIX ATC\u201912). 15\u201326."},{"key":"e_1_3_1_68_2","volume-title":"Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST\u201905)","author":"Huang Cheng","year":"2005","unstructured":"Cheng Huang and Lihao Xu. 2005. STAR: An efficient coding scheme for correcting triple storage node failures. In Proceedings of the 4th USENIX Conference on File and Storage Technologies (FAST\u201905)."},{"key":"e_1_3_1_69_2","doi-asserted-by":"crossref","unstructured":"Jianzhong Huang Xianhai Liang Xiao Qin Qiang Cao and Changsheng Xie. 2015. PUSH: A pipelined reconstruction I\/O for erasure-coded storage clusters. IEEE Transactions on Parallel and Distributed Systems 26 2 (2015) 516\u2013526.","DOI":"10.1109\/TPDS.2014.2311808"},{"key":"e_1_3_1_70_2","doi-asserted-by":"crossref","unstructured":"Jianzhong Huang Xianhai Liang Xiao Qin Ping Xie and Changsheng Xie. 2015. Scale-RS: An efficient scaling scheme for RS-coded storage clusters. IEEE Transactions on Parallel and Distributed Systems 26 6 (2015) 1704\u20131717.","DOI":"10.1109\/TPDS.2014.2326156"},{"key":"e_1_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Lingchen Huang Huazi Zhang Rong Li Yiqun Ge and Jun Wang. 2019. AI coding: Learning to construct error correction codes. IEEE Transactions on Communications 68 1 (2019) 26\u201339.","DOI":"10.1109\/TCOMM.2019.2951403"},{"key":"e_1_3_1_72_2","doi-asserted-by":"crossref","unstructured":"Ilias Iliadis. 2023. Reliability evaluation of erasure-coded storage systems with latent errors. ACM Transactions on Storage 19 1 (2023) 1\u201347.","DOI":"10.1145\/3568313"},{"key":"e_1_3_1_73_2","doi-asserted-by":"crossref","unstructured":"Ilias Iliadis Robert Haas Xiao-Yu Hu and Evangelos Eleftheriou. 2011. Disk scrubbing versus intradisk redundancy for RAID storage systems. ACM Transactions on Storage 7 2 (2011) 1\u201342.","DOI":"10.1145\/1970348.1970350"},{"key":"e_1_3_1_74_2","doi-asserted-by":"crossref","unstructured":"Ilias Iliadis and Vinodh Venkatesan. 2015. Rebuttal to beyond MTTDL: A closed-form RAID-6 reliability equation. ACM Transactions on Storage 11 2 (2015) 1\u201310.","DOI":"10.1145\/2700311"},{"key":"e_1_3_1_75_2","first-page":"1","volume-title":"Proceedings of the 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage\u201920)","author":"Jaffer Shehbaz","year":"2020","unstructured":"Shehbaz Jaffer, Kaveh Mahdaviani, and Bianca Schroeder. 2020. Rethinking WOM codes to enhance the lifetime in new SSD generations. In Proceedings of the 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage\u201920). 1\u20138."},{"key":"e_1_3_1_76_2","first-page":"117","volume-title":"Proceedings of the 20th USENIX Conference on File and Storage Technologies (FAST\u201922)","author":"Jaffer Shehbaz","year":"2022","unstructured":"Shehbaz Jaffer, Kaveh Mahdaviani, and Bianca Schroeder. 2022. Improving the reliability of next generation SSDs using WOM-v codes. In Proceedings of the 20th USENIX Conference on File and Storage Technologies (FAST\u201922). 117\u2013132."},{"key":"e_1_3_1_77_2","unstructured":"Jerasure. Accessed in March 2024. Jerasure: Erasure Coding Library. Retrieved March 2024 from https:\/\/jerasure.org\/"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00130"},{"key":"e_1_3_1_79_2","doi-asserted-by":"crossref","unstructured":"Wei Jiang Hao Jiang Jing Wu and Qimei Chen. 2023. Accelerating distributed cloud storage systems with in-network computing. IEEE Network 37 4 (2023) 64\u201370.","DOI":"10.1109\/MNET.002.2200631"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45041.2023.10278699"},{"key":"e_1_3_1_81_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2011.5937230"},{"key":"e_1_3_1_82_2","doi-asserted-by":"crossref","unstructured":"Hai Jin Ruikun Luo Qiang He Song Wu Zilai Zeng and Xiaoyu Xia. 2023. Cost-effective data placement in edge storage systems with erasure code. IEEE Transactions on Services Computing 16 2 (2023) 1039\u20131050.","DOI":"10.1109\/TSC.2022.3152849"},{"key":"e_1_3_1_83_2","first-page":"413","volume-title":"Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201922)","author":"Kadekodi Saurabh","year":"2022","unstructured":"Saurabh Kadekodi, Francisco Maturana, Sanjith Athlur, Arif Merchant, K. V. Rashmi, and Gregory R. Ganger. 2022. Tiger: Disk-adaptive redundancy without placement restrictions. In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201922). 413\u2013429."},{"key":"e_1_3_1_84_2","first-page":"369","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920)","author":"Kadekodi Saurabh","year":"2020","unstructured":"Saurabh Kadekodi, Francisco Maturana, Suhas Jayaram Subramanya, Juncheng Yang, K. V. Rashmi, and Gregory R. Ganger. 2020. PACEMAKER: Avoiding HeART attacks in storage clusters with disk-adaptive redundancy. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920). 369\u2013385."},{"key":"e_1_3_1_85_2","first-page":"345","volume-title":"Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919)","author":"Kadekodi Saurabh","year":"2019","unstructured":"Saurabh Kadekodi, K. V. Rashmi, and Gregory R. Ganger. 2019. Cluster storage systems gotta have HeART: Improving storage efficiency by exploiting disk-reliability heterogeneity. In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919). 345\u2013358."},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.5555\/3585938.3585939"},{"key":"e_1_3_1_87_2","first-page":"251","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST\u201912)","author":"Khan Osama","year":"2012","unstructured":"Osama Khan, Randal Burns, James Plank, William Pierce, and Cheng Huang. 2012. Rethinking erasure codes for cloud file systems: Minimizing I\/O for recovery and degraded reads. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST\u201912). 251\u2013264."},{"key":"e_1_3_1_88_2","first-page":"865","volume-title":"Proceeding of the 2018 USENIX Annual Technical Conference (ATC\u201918)","author":"Kolosov Oleg","year":"2018","unstructured":"Oleg Kolosov, Gala Yadgar, Matan Liram, Itzhak Tamo, and Alexander Barg. 2018. On fault tolerance, locality, and optimality in locally repairable codes. In Proceeding of the 2018 USENIX Annual Technical Conference (ATC\u201918). 865\u2013877."},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087832"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359654"},{"key":"e_1_3_1_91_2","first-page":"129","volume-title":"Proceedings of the 2007 USENIX Annual Technical Conference (ATC\u201907)","author":"Kotla Ramakrishna","year":"2007","unstructured":"Ramakrishna Kotla, Lorenzo Alvisi, and Mike Dahlin. 2007. SafeStore: A durable and practical storage system. In Proceedings of the 2007 USENIX Annual Technical Conference (ATC\u201907). 129\u2013142."},{"key":"e_1_3_1_92_2","doi-asserted-by":"crossref","unstructured":"Katina Kralevska Danilo Gligoroski Rune E. Jensen and Harald \u00d8verby. 2018. Hashtag erasure codes: From theory to practice. IEEE Transactions on Big Data 4 4 (2018) 516\u2013529.","DOI":"10.1109\/TBDATA.2017.2749255"},{"key":"e_1_3_1_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_3_1_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2015.7208288"},{"key":"e_1_3_1_95_2","doi-asserted-by":"crossref","unstructured":"Leslie Lamport. 1998. The part-time parliament. ACM Transactions on Computer Systems 16 2 (1998) 133\u2013169.","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_1_96_2","unstructured":"Leslie Lamport. 2001. Paxos made simple. ACM Transactions on SIGACT News 32 4 (2001) 51\u201358."},{"key":"e_1_3_1_97_2","first-page":"181","volume-title":"Proceedings of the 20th USENIX Conference on File and Storage Technologies (FAST\u201922)","author":"Lee Youngmoon","year":"2022","unstructured":"Youngmoon Lee, Hasan Al Maruf, Mosharaf Chowdhury, Asaf Cidon, and Kang G. Shin. 2022. Hydra: Resilient and highly available remote memory. In Proceedings of the 20th USENIX Conference on File and Storage Technologies (FAST\u201922). 181\u2013198."},{"key":"e_1_3_1_98_2","unstructured":"Michael Ley. The DBLP Computer Science Bibliography. Retrieved August 2024 from https:\/\/dblp.org"},{"key":"e_1_3_1_99_2","first-page":"581","volume-title":"Proceedings of the 15th USENIX Annual Technical Conference (ATC\u201917)","author":"Li Huiba","year":"2017","unstructured":"Huiba Li, Yiming Zhang, Zhiming Zhang, Shengyun Liu, Dongsheng Li, Xiaohui Liu, and Yuxing Peng. 2017. PARIX: Speculative partial writes in erasure-coded systems. In Proceedings of the 15th USENIX Annual Technical Conference (ATC\u201917). 581\u2013587."},{"key":"e_1_3_1_100_2","doi-asserted-by":"crossref","unstructured":"Jun Li and Baochun Li. 2013. Erasure coding for cloud storage systems: A survey. Tsinghua Science and Technology 18 3 (2013) 259\u2013272.","DOI":"10.1109\/TST.2013.6522585"},{"key":"e_1_3_1_101_2","doi-asserted-by":"crossref","unstructured":"Mingqiang Li and Patrick P. C. Lee. 2014. STAIR codes: A general family of erasure codes for tolerating device and sector failures. ACM Transactions on Storage 10 4 (2014) 1553\u20133077.","DOI":"10.1145\/2658991"},{"key":"e_1_3_1_102_2","doi-asserted-by":"crossref","unstructured":"Mingqiang Li and Patrick P. C. Lee. 2018. Relieving both storage and recovery burdens in big data clusters with R-STAIR codes. IEEE Internet Computing 22 4 (2018) 15\u201326.","DOI":"10.1109\/MIC.2018.043051461"},{"key":"e_1_3_1_103_2","doi-asserted-by":"crossref","unstructured":"Mingqiang Li Jiwu Shu and Weimin Zheng. 2009. GRID codes: Strip-based erasure codes with high fault tolerance for storage systems. ACM Transactions on Storage 4 4 (2009) 1\u201322.","DOI":"10.1145\/1480439.1480444"},{"key":"e_1_3_1_104_2","doi-asserted-by":"crossref","unstructured":"Qiliang Li Liangliang Xu Yongkun Li Min Lyu Wei Wang Pengfei Zuo and Yinlong Xu. 2024. Enabling efficient erasure coding in disaggregated memory systems. IEEE Transactions on Parallel and Distributed Systems 35 01 (2024) 154\u2013168.","DOI":"10.1109\/TPDS.2023.3332782"},{"key":"e_1_3_1_105_2","doi-asserted-by":"crossref","unstructured":"Runhui Li Yuchong Hu and Patrick P. C. Lee. 2017. Enabling efficient and reliable transition from replication to erasure coding for clustered file systems. IEEE Transactions on Parallel and Distributed Systems 28 9 (2017) 2500\u20132513.","DOI":"10.1109\/TPDS.2017.2678505"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.47"},{"key":"e_1_3_1_107_2","first-page":"567","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917)","author":"Li Runhui","year":"2017","unstructured":"Runhui Li, Xiaolu Li, Patrick P. C. Lee, and Qun Huang. 2017. Repair pipelining for erasure-coded storage. In Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC\u201917). 567\u2013579."},{"key":"e_1_3_1_108_2","doi-asserted-by":"crossref","unstructured":"Runhui Li Jian Lin and Patrick P. C. Lee. 2015. Enabling concurrent failure recovery for regenerating-coding-based storage systems: From theory to practice. IEEE Transactions on Computers 64 7 (2015) 1898\u20131911.","DOI":"10.1109\/TC.2014.2349518"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.39"},{"key":"e_1_3_1_110_2","doi-asserted-by":"crossref","unstructured":"Shiyi Li Qiang Cao Shenggang Wan Wen Xia and Changsheng Xie. 2023. gPPM: A generalized matrix operation and parallel algorithm to accelerate the encoding\/decoding process of erasure codes. ACM Transactions On Architecture And Code Optimization 20 4 (2023) 1\u201325.","DOI":"10.1145\/3625005"},{"key":"e_1_3_1_111_2","first-page":"1","volume-title":"Proceedings of the 31th International Conference on Massive Storage Systems and Technology (MSST\u201917)","author":"Li Shenglong","year":"2017","unstructured":"Shenglong Li, Quanlu Zhang, Zhi Yang, and Yafei Dai. 2017. BCStore: Bandwidth-efficient in-memory KV-store with batch coding. In Proceedings of the 31th International Conference on Massive Storage Systems and Technology (MSST\u201917). 1\u201313."},{"key":"e_1_3_1_112_2","doi-asserted-by":"crossref","unstructured":"Xiaolu Li Keyun Cheng Zhirong Shen and Patrick P. C. Lee. 2022. Fast proactive repair in erasure-coded storage: Analysis design and implementation. IEEE Transactions on Parallel and Distributed Systems 33 12 (2022) 3400\u20133414.","DOI":"10.1109\/TPDS.2022.3152817"},{"key":"e_1_3_1_113_2","first-page":"17","volume-title":"Proceedings of the 21st USENIX Conference on File and Storage Technologies (FAST\u201923)","author":"Li Xiaolu","year":"2023","unstructured":"Xiaolu Li, Keyun Cheng, Kaicheng Tang, Patrick P. C. Lee, Yuchong Hu, Dan Feng, Jie Li, and Ting-Yi Wu. 2023. ParaRC: Embracing sub-packetization for repair parallelization in MSR-coded storage. In Proceedings of the 21st USENIX Conference on File and Storage Technologies (FAST\u201923). 17\u201332."},{"key":"e_1_3_1_114_2","first-page":"331","volume-title":"Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919)","author":"Li Xiaolu","year":"2019","unstructured":"Xiaolu Li, Runhui Li, Patrick P. C. Lee, and Yuchong Hu. 2019. OpenEC: Toward unified and configurable erasure coding management in distributed storage systems. In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919). 331\u2013344."},{"key":"e_1_3_1_115_2","doi-asserted-by":"crossref","unstructured":"Xiaolu Li Zuoru Yang Jinhong Li Runhui Li Patrick P. C. Lee Qun Huang and Yuchong Hu. 2021. Repair pipelining for erasure-coded storage: Algorithms and evaluation. ACM Transactions on Storage 17 2 (2021) 13:1\u201313:29.","DOI":"10.1145\/3436890"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.5555\/3129633.3129646"},{"key":"e_1_3_1_117_2","first-page":"641","volume-title":"Proceedings of the 2021 USENIX Annual Technical Conference (USENIX ATC\u201921)","author":"Lin Shiyao","year":"2021","unstructured":"Shiyao Lin, Guowen Gong, Zhirong Shen, Patrick P. C. Lee, and Jiwu Shu. 2021. Boosting full-node repair in erasure-coded storage. In Proceedings of the 2021 USENIX Annual Technical Conference (USENIX ATC\u201921). 641\u2013655."},{"key":"e_1_3_1_118_2","doi-asserted-by":"crossref","unstructured":"Witold Litwin Rim Moussa and Thomas Schwarz. 2005. LH \\(^*_{RS}\\) - A highly-available scalable distributed data structure. ACM Transactions on Database Systems 30 3 (2005) 769\u2013811.","DOI":"10.1145\/1093382.1093386"},{"key":"e_1_3_1_119_2","doi-asserted-by":"crossref","unstructured":"Kaiyang Liu Jun Peng Jingrong Wang Zhiwu Huang and Jianping Pan. 2023. Adaptive and scalable caching with erasure codes in distributed cloud-edge storage systems. IEEE Transactions on Cloud Computing 11 2 (2023) 1840\u20131853.","DOI":"10.1109\/TCC.2022.3168662"},{"key":"e_1_3_1_120_2","doi-asserted-by":"crossref","unstructured":"Shiqiu Liu and Fr\u00e9d\u00e9rique Oggier. 2018. An overview of coding for distributed storage systems. Network Coding and Subspace Designs 1 1 (2018) 363\u2013383.","DOI":"10.1007\/978-3-319-70293-3_14"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.5555\/3386691.3386706"},{"key":"e_1_3_1_122_2","doi-asserted-by":"crossref","unstructured":"Michael Luby Roberto Padovani Thomas J. Richardson Lorenz Minder and Pooja Aggarwal. 2019. Liquid cloud storage. ACM Transactions on Storage 15 1 (2019) 1\u201349.","DOI":"10.1145\/3281276"},{"key":"e_1_3_1_123_2","doi-asserted-by":"crossref","unstructured":"Jianqiang Luo Mochan Shrestha Lihao Xu and James S. Plank. 2014. Efficient encoding schedules for XOR-based erasure codes. IEEE Transactions on Computers 63 9 (2014) 2259\u20132272.","DOI":"10.1109\/TC.2013.23"},{"key":"e_1_3_1_124_2","first-page":"95","volume-title":"Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916)","author":"Margaglia Fabio","year":"2016","unstructured":"Fabio Margaglia, Gala Yadgar, Eitan Yaakobi, Yue Li, Assaf Schuster, and Andr Brinkmann. 2016. The devil is in the details: Implementing flash page reuse with WOM codes. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916). 95\u2013109."},{"key":"e_1_3_1_125_2","doi-asserted-by":"crossref","unstructured":"Francisco Maturana and K. V. Rashmi. 2022. Convertible codes: Enabling efficient conversion of coded data in distributed storage. IEEE Transactions on Information Theory 68 7 (2022) 4392\u20134407.","DOI":"10.1109\/TIT.2022.3155972"},{"key":"e_1_3_1_126_2","doi-asserted-by":"crossref","unstructured":"Francisco Maturana and K. V. Rashmi. 2023. Bandwidth cost of code conversions in distributed storage: Fundamental limits and optimal constructions. IEEE Transactions on Information Theory 69 8 (2023) 4993\u20135008.","DOI":"10.1109\/TIT.2023.3265512"},{"key":"e_1_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/2901318.2901328"},{"key":"e_1_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/2600212.2600218"},{"key":"e_1_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC47752.2019.9041963"},{"key":"e_1_3_1_130_2","first-page":"383","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Muralidhar Subramanian","year":"2014","unstructured":"Subramanian Muralidhar, Wyatt Lloyd, Sabyasachi Roy, Cory Hill, Ernest Lin, Weiwen Liu, Satadru Pan, Shiva Shankar, Viswanath Sivakumar, Linpeng Tang, et al.2014. f4: Facebook\u2019s warm BLOB storage system. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914). 383\u2013398."},{"key":"e_1_3_1_131_2","first-page":"15","volume-title":"Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST\u201904)","author":"Prabhakaran Andrea C. Arpaci-Dusseau Muthian Sivathanu, Vijayan","year":"2004","unstructured":"Andrea C. Arpaci-Dusseau Muthian Sivathanu, Vijayan Prabhakaran and Remzi H. Arpaci-Dusseau. 2004. Improving storage system availability with D-GRAID. In Proceedings of the 3rd USENIX Conference on File and Storage Technologies (FAST\u201904). 15\u201330."},{"key":"e_1_3_1_132_2","first-page":"225","volume-title":"Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI\u201906)","author":"Nath Suman","year":"2006","unstructured":"Suman Nath, Haifeng Yu, Phillip B. Gibbons, and Srinivasan Seshan. 2006. Subtleties in tolerating correlated failures in wide-area storage systems. In Proceedings of the 3rd Symposium on Networked Systems Design and Implementation (NSDI\u201906). 225\u2013238."},{"key":"e_1_3_1_133_2","first-page":"305","volume-title":"Proceeding of the 2014 USENIX Annual Technical Conference (ATC\u201914)","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm. In Proceeding of the 2014 USENIX Annual Technical Conference (ATC\u201914). 305\u2013319."},{"key":"e_1_3_1_134_2","doi-asserted-by":"crossref","unstructured":"Michael Ovsiannikov Silvius Rus Damian Reeves Paul Sutter Sriram Rao and Jim Kelly. 2013. The Quantcast file system. Proceedings of the VLDB Endowment 6 11 (2013) 1092\u20131101.","DOI":"10.14778\/2536222.2536234"},{"key":"e_1_3_1_135_2","doi-asserted-by":"crossref","unstructured":"Rasmus Pagh and Flemming Friche Rodler. 2004. Cuckoo hashing. Journal of Algorithms 51 2 (2004) 122\u2013144.","DOI":"10.1016\/j.jalgor.2003.12.002"},{"key":"e_1_3_1_136_2","first-page":"81","volume-title":"Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916)","author":"Pamies-Juarez Lluis","year":"2016","unstructured":"Lluis Pamies-Juarez, Filip Blagojevi, Robert Mateescu, Cyril Gyuot, Eyal En Gad, and Zvonimir Bandi. 2016. Opening the Chrysalis: On the real repair performance of MSR codes. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST\u201916). 81\u201394."},{"key":"e_1_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566922"},{"key":"e_1_3_1_138_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195703"},{"key":"e_1_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"key":"e_1_3_1_140_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524347"},{"key":"e_1_3_1_141_2","doi-asserted-by":"crossref","unstructured":"Xiaoqiang Pei Yijie Wang Xingkong Ma and Fangliang Xu. 2017. Efficient in-place update with grouped and pipelined data transmission in erasure-coded storage systems. Future Generation Computer Systems 69 1 (2017) 24\u201340.","DOI":"10.1016\/j.future.2016.10.016"},{"key":"e_1_3_1_142_2","first-page":"97","volume-title":"Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST\u201908)","author":"Plank James S.","year":"2008","unstructured":"James S. Plank. 2008. The RAID-6 liberation codes. In Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST\u201908). 97\u2013110."},{"key":"e_1_3_1_143_2","doi-asserted-by":"crossref","unstructured":"James S. Plank and Mario Blaum. 2014. Sector-Disk (SD) erasure codes for mixed failure modes in RAID systems. ACM Transactions on Storage 10 1 (2014) 1\u201317.","DOI":"10.1145\/2560013"},{"key":"e_1_3_1_144_2","first-page":"299","volume-title":"Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST\u201913)","author":"Plank James S.","year":"2013","unstructured":"James S. Plank, Kevin M. Greenan, and Ethan L. Miller. 2013. Screaming fast Galois field arithmetic using Intel SIMD instructions. In Proceedings of the 12th USENIX Conference on File and Storage Technologies (FAST\u201913). 299\u2013306."},{"key":"e_1_3_1_145_2","unstructured":"James S. Plank and Cheng Huang. 2013. Tutorial: Erasure Coding for Storage Applications. Slides presented at USENIX FAST 2013."},{"key":"e_1_3_1_146_2","first-page":"253","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST\u201909)","author":"Plank James S.","year":"2009","unstructured":"James S. Plank, Jianqiang Luo, Catherine D. Schuman, Lihao Xu, Zooko Wilcox-O\u2019Hearn, et\u00a0al. 2009. A performance evaluation and examination of open-source erasure coding libraries for storage. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST\u201909). 253\u2013265."},{"key":"e_1_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263937"},{"key":"e_1_3_1_148_2","unstructured":"Pure Storage. 2023. The Data Center of the Future Is All-flash. Retrieved from https:\/\/blog.purestorage.com\/purely-educational\/the-data-center-of-the-future-is-all-flash\/ Accessed in 2024."},{"key":"e_1_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380833"},{"key":"e_1_3_1_150_2","doi-asserted-by":"crossref","unstructured":"Vinayak Ramkumar S. B. Balaji Birenjith Sasidharan Myna Vajha M. Nikhil Krishnan and P. Vijay Kumar. 2022. Codes for distributed storage. Foundations and Trends\u00aein Communications and Information Theory 19 4 (2022) 547\u2013813.","DOI":"10.1561\/0100000115"},{"key":"e_1_3_1_151_2","doi-asserted-by":"crossref","unstructured":"K. K. Rao James Lee Hafner and Richard A. Golding. 2010. Reliability for networked storage nodes. IEEE Transactions on Dependable and Secure Computing 8 3 (2010) 404\u2013418.","DOI":"10.1109\/TDSC.2010.21"},{"key":"e_1_3_1_152_2","first-page":"401","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Rashmi K. V.","year":"2016","unstructured":"K. V. Rashmi, Mosharaf Chowdhury, Jack Kosaian, Ion Stoica, and Kannan Ramchandran. 2016. EC-Cache: Load-balanced, low-latency cluster caching with online erasure coding. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916). 401\u2013417."},{"key":"e_1_3_1_153_2","first-page":"81","volume-title":"Proceedings of the 13th USENIX Conference on File and Storage Technologies (DSN\u201910)","author":"Rashmi K. V.","year":"2015","unstructured":"K. V. Rashmi, Preetum Nakkiran, Jingyan Wang, Nihar B. Shah, and Kannan Ramchandran. 2015. Having your cake and eating it too: Jointly optimal erasure codes for I\/O, storage, and network-bandwidth. In Proceedings of the 13th USENIX Conference on File and Storage Technologies (DSN\u201910). 81\u201394."},{"key":"e_1_3_1_154_2","first-page":"8:1\u20138:5","volume-title":"Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage\u201913)","author":"Rashmi K. V.","year":"2013","unstructured":"K. V. Rashmi, Nihar B. Shah, Dikang Gu, Hairong Kuang, Dhruba Borthakur, and Kannan Ramchandran. 2013. A solution to the network challenges of data recovery in erasure-coded distributed storage systems: A study on the Facebook warehouse cluster. In Proceedings of the 5th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage\u201913). 8:1\u20138:5."},{"key":"e_1_3_1_155_2","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626325"},{"key":"e_1_3_1_156_2","doi-asserted-by":"crossref","unstructured":"K. V. Rashmi Nihar B. Shah and P. Vijay Kumar. 2011. Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction. IEEE Transactions on Information Theory 57 8 (2011) 5227\u20135239.","DOI":"10.1109\/TIT.2011.2159049"},{"key":"e_1_3_1_157_2","unstructured":"K. V. Rashmi Nihar B. Shah and Kannan Ramchandran. 2017. A piggybacking design framework for read-and download-efficient distributed storage codes. IEEE Transactions on Information Theory 63 9 (2017) 5802\u20135820."},{"key":"e_1_3_1_158_2","doi-asserted-by":"crossref","unstructured":"I. S. Reed and G. Solomon. 1960. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics 8 2 (1960) 300\u2013304.","DOI":"10.1137\/0108018"},{"key":"e_1_3_1_159_2","unstructured":"David Reinsel John Gantz and John Rydnin. 2018. The Digitization of the World From Edge to Core. Retrieved from https:\/\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf Accessed in 2024."},{"key":"e_1_3_1_160_2","first-page":"293","volume-title":"Proceedings of the 22nd USENIX Conference on File and Storage Technologies (FAST\u201924)","author":"Ren Yanjing","year":"2024","unstructured":"Yanjing Ren, Yuanming Ren, Xiaolu Li, Yuchong Hu, Jingwei Li, and Patrick P. C. Lee. 2024. ELECT: Enabling erasure coding tiering for LSM-tree-based storage. In Proceedings of the 22nd USENIX Conference on File and Storage Technologies (FAST\u201924). 293\u2013310."},{"key":"e_1_3_1_161_2","doi-asserted-by":"publisher","DOI":"10.1007\/11558989_21"},{"key":"e_1_3_1_162_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387546"},{"key":"e_1_3_1_163_2","doi-asserted-by":"crossref","unstructured":"Maheswaran Sathiamoorthy Megasthenis Asteris Dimitris Papailiopoulos Alexandros G. Dimakis Ramkumar Vadali Scott Chen and Dhruba Borthakur. 2013. XORing elephants: Novel erasure codes for big data. Proceedings of the VLDB Endowment 6 5 (2013) 325\u2013336.","DOI":"10.14778\/2535573.2488339"},{"key":"e_1_3_1_164_2","doi-asserted-by":"crossref","unstructured":"Nihar B. Shah K. V. Rashmi P. Vijay Kumar and Kannan Ramchandran. 2012. Interference alignment in regenerating codes for distributed storage: Necessity and code constructions. IEEE Transactions on Information Theory 58 4 (2012) 2134\u20132158.","DOI":"10.1109\/TIT.2011.2178588"},{"key":"e_1_3_1_165_2","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483558"},{"key":"e_1_3_1_166_2","first-page":"69","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918)","author":"Shan Yizhou","year":"2018","unstructured":"Yizhou Shan, Yutong Huang, Yilun Chen, and Yiying Zhang. 2018. LegoOS: A disseminated, distributed OS for hardware resource disaggregation. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918). 69\u201387."},{"key":"e_1_3_1_167_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.224"},{"key":"e_1_3_1_168_2","doi-asserted-by":"crossref","unstructured":"Jiajie Shen Kai Zhang Jiazhen Gu Yangfan Zhou and Xin Wang. 2018. Efficient scheduling for multi-block updates in erasure coding based storage systems. IEEE Transactions on Computers 67 4 (2018) 573\u2013581.","DOI":"10.1109\/TC.2017.2769051"},{"key":"e_1_3_1_169_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.18"},{"key":"e_1_3_1_170_2","doi-asserted-by":"publisher","DOI":"10.1145\/3225058.3225065"},{"key":"e_1_3_1_171_2","doi-asserted-by":"crossref","unstructured":"Zhirong Shen Jiwu Shu and Yingxun Fu. 2016. HV Code: An all-around MDS code for RAID-6 storage systems. IEEE Transactions on Parallel and Distributed Systems 27 6 (2016) 1674\u20131686.","DOI":"10.1109\/TPDS.2015.2464800"},{"key":"e_1_3_1_172_2","doi-asserted-by":"crossref","unstructured":"Zhirong Shen Jiwu Shu and Yingxun Fu. 2016. Parity-switched data placement: Optimizing partial stripe writes in XOR-coded storage systems. IEEE Transactions on Parallel and Distributed Systems 27 11 (2016) 3311\u20133322.","DOI":"10.1109\/TPDS.2016.2525770"},{"key":"e_1_3_1_173_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00015"},{"key":"e_1_3_1_174_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.37"},{"key":"e_1_3_1_175_2","doi-asserted-by":"crossref","unstructured":"Zhirong Shen Jiwu Shu Patrick P. C. Lee and Yingxun Fu. 2017. Seek-Efficient I\/O optimization in single failure recovery for XOR-Coded storage systems. IEEE Transactions on Parallel and Distributed Systems 28 3 (2017) 877\u2013890.","DOI":"10.1109\/TPDS.2016.2591040"},{"key":"e_1_3_1_176_2","doi-asserted-by":"publisher","DOI":"10.1145\/2611354.2611370"},{"key":"e_1_3_1_177_2","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165143"},{"key":"e_1_3_1_178_2","doi-asserted-by":"crossref","unstructured":"Changho Suh and Kannan Ramchandran. 2011. Exact-repair MDS code construction using interference alignment. IEEE Transactions on Information Theory 57 3 (2011) 1425\u20131442.","DOI":"10.1109\/TIT.2011.2105003"},{"key":"e_1_3_1_179_2","doi-asserted-by":"crossref","unstructured":"Itzhak Tamo and Alexander Barg. 2014. A family of optimal locally recoverable codes. IEEE Transactions on Information Theory 60 8 (2014) 4661\u20134676.","DOI":"10.1109\/TIT.2014.2321280"},{"key":"e_1_3_1_180_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM53939.2023.10228984"},{"key":"e_1_3_1_181_2","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190536"},{"key":"e_1_3_1_182_2","unstructured":"Petroc Taylor. 2023. Volume of Data\/information Created Captured Copied and Consumed Worldwide from 2010 to 2020 with Forecasts from 2021 to 2025. Retrieved from https:\/\/www.statista.com\/statistics\/871513\/worldwide-data-created\/ Accessed in 2024."},{"key":"e_1_3_1_183_2","doi-asserted-by":"crossref","unstructured":"Alexander Thomasian. 2005. Reconstruct versus read-modify writes in RAID. Information Processing Letters 93 4 (2005) 163\u2013168.","DOI":"10.1016\/j.ipl.2004.10.009"},{"key":"e_1_3_1_184_2","doi-asserted-by":"crossref","unstructured":"Alexander Thomasian and Mario Blaum. 2009. Higher reliability redundant disk arrays: Organization operation and coding. ACM Transactions on Storage 5 3 (2009) 1\u201359.","DOI":"10.1145\/1629075.1629076"},{"key":"e_1_3_1_185_2","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476204"},{"key":"e_1_3_1_186_2","first-page":"157","volume-title":"Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201920)","author":"Uluyol Muhammed","year":"2020","unstructured":"Muhammed Uluyol, Anthony Huang, Ayush Goel, Mosharaf Chowdhury, and Harsha V. Madhyastha. 2020. Near-optimal latency versus cost tradeoffs in geo-distributed storage. In Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201920). 157\u2013180."},{"key":"e_1_3_1_187_2","first-page":"139","volume-title":"Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918)","author":"Vajha Myna","year":"2018","unstructured":"Myna Vajha, Vinayak Ramkumar, Bhagyashree Puranik, Ganesh Kini, Elita Lobo, Birenjith Sasidharan, P. Vijay Kumar, Alexandar Barg, Min Ye, Srinivasan Narayanamurthy, et al.. 2018. Clay codes: Moulding MDS codes to yield an MSR code. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918). 139\u2013154."},{"key":"e_1_3_1_188_2","first-page":"267","volume-title":"Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST\u201920)","author":"Wang Ao","year":"2020","unstructured":"Ao Wang, Jingyuan Zhang, Xiaolong Ma, Ali Anwar, Lukas Rupprecht, Dimitrios Skourtis, Vasily Tarasov, Feng Yan, and Yue Cheng. 2020. InfiniCache: Exploiting ephemeral serverless functions to build a cost-effective memory cache. In Proceedings of the 18th USENIX Conference on File and Storage Technologies (FAST\u201920). 267\u2013281."},{"key":"e_1_3_1_189_2","first-page":"261","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920)","author":"Wang Chenxi","year":"2020","unstructured":"Chenxi Wang, Haoran Ma, Shi Liu, Yuanqi Li, Zhenyuan Ruan, Khanh Nguyen, Michael D. Bond, Ravi Netravali, Miryung Kim, and Guoqing Harry Xu. 2020. Semeru: A memory-disaggregated managed runtime. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920). 261\u2013280."},{"key":"e_1_3_1_190_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2019.00005"},{"key":"e_1_3_1_191_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581784.3607072"},{"key":"e_1_3_1_192_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.15"},{"key":"e_1_3_1_193_2","doi-asserted-by":"publisher","DOI":"10.1145\/3514221.3517824"},{"key":"e_1_3_1_194_2","first-page":"297","volume-title":"Proceedings of the18th USENIX Conference on File and Storage Technologies (FAST\u201920)","author":"Wang Zizhong","year":"2020","unstructured":"Zizhong Wang, Tongliang Li, Haixia Wang, Airan Shao, Yunren Bai, Shangming Cai, Zihan Xu, and Dongsheng Wang. 2020. CRaft: An erasure-coding-supported version of Raft for reducing storage cost and network cost. In Proceedings of the18th USENIX Conference on File and Storage Technologies (FAST\u201920). 297\u2013308."},{"key":"e_1_3_1_195_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_31"},{"key":"e_1_3_1_196_2","volume-title":"An Introduction to Galois Fields and Reed-Solomon Coding","author":"Westall James","year":"2010","unstructured":"James Westall and James Martin. 2010. An Introduction to Galois Fields and Reed-Solomon Coding. Technical Report. School of Computing, Clemson University. Retrieved August, 2024 from https:\/\/people.computing.clemson.edu\/jmarty\/papers\/IntroToGaloisFieldsAndRSCoding.pdf"},{"key":"e_1_3_1_197_2","doi-asserted-by":"crossref","unstructured":"John Wilkes Richard Golding Carl Staelin and Tim Sullivan. 1996. The HP AutoRAID hierarchical storage system. ACM Transactions on Computer Systems 14 1 (1996) 108\u2013136.","DOI":"10.1145\/225535.225539"},{"key":"e_1_3_1_198_2","doi-asserted-by":"crossref","unstructured":"John Wilkes Richard Golding Carl Staelin and Tim Sullivan. 2021. Demand-aware erasure coding for distributed storage systems. IEEE Transactions on Cloud Computing 9 2 (2021) 532\u2013545.","DOI":"10.1109\/TCC.2018.2885306"},{"key":"e_1_3_1_199_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2012.32"},{"key":"e_1_3_1_200_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2013.68"},{"key":"e_1_3_1_201_2","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2012.24"},{"key":"e_1_3_1_202_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958220"},{"key":"e_1_3_1_203_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2011.78"},{"key":"e_1_3_1_204_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796704"},{"key":"e_1_3_1_205_2","doi-asserted-by":"crossref","unstructured":"Si Wu Zhirong Shen Patrick P. C. Lee Zhiwei Bai and Yinlong Xu. 2024. Elastic Reed-Solomon codes for efficient redundancy transitioning in distributed key-value stores. IEEE\/ACM Transactions on Networking 32 1 (2024) 670\u2013685.","DOI":"10.1109\/TNET.2023.3303865"},{"key":"e_1_3_1_206_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155417"},{"key":"e_1_3_1_207_2","doi-asserted-by":"crossref","unstructured":"Si Wu Yinlong Xu Yongkun Li and Zhijia Yang. 2016. I\/O-efficient scaling schemes for distributed storage systems with CRS codes. IEEE Transactions on Parallel and Distributed Systems 27 9 (2016) 2639\u20132652.","DOI":"10.1109\/TPDS.2015.2505722"},{"key":"e_1_3_1_208_2","doi-asserted-by":"crossref","unstructured":"Junxu Xia Deke Guo and Geyao Cheng. 2019. In-network block repairing for erasure coding storage systems. Concurrency and Computation: Practice and Experience 31 24 (2019) e5432.","DOI":"10.1002\/cpe.5432"},{"key":"e_1_3_1_209_2","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2017.8026875"},{"key":"e_1_3_1_210_2","doi-asserted-by":"crossref","unstructured":"Junxu Xia Lailong Luo Bowen Sun Geyao Cheng and Deke Guo. 2024. Parallelized in-network aggregation for failure repair in erasure-coded storage systems. IEEE\/ACM Transactions on Networking 32 4 (2024) 2888\u20132903.","DOI":"10.1109\/TNET.2024.3367995"},{"key":"e_1_3_1_211_2","doi-asserted-by":"publisher","DOI":"10.5555\/2750482.2750499"},{"key":"e_1_3_1_212_2","doi-asserted-by":"crossref","unstructured":"Liping Xiang Yinlong Xu John C.S. Lui Qian Chang Yubiao Pan and Runhui Li. 2011. A hybrid approach of failed disk recovery using RAID-6 codes: Algorithms and performance evaluation. ACM Transactions on Storage 7 3 (2011).","DOI":"10.1145\/2027066.2027071"},{"key":"e_1_3_1_213_2","doi-asserted-by":"publisher","DOI":"10.5555\/1032647.1033303"},{"key":"e_1_3_1_214_2","doi-asserted-by":"publisher","DOI":"10.1145\/3337821.3337826"},{"key":"e_1_3_1_215_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS49936.2021.00091"},{"key":"e_1_3_1_216_2","doi-asserted-by":"crossref","unstructured":"Lihao Xu and Jehoshua Bruck. 1999. X-code: MDS array codes with optimal encoding. IEEE Transactions on Information Theory 45 1 (1999) 272\u2013276.","DOI":"10.1109\/18.746809"},{"key":"e_1_3_1_217_2","unstructured":"Liangliang Xu Min Lyu Zhipeng Li Cheng Li and Yinlong Xu. 2022. A data layout and fast failure recovery scheme for distributed storage systems with mixed erasure codes. IEEE Transactions on Computers 71 8 (2022) 1740\u20131754."},{"key":"e_1_3_1_218_2","doi-asserted-by":"crossref","unstructured":"Silei Xu Runhui Li Patrick P. C. Lee Yunfeng Zhu Liping Xiang Yinlong Xu and John C. S. Lui. 2014. Single disk failure recovery for X-code-based parallel storage systems. IEEE Transactions on Computers 63 4 (2014) 995\u20131007.","DOI":"10.1109\/TC.2013.8"},{"key":"e_1_3_1_219_2","first-page":"481","volume-title":"Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC\u201918) (FAST\u201918)","author":"Xu Yong","year":"2018","unstructured":"Yong Xu, Kaixin Sui, Randolph Yao, Hongyu Zhang, Qingwei Lin, Yingnong Dang, Peng Li, Keceng Jiang, Wenchi Zhang, Jian-Guang Lou, et\u00a0al. 2018. Improving service availability of cloud systems by predicting disk error. In Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC\u201918) (FAST\u201918). 481\u2013494."},{"key":"e_1_3_1_220_2","first-page":"257","volume-title":"Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST\u201915)","author":"Yadgar Gala","year":"2015","unstructured":"Gala Yadgar, Eitan Yaakobi, and Assaf Schuster. 2015. Write once, get 50% free: saving SSD erase costs using WOM codes. In Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST\u201915). 257\u2013271."},{"key":"e_1_3_1_221_2","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS55811.2022.00033"},{"key":"e_1_3_1_222_2","first-page":"1159","volume-title":"Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201922)","author":"Yang Juncheng","year":"2022","unstructured":"Juncheng Yang, Anirudh Sabnis, Daniel S. Berger, K. V. Rashmi, and Ramesh K. Sitaraman. 2022. C2DN: How to harness erasure codes at the edge for ffficient content delivery. In Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201922). 1159\u20131177."},{"key":"e_1_3_1_223_2","first-page":"503","volume-title":"Proceedings of the 18th Symposium on Networked Systems Design and Implementation (NSDI\u201921)","author":"Yang Juncheng","year":"2021","unstructured":"Juncheng Yang, Yao Yue, and Rashmi Vinayak. 2021. Segcache: A memory-efficient and scalable in-memory key-value cache for small objects. In Proceedings of the 18th Symposium on Networked Systems Design and Implementation (NSDI\u201921). 503\u2013518."},{"key":"e_1_3_1_224_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00053"},{"key":"e_1_3_1_225_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00065"},{"key":"e_1_3_1_226_2","doi-asserted-by":"publisher","DOI":"10.1145\/3078468.3078470"},{"key":"e_1_3_1_227_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS54959.2023.00036"},{"key":"e_1_3_1_228_2","first-page":"279","volume-title":"Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918)","author":"Zhang Guangyan","year":"2018","unstructured":"Guangyan Zhang, Zican Huang, Xiaosong Ma, Songlin Yang, Zhufan Wang, and Weimin Zheng. 2018. RAID+: Deterministic and balanced data distribution for large disk enclosures. In Proceedings of the 16th USENIX Conference on File and Storage Technologies (FAST\u201918). 279\u2013294."},{"key":"e_1_3_1_229_2","doi-asserted-by":"crossref","unstructured":"Guangyan Zhang Keqin Li Jingzhe Wang and Weimin Zheng. 2015. Accelerate RDP RAID-6 scaling by reducing disk I\/Os and XOR operations. IEEE Transactions on Computers 64 1 (2015) 32\u201344.","DOI":"10.1109\/TC.2013.210"},{"key":"e_1_3_1_230_2","doi-asserted-by":"crossref","unstructured":"Guangyan Zhang Jiwu Shu Wei Xue and Weimin Zheng. 2007. SLAS: An efficient approach to scaling round-robin striped volumes. ACM Transactions on Storage 3 1 (2007) 1\u201339.","DOI":"10.1145\/1227835.1227838"},{"key":"e_1_3_1_231_2","doi-asserted-by":"crossref","unstructured":"Guangyan Zhang Jiwu Shu Wei Xue and Weimin Zheng. 2010. ALV: A new data redistribution approach to RAID-5 scaling. IEEE Transactions on Computers 59 3 (2010) 345\u2013357.","DOI":"10.1109\/TC.2009.150"},{"key":"e_1_3_1_232_2","doi-asserted-by":"crossref","unstructured":"Guangyan Zhang Weimin Zheng and Keqin Li. 2014. Rethinking RAID-5 data layout for better scalability. IEEE Transactions on Computers 63 11 (2014) 2816\u20132828.","DOI":"10.1109\/TC.2013.143"},{"key":"e_1_3_1_233_2","doi-asserted-by":"crossref","unstructured":"Mi Zhang Shujie Han and Patrick P. C. Lee. 2019. SimEDC: A simulator for the reliability analysis of erasure-coded data centers. IEEE Transactions on Parallel and Distributed Systems 30 12 (2019) 2836\u20132848.","DOI":"10.1109\/TPDS.2019.2921551"},{"key":"e_1_3_1_234_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605573.3605619"},{"key":"e_1_3_1_235_2","unstructured":"Shenglin Zhang Ying Liu Weibin Meng Zhiling Luo Jiahao Bu Sen Yang Peixian Liang Dan Pei Jun Xu Yuzhi Zhang et\u00a0al. 2018. Prefix: Switch failure prediction in datacenter networks. Proceedings of the ACM on Measurement and Analysis of Computing Systems 2 1 (2018) 1\u201329."},{"key":"e_1_3_1_236_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.19"},{"key":"e_1_3_1_237_2","first-page":"243","volume-title":"Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST\u201913)","author":"Zhao Kai","year":"2013","unstructured":"Kai Zhao, Wenzhe Zhao, Hongbin Sun, Tong Zhang, Xiaodong Zhang, and Nanning Zheng. 2013. LDPC-in-SSD: Making advanced error correction codes work effectively in solid state drives. In Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST\u201913). 243\u2013256."},{"key":"e_1_3_1_238_2","volume-title":"Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST\u201911)","author":"Zheng Weimin","year":"2011","unstructured":"Weimin Zheng and Guangyan Zhang. 2011. FastScale: Accelerate RAID scaling by minimizing data migration. In Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST\u201911)."},{"key":"e_1_3_1_239_2","doi-asserted-by":"publisher","DOI":"10.1145\/3472456.3472494"},{"key":"e_1_3_1_240_2","doi-asserted-by":"crossref","unstructured":"Hai Zhou Dan Feng and Yuchong Hu. 2023. MDTUpdate: A multi-block double tree update technique in heterogeneous erasure-coded clusters. IEEE Transactions on Computers 72 10 (2023) 2808\u20132821.","DOI":"10.1109\/TC.2023.3271064"},{"key":"e_1_3_1_241_2","doi-asserted-by":"crossref","unstructured":"Panping Zhou Jianzhong Huang Xiao Qin and Changsheng Xie. 2019. PaRS: A popularity-aware redundancy scheme for in-memory stores. IEEE Transactions on Computers 68 4 (2019) 556\u2013569.","DOI":"10.1109\/TC.2018.2876827"},{"key":"e_1_3_1_242_2","first-page":"317","volume-title":"Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919)","author":"Zhou Tianli","year":"2019","unstructured":"Tianli Zhou and Chao Tian. 2019. Fast erasure coding for data storage: A comprehensive study of the acceleration techniques. In Proceedings of the 17th USENIX Conference on File and Storage Technologies (FAST\u201919). 317\u2013329."},{"key":"e_1_3_1_243_2","first-page":"55","volume-title":"Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201922)","author":"Zhou Yang","year":"2022","unstructured":"Yang Zhou, Hassan M. G. Wassel, Sihang Liu, Jiaqi Gao, James Mickens, Minlan Yu, Chris Kennelly, Paul Turner, David E. Culler, Henry M. Levy, et\u00a0al. 2022. Carbink: Fault-tolerant far memory. In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201922). 55\u201371."},{"key":"e_1_3_1_244_2","doi-asserted-by":"crossref","unstructured":"Yunfeng Zhu Patrick P. C. Lee Yinlong Xu Yuchong Hu and Liping Xiang. 2014. On the speedup of recovery in large-scale erasure-coded storage systems. IEEE Transactions on Parallel and Distributed Systems 25 7 (2014) 1830\u20131840.","DOI":"10.1109\/TPDS.2013.244"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:55Z","timestamp":1750295875000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,8]]},"references-count":243,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2,28]]}},"alternative-id":["10.1145\/3708994"],"URL":"https:\/\/doi.org\/10.1145\/3708994","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"value":"1553-3077","type":"print"},{"value":"1553-3093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,8]]},"assertion":[{"value":"2023-11-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-10","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}