A first idea to solve this problem is developed in
Glacier (Haeberlen et al., 2005), a decentralized stor-
age system. Glacier makes heavy use of erasure cod-
ing techniques coupled with a repair mechanism in
case of failure to ensure the required availability level
even if the system is severely damaged. However, the
fragments placement made by Glacier is key-based
and static into a DHT. As a consequence, an attacker
knowing the fragments’ keys could target their host-
ing nodes to make the data unrecoverable.
A second idea proposed in the literature is to cre-
ate a correlated faults model (Weatherspoon et al.,
2002; Bakkaloglu et al., 2002) from various obser-
vations of the overlay. The model is then used to cre-
ate clusters of correlated nodes. The idea is to adopt a
proactive approach in distributing a maximum of frag-
ments on different clusters to prevent the loss of mul-
tiple fragments after a fault.
From these observations, we propose a flexible ap-
proach to avoid the static key-based placement with-
out losing the ability to self-repair during the flock
lifetime. Our goal is to combine the massive fragmen-
tation approaches with proactive mobile-based ap-
proaches to solve the problem of the availability of
data in presence of correlated failures. More precisely
we think that:
1. In our architecture, each flock knows its compo-
sition (the number and the location of fragments)
and the environment it explores (the peers it dis-
covers), making it able to plan a repair when its
size has reached a given critical threshold. In
case of hierarchical codes (Duminuco and Bier-
sack, 2008) for example, the system can com-
pute P( f ailure|a), the probability of complete
data loss if other a fragments loses occur.
2. The second interest of a mobile-agents based ap-
proach is the faculty for the flock to change it’s
location when the environment evolves. If we
suppose a correlated faults model of the network,
the flock can search an optimal placement during
its motion which minimizes the inter-correlation
between its hosting nodes using techniques like
simulated-annealing. Since we are in a dynamic
environment, the flock searches a new optimal po-
sition every time the equilibrium is disturbed (typ-
ically after a fault or a node join into the neighbor-
hood of the flock).
3. In opposition with Glacier where an attacker
knowing the fragments’ keys could provoke an
unrecoverable failure, the flock’s location is not
accessible to attackers and its motion is quite un-
predictable making the setup of these kind of at-
tacks very difficult.
6 CONCLUSIONS
We presented in this paper the bases of a new ap-
proach to handle the problems of data placement and
its dependability in decentralized data storage sys-
tems. The described approach claims to be flexi-
ble and adaptable by using mobile agents moving in
flocks in a peer-to-peer network. Our experimenta-
tions show that cohesion of the flock is preserved dur-
ing its motion. However, this cohesion is dependent
of the network size and consequently of the number
of neighbors per peer. This is clearly a SCAMP re-
lated constraint where the neighborhood grows with
the network size. The pheromones deposit guaranties
that almost all network nodes are visited after sev-
eral flock motions. Those experimentations validate
to some extent our approach basis.
The next step of our work aims to make good use
of the flock’s knowledge and its environment to pro-
pose a proactive and optimal data placement guaran-
tying the required dependability level in presence of
correlated faults. Finally, we will measure the costs
of our approach in comparison to existing locals and
random data placements.
REFERENCES
Bakkaloglu, M., Wylie, J. J., Wang, C., and Ganger, G. R.
(2002). On correlated failures in survivable stor-
age systems. Technical Report CMU-CS-02-129,
Carnegie Mellon University.
Douceur, J. and Wattenhofer, R. (2001). Competitive hill-
climbing strategies for replica placement in a dis-
tributed file system. In Proceedings of the 15th Inter-
national Conference on Distributed Computing, pages
48–62, London, UK. Springer-Verlag.
Druschel, P. and Rowstron, A. (2001). PAST: A large-scale,
persistent peer-to-peer storage utility. Workshop on
Hot Topics in Operating Systems, pages 75–80.
Duminuco, A. and Biersack, E. (2008). Hierarchical codes:
How to make erasure codes attractive for peer-to-peer
storage systems. IEEE International Conference on
Peer-to-Peer Computing, pages 89–98.
Erd
˝
os, P. and R
´
enyi, A. (1959). On random graphs. I.
In Publicationes Mathematicae Debrecen, pages 290–
297.
Erd
˝
os, P. and R
´
enyi, A. (1960). On the evolution of random
graphs. In Publications of the Mathematical Institute
of the Hungarian Academy of Sciences, pages 17–61.
Ganesh, A. J., Kermarrec, A.-M., and Massouli
´
e, L. (2001).
Scamp: Peer-to-peer lightweight membership service
for large-scale group communication. In Proceedings
of the 3rd International Workshop Networked Group
Communication, pages 44–55, London, UK.
BIO-INSPIRED DATA PLACEMENT IN PEER-TO-PEER NETWORKS - Benefits of using Multi-agents Systems
323