My Projects


1. Disaggregated Memory

Overview

Memory disaggregation, which has attracted extensive attentions from both industry, e.g., HP’s The Machine and Intel RSD and academia, decouples the traditional monolithic compute and memory resources in datacenters and forms independent compute and memory resource pools. Due to resource pooling and independent hardware deployments, disaggregated memory enjoys the benefits of improvements on resource utilization, failure isolation, and elasticity. In the disaggregated memory architecture, compute blades run applications with only a small amount of memory as cache. In contrast, the memory pool stores application data with weak computing power. Due to not involving the compute resources in the memory pool, fast one-sided RDMA networks generally serve for data accesses from the compute blades to the memory pool.

Publications

2. Index Structures for NVM

Overview

Non-volatile memory (NVM) as persistent memory is expected to substitute or complement DRAM as the next-generation main memory, due to the strengths of non-volatility, high density, and near-zero standby power. In main memory systems, hashing index structures are fundamental building block to provide fast query response. However, hashing index structures originally designed for DRAM become inefficient for NVM due to new challenges such as hardware limitations of NVM and the requirement of data consistency. To address these problems, we propose a series of efficient hashing index schemes for NVM:

  • In Path Hashing [MSST’2017], we propose a cost-efficient write-friendly hashing scheme that can significantly reduce extra writes for NVM. The basic idea of path hashing is to leverage a novel hash-collision resolution method, i.e., position sharing, which meets the needs of insertion and deletion requests without extra writes to NVMs. By further exploiting double-path hashing and path shortening techniques, path hashing delivers high performance of hash tables in terms of space utilization and request latency.

  • In Cache-optimized Path Hashing [TPDS’2018], we enable path hashing to be cache-optimized by packing multiple cells in the same path together and storing them into one cache line, and thus improve the cache line utilization in path hashing to obtain higher performance.

  • In Level Hashing [OSDI’2018], we propose a write-optimized and high-performance hashing index scheme with low-overhead consistency guarantee and cost-efficient resizing for persistent memory. Level hashing provides a sharing-based two-level hash table, which achieves a constant-scale search/insertion/deletion/update time complexity in the worst case and rarely incurs extra NVM writes. To guarantee the consistency with low overhead, level hashing leverages log-free consistency schemes for insertion, deletion, and resizing operations, and an opportunistic log-free scheme for update operation. To cost-efficiently resize this hash table, level hashing leverages an in-place resizing scheme that only needs to rehash 1/3 of buckets instead of the entire table, thus significantly reducing the number of rehashed buckets and improving the resizing performance.

Publications


3. Secure NVM

Overview

Non-volatile memory (NVM) technologies are considered as promising candidates of the next-generation main memory. However, the non-volatility of NVMs leads to new security vulnerabilities. For example, it is not difficult to access sensitive data stored on stolen NVMs. Memory encryption can be employed to mitigate the security vulnerabilities, but it increases the number of bits written to NVMs due to the diffusion property and thereby aggravates the NVM wear-out induced by writes. Moreover, in the non-volatile memory, ensuring the security and correctness of persistent data is fundamental. However, the security and persistence issues are usually studied independently in existing work. To achieve both data security and persistence, simply combining existing persistence schemes with memory encryption is inefficient due to crash inconsistency and significant performance degradation.

  • In DeWrite[MICRO’2018], we propose a secure and deduplication-aware scheme to enhance the performance and endurance of encrypted NVMs based on a new in-line deduplication technique and the synergistic integrations of deduplication and encryption. Specifically, it performs low-latency in-line deduplication to exploit the abundant cache-line-level duplications leveraging the intrinsic read/write asymmetry of NVMs and light-weight hashing. It also opportunistically parallelizes the operations of deduplication and encryption and allows them to co-locate the metadata for high time and space efficiency.
  • In SecPM [HotStorage’2018], we propose a secure and persistent memory system. SecPM leverages the CWT scheme to guarantee the crash consistency via ensuring both the data and its counter are durable before the data flush completes, and leverages the CWR scheme to improve the performance via exploiting the spatial locality of counter storage, log and data writes.

Publications


4. Data Deduplication

Overview

Data deduplication is able to effectively identify and eliminate redundant data and only maintain a single copy of data. Hence, it is widely used in backup and archival storage systems to save storage space. Nevertheless, redundant data also widely exist in other application situations such as network, cloud storage, and devices. How to efficienlt deploying or improving deduplicaiton techqiues in these applicaitons is challenging.

  • In BEES [ICDCS’2017], we propose a bandwidth and energy efficient image sharing system to provide efficient image sharing in disasters by leveraging deduplication. The salient feature behind BEES is to propose the concept of Approximate Image Sharing (AIS), which explores and exploits approximate feature extraction, redundancy detection, and image uploading to trade the slightly low quality of computation results in content-based redundancy elimination for higher bandwidth and energy efficiency.

  • In RRCS [IPDPS’2018], we propose a simple yet effective scheme to significantly mitigate the risk of the LRI attack while maintaining the high bandwidth efficiency of deduplication in cloud storage systems, by adding randomized redundant chunks to mix up the real deduplication states of files used for the LRI attack.

  • In DeWrite [MICRO’2018], we propose a secure and deduplication-aware scheme to enhance the performance and endurance of encrypted NVM devices based on a new in-line deduplication technique and the synergistic integrations of deduplication and encryption.

Publications