Skip to main content
Darrell D E Long
  • Paris, France
  • +1 (831) 459-2817
  • Dr. Darrell D. E. Long is Distinguished Professor of Engineering at the University of California, Santa Cruz. He hold... moreedit
  • Jehan-François Pârisedit
The ability to automatically hoard data on a computer's local store would go a long way towards freeing the mobile user from dependence on the network and potentially un- bounded latencies. An important step in developing a fully... more
The ability to automatically hoard data on a computer's local store would go a long way towards freeing the mobile user from dependence on the network and potentially un- bounded latencies. An important step in developing a fully automated file hoarding algorithm is the ability to automat- ically identify strong relationships between files. We present a mechanism for visualizing the
The subject of this article is differential compression , the algorithmic task of finding common strings between versions of data and using them to encode one version compactly by describing it as a set of changes from its companion. A... more
The subject of this article is differential compression , the algorithmic task of finding common strings between versions of data and using them to encode one version compactly by describing it as a set of changes from its companion. A main goal of this work is to present new differencing algorithms that (i) operate at a fine granularity (the atomic unit of change), (ii) make no assumptions about the format or alignment of input data, and (iii) in practice use linear time, use constant space, and give good compression. We present new algorithms, which do not always compress optimally but use considerably less time or space than existing algorithms. One new algorithm runs in O ( n ) time and O (1) space in the worst case (where each unit of space contains [log n ] bits), as compared to algorithms that run in O ( n ) time and O ( n ) space or in O ( n 2 ) time and O (1) space. We introduce two new techniques for differential compression and apply these to give additional algorithms th...
Research Interests:
SeaOS is a simple operating system developed for fast prototyping of research concepts. SeaOS implements a POSIX-like interface in less than 30,000 lines of C kernel code. Its userspace is complete enough to be self-hosting and includes... more
SeaOS is a simple operating system developed for fast prototyping of research concepts. SeaOS implements a POSIX-like interface in less than 30,000 lines of C kernel code. Its userspace is complete enough to be self-hosting and includes ports of gcc, bash, grub, binutils, and coreutils. SeaOS runs on modern x86 and x86_64 architectures and is designed to support our lab's operating system research in scheduling, virtualization and security architectures.
The field of consistency control protocols for replicated data objects has existed for about ten years. Its birth coincides with the advent of distributed data bases and the communications technology required to support them. When data... more
The field of consistency control protocols for replicated data objects has existed for about ten years. Its birth coincides with the advent of distributed data bases and the communications technology required to support them. When data objects are replicated around a computer network, a protocol must be chosen to ensure a consistent view to an accessing process. The replicas of the data object are then said to be mutually consistent. The protocols used to insure mutual consistency are known as replica control or consistency control protocols. There are several advantages to a distributed system over a single processor system. Among these are increased computing power and the ability to tolerate partial failures due to the malfunction of individual components. The redundancy present in a distributed system has been the focus of much research in the area of distributed data base systems. Another benefit of this natural redundancy, along with the relatively independent failure modes of the processors, is that it allows the system to continue operation even after some of the processors have failed. This can be used to construct data objects that are robust in the face of partial system failures. The focus of this dissertation is the exploitation of the redundancy present in distribution systems in order to attain an increased level of fault tolerance for data objects. The use of replication as a method of increasing fault tolerance is a well-known technique. Replication introduces the additional complexity of maintaining mutual consistency among the replicas of the data object. The protocols that manage the replicated data and provide the user with a single consistent view of that data are studied, and a comprehensive analysis of the fault tolerance provided by several of the most promising protocols are presented. Several techniques are employed, including Markov analysis and discrete event simulation. Simulation is used to confirm and extend the results obtained using analytic techniques.
Micro-Electro-Mechanical Systems (MEMS)-based storage is an emerging non-volatile secondary storage technology. Combining a movable non-rotating media sled and a stationary array with thousands of read/write probe tips into a single chip... more
Micro-Electro-Mechanical Systems (MEMS)-based storage is an emerging non-volatile secondary storage technology. Combining a movable non-rotating media sled and a stationary array with thousands of read/write probe tips into a single chip as small as a dime, MEMS-based storage provides up to ten gigabytes of storage with low access latency, high streaming bandwidth, low power consumption, and low entry cost. It is equally important that MEMS-based storage exhibits distinct low-level device-specific features, such as two-dimensional independent media positioning and fast power state transitions. The theme of this thesis research is to exploit the distinct properties of MEMS-based storage to deliver better performance, higher cost/performance ratios, lower power consumption, and higher reliability of storage systems. We developed an analytical model of seek times for MEMS-based storage and identified seek time equivalence regions. This finding has great impacts on request scheduling and data layout on MEMS storage devices. We have developed MEMS-aware request scheduling algorithms that achieve superior service performance without sacrificing fairness. Data layout that leverages the knowledge of MEMS seek time equivalence regions also results in better performance under randomly-accessed workloads. Our MEMS-aware power conservation techniques reduces half of the power consumed by storage devices with negligible I/O performance penalties. With internal redundancy, sufficient online spares as well as optional maintenance, MEMS storage drives, which are built as disk replacement, are highly reliable in the economic lifetime. MEMS-based storage can also be used as fast front-end for disks to build high-performing, cost-effective hybrid MEMS/disk storage devices.
It is increasingly important and a big challenge to detect intrusion behavior variants in today's world. Previous host-based intrusion detection methods typically explore the sequence of system calls or unix shell commands to detect... more
It is increasingly important and a big challenge to detect intrusion behavior variants in today's world. Previous host-based intrusion detection methods typically explore the sequence of system calls or unix shell commands to detect the intrusion behavior. This article abstracts the detection of intrusion behavior variants as the comparison between different sequences when the sequence order or length transforms. To overcome the impact of sequence transformation on the detection accuracy, we propose P-Gaussian, a provenance-based Gaussian distribution detection scheme which comprises two key design features: (1) it utilizes provenance to describe and identify intrusion behavior variants, and eliminates the impact of sequence order transformation on the detection accuracy. (2) it adopts Gaussian distribution principle to accurately compute the similarity between intrusion behavior and its variant, and eliminates the impact of intrusion behavior sequence length increase on the detection accuracy. To improve the detection performance, P-Gaussian employs a Redis memory database with multiple Redis instances and multiple threads to enable the parallelism of provenance processing in multi-core environments. It also classifies hot and cold provenance to provide high-efficient long-term forensic analysis. Experimental results on widely-used real world applications demonstrate the performance and efficiency of our system.
Research Interests:
Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwords. To prevent exposure, data centers have security policies in place to physically secure drives in the system, and securely delete data... more
Removing hard drives from a data center may expose sensitive data, such as encryption keys or passwords. To prevent exposure, data centers have security policies in place to physically secure drives in the system, and securely delete data from drives that are removed. Despite advances in security technology and best practices, implementation of these security measures is often done incorrectly. We anticipate that physical security will fail, and fixing the issue after the failure is costly and ineffective. We propose Inkpack, a protocol that prevents an attacker from reading data from a drive removed from the data center even if the attacker has the user key linked to the data. An implementation of this protocol encrypts data, and secret splits the key over a number of drives. Recovering the key requires communicating with other drives, thereby denying access to the data if a few drives have been removed. Inkpack also requires the system to verify the validity of individual drives before normal operation. A prototype created within the Ceph storage system executed individual key split, key rebuild, and drive validation operations in 100--150 μs. We also show that our protocol is sensitive to small data write overheads, demonstrating potential performance gains if implemented on smart solid state storage devices, and propose a solution to increase performance.

And 433 more

Research Interests: