Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James Hendricks is active.

Publication


Featured researches published by James Hendricks.


symposium on operating systems principles | 2007

Low-overhead byzantine fault-tolerant storage

James Hendricks; Gregory R. Ganger; Michael K. Reiter

This paper presents an erasure-coded Byzantine fault-tolerant block storage protocol that is nearly as efficient as protocols that tolerate only crashes. Previous Byzantine fault-tolerant block storage protocols have either relied upon replication, which is inefficient for large blocks of data when tolerating multiple faults, or a combination of additional servers, extra computation, and versioned storage. To avoid these expensive techniques, our protocol employs novel mechanisms to optimize for the common case when faults and concurrency are rare. In the common case, a write operation completes in two rounds of communication and a read completes in one round. The protocol requires a short checksum comprised of cryptographic hashes and homomorphic fingerprints. It achieves throughput within 10% of the crash-tolerant protocol for writes and reads in failure-free runs when configured to tolerate up to 6 faulty servers and any number of faulty clients.


principles of distributed computing | 2007

Verifying distributed erasure-coded data

James Hendricks; Gregory R. Ganger; Michael K. Reiter

Erasure coding can reduce the space and band width overheads of redundancy in fault-tolerant data storage and delivery systems. But it introduces the fundamental difficulty of ensuring that all erasure-coded fragments correspond to the same block of data. Without such assurance, a different block may be reconstructed from different subsets of fragments. This paper develops a technique for providing this assurance without the bandwidth and computational overheads associated with current approaches. The core idea is to distribute with each fragment what we call homomorphic fingerprints. These fingerprints preserve the structure of the erasure code and allow each fragment to be independently verified as corresponding to a specific block. We demonstrate homomorphic fingerprinting functions that are secure, efficient, and compact.


acm sigops european workshop | 2004

Secure bootstrap is not enough: shoring up the trusted computing base

James Hendricks; Leendert van Doorn

We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware of all devices in the computer, not just devices that are accessible by the host CPU. Modern computers contain many autonomous processing elements, such as disk controllers, disks, network adapters, and coprocessors, that all have field-upgradeable firmware and are an essential component of the computer systems trust model. Ignoring these devices opens the system to attacks similar to those secure boot was engineered to defeat.


dependable systems and networks | 2010

Zzyzx: Scalable fault tolerance through Byzantine locking

James Hendricks; Shafeeq Sinnamohideen; Gregory R. Ganger; Michael K. Reiter

Zzyzx is a Byzantine fault-tolerant replicated state machine protocol that outperforms prior approaches and provides near-linear throughput scaling. Using a new technique called Byzantine Locking, Zzyzx allows a client to extract state from an underlying replicated state machine and access it via a second protocol specialized for use by a single client. This second protocol requires just one round-trip and 2 f + 1 responsive servers—compared to Zyzzyva, this results in 39–43% lower response times and a factor of 2.2−2.9× higher throughput. Furthermore, the extracted state can be transferred to other servers, allowing non-overlapping sets of servers to manage different state. Thus, Zzyzx allows throughput to be scaled by adding servers when concurrent data sharing is not common. When data sharing is common, performance can match that of the underlying replicated state machine protocol.


file and storage technologies | 2005

Ursa minor: versatile cluster-based storage

Michael Abd-El-Malek; William V. Courtright Ii; Charles D. Cranor; Gregory R. Ganger; James Hendricks; Andrew J. Klosterman; Michael P. Mesnier; Manish Prasad; Brandon Salmon; Raja R. Sambasivan; Shafeeq Sinnamohideen; John D. Strunk; Eno Thereska; Matthew Wachs; Jay J. Wylie


file and storage technologies | 2007

Trace: parallel trace replay with approximate causal events

Michael P. Mesnier; Matthew Wachs; Raja R. Sambasivan; Julio Lopez; James Hendricks; Gregory R. Ganger; David R. O'Hallaron


Archive | 2006

Improving Small File Performance in Object-Based Storage

James Hendricks; Raja R. Sambasivan; Shafeeq Sinnamohideen; Gregory R. Ganger


usenix annual technical conference | 2010

A transparently-scalable metadata service for the Ursa Minor storage system

Shafeeq Sinnamohideen; Raja R. Sambasivan; James Hendricks; Likun Liu; Gregory R. Ganger


ALS'00 Proceedings of the 4th annual Linux Showcase & Conference - Volume 4 | 2000

The linux BIOS

Ronald Minnich; James Hendricks; Dale Webster


IEEE Data(base) Engineering Bulletin | 2006

Early experiences on the journey towards self-* storage.

Michael Abd-El-Malek; William V. Courtright Ii; Charles D. Cranor; Gregory R. Ganger; James Hendricks; Andrew J. Klosterman; Michael P. Mesnier; Manish Prasad; Brandon Salmon; Raja R. Sambasivan; Shafeeq Sinnamohideen; John D. Strunk; Eno Thereska; Matthew Wachs; Jay J. Wylie

Collaboration


Dive into the James Hendricks's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew Wachs

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Brandon Salmon

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

John D. Strunk

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge