Salim El Rouayheb – ResearchResearch SummaryMy research interests lie in the broad area of communications with a focus on the reliability and security of data. in distributed storage systems, networks and wireless systems. My research focuses on exploring the fundamental performance limits and developing efficient algorithms for data reliability and security in today's large-scale distributed systems. These systems are now undergoing an explosive growth under the umbrella name of ‘‘the cloud", which includes data centers, peer-to-peer (p2p) architectures and content delivery networks. In this exploration, I draw on tools from information theory, coding theory, network coding, combinatorics and probabilistic methods to find solutions. My goal is to contribute to the vision of making data seamlessly available to users anywhere and anytime over wired and wireless networks. Below, I describe research projects that I have been interested in and that are aimed toward that goal. reliable and secure distributed information systems and on the algorithmic and information-theoretic aspects of networking. My research focuses on exploring the fundamental performance limits and developing efficient algorithms for data reliability and security in today's large-scale distributed systems. These systems are now undergoing an explosive growth under the umbrella name of ‘‘the cloud", which includes data centers, peer-to-peer (p2p) architectures and content delivery networks. In this exploration, I draw on tools from information theory, coding theory, network coding, combinatorics and probabilistic methods, and place a special emphasis on solutions that can be implemented in real systems. For this reason, I enjoy talking to and collaborating with people in the industry to formulate new relevant problems and test new solutions. The general goal of my research is to contribute to the vision of making data seamlessly available to users anywhere and anytime over wired and wireless networks. Below, I describe three main tracks of my research work aimed toward that goal.vspace{-.2cm} My research interests lie in the broad area of communications with a focus on reliable and secure distributed information systems and on the algorithmic and information-theoretic aspects of networking. In my research, I seek to establish the theoretical foundations of next-generation communications systems, such as data centers, cloud and peer-to-peer (p2p) systems, with a multidisciplinary approach based on coding and information theory, combinatorics, graph theory and matroid theory. Distributed Storage SystemsData, in the order of petabytes, is now hailed as the ‘‘Intel Inside" of the cloud. However, the cloud is not reliable due to the use of large number of cheap commodity hardware devices. Cloud storage relies on large distributed networks of cheap storage nodes to reliably store petabytes of data. The quote from the Google File System paper puts it best: ‘‘Component failures are the norm rather than the exception." While 3-way replication is currently the industry standard for providing data reliability, it is not a scalable solution due to the huge incurred storage cost. Practitioners are now realizing the need to move to more sophisticated code-based redundancy schemes to protect the data. Classical erasure codes such as Reed-Solomon have optimal storage cost, but incur additional bandwidth, disk access and computation overheads since reproducing a coded chunk of a file requires reading, downloading and decoding the whole file. In my current research, I investigate the fundamental tradeoffs that exist among the different system resources for achieving a desired level of reliability. These resources include storage capacity, bandwidth, disk access and energy. %The majority of current cloud storage systems are hard disk based, and due to its mechanical nature disk access and reads is still a major bottleneck. I showed that it is possible to simultaneously minimize disk reads - a major system bottleneck - and repair bandwidth, at a slight storage overhead. Moreover, I proposed new codes, dubbed Distributed Replication-based Simple Storage (DRESS) codes, that can achieve these optimal tradeoffs. DRESS codes were implemented in a new cache-based distributed video-on-demand system that was built at UC Berkeley.vspace{.2cm} {it Future directions:} A theory of cloud systems is still in a nascent state and numerous fundamental problems are still to be explored, in terms of data availability, load-balancing, caching and energy cost, to state a few. For instance, a cloud system should be able to scale and grow with little overhead and no service disruption. This requires investigating emph{‘‘elastic"} codes that are storage efficient and can distributively grow to serve increasingly popular files or move data closer to mobile users. Codes also enable a fluid abstraction of the data where any coded chunk can be helpful to a user requesting the file. Codes can therefore play an instrumental role in load-balancing techniques to minimize the emph{delay} %footnote{delay costs dollars.} in the user response time. This important role of codes is yet to be studied and analyzed. Moreover, in emph{cloud computing} applications, and particularly in the MapReduce framework, placing the data closer to compute nodes is essential in reducing the delay. Efficient algorithms with guarantees for data placement, within and across data centers, are needed to go beyond the heuristics used in practice. Another related big challenge is designing scalable solutions for video-on-demand applications over the internet. I am interested in analyzing and implementing distributed caching techniques and p2p cloud architectures which I believe are key ingredients for meeting this challenge. Answering these open questions will be essential in building the next-generation cloud systems. Security of Distributed Storage SystemsCollaboration in Wireless NetworksFigure 4: (a) Cellular networks are being chocked by the ever-increasing demand for high data rates forcing service providers to resort to bandwidth throttling. (b) One solution to increase the support for high data rates in next-generation wireless systems is to leverage the data storage resources on smart phones and tablets device by caching (pre-emptively storing) data that is overheard or pushed to the device off peak time. In the example above, the cached data that each device “has” helps reduce the number of packets broadcast by the base station by half by broadcasting the two coded packets P1+P2+P3 and P1+P4 instead of all the four. For instance, the user that “wants” P1 can decode it by computing (P1+P2+P3)-P2-P3. Index coding is the problem of finding an optimal code that can minimized the amount of information that need to be transmitted by the base station. The rapid growth in the popularity of data-hungry smart phones and tablets are choking the cellular networks. The main bottleneck is the last-mile wireless link between the base station and the mobile devices. In my research, I investigate new collaborative algorithms and codes that help support high data rates in next-generation wireless systems:
Selected Publications:
Network Coding for Security and RobustnessFigure 4: (a) A secure network code for the butterfly network using a coset code at the source (see [1]). An eavesdropper wiretapping any edge in the network cannot learn any information about the transmitted data x. (b) A robust network code that can achieve instantaneous recovery from any single link failure (see [2]). For instance, when the red link fails, its head node will send all-zero packets and the destination will get the packets {0, x+0, y} and thus can decode . As seen in the table, the destination will always be able to decode in the case of any single link failure. The recent theory of network coding has demonstrated the advantages of “mixing” (coding) information packets at intermediate nodes in the network over traditional routing algorithms. Network codes can achieve higher data throughputs and better security and fault-tolerance in networks. In my research, I have investigated the information-theoretical limits on network security against wiretapping and malicious attacks and constructed efficient network codes that can achieve these limits. In particular, I have focused on the following two problems:
Selected Publications:
|