CaseDB: Lightweight Key-Value Store for Edge Computing Environment

被引:5
|
作者
Tulkinbekov, Khikmatullo [1 ]
Kim, Deok-Hwan [1 ]
机构
[1] Inha Univ, Dept Elect Engn, Incheon 22211, South Korea
基金
新加坡国家研究基金会;
关键词
Compaction; Nonvolatile memory; Big Data; Metadata; Edge computing; Databases; Merging; Key-value store; LSM-tree; NoSQL; write and space amplification; edge computing; TREE;
D O I
10.1109/ACCESS.2020.3016680
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key-value stores based on a log-structured merge (LSM) tree have emerged in big data systems because of their scalability and reliability. An LSM-tree offers a multilevel data structure with a simple interface. However, it performs file rewrites at the disk level, which causes write amplification. This study is concerned with this problem in relation to an embedded board environment, which can be used in edge computing. Addressing the major problems associated with an LSM-tree, we propose a new key-value store named CaseDB, which aggressively separates keys and bloom filters on the non-volatile memory express (NVMe) drive and stores the values on the SSD. Our solution reduces the I/O cost and enhances the overall performance in a cost-efficient manner. CaseDB employs a memory component, CBuffer, to avoid small write operations, and a delayed value compaction technique that guarantees the sorted order for both keys and values. CaseDB also utilizes deduction-based data deduplication to prevent space amplification in the values layer. The experiments show that CaseDB outperforms LevelDB and WiscKey 5.7 and 1.8 times, respectively, with respect to data writes, and additionally improves the read performance by 1.5 times. CaseDB also avoids the space amplification of WiscKey.
引用
收藏
页码:149775 / 149786
页数:12
相关论文
共 50 条
  • [21] WOKV: A Write-Optimized Key-Value Store
    Zhan, Ling
    Yu, Kan
    Zhou, Chenxi
    Tang, Chenlei
    2018 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA), 2018, : 527 - 531
  • [22] Concerto: A High Concurrency Key-Value Store with Integrity
    Arasu, Arvind
    Eguro, Ken
    Kaushik, Raghav
    Kossmann, Donald
    Meng, Pingfan
    Pandey, Vineet
    Ramamurthy, Ravi
    SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2017, : 251 - 266
  • [23] Dotori: A Key-Value SSD Based KV Store
    Duffy, Carl
    Shim, Jaehoon
    Kim, Sang-Hoon
    Kim, Jin-Soo
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (06): : 1560 - 1572
  • [24] Building an Encrypted, Distributed, and Searchable Key-value Store
    Yuan, Xingliang
    Wang, Xinyu
    Wang, Cong
    Qian, Chen
    Lin, Jianxiong
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 547 - 558
  • [25] High-Performance Key-Value Store On OpenSHMEM
    Fu, Huansong
    Venkata, Manjunath Gorentla
    Choudhury, Ahana Roy
    Imam, Neena
    Yu, Weikuan
    2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 559 - 568
  • [26] FlashStore: High Throughput Persistent Key-Value Store
    Debnath, Biplob
    Sengupta, Sudipta
    Li, Jin
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2010, 3 (02): : 1414 - 1425
  • [27] LibreKV: A Persistent in-Memory Key-Value Store
    Liu, Hao
    Huang, Linpeng
    Zhu, Yanmin
    Shen, Yanyan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2020, 8 (04) : 916 - 927
  • [28] An extra spatial hierarchical schema in key-value store
    Kun Zheng
    Kang Zheng
    Falin Fang
    Miao Zhang
    Qi Li
    Yanghui Wang
    Wenyu Zhao
    Cluster Computing, 2019, 22 : 6483 - 6497
  • [29] Towards a Scalable, Private, and Searchable Key-value Store
    Yuan, Xingliang
    Wang, Xinyu
    Chu, Yilei
    Wang, Cong
    Qian, Chen
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 773 - 774
  • [30] EncKV: An Encrypted Key-value Store with Rich Queries
    Yuan, Xingliang
    Guo, Yu
    Wang, Xinyu
    Wang, Cong
    Li, Baochun
    Jia, Xiaohua
    PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 423 - 435