Presentation 2014-04-17
Access Methods for Distributed Key-Value Stores with Highly Skewed Access Distribution of Keys
Hiroyuki Kurita, Naoki Takada, Takao Yamashita, Tomoharu Motono,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Distributed Key-Value Stores are becoming applicable to various applications, such as not only Web applications but authentication systems. However, if the frequency of requests for each key varies greatly, this causes an uneven distribution of the load to the Key-Value Store servers. As a result, the number of servers required increases. To solve such a problem, we have studied a load balancing method which focuses on the frequency of requests for each key. However, since the method needs to change the load balancing algorithm, it is difficult to apply to existing Key-Value Store systems. Therefore, this paper presents a load balancing method which makes replicas of keys according to the frequency of each key. Since this method is transparent to a Key-Value Store system, it can be applied without changing the existing systems. An evaluation of the proposed method using simulation has confirmed that the system can successfully reduce the number of servers by 13% - 31%.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Distributed Key-Value Store / Load Balancing / Consistent Hashing / Unbalance / Number of Servers
Paper # NS2014-6
Date of Issue

Conference Information
Committee NS
Conference Date 2014/4/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Network Systems(NS)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Access Methods for Distributed Key-Value Stores with Highly Skewed Access Distribution of Keys
Sub Title (in English)
Keyword(1) Distributed Key-Value Store
Keyword(2) Load Balancing
Keyword(3) Consistent Hashing
Keyword(4) Unbalance
Keyword(5) Number of Servers
1st Author's Name Hiroyuki Kurita
1st Author's Affiliation NTT Network Service Systems Laboratories, NTT Corporation()
2nd Author's Name Naoki Takada
2nd Author's Affiliation NTT Network Service Systems Laboratories, NTT Corporation
3rd Author's Name Takao Yamashita
3rd Author's Affiliation NTT Network Service Systems Laboratories, NTT Corporation
4th Author's Name Tomoharu Motono
4th Author's Affiliation NTT Network Service Systems Laboratories, NTT Corporation
Date 2014-04-17
Paper # NS2014-6
Volume (vol) vol.114
Number (no) 6
Page pp.pp.-
#Pages 6
Date of Issue