Cloud Key-Value Storage

: pp. 133 - 141
Lviv Polytechnic National University, Ukraine
Lviv Polytechnic National University, Computer Engineering Department

The paper represents all the stages of designing, architecting, and developing cloud-based key-value storage. This work aims to bring new approaches to distributed data systems. The authors focus on the security and productivity of the project as well as security and maintainability.

The authors have studied the use of hash tables in a multi-threaded environment. Architectural approaches and tools have been described. The general structure of the key-value storage server has been presented. The server algorithm has been presented. Our research delves into the intricate nuances of utilizing hash tables in a multi-threaded environment, shedding light on the intricacies and challenges of managing concurrent access to key-value data structures. The authors have explored the trade-offs between lock-free designs and traditional locking approaches.

  1. A. Melnyk, Y. Morozov, B. Havano and P. Hupalo, (2021). Protection of Biometric Data Transmission and Storage in the Human State Remote Monitoring Tools. 11th IEEE In- ternational Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applica- tions (IDAACS), Cracow, Poland, vol. 1, pp. 301–306, DOI: 10.1109/IDAACS53288.2021.9661047
  2. Mazumdar, S., Seybold, D., Kritikos, K., & Verginadis, G., (2019). A survey on data storage and placement method- ologies for Cloud-Big Data ecosystem. Journal of Big Data, vol. 6, pp. 1–37. DOI: s40537-019-0178-3
  3. Awan, I., Younas, M., & Benbernou, S., (2021). Conver- gence of cloud, Internet of Things, and big data: new plat- forms and applications. Concurrency and Computation: Practice and Experience, vol. 33, no. 23, pp. 1–3. DOI: 10.1002/cpe.6668
  4. Sadeeq, M.A., Abdulkareem, N.M., Zeebaree, S.R., Ah-med, D.M., Sami, A.S., & Zebari, R.R., (2021). IoT and Cloud Computing Issues, Challenges and Opportunities: A Review. Qubahan Academic Journal, vol. 1, no. 2, pp. 1–7. DOI:
  5. Gan, Y., Zhang, Y., Cheng, D., Shetty, A., Rathi, P., Katarki, N., Bruno, A., Hu, J., Ritchken, B., Jackson, B., Hu, K., Pancholi, M., He, Y., Clancy, B., Colen, C., Wen, F., Leung, C., Wang, S., Zaruvinsky, L., Espinosa Zar- lenga, M., Lin, R., Liu, Z., Padilla, J., & Delimitrou, C., (2019). An Open-Source Benchmark Suite for Microser- vices and Their Hardware-Software Implications for Cloud & Edge Systems. Proceedings of the Twenty-Fourth Inter- national Conference on Architectural Support for Pro- gramming Languages and Operating Systems, pp. 3–18.DOI:
  6. Vladyslav Kotyk, Yevhenii Vavruk, (2022). Comparative Analysis of Server and Serverless Cloud Computing Plat- forms, Advances in Cyber-Physical Systems, vol. 7, no. 2, pp. 115–120. DOI: 02.115
  7. Taehoon Kim, Joongun Park, Jaewook Woo, Seungheun Jeon, and Jaehyuk Huh, (2019). ShieldStore: Shielded In- memory Key-value Storage with SGX. Proceedings of the Fourteenth EuroSys Conference 2019, March 25–28, 2019, Dresden, Germany. ACM, New York, NY, USA, pp. 1–15. DOI:
  8. Chen, Y., Lu, Y., Yang, F., Wang, Q., Wang, Y., & Shu, J., (2020). FlatStore: An Efficient Log-Structured Key-Value Storage Engine for Persistent Memory. Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Sys- tems, pp. 1077–1091. DOI: 3373376.3378515
  9. Lim, H., Han, D., Andersen, D.G., & Kaminsky, M., (2014). MICA: A Holistic Approach to Fast In-Memory Key-Value Storage. 11th USENIX Symposium on Net- worked Systems Design and Implementation (NSDI ’14), vol. 39, no. 4, pp. 429–444. DOI: 10.5555/2616448.