Secure Static Data De-duplication

被引:0
|
作者
Pawar, Rohit [1 ]
Zanwar, Payal [1 ]
Bora, Shruti [1 ]
Kullkarni, Shweta [1 ]
机构
[1] Savitribai Phule Pune Univ, Sinhgad Coll Engn, Dept Comp Engn, Pune 411041, Maharashtra, India
关键词
SHA-Secure Hash Algorithm; TTTD-Two Threshold Two Divisor;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data de-duplication is a technique used to improve storage efficiency. In static data de-duplication system, Hashing is carried out at client side. Firstly hashing is done at file level. The de-duplicator identifies duplication by comparing existing hash values in metadata server. If match is found, then logical pointers are created for storing redundant data. If match doesn't exist, then same process is carried out at chunk level. Duplicated data chunks are identified and only one replica of the data is stored in storage. Logical pointers are created for other copies, instead of storing redundant data. If it is a new hash value, it will be recorded in metadata server and the file or corresponding chunk will be stored in file server and its logical path in terms of logical pointers is also stored in metadata server. Basically static de-duplicator is implemented with three components: interface, de-duplicator and storage. Interface carries out hashing of uploaded file and interfaces client with de-duplicator. After receiving hash value, de-duplicator carries out its function as mentioned above. The last component storage consists of file server and metadata server. Thus, de-duplication can reduce both storage space and network bandwidth.
引用
收藏
页码:69 / 73
页数:5
相关论文
共 50 条
  • [31] An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment
    J. K. Periasamy
    B. Latha
    [J]. Neural Computing and Applications, 2020, 32 : 485 - 494
  • [32] An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment
    Periasamy, J. K.
    Latha, B.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2020, 32 (02): : 485 - 494
  • [33] De-duplication in File Sharing Network
    Yadav, Divakar
    Dani, Deepali
    Kumari, Preeti
    [J]. CONTEMPORARY COMPUTING, 2011, 168 : 551 - 553
  • [34] De-Duplication Of Passports Using Aadhaar
    Prathilothamai, M.
    Nair, Priyanka Sunil
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [35] Stormy weather, redundancy, and de-duplication
    Ojala, Marydee
    [J]. ONLINE, 2008, 32 (05): : 5 - 5
  • [36] VMDedup: Memory De-duplication in Hypervisor
    Shaikh, Furquan
    Yao, Fangzhou
    Gupta, Indranil
    Campbell, Roy H.
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 379 - 384
  • [37] A proficient cost reduction framework for de-duplication of records in data integration
    Asif Sohail
    Muhammad Murtaza Yousaf
    [J]. BMC Medical Informatics and Decision Making, 16
  • [38] Logical Data Deletion in High-Performance De-duplication Backup
    Yang, Tianming
    Tang, Zhen
    Wan, Yaping
    Sun, Wei
    [J]. MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2519 - +
  • [39] De-Duplication Complexity of Fingerprint Data in Large-Scale Applications
    Nalla Pattabhi Ramaiah
    C.Krishna Mohan
    [J]. Journal of Electronic Science and Technology, 2014, 12 (02) : 224 - 228
  • [40] De-Duplication Complexity of Fingerprint Data in Large-Scale Applications
    Nalla Pattabhi Ramaiah
    C.Krishna Mohan
    [J]. Journal of Electronic Science and Technology, 2014, (02) : 224 - 228