Secure Static Data De-duplication

被引:0
|
作者
Pawar, Rohit [1 ]
Zanwar, Payal [1 ]
Bora, Shruti [1 ]
Kullkarni, Shweta [1 ]
机构
[1] Savitribai Phule Pune Univ, Sinhgad Coll Engn, Dept Comp Engn, Pune 411041, Maharashtra, India
关键词
SHA-Secure Hash Algorithm; TTTD-Two Threshold Two Divisor;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data de-duplication is a technique used to improve storage efficiency. In static data de-duplication system, Hashing is carried out at client side. Firstly hashing is done at file level. The de-duplicator identifies duplication by comparing existing hash values in metadata server. If match is found, then logical pointers are created for storing redundant data. If match doesn't exist, then same process is carried out at chunk level. Duplicated data chunks are identified and only one replica of the data is stored in storage. Logical pointers are created for other copies, instead of storing redundant data. If it is a new hash value, it will be recorded in metadata server and the file or corresponding chunk will be stored in file server and its logical path in terms of logical pointers is also stored in metadata server. Basically static de-duplicator is implemented with three components: interface, de-duplicator and storage. Interface carries out hashing of uploaded file and interfaces client with de-duplicator. After receiving hash value, de-duplicator carries out its function as mentioned above. The last component storage consists of file server and metadata server. Thus, de-duplication can reduce both storage space and network bandwidth.
引用
收藏
页码:69 / 73
页数:5
相关论文
共 50 条
  • [41] A proficient cost reduction framework for de-duplication of records in data integration
    Sohail, Asif
    Yousaf, Muhammad Murtaza
    [J]. BMC MEDICAL INFORMATICS AND DECISION MAKING, 2016, 16
  • [42] Data De-duplication and Event Processing for Security Applications on an Embedded Processor
    Nagarajaiah, Harsha
    Upadhyaya, Shambhu
    Gopal, Vinodh
    [J]. 2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 418 - 423
  • [43] Data Storage Layout for Object-based De-duplication System
    Yan, Fang
    Tan, YuAn
    [J]. SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2284 - 2288
  • [44] De-duplication scheduling strategy in real-time data warehouse
    Liu, Hui
    Song, Jie
    Wu, Jin Bo
    Bao, Yu-Bin
    [J]. Open Cybernetics and Systemics Journal, 2015, 9 (01): : 37 - 43
  • [45] DBSCAN-Based Automatic De-Duplication for Software Quality Inspection Data
    Cao, Chun-Hua
    Tang, Ya-Na
    Zhou, Hua
    Li, Yu-Li
    Marszalek, Zbigniew
    [J]. IEEE ACCESS, 2023, 11 : 17882 - 17890
  • [46] Large-Scale Data Management System Using Data De-duplication System
    Abirami, S.
    Vikraman, Rashmi
    Murugappan, S.
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION TECHNOLOGIES, IC3T 2015, VOL 1, 2016, 379 : 225 - 234
  • [47] A Novel and Efficient De-duplication System For HDFS
    Ranjitha, S.
    Sudhakar, P.
    Seetharaman, K. S.
    [J]. 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, COMMUNICATION & CONVERGENCE, ICCC 2016, 2016, 92 : 498 - 505
  • [48] An Effective Data Storage Model for Cloud Databases using Temporal Data De-duplication Approach
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Kannan, A.
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 42 - 45
  • [49] Article De-duplication Using Distributed Representations
    Okura, Shumpei
    Tagami, Yukihiro
    Tajima, Akira
    [J]. PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 87 - 88
  • [50] User-aware de-duplication algorithm
    School of Computer, Wuhan University, Wuhan
    430072, China
    不详
    518219, China
    不详
    410000, China
    [J]. Ruan Jian Xue Bao, 10 (2581-2595):