Improving Accessing Efficiency of Cloud Storage Using De-Duplication and Feedback Schemes

被引:15
|
作者
Wu, Tin-Yu [1 ]
Pan, Jeng-Shyang [2 ]
Lin, Chia-Fan [3 ]
机构
[1] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Ilan 26047, Taiwan
[2] Shenzhen Grad Sch, Harbin Inst Technol, Shenzhen 51800, Peoples R China
[3] Tamkang Univ, Dept Elect Engn, New Taipei City 25137, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2014年 / 8卷 / 01期
关键词
Cloud storage; de-duplication; hash code; load balancing; ALGORITHM; SYSTEM;
D O I
10.1109/JSYST.2013.2256715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
File distribution and storage in a cloud storage environment is usually handled by storage device providers or physical storage devices rented from third parties. Files can be integrated into useful resources that users are then able to access via centralized management and virtualization. Nevertheless, when the number of files continues to increase, the condition of every storage node cannot be guaranteed by the manager. High volumes of files will result in wasted hardware resources, increased control complexity of the data center, and a less efficient cloud storage system. Therefore, in order to reduce workloads due to duplicate files, we propose the index name servers (INS) to manage not only file storage, data de-duplication, optimized node selection, and server load balancing, but also file compression, chunk matching, real-time feedback control, IP information, and busy level index monitoring. To manage and optimize the storage nodes based on the client-side transmission status by our proposed INS, all nodes must elicit optimal performance and offer suitable resources to clients. In this way, not only can the performance of the storage system be improved, but the files can also be reasonably distributed, decreasing the workload of the storage nodes.
引用
下载
收藏
页码:208 / 218
页数:11
相关论文
共 50 条
  • [21] A method for organizing metadata of storage nodes with data de-duplication
    Wang, Guohua
    Zhao, Yuelong
    Li, Tianxiang
    Liao, Jinggui
    Journal of Computational Information Systems, 2014, 10 (09): : 3845 - 3854
  • [22] Proving method of ownership of encrypted files in cloud de-duplication deletion
    Yang, Chao
    Zhang, Junwei
    Dong, Xuewen
    Ma, Jianfeng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2015, 52 (01): : 248 - 258
  • [23] Attribute Based Storage Mechanism with De-duplication Filter: A Review Paper
    Bhosale, Amarja Hanumant
    Manjrekar, Amrita A.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR COMPETITIVE STRATEGIES, 2019, 40 : 89 - 97
  • [24] Data Storage Layout for Object-based De-duplication System
    Yan, Fang
    Tan, YuAn
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2284 - 2288
  • [25] A Novel scheme for Authenticated secured De-duplication with Identity based encryption in Cloud
    Reshma, N. S.
    Gopal, Greeshma N.
    Sreeraag, G.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE (ICIS), 2016, : 228 - 232
  • [26] A study on disk index design for large scale de-duplication storage systems
    Yang, Tian-Ming
    Feng, Dan
    Chou, Wen-Kuang
    Liu, Jing-Ning
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 10 (1-2) : 171 - 180
  • [27] A study on disk index design for large scale de-duplication storage systems
    Yang, Tian-Ming
    Feng, Dan
    Chou, Wen-Kuang
    Liu, Jing-Ning
    International Journal of Computational Science and Engineering, 2015, 10 (01) : 171 - 180
  • [28] Trial Somaliland Voting Register De-Duplication Using Iris Recognition
    Bowyer, Kevin W.
    Ortiz, Estefan
    Sgroi, Amanda
    2015 11TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG): BIOMETRICS IN THE WILD (B-WILD 2015), VOL 2, 2015,
  • [29] Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication
    Taek-Young Youn
    Ku-Young Chang
    Science China Information Sciences, 2018, 61
  • [30] An enhanced secure content de-duplication identification and prevention (ESCDIP) algorithm in cloud environment
    Periasamy, J. K.
    Latha, B.
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (02): : 485 - 494