Abstract
In this paper, we propose a deduplication storage system exploiting stride scheme to minimize storage space and network bandwidth. The key idea of this paper is to provide duplication checking mechanism based on stride scheme of fixed-length block algorithm. Our approach can minimize computation time for detecting duplicated region of blocks while decreasing computation time. We made several experiments to show performance enhancement of the proposed system. In experiments, stride scheme can diminish storage space and efficiently manages duplicated data blocks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Robin, J.S., Irvine, C.E.: Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor. In: Proceedings of the 9th Conference on USENIX Security Symposium, vol. 9, p. 10. USENIX Association (2000)
Cox, L.P., Murray, C.D., Noble, B.D.: Pastiche: Making backup cheap and easy. ACM SIGOPS Operating Systems Review 36, 285–298 (2002)
Tridgell, A.: Efficient algorithms for sorting and synchronization. vol. PhD. Doktorarbeit, Australian National University (1999)
Quinlan, S., Dorward, S.: Venti: a new approach to archival storage. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, pp. 7–7. USENIX Association, Monterey (2002)
Muthitacharoen, A., Chen, B., Mazieres, D.: A low-bandwidth network file system. ACM SIGOPS Operating Systems Review 35, 174–187 (2001)
Bobbarjung, D.R., Jagannathan, S., Dubnicki, C.: Improving duplicate elimination in storage systems. ACM Transactions on Storage (TOS) 2, 424–448 (2006)
Eshghi, K., Tang, H.K.: A framework for analyzing and improving content-based chunking algorithms. Hewlett-Packard Labs Technical Report TR, vol. 30 (2005)
Douglis, F., Iyengar, A.: Application-specific delta-encoding via resemblance detection. In: Proceedings of the USENIX Annual Technical Conference, pp. 1–23 (2003)
Kulkarni, P., Douglis, F., LaVoie, J., Tracey, J.M.: Redundancy elimination within large collections of files. In: Proceedings of the annual conference on USENIX Annual Technical Conference, p. 5. USENIX Association (2004)
Eastlake, D., Jones, P.: US secure hash algorithm 1 (SHA1). RFC 3174 (September 2001)
Rivest, R.: RFC 1321: The MD5 message-digest algorithm. Internet activities board 143 (1992)
Rabin, M.O.: Fingerprinting by random polynomials. Center for Research in Computing Techn., Aiken Computation Laboratory, Univ. (1981)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jung, H.M., Kim, J., Cho, J.H., Ko, Y.W. (2011). Design and Implementation of Deduplication Storage Server Using Stride Scheme. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_58
Download citation
DOI: https://doi.org/10.1007/978-3-642-27180-9_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27179-3
Online ISBN: 978-3-642-27180-9
eBook Packages: Computer ScienceComputer Science (R0)