Skip to main content

Design and Implementation of Deduplication Storage Server Using Stride Scheme

  • Conference paper
  • 1550 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 261))

Abstract

In this paper, we propose a deduplication storage system exploiting stride scheme to minimize storage space and network bandwidth. The key idea of this paper is to provide duplication checking mechanism based on stride scheme of fixed-length block algorithm. Our approach can minimize computation time for detecting duplicated region of blocks while decreasing computation time. We made several experiments to show performance enhancement of the proposed system. In experiments, stride scheme can diminish storage space and efficiently manages duplicated data blocks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Robin, J.S., Irvine, C.E.: Analysis of the Intel Pentium’s ability to support a secure virtual machine monitor. In: Proceedings of the 9th Conference on USENIX Security Symposium, vol. 9, p. 10. USENIX Association (2000)

    Google Scholar 

  2. Cox, L.P., Murray, C.D., Noble, B.D.: Pastiche: Making backup cheap and easy. ACM SIGOPS Operating Systems Review 36, 285–298 (2002)

    Article  Google Scholar 

  3. Tridgell, A.: Efficient algorithms for sorting and synchronization. vol. PhD. Doktorarbeit, Australian National University (1999)

    Google Scholar 

  4. Quinlan, S., Dorward, S.: Venti: a new approach to archival storage. In: Proceedings of the 1st USENIX Conference on File and Storage Technologies, pp. 7–7. USENIX Association, Monterey (2002)

    Google Scholar 

  5. Muthitacharoen, A., Chen, B., Mazieres, D.: A low-bandwidth network file system. ACM SIGOPS Operating Systems Review 35, 174–187 (2001)

    Article  Google Scholar 

  6. Bobbarjung, D.R., Jagannathan, S., Dubnicki, C.: Improving duplicate elimination in storage systems. ACM Transactions on Storage (TOS) 2, 424–448 (2006)

    Article  Google Scholar 

  7. Eshghi, K., Tang, H.K.: A framework for analyzing and improving content-based chunking algorithms. Hewlett-Packard Labs Technical Report TR, vol. 30 (2005)

    Google Scholar 

  8. Douglis, F., Iyengar, A.: Application-specific delta-encoding via resemblance detection. In: Proceedings of the USENIX Annual Technical Conference, pp. 1–23 (2003)

    Google Scholar 

  9. Kulkarni, P., Douglis, F., LaVoie, J., Tracey, J.M.: Redundancy elimination within large collections of files. In: Proceedings of the annual conference on USENIX Annual Technical Conference, p. 5. USENIX Association (2004)

    Google Scholar 

  10. Eastlake, D., Jones, P.: US secure hash algorithm 1 (SHA1). RFC 3174 (September 2001)

    Google Scholar 

  11. Rivest, R.: RFC 1321: The MD5 message-digest algorithm. Internet activities board 143 (1992)

    Google Scholar 

  12. Rabin, M.O.: Fingerprinting by random polynomials. Center for Research in Computing Techn., Aiken Computation Laboratory, Univ. (1981)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jung, H.M., Kim, J., Cho, J.H., Ko, Y.W. (2011). Design and Implementation of Deduplication Storage Server Using Stride Scheme. In: Kim, Th., et al. Grid and Distributed Computing. GDC 2011. Communications in Computer and Information Science, vol 261. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27180-9_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27180-9_58

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27179-3

  • Online ISBN: 978-3-642-27180-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics