De-duplication in File Sharing Network

被引:0
|
作者
Yadav, Divakar [1 ]
Dani, Deepali [1 ]
Kumari, Preeti [1 ]
机构
[1] Jaypee Inst Informat Technol, Noida, India
来源
CONTEMPORARY COMPUTING | 2011年 / 168卷
关键词
De-duplication; three-tier architecture; Hash Algorithm; Bandwidth conservation; Storage reduction;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Redundant data transfer over a network is one of the important reasons of traffic congestion today. In this paper, we proposed an efficient and secure file sharing model using de-duplication technology to resolve it. A file sharing based de-duplication system reduce bandwidth and storage at both client and server machine. It does not download duplicate blocks that already have been downloaded. To achieve the security of client data, three-tier architecture is proposed in this work. For this purpose SHA-1 hash function is being used, in which 8KB block of data is converted into a 20 bytes digest. Thus the design presents a dramatic reduction in storage space requirement for various workloads and hence reduces time to perform backup in bandwidth constraint environment.
引用
收藏
页码:551 / 553
页数:3
相关论文
共 50 条
  • [31] Introspection-based Memory De-duplication and Migration
    Chiang, Jui-Hao
    Li, Han-Lin
    Chiueh, Tzi-cker
    ACM SIGPLAN NOTICES, 2013, 48 (07) : 51 - 61
  • [32] Semantic Data De-duplication for Archival Storage Systems
    Liu, Chuanyi
    Ju, Dapeng
    Gu, Yu
    Zhang, Youhui
    Wang, Dongsheng
    Du, David H. C.
    2008 13TH ASIA-PACIFIC COMPUTER SYSTEMS ARCHITECTURE CONFERENCE, 2008, : 154 - +
  • [33] Efficient index lookup for De-duplication backup system
    Won, Youjip
    Ban, Jongmyeong
    Min, Jaehong
    Hur, Jungpil
    Oh, Sangkyu
    Lee, Jangsun
    2008 IEEE INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS & SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS), 2008, : 352 - +
  • [34] De-Duplication Errors in a Biometric System : An Investigative Study
    DeCann, Brian
    Ross, Arun
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 43 - 48
  • [35] A study on data de-duplication schemes in cloud storage
    Kumar, Priyan Malarvizhi
    Devi, G. Usha
    Basheer, Shakila
    Parthasarathy, P.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2020, 11 (04) : 509 - 516
  • [36] 3DNBS: A Data De-duplication Disk-based Network Backup System
    Yang, Tianming
    Feng, Dan
    Liu, Jingning
    Wan, Yaping
    Niu, Zhongying
    Ke, Yuchang
    NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, : 287 - 294
  • [37] De-duplication of database search results for systematic reviews in EndNote
    Bramer, Wichor M.
    Giustini, Dean
    de Jonge, Gerdien B.
    Holland, Leslie
    Bekhuis, Tanja
    JOURNAL OF THE MEDICAL LIBRARY ASSOCIATION, 2016, 104 (03) : 240 - 243
  • [38] A Web Page De-duplication Algorithm Based On Data Cleaning
    Lin, Jian-ming
    Liu, Dong-sheng
    Gao, Shi-wen
    Chen, Wei
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 544 - +
  • [39] Buffer Cache De-duplication for Query Dispatch in Replicated Databases
    Yamamuro, Takeshi
    Suga, Yoshiharu
    Kotani, Naoya
    Hitaka, Toshio
    Yamamuro, Masashi
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PT II, 2011, 6588 : 352 - 366
  • [40] SMERED: A Bayesian Approach to Graphical Record Linkage and De-duplication
    Steorts, Rebecca C.
    Hall, Rob
    Fienberg, Stephen E.
    ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 33, 2014, 33 : 922 - 930