Novel Approach: Deduplication for Backup Systems Using Data Block Size

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 31)


The core confronts of today’s Information Technology remains to be the funding and optimized management of storage infrastructure. Data maintenance and most importantly securing the data, since data is omitted by non IT infrastructure edging higher and hence storage appliances turning huge and breeding infrastructure capital investment, hence technology front is pointing at new research method that would cut and reduce the capital investments on storage front. Deduplication is one of the key components of storage efficiency technologies that enable customers to store the maximum amount of data for the lowest possible cost. This technology is implemented on storage to achieve efficient storage savings. Unlike any other storage technology deduplication is also crond to run at suitable clock across data centre. This research article aims to lower the storage cost and in achieving the higher deduplication rate.




  1. 1.
    Ateniese, R., Pietro, D., Mancini, L.V., Sudik, G.T.: Scalable and efficient provable data possession. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks (SecureComm ’08), pp. 9:1–9:10. ACM, New York (2008)Google Scholar
  2. 2.
    Russell, D.: Data deduplication will be even bigger in 2010. Gartner 8 (2010)Google Scholar
  3. 3.
    Douceur, J.R., Adya, A., Bolosky, W.J., Simon, D., Theimer, M.: Reclaiming space from duplicate files in a serverless distributed file system. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS ’02), Washington, DC (2002)Google Scholar
  4. 4.
    Hamilton, J., Olsen, E.W.: Design and implementation of a storage repository using commonality factoring. In: Proceedings of the 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies (2003)Google Scholar
  5. 5.
  6. 6.
    Sahai, A.K.: Performance aspects of RAID architectures. In: IEEE International Performance, Computing, and Communications Conference, IPCCC 1997, Apple Comput. Inc., Cupertino, 0-7803-3873-1 (1997)Google Scholar
  7. 7.
    Bo, Z., Li, F., Can, W.: Research on chunking algorithm of data deduplication. Am. J. Eng. Technol. Res. 11(9), 1353–1358 (2011)Google Scholar
  8. 8.
    McClure, T., Garrett, B.: EMC centera, optimizing archive efficiency. White paper (2009)Google Scholar
  9. 9.
    Bhagwat, D., Eshghi, K.; Long, D.D.E., Lillibridge, M.: Modeling, analysis and simulation of computer and telecommunication systems. In: IEEE International Symposium on, Extreme Binning: Scalable, Parallel Deduplication for Chunk-Based File Backup, MASCOTS ‘09. IEEE, pp. 21–23. University of California, Santa Cruz, Sept 2009Google Scholar
  10. 10.
    Chun-Ho. N.,Mingcao, M.: Conference: Middleware 2011—ACM/IFIP/USENIX 12th International Middleware Conference, Lisbon, Portugal, Dec 12–16, 2011. Proceedings Source: DBLPLive Deduplication Storage of Virtual Machine Images in an Open-Source Cloud. doi:  10.1007/978-3-642-25821-3_5
  11. 11.
    Cui, Z., Liang, Y. Rupnow, K.: An accurate GPU performance model for effective control flow divergence optimization. In: Proceedings of 26th IEEE International Parallel and Distributed Processing Symposium (2012)Google Scholar
  12. 12.
    Muthiacharoen, A., Chen, B., Mazieres, D.: A low-bandwidth network file system. In: Proceedings of the 18th ACM Symposium on Operating Systems Principles (2001)Google Scholar
  13. 13.
    George crump. Lab report: deduplication of primary storage. (2009)
  14. 14.
    Xia, W., Jiang, H., Feng, D., Hua, Y., Lo, S.: A similarity-locality based near-exact deduplication scheme with low ram overhead and high throughput. In: Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference (2011)Google Scholar
  15. 15.
    Zhang, Y., Ansari, N., Wu, M., Yu, H.: On wide area network optimization. Advanced Networking Lab., Department of Electrical and Computer Engineering, New Jersey Institute of Technology, Newark, 13 Oct 2011Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Computer Science and EngineeringSiddaganga Institute of TechnologyTumkurIndia
  2. 2.Department of MCAAyya Nadar Janaki Ammal CollegeSivakasiIndia

Personalised recommendations