File recipe compression in data deduplication systems

@inproceedings{Meister2013FileRC,
  title={File recipe compression in data deduplication systems},
  author={Dirk Meister and Andr{\'e} Brinkmann and Tim S{\"u}{\ss}},
  booktitle={FAST},
  year={2013}
}
Data deduplication systems discover and exploit redundancies between different data blocks. The most common approach divides data into chunks and identifies redundancies via fingerprints. The file content can be rebuilt by combining the chunk fingerprints which are stored sequentially in a file recipe. The corresponding file recipe data can occupy a significant fraction of the total disk space, especially if the deduplication ratio is very high. We propose a combination of efficient and… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 29 CITATIONS

GDedup: Distributed File System Level Deduplication for Genomic Big Data

  • 2018 IEEE International Congress on Big Data (BigData Congress)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

PFCG: Improving the Restore Performance of Package Datasets in Deduplication Systems

  • 2018 IEEE 36th International Conference on Computer Design (ICCD)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

A Comprehensive Study of the Past, Present, and Future of Data Deduplication

  • Proceedings of the IEEE
  • 2016
VIEW 2 EXCERPTS
CITES METHODS & BACKGROUND

A Data Deduplication Framework of Disk Images with Adaptive Block Skipping

  • Journal of Computer Science and Technology
  • 2016
VIEW 2 EXCERPTS
CITES METHODS

A Secondary Index for Improving Reading Performance in the Inline Deduplication System

  • 2016 International Conference on Network and Information Systems for Computers (ICNISC)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

A long-term user-centric analysis of deduplication patterns

  • 2016 32nd Symposium on Mass Storage Systems and Technologies (MSST)
  • 2016
VIEW 1 EXCERPT

CloudEFS: Efficient and secure file system for cloud storage

  • 2016 14th Annual Conference on Privacy, Security and Trust (PST)
  • 2016
VIEW 1 EXCERPT
CITES BACKGROUND

Credential and security issues of cloud service models

  • 2016 2nd International Conference on Next Generation Computing Technologies (NGCT)
  • 2016
VIEW 1 EXCERPT

References

Publications referenced by this paper.
SHOWING 1-10 OF 32 REFERENCES

MAD2: A scalable high-throughput exact deduplication approach for network backup services

  • 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)
  • 2010
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Design of an exact data deduplication cluster

  • 012 IEEE 28th Symposium on Mass Storage Systems and Technologies (MSST)
  • 2012
VIEW 3 EXCERPTS

CABdedupe: A Causality-Based Deduplication Performance Booster for Cloud Backup Services

  • 2011 IEEE International Parallel & Distributed Processing Symposium
  • 2011
VIEW 1 EXCERPT

Optimized Cloud Storage with High Throughput Deduplication Approach

Y. V. LOKESHWARI, B. PRABAVATHY, C. BABU
  • In Proceedings of the International Conference on Emerging Technology Trends
  • 2011

dedupv1: Improving deduplication throughput using solid state drives (SSD)

  • 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)
  • 2010
VIEW 3 EXCERPTS

Similar Papers

Loading similar papers…