Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "915b9a57-2f98-4664-80ed-f750a6c961d9"}, "_deposit": {"created_by": 45, "id": "2926", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "2926"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/2926", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Ensuring Reliability in Deduplicated Data by Erasure Coded Replication", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "As computer systems are taking more and\nmore responsibilities in critical processes, the\ndemand for storage is increasing due to\nwidespread applications. Saving the digital\ninformation in a large disk is expensive and\nunreliable. As a result, if the disk fails all the\ndata is lost. Therefore, the yearning for a better\nunderstanding of the system’s reliability is ever\nincreasing. In greatest hit storage environments,\ndeduplication is applied as an effective technique\nto optimize the storage space utilization. Usually,\nthe data deduplication impacts the bad result for\nthe reliability of the storage system because of\nthe information sharing."}, {"interim": "In this paper, reliability guaranteed\ndeduplication algorithm is proposed by\nconsidering reliability during the deduplication\nprocess. The deduplicated data are distributed to\nthe storage pool by applying the consistent hash\nring as a replicas placement strategy. The\nproposed mechanism is evaluated and the result\nis compared with pure replication and erasure\ncoded replication. The proposed mechanism can\nprovide the better storage utilization and the one\nhundred percent of assurance for demanded\nreliability level in compared with the existing\nsystems."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Deduplication"}, {"interim": "Distributed storage"}, {"interim": "Erasure coding"}, {"interim": "Reliability"}, {"interim": "Replication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf", "filesize": [{"value": "693 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 693000.0, "url": {"url": "https://meral.edu.mm/record/2926/files/Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf"}, "version_id": "f7d684e2-f0be-49ff-a385-83aacb1c1ffc"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICCA 2014", "subitem_c_date": "17-18 February, 2014", "subitem_conference_title": "12th International Conference on Computer Applications", "subitem_place": "Sedona Hotel, Yangon, Myanmar", "subitem_website": "https://www.ucsy.edu.mm/TwelfthIcca.do"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myat Pwint Phyu"}, {"subitem_authors_fullname": "Thandar Thein"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-18"}, "item_title": "Ensuring Reliability in Deduplicated Data by Erasure Coded Replication", "item_type_id": "21", "owner": "45", "path": ["1596102355557"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000002926", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-08-06"}, "publish_date": "2020-08-06", "publish_status": "0", "recid": "2926", "relation": {}, "relation_version_is_last": true, "title": ["Ensuring Reliability in Deduplicated Data by Erasure Coded Replication"], "weko_shared_id": -1}
  1. University of Information Technology
  2. Faculty of Computer Science

Ensuring Reliability in Deduplicated Data by Erasure Coded Replication

http://hdl.handle.net/20.500.12678/0000002926
http://hdl.handle.net/20.500.12678/0000002926
39653d4b-723b-4521-ba82-e96b30e5d4c1
915b9a57-2f98-4664-80ed-f750a6c961d9
None
Preview
Name / File License Actions
Ensuring Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf (693 Kb)
license.icon
Publication type
Conference paper
Upload type
Publication
Title
Title Ensuring Reliability in Deduplicated Data by Erasure Coded Replication
Language en
Publication date 2014-02-18
Authors
Myat Pwint Phyu
Thandar Thein
Description
As computer systems are taking more and
more responsibilities in critical processes, the
demand for storage is increasing due to
widespread applications. Saving the digital
information in a large disk is expensive and
unreliable. As a result, if the disk fails all the
data is lost. Therefore, the yearning for a better
understanding of the system’s reliability is ever
increasing. In greatest hit storage environments,
deduplication is applied as an effective technique
to optimize the storage space utilization. Usually,
the data deduplication impacts the bad result for
the reliability of the storage system because of
the information sharing.
In this paper, reliability guaranteed
deduplication algorithm is proposed by
considering reliability during the deduplication
process. The deduplicated data are distributed to
the storage pool by applying the consistent hash
ring as a replicas placement strategy. The
proposed mechanism is evaluated and the result
is compared with pure replication and erasure
coded replication. The proposed mechanism can
provide the better storage utilization and the one
hundred percent of assurance for demanded
reliability level in compared with the existing
systems.
Keywords
Deduplication, Distributed storage, Erasure coding, Reliability, Replication
Conference papers
ICCA 2014
17-18 February, 2014
12th International Conference on Computer Applications
Sedona Hotel, Yangon, Myanmar
https://www.ucsy.edu.mm/TwelfthIcca.do
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-08-06 10:37:29.406641
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL