MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "915b9a57-2f98-4664-80ed-f750a6c961d9"}, "_deposit": {"created_by": 45, "id": "2926", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "2926"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/2926", "sets": ["user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Ensuring Reliability in Deduplicated Data by Erasure Coded Replication", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "As computer systems are taking more and\nmore responsibilities in critical processes, the\ndemand for storage is increasing due to\nwidespread applications. Saving the digital\ninformation in a large disk is expensive and\nunreliable. As a result, if the disk fails all the\ndata is lost. Therefore, the yearning for a better\nunderstanding of the system’s reliability is ever\nincreasing. In greatest hit storage environments,\ndeduplication is applied as an effective technique\nto optimize the storage space utilization. Usually,\nthe data deduplication impacts the bad result for\nthe reliability of the storage system because of\nthe information sharing."}, {"interim": "In this paper, reliability guaranteed\ndeduplication algorithm is proposed by\nconsidering reliability during the deduplication\nprocess. The deduplicated data are distributed to\nthe storage pool by applying the consistent hash\nring as a replicas placement strategy. The\nproposed mechanism is evaluated and the result\nis compared with pure replication and erasure\ncoded replication. The proposed mechanism can\nprovide the better storage utilization and the one\nhundred percent of assurance for demanded\nreliability level in compared with the existing\nsystems."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Deduplication"}, {"interim": "Distributed storage"}, {"interim": "Erasure coding"}, {"interim": "Reliability"}, {"interim": "Replication"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-08-06"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf", "filesize": [{"value": "693 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_0", "mimetype": "application/pdf", "size": 693000.0, "url": {"url": "https://meral.edu.mm/record/2926/files/Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf"}, "version_id": "f7d684e2-f0be-49ff-a385-83aacb1c1ffc"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICCA 2014", "subitem_c_date": "17-18 February, 2014", "subitem_conference_title": "12th International Conference on Computer Applications", "subitem_place": "Sedona Hotel, Yangon, Myanmar", "subitem_website": "https://www.ucsy.edu.mm/TwelfthIcca.do"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Myat Pwint Phyu"}, {"subitem_authors_fullname": "Thandar Thein"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2014-02-18"}, "item_title": "Ensuring Reliability in Deduplicated Data by Erasure Coded Replication", "item_type_id": "21", "owner": "45", "path": ["1596102355557"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000002926", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-08-06"}, "publish_date": "2020-08-06", "publish_status": "0", "recid": "2926", "relation": {}, "relation_version_is_last": true, "title": ["Ensuring Reliability in Deduplicated Data by Erasure Coded Replication"], "weko_shared_id": -1}
Ensuring Reliability in Deduplicated Data by Erasure Coded Replication
http://hdl.handle.net/20.500.12678/0000002926
http://hdl.handle.net/20.500.12678/000000292639653d4b-723b-4521-ba82-e96b30e5d4c1
915b9a57-2f98-4664-80ed-f750a6c961d9
Name / File | License | Actions |
---|---|---|
Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf (693 Kb)
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Ensuring Reliability in Deduplicated Data by Erasure Coded Replication | |||||
Language | en | |||||
Publication date | 2014-02-18 | |||||
Authors | ||||||
Myat Pwint Phyu | ||||||
Thandar Thein | ||||||
Description | ||||||
As computer systems are taking more and more responsibilities in critical processes, the demand for storage is increasing due to widespread applications. Saving the digital information in a large disk is expensive and unreliable. As a result, if the disk fails all the data is lost. Therefore, the yearning for a better understanding of the system’s reliability is ever increasing. In greatest hit storage environments, deduplication is applied as an effective technique to optimize the storage space utilization. Usually, the data deduplication impacts the bad result for the reliability of the storage system because of the information sharing. |
||||||
In this paper, reliability guaranteed deduplication algorithm is proposed by considering reliability during the deduplication process. The deduplicated data are distributed to the storage pool by applying the consistent hash ring as a replicas placement strategy. The proposed mechanism is evaluated and the result is compared with pure replication and erasure coded replication. The proposed mechanism can provide the better storage utilization and the one hundred percent of assurance for demanded reliability level in compared with the existing systems. |
||||||
Keywords | ||||||
Deduplication, Distributed storage, Erasure coding, Reliability, Replication | ||||||
Conference papers | ||||||
ICCA 2014 | ||||||
17-18 February, 2014 | ||||||
12th International Conference on Computer Applications | ||||||
Sedona Hotel, Yangon, Myanmar | ||||||
https://www.ucsy.edu.mm/TwelfthIcca.do |