{"created":"2020-08-06T10:32:16.534273+00:00","id":2926,"links":{},"metadata":{"_buckets":{"deposit":"915b9a57-2f98-4664-80ed-f750a6c961d9"},"_deposit":{"created_by":45,"id":"2926","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"2926"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/2926","sets":["1582963342780:1596102355557"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Ensuring Reliability in Deduplicated Data by Erasure Coded Replication","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"As computer systems are taking more and\nmore responsibilities in critical processes, the\ndemand for storage is increasing due to\nwidespread applications. Saving the digital\ninformation in a large disk is expensive and\nunreliable. As a result, if the disk fails all the\ndata is lost. Therefore, the yearning for a better\nunderstanding of the system’s reliability is ever\nincreasing. In greatest hit storage environments,\ndeduplication is applied as an effective technique\nto optimize the storage space utilization. Usually,\nthe data deduplication impacts the bad result for\nthe reliability of the storage system because of\nthe information sharing."},{"interim":"In this paper, reliability guaranteed\ndeduplication algorithm is proposed by\nconsidering reliability during the deduplication\nprocess. The deduplicated data are distributed to\nthe storage pool by applying the consistent hash\nring as a replicas placement strategy. The\nproposed mechanism is evaluated and the result\nis compared with pure replication and erasure\ncoded replication. The proposed mechanism can\nprovide the better storage utilization and the one\nhundred percent of assurance for demanded\nreliability level in compared with the existing\nsystems."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Deduplication"},{"interim":"Distributed storage"},{"interim":"Erasure coding"},{"interim":"Reliability"},{"interim":"Replication"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-08-06"}],"displaytype":"preview","filename":"Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf","filesize":[{"value":"693 Kb"}],"format":"application/pdf","licensetype":"license_0","url":{"url":"https://meral.edu.mm/record/2926/files/Ensuring Reliability in Deduplicated Data by Erasure Coded Replication.pdf"},"version_id":"f7d684e2-f0be-49ff-a385-83aacb1c1ffc"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICCA 2014","subitem_c_date":"17-18 February, 2014","subitem_conference_title":"12th International Conference on Computer Applications","subitem_place":"Sedona Hotel, Yangon, Myanmar","subitem_website":"https://www.ucsy.edu.mm/TwelfthIcca.do"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Myat Pwint Phyu"},{"subitem_authors_fullname":"Thandar Thein"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2014-02-18"},"item_title":"Ensuring Reliability in Deduplicated Data by Erasure Coded Replication","item_type_id":"21","owner":"45","path":["1596102355557"],"publish_date":"2020-08-06","publish_status":"0","recid":"2926","relation_version_is_last":true,"title":["Ensuring Reliability in Deduplicated Data by Erasure Coded Replication"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2021-12-13T01:03:35.127574+00:00"}