Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "d48e312c-9a28-45cf-a3cc-32d34c778f4d"}, "_deposit": {"id": "3289", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3289"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3289", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Deduplication for Chunk-Based File Backup", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Data deduplication has become a populartechnology for reducing the amount of storagespace necessary for backup and archival data. Asthe amount of data growth all over the world,many organization need to reduce amount of datasafely. To protect size of data enormously growth,deduplication become a solution to solve thisproblem. Data deduplication is found in manyforms. Data deduplication reduces the data thatduplicate within a file or among other files.Virtual tape libraries, archive storage, diskstorage systems, and applications such as emailsystems, content managers, backup systems andmore, are examples of where data deduplicationcan be applied. It can achieve more storage spacealthough there are multiple files. So, datadeduplication becomes essential and criticalcomponent of backup systems.In this thesis, deduplication for chunk-based filebackup is implemented using Content-DefinedChunking Algorithm and Secure Hash Algorithm.In this thesis, deduplication works with four steps:(1) Chunking (2) Fingerprinting (3) Index lookup(4) Writing.Content-Defined ChunkingAlgorithm chunks input file stream to generatechunks. Secure Hash Algorithm is use to generatehash key (fingerprint) and to compare new chunksand old chunks in order to get unique chunks inthe file. In such system, we focus on MicrosoftWord files. In normal, deduplication takes a longtime to complete and use a lot of CPU cycles inthe process of deduplicating data, possiblyintroducing performance issues on productionmachines. Instant of deduplication make overentire file, this thesis dedupes a file by partitionthree parts in order to reduce processing time."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-19"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "194_PDFsam_PSC_final proof.pdf", "filesize": [{"value": "138 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 138000.0, "url": {"url": "https://meral.edu.mm/record/3289/files/194_PDFsam_PSC_final proof.pdf"}, "version_id": "25dc234b-2738-4ce8-9b9f-5a930ebe5ef4"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eighth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Maw, Yu Yu"}, {"subitem_authors_fullname": "Soe, Khin Mar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2017-12-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1054"}, "item_title": "Deduplication for Chunk-Based File Backup", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003289", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-19"}, "publish_date": "2019-07-19", "publish_status": "0", "recid": "3289", "relation": {}, "relation_version_is_last": true, "title": ["Deduplication for Chunk-Based File Backup"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Deduplication for Chunk-Based File Backup

http://hdl.handle.net/20.500.12678/0000003289
http://hdl.handle.net/20.500.12678/0000003289
270daf3c-043c-4c2c-abef-24162531bf33
d48e312c-9a28-45cf-a3cc-32d34c778f4d
None
Preview
Name / File License Actions
194_PDFsam_PSC_final 194_PDFsam_PSC_final proof.pdf (138 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 09:53:58.755904
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL