{"created":"2020-09-01T09:53:56.956678+00:00","id":3289,"links":{},"metadata":{"_buckets":{"deposit":"d48e312c-9a28-45cf-a3cc-32d34c778f4d"},"_deposit":{"id":"3289","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3289"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3289","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Deduplication for Chunk-Based File Backup","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Data deduplication has become a populartechnology for reducing the amount of storagespace necessary for backup and archival data. Asthe amount of data growth all over the world,many organization need to reduce amount of datasafely. To protect size of data enormously growth,deduplication become a solution to solve thisproblem. Data deduplication is found in manyforms. Data deduplication reduces the data thatduplicate within a file or among other files.Virtual tape libraries, archive storage, diskstorage systems, and applications such as emailsystems, content managers, backup systems andmore, are examples of where data deduplicationcan be applied. It can achieve more storage spacealthough there are multiple files. So, datadeduplication becomes essential and criticalcomponent of backup systems.In this thesis, deduplication for chunk-based filebackup is implemented using Content-DefinedChunking Algorithm and Secure Hash Algorithm.In this thesis, deduplication works with four steps:(1) Chunking (2) Fingerprinting (3) Index lookup(4) Writing.Content-Defined ChunkingAlgorithm chunks input file stream to generatechunks. Secure Hash Algorithm is use to generatehash key (fingerprint) and to compare new chunksand old chunks in order to get unique chunks inthe file. In such system, we focus on MicrosoftWord files. In normal, deduplication takes a longtime to complete and use a lot of CPU cycles inthe process of deduplicating data, possiblyintroducing performance issues on productionmachines. Instant of deduplication make overentire file, this thesis dedupes a file by partitionthree parts in order to reduce processing time."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-19"}],"displaytype":"preview","filename":"194_PDFsam_PSC_final proof.pdf","filesize":[{"value":"138 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3289/files/194_PDFsam_PSC_final proof.pdf"},"version_id":"25dc234b-2738-4ce8-9b9f-5a930ebe5ef4"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Eighth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Maw, Yu Yu"},{"subitem_authors_fullname":"Soe, Khin Mar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-12-27"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/1054"},"item_title":"Deduplication for Chunk-Based File Backup","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-19","publish_status":"0","recid":"3289","relation_version_is_last":true,"title":["Deduplication for Chunk-Based File Backup"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T00:42:03.427855+00:00"}