Byte Index Chunking Approach for Data Compression

Size: px
Start display at page:

Download "Byte Index Chunking Approach for Data Compression"

Transcription

1 Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2 Dept. of Computer Science and Engineering, Korea University, Seoul, Korea hxy@korea.ac.kr Abstract. This paper presents an algorithm and structure for a deduplication method which can be efficiently define identical data between files existing different machines with high rate and performing it within rapid time. The algorithm identifies to some part of the destination file, and only sends those parts which cannot be matched in this way. The fundamental aspects of reaching faster and accurately looking up result is that data are expressed as fixed-size block chunks and indexed by its anchor byte values in Index-table. Index-table is a 256x256 sized table structure; indexing the edge chunk byte values are used as their cell row and column numbers. To check commonality between two chunks by their SHA1 hash is fundamental to get stable data deduplication. Keywords: Deduplication, Cloud storage, Chunk, Index-table, Anchor Byte 1 Introduction With the explosion of data such as text, audio, video, image, and the proliferation of the data centers, the regulatory back-up data is the pending issue to be resolved. With usage of data deduplication mechanism, the required storage capacity can be reduced and the deduplication scheme is adapted to various storage systems. There are lots of data processing system [1][2], In Content-defined Chunking[3], each block size is partitioned by anchoring based on their data patterns. This scheme can prevent the data shifting problem of the Static Chunking approach. One of the well-known Content-defined Chunking algorithms is LBFS [4], a network File system designed for low bandwidth networks. However, content-defined data deduplication approach can achieve high deduplication ratio, but requires too much time to perform deduplication process in comparison to the other data deduplication approaches. Static 1 This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(mest) (No ), and this research was supported by the MKE, Korea and NHN. under IT/SW Creative research program supervised by the NIPA (NIPA-2012) IST 2013, ASTL Vol. 23, pp , 2013 SERSC

2 Proceedings, The 2nd International Conference on Information Science and Technology chunking [4] is the fastest algorithm among the others for detecting duplicated blocks but the performance is not acceptable with boundary shifting problem. The primary goal of this work is to develop simple fast and high rate data duplication ratio result approach. The key idea is to start lookup process with predict data from destination file which are highly probable to identical to source file in rapid time. Then verify these data are duplicated by sha1 hash commonality checking. If duplicate probable chunk is not verified to duplicated, we start to lookup process again for only this chunk to determine different suspicious chunk is stored in this chunk or not. Then we continue verifying process as previous steps. 2. Design In this work, we implemented a deduplication server, employing source-based approach[5] with a refined and improved touch. We transfer Index-table (size: 256*256) from the server to the client in order to perform lookup process and find high probability of the duplicated data and number of duplicated data blocks. Indextable is a 256x256 sized table structure; keeping chunk numbers and the chunk s edge chunk byte values are used as their cell row and column numbers. Server Client Take file hash DBMS File Find duplicate probable chunks. Send Index matrix Index table Send duplicated probable chunks Data deduplication Ensure suspicious chunk to duplicate Chunking update Block I/O Block I/O Local disk Storage Fig. 1 Proposed System architecture overview: Byte Index based approach First of all, we create Index-table of source file in the server; send it to client and using it to start whole file lookup to define high identical probable data from destination file in client side. Result we can found parts of data which are be very high probability to be duplicated in very fast and got a scheme as shown in Fig

3 First step, we start to byte shifting lookup and aim to find the chunks that are expected to be duplicated (highly probable duplicate chunk) using Index table by only read their boundary byte values in this algorithm. For improving our search results to be more accurate, we not only do search a single chunk, but we also aim to seek adjacent double chunks for per offset in the modified file. Adjacent chunks, we find in modified file, is not only has the same length with the any adjacent chunks in the server, but also both these chunks store same bytes of values at the position where boundaries of each chunk, that s why we call this chunk in modified file as Highly probable duplicate chunk ( Fig. 2). Fig. 2 Duplicated chunk look up process overview. Probability to be a duplicate is the only one from (4,294,967,296) occasions. Nevertheless, Highly probable duplicate chunk is possibly seen to be duplicated but we confirm whether they are duplicated or not by their SHA1 value. Chunking process is implemented on the server. We divide the source file stream into the fixed sized length chunks and calculate its hashes. The step of chunking process is similar to the fixed sized chunking. At the next step is bit difference from fixed sized chunking, in which we also consider values of edge two boundary bytes for each chunk and we call them Anchor bytes Fig. 3.Also we numbering each chunk in source file in the server. By anchor bytes with chunk hash and its chunk number (chunk-index), we create Meta data and then save them into data storage in the server. Fig.3 Overview of chunking with anchor points 319

4 Proceedings, The 2nd International Conference on Information Science and Technology After the chunking process, we then create [256,256] amount of index table. For every chunk, we need to set a value to the convenient cell of Index-table. For a chunk, first anchor point (left edge byte) value of byte represents the horizontal direction index and a last anchor point (right edge byte) value of byte is a reference to the vertical direction of the Index-table. (Fig. 4) Fig. 4 Overview of filling Index-table table Figure 4 shows how Index-table is filled with reference points of the chunk. When we create metadata (with chunk index, chunk hash and chunk anchor points (value of edge bytes)) list, we save the each chunk index to the Index-table at the location where metadata chunk s anchor point (edge bytes) values. 3. Performance evaluation Our experiments were conducted on identical dual-core1.9ghz Celeron processor, each with 2GBytes of RAM and a 7,200RPM, 8.9ms Seagate ST AIDE drive. We examined the behavior of proposed system s deduplication ratio result and performance time consumption separately with comparing Content-defined break point chunking, and Fixed-size chunking approach with performing results. Experiments are based on using a file with 20% random modification from 1110 MB file and measured when block size are 16KB, 32KB, 64KB, 128KB, 256KB, 512KB and 1MB in each case. As can be seen Figure 5, Content-based chunking shows best performance for detecting duplicated region of data. But as described previous section, the overhead of Contend-based chunking is very high. The proposed scheme shows high performance deduplication capability comparable to Content-based chunking. Our scheme consumes very small sized metadata and can be processed faster than Content-based chunking. The performance of Fixed-size chunking is not good because it suffers from boundary shift problem. 320

5 Fig 5 Deduplication ratio result of chunking based approaches. 4. Conclusion In this paper, we introduced an algorithm and structure for a deduplication method which can be efficiently used in a storage system. The algorithm identifies to some part of the destination file, and only sends those parts which cannot be matched in this way. The fundamental aspects of reaching faster and accurately looking up result is that data are expressed as fixed-size block chunks and indexed by its anchor byte values in Index-table. Index-table is a 256x256 sized table structure; indexing the edge chunk byte values are used as their cell row and column numbers. Performance evaluation result shows that the proposed approach is very useful compared to Content-based chunking and Fixed-sized chunking. References 1. JY. Oh and HJ. Kouh, A study on aes extension for large-scale data. The Journal of IWIT. 9, 6 pp (2009) 2. KY. Lee, MJ. Lim, JJ. Kim, KH. Kim and JL. Kim, Design and implementation of a data management system for mobile spatio-temporal query. The Journal of IWIT. 11,1 pp (2011) 3. K. Eshghi and H. Tang, A framework for analyzing and improving content-based chunking algorithms. Hewlett-Packard Labs Technical Report TR. 30(2005) 4. A. Muthitacharoen, B. Chen and D. Mazieres, A low-bandwidth network file system. ACM SIGOPS Operating Systems Review. 35, 5 pp (2001) 5. S. Quinlan and S. Dorward. Venti: A New Approach to Archival Storage, In Proceedings of the FAST 2002 Conference on File and Storage Technologies,

Multi-level Byte Index Chunking Mechanism for File Synchronization

Multi-level Byte Index Chunking Mechanism for File Synchronization , pp.339-350 http://dx.doi.org/10.14257/ijseia.2014.8.3.31 Multi-level Byte Index Chunking Mechanism for File Synchronization Ider Lkhagvasuren, Jung Min So, Jeong Gun Lee, Jin Kim and Young Woong Ko *

More information

Online Version Only. Book made by this file is ILLEGAL. Design and Implementation of Binary File Similarity Evaluation System. 1.

Online Version Only. Book made by this file is ILLEGAL. Design and Implementation of Binary File Similarity Evaluation System. 1. , pp.1-10 http://dx.doi.org/10.14257/ijmue.2014.9.1.01 Design and Implementation of Binary File Similarity Evaluation System Sun-Jung Kim 2, Young Jun Yoo, Jungmin So 1, Jeong Gun Lee 1, Jin Kim 1 and

More information

Parallelizing Inline Data Reduction Operations for Primary Storage Systems

Parallelizing Inline Data Reduction Operations for Primary Storage Systems Parallelizing Inline Data Reduction Operations for Primary Storage Systems Jeonghyeon Ma ( ) and Chanik Park Department of Computer Science and Engineering, POSTECH, Pohang, South Korea {doitnow0415,cipark}@postech.ac.kr

More information

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage

An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage , pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2

More information

ChunkStash: Speeding Up Storage Deduplication using Flash Memory

ChunkStash: Speeding Up Storage Deduplication using Flash Memory ChunkStash: Speeding Up Storage Deduplication using Flash Memory Biplob Debnath +, Sudipta Sengupta *, Jin Li * * Microsoft Research, Redmond (USA) + Univ. of Minnesota, Twin Cities (USA) Deduplication

More information

A Virtual-Synchronized-File Based Privacy Protection System

A Virtual-Synchronized-File Based Privacy Protection System Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System

More information

Remote Direct Storage Management for Exa-Scale Storage

Remote Direct Storage Management for Exa-Scale Storage , pp.15-20 http://dx.doi.org/10.14257/astl.2016.139.04 Remote Direct Storage Management for Exa-Scale Storage Dong-Oh Kim, Myung-Hoon Cha, Hong-Yeon Kim Storage System Research Team, High Performance Computing

More information

Adaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network

Adaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network Contemporary Engineering Sciences, Vol. 7, 2014, no. 14, 725-730 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4681 Adaptive Aggregation Scheduling Using Aggregation-degree Control in

More information

P2FS: supporting atomic writes for reliable file system design in PCM storage

P2FS: supporting atomic writes for reliable file system design in PCM storage LETTER IEICE Electronics Express, Vol.11, No.13, 1 6 P2FS: supporting atomic writes for reliable file system design in PCM storage Eunji Lee 1, Kern Koh 2, and Hyokyung Bahn 2a) 1 Department of Software,

More information

A Load Balancing Scheme for Games in Wireless Sensor Networks

A Load Balancing Scheme for Games in Wireless Sensor Networks , pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,

More information

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, ISSN

International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18,   ISSN International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, www.ijcea.com ISSN 2321-3469 SECURE DATA DEDUPLICATION FOR CLOUD STORAGE: A SURVEY Vidya Kurtadikar

More information

Alternative Approaches for Deduplication in Cloud Storage Environment

Alternative Approaches for Deduplication in Cloud Storage Environment International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 10 (2017), pp. 2357-2363 Research India Publications http://www.ripublication.com Alternative Approaches for

More information

Deduplication Storage System

Deduplication Storage System Deduplication Storage System Kai Li Charles Fitzmorris Professor, Princeton University & Chief Scientist and Co-Founder, Data Domain, Inc. 03/11/09 The World Is Becoming Data-Centric CERN Tier 0 Business

More information

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence , pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,

More information

A DEDUPLICATION-INSPIRED FAST DELTA COMPRESSION APPROACH W EN XIA, HONG JIANG, DA N FENG, LEI T I A N, M I N FU, YUKUN Z HOU

A DEDUPLICATION-INSPIRED FAST DELTA COMPRESSION APPROACH W EN XIA, HONG JIANG, DA N FENG, LEI T I A N, M I N FU, YUKUN Z HOU A DEDUPLICATION-INSPIRED FAST DELTA COMPRESSION APPROACH W EN XIA, HONG JIANG, DA N FENG, LEI T I A N, M I N FU, YUKUN Z HOU PRESENTED BY ROMAN SHOR Overview Technics of data reduction in storage systems:

More information

Sparse Indexing: Large-Scale, Inline Deduplication Using Sampling and Locality

Sparse Indexing: Large-Scale, Inline Deduplication Using Sampling and Locality Sparse Indexing: Large-Scale, Inline Deduplication Using Sampling and Locality Mark Lillibridge, Kave Eshghi, Deepavali Bhagwat, Vinay Deolalikar, Greg Trezise, and Peter Camble Work done at Hewlett-Packard

More information

DEC: An Efficient Deduplication-Enhanced Compression Approach

DEC: An Efficient Deduplication-Enhanced Compression Approach 2016 IEEE 22nd International Conference on Parallel and Distributed Systems DEC: An Efficient Deduplication-Enhanced Compression Approach Zijin Han, Wen Xia, Yuchong Hu *, Dan Feng, Yucheng Zhang, Yukun

More information

A Personal Information Retrieval System in a Web Environment

A Personal Information Retrieval System in a Web Environment Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.42-46 http://dx.doi.org/10.14257/astl.2015.87.10 A Personal Information Retrieval System in a Web Environment YoungDeok

More information

Deploying De-Duplication on Ext4 File System

Deploying De-Duplication on Ext4 File System Deploying De-Duplication on Ext4 File System Usha A. Joglekar 1, Bhushan M. Jagtap 2, Koninika B. Patil 3, 1. Asst. Prof., 2, 3 Students Department of Computer Engineering Smt. Kashibai Navale College

More information

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington

More information

Cache Replacement Strategies for Scalable Video Streaming in CCN

Cache Replacement Strategies for Scalable Video Streaming in CCN Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr

More information

EaSync: A Transparent File Synchronization Service across Multiple Machines

EaSync: A Transparent File Synchronization Service across Multiple Machines EaSync: A Transparent File Synchronization Service across Multiple Machines Huajian Mao 1,2, Hang Zhang 1,2, Xianqiang Bao 1,2, Nong Xiao 1,2, Weisong Shi 3, and Yutong Lu 1,2 1 State Key Laboratory of

More information

SMCCSE: PaaS Platform for processing large amounts of social media

SMCCSE: PaaS Platform for processing large amounts of social media KSII The first International Conference on Internet (ICONI) 2011, December 2011 1 Copyright c 2011 KSII SMCCSE: PaaS Platform for processing large amounts of social media Myoungjin Kim 1, Hanku Lee 2 and

More information

A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space

A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space , pp.70-74 http://dx.doi.org/10.14257/astl.2013.32.17 A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space Heangwoo Lee 1.1, Janghoo Seo 2.1, Yongseong Kim 2.2,

More information

Speeding Up Cloud/Server Applications Using Flash Memory

Speeding Up Cloud/Server Applications Using Flash Memory Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta and Jin Li Microsoft Research, Redmond, WA, USA Contains work that is joint with Biplob Debnath (Univ. of Minnesota) Flash Memory

More information

DDSF: A Data Deduplication System Framework for Cloud Environments

DDSF: A Data Deduplication System Framework for Cloud Environments DDSF: A Data Deduplication System Framework for Cloud Environments Jianhua Gu, Chuang Zhang and Wenwei Zhang School of Computer Science and Technology, High Performance Computing R&D Center Northwestern

More information

A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks

A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks Daewook Shin, Jaebeom Kim, and Young-Bae Ko Department of Computer Engineering Graduate School of Ajou University Suwon, Republic

More information

A Memory Management Scheme for Hybrid Memory Architecture in Mission Critical Computers

A Memory Management Scheme for Hybrid Memory Architecture in Mission Critical Computers A Memory Management Scheme for Hybrid Memory Architecture in Mission Critical Computers Soohyun Yang and Yeonseung Ryu Department of Computer Engineering, Myongji University Yongin, Gyeonggi-do, Korea

More information

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing , pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,

More information

ECE Lab 8. Logic Design for a Direct-Mapped Cache. To understand the function and design of a direct-mapped memory cache.

ECE Lab 8. Logic Design for a Direct-Mapped Cache. To understand the function and design of a direct-mapped memory cache. ECE 201 - Lab 8 Logic Design for a Direct-Mapped Cache PURPOSE To understand the function and design of a direct-mapped memory cache. EQUIPMENT Simulation Software REQUIREMENTS Electronic copy of your

More information

WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression

WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression Philip Shilane, Mark Huang, Grant Wallace, & Windsor Hsu Backup Recovery Systems Division EMC Corporation Introduction

More information

The Design of Real-time Display Screen Control Techniques for Mobile Devices 1

The Design of Real-time Display Screen Control Techniques for Mobile Devices 1 , pp.189-193 http://dx.doi.org/10.14257/astl.2016.133.36 The Design of Real-time Display Screen Control Techniques for Mobile Devices 1 Jungsoo Hwang 1, Ji Hee Jeong 1, Soon-Bum Lim 1, 1 Dept. of Multimedia

More information

A Reverse Differential Archiving Method based on Zdelta

A Reverse Differential Archiving Method based on Zdelta 2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.19 A Reverse Differential Archiving Method based

More information

Classifying Physical Storage Media. Chapter 11: Storage and File Structure. Storage Hierarchy (Cont.) Storage Hierarchy. Magnetic Hard Disk Mechanism

Classifying Physical Storage Media. Chapter 11: Storage and File Structure. Storage Hierarchy (Cont.) Storage Hierarchy. Magnetic Hard Disk Mechanism Chapter 11: Storage and File Structure Overview of Storage Media Magnetic Disks Characteristics RAID Database Buffers Structure of Records Organizing Records within Files Data-Dictionary Storage Classifying

More information

Classifying Physical Storage Media. Chapter 11: Storage and File Structure. Storage Hierarchy. Storage Hierarchy (Cont.) Speed

Classifying Physical Storage Media. Chapter 11: Storage and File Structure. Storage Hierarchy. Storage Hierarchy (Cont.) Speed Chapter 11: Storage and File Structure Overview of Storage Media Magnetic Disks Characteristics RAID Database Buffers Structure of Records Organizing Records within Files Data-Dictionary Storage Classifying

More information

NLE-FFS: A Flash File System with PRAM for Non-linear Editing

NLE-FFS: A Flash File System with PRAM for Non-linear Editing 16 IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, NOVEMBER 9 NLE-FFS: A Flash File System with PRAM for Non-linear Editing Man-Keun Seo, Sungahn Ko, Youngwoo Park, and Kyu Ho Park, Member,

More information

Robot localization method based on visual features and their geometric relationship

Robot localization method based on visual features and their geometric relationship , pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department

More information

Design and Implementation of Various File Deduplication Schemes on Storage Devices

Design and Implementation of Various File Deduplication Schemes on Storage Devices Design and Implementation of Various File Deduplication Schemes on Storage Devices Yong-Ting Wu, Min-Chieh Yu, Jenq-Shiou Leu Department of Electronic and Computer Engineering National Taiwan University

More information

TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD

TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD 1 Backup Speed and Reliability Are the Top Data Protection Mandates What are the top data protection mandates from your organization s IT leadership?

More information

A Study on Multi-resolution Screen based Conference Broadcasting Technology

A Study on Multi-resolution Screen based Conference Broadcasting Technology 2 : (Young-ae Kim et al.: A Study on Multi-resolution Screen based Conference Broadcasting Technology) (Special Paper) 23 2, 2018 3 (JBE Vol. 23, No. 2, March 2018) https://doi.org/10.5909/jbe.2018.23.2.253

More information

Interference Management Scheme for Wireless Sensor Network

Interference Management Scheme for Wireless Sensor Network , pp.64-69 http://dx.doi.org/0.4257/astl.204.46.5 Interference Management Scheme for Wireless Sensor Network Sangmi Moon, Saransh Malik, Bora Kim, Hun Choi, Jinsul Kim, Cheolhong Kim, and Intae Hwang Dept.

More information

Scanline-based rendering of 2D vector graphics

Scanline-based rendering of 2D vector graphics Scanline-based rendering of 2D vector graphics Sang-Woo Seo 1, Yong-Luo Shen 1,2, Kwan-Young Kim 3, and Hyeong-Cheol Oh 4a) 1 Dept. of Elec. & Info. Eng., Graduate School, Korea Univ., Seoul 136 701, Korea

More information

A multilingual reference based on cloud pattern

A multilingual reference based on cloud pattern A multilingual reference based on cloud pattern G.Rama Rao Department of Computer science and Engineering, Christu Jyothi Institute of Technology and Science, Jangaon Abstract- With the explosive growth

More information

Data Deduplication Overview and Implementation

Data Deduplication Overview and Implementation Data Deduplication Overview and Implementation Somefun Olawale Mufutau 1, Nwala Kenneth 2, Okonji Charles 3, Omotosho Olawale Jacob 4 1 Computer Science Department Babcock University, Ilisan Remo Ogun

More information

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA

MATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO

More information

Automatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud

Automatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud , pp.43-47 http://dx.doi.org/10.14257/astl.2014.67.11 Automatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud Ashok Kumar Patil, Seong Sill Park, Pavitra Holi,

More information

Building Ubiquitous Computing Environment Using the Web of Things Platform

Building Ubiquitous Computing Environment Using the Web of Things Platform , pp.105-109 http://dx.doi.org/10.14257/astl.2013 Building Ubiquitous Computing Environment Using the Web of Things Platform Woo-Chang Shin Dept. of Computer Science, at SeoKyeong University 16-1 Jungneung-Dong

More information

Time Stamp based Multiple Snapshot Management Method for Storage System

Time Stamp based Multiple Snapshot Management Method for Storage System Time Stamp based Multiple Snapshot Management Method for Storage System Yunsoo Lee 1, Dongmin Shin 1, Insoo Bae 1, Seokil Song 1, Seungkook Cheong 2 1 Dept. of Computer Engineering, Korea National University

More information

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Ilhoon Shin Seoul National University of Science & Technology ilhoon.shin@snut.ac.kr Abstract As the amount of digitized

More information

A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop

A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop Myoungjin Kim 1, Seungho Han 1, Jongjin Jung 3, Hanku Lee 1,2,*, Okkyung Choi 2 1 Department of Internet and Multimedia Engineering,

More information

Design of Self-Adaptive System Observation over Internet of Things

Design of Self-Adaptive System Observation over Internet of Things , pp.165-171 http://dx.doi.org/10.14257/astl.2015.117.39 Design of Self-Adaptive System Observation over Internet of Things Young-Joo Kim 1, Jong-Soo Seok 1, Moon Soo Lee 1, Jeong-Si Kim 1, and YungJoon

More information

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING

ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.

More information

Chapter 14 HARD: Host-Level Address Remapping Driver for Solid-State Disk

Chapter 14 HARD: Host-Level Address Remapping Driver for Solid-State Disk Chapter 14 HARD: Host-Level Address Remapping Driver for Solid-State Disk Young-Joon Jang and Dongkun Shin Abstract Recent SSDs use parallel architectures with multi-channel and multiway, and manages multiple

More information

Design and Implementation of Secure OTP Generation for IoT Devices

Design and Implementation of Secure OTP Generation for IoT Devices , pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research

More information

dedupv1: Improving Deduplication Throughput using Solid State Drives (SSD)

dedupv1: Improving Deduplication Throughput using Solid State Drives (SSD) University Paderborn Paderborn Center for Parallel Computing Technical Report dedupv1: Improving Deduplication Throughput using Solid State Drives (SSD) Dirk Meister Paderborn Center for Parallel Computing

More information

Implementation of Semantic Information Retrieval. System in Mobile Environment

Implementation of Semantic Information Retrieval. System in Mobile Environment Contemporary Engineering Sciences, Vol. 9, 2016, no. 13, 603-608 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6447 Implementation of Semantic Information Retrieval System in Mobile

More information

A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking

A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking Dongjin Hong, Jinyong Kim, and Jaehoon (Paul) Jeong Department of Electrical and Computer Engineering, Sungkyunkwan

More information

Design of a Processing Structure of CNN Algorithm using Filter Buffers

Design of a Processing Structure of CNN Algorithm using Filter Buffers , pp.37-41 http://dx.doi.org/10.14257/astl.2016.129.08 Design of a Processing Structure of CNN Algorithm using Filter Buffers Kwan-Ho Lee 1, Jun-Mo Jeong 2, Jong-Joon Park 3 1 Dept. of Electronics and

More information

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle

Application of isight for Optimal Tip Design of Complex Tool Holder Spindle Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net

More information

Data De-duplication for Distributed Segmented Parallel FS

Data De-duplication for Distributed Segmented Parallel FS Data De-duplication for Distributed Segmented Parallel FS Boris Zuckerman & Oskar Batuner Hewlett-Packard Co. Objectives Expose fundamentals of highly distributed segmented parallel file system architecture

More information

A Design of Authentication Protocol for a Limited Mobile Network Environment

A Design of Authentication Protocol for a Limited Mobile Network Environment Vol.29 (SecTech 2013), pp.41-45 http://dx.doi.org/10.14257/astl.2013.29.08 A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept.

More information

The Effectiveness of Deduplication on Virtual Machine Disk Images

The Effectiveness of Deduplication on Virtual Machine Disk Images The Effectiveness of Deduplication on Virtual Machine Disk Images Keren Jin & Ethan L. Miller Storage Systems Research Center University of California, Santa Cruz Motivation Virtualization is widely deployed

More information

Rethinking Deduplication Scalability

Rethinking Deduplication Scalability Rethinking Deduplication Scalability Petros Efstathopoulos Petros Efstathopoulos@symantec.com Fanglu Guo Fanglu Guo@symantec.com Symantec Research Labs Symantec Corporation, Culver City, CA, USA 1 ABSTRACT

More information

Storage Architecture and Software Support for SLC/MLC Combined Flash Memory

Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Soojun Im and Dongkun Shin Sungkyunkwan University Suwon, Korea {lang33, dongkun}@skku.edu ABSTRACT We propose a novel flash

More information

LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine

LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine 777 LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine Hak-Su Lim and Jin-Soo Kim *College of Info. & Comm. Engineering, Sungkyunkwan University, Korea {haksu.lim,

More information

The Method of Seed Based Grouping Malicious Traffic by Deep-Learning

The Method of Seed Based Grouping Malicious Traffic by Deep-Learning The Method of Seed Based Grouping Malicious Traffic by Deep-Learning Ui-Jun Baek pb1069@korea.ac.kr Jee-Tae Park pjj5846@korea.ac.kr Huru Hasanova hhuru@korea.ac.kr Myung Sup Kim tmskim@korea.ac.kr Abstract

More information

Implementation and Performance Evaluation of RAPID-Cache under Linux

Implementation and Performance Evaluation of RAPID-Cache under Linux Implementation and Performance Evaluation of RAPID-Cache under Linux Ming Zhang, Xubin He, and Qing Yang Department of Electrical and Computer Engineering, University of Rhode Island, Kingston, RI 2881

More information

Improving Duplicate Elimination in Storage Systems

Improving Duplicate Elimination in Storage Systems Improving Duplicate Elimination in Storage Systems Deepak R. Bobbarjung and Suresh Jagannathan Department of Computer Sciences, Purdue University and Cezary Dubnicki NEC Laboratories America Minimizing

More information

In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge

In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge Smitha.M. S, Prof. Janardhan Singh Mtech Computer Networking, Associate Professor Department of CSE, Cambridge

More information

A Study on the IoT Sensor Interaction Transmission System based on BigData

A Study on the IoT Sensor Interaction Transmission System based on BigData Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young

More information

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks

An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks , pp.135-140 http://dx.doi.org/10.14257/astl.2014.48.22 An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks Jin Wang 1, Bo Tang 1, Zhongqi Zhang 1, Jian Shen 1, Jeong-Uk Kim 2

More information

Quantifying FTK 3.0 Performance with Respect to Hardware Selection

Quantifying FTK 3.0 Performance with Respect to Hardware Selection Quantifying FTK 3.0 Performance with Respect to Hardware Selection Background A wide variety of hardware platforms and associated individual component choices exist that can be utilized by the Forensic

More information

CSE 4/521 Introduction to Operating Systems. Lecture 14 Main Memory III (Paging, Structure of Page Table) Summer 2018

CSE 4/521 Introduction to Operating Systems. Lecture 14 Main Memory III (Paging, Structure of Page Table) Summer 2018 CSE 4/521 Introduction to Operating Systems Lecture 14 Main Memory III (Paging, Structure of Page Table) Summer 2018 Overview Objective: To discuss how paging works in contemporary computer systems. Paging

More information

Determination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS

Determination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS Vol. (Architecture and Civil Engineering 2), pp.8-22 http://dx.doi.org/.42/astl.2..2 Determination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS Joon

More information

Research on the Performance of JavaScript-based IoT Service Platform

Research on the Performance of JavaScript-based IoT Service Platform International Journal of Control Theory and Applications ISSN : 0974-5572 International Science Press Volume 9 Number 44 2016 Research on the Performance of JavaScript-based IoT Service Platform Jin-Tae

More information

A Robust Bloom Filter

A Robust Bloom Filter A Robust Bloom Filter Yoon-Hwa Choi Department of Computer Engineering, Hongik University, Seoul, Korea. Orcid: 0000-0003-4585-2875 Abstract A Bloom filter is a space-efficient randomized data structure

More information

IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1

IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 2005 IEEE International Symposium on Signal Processing and Information Technology IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 G.T. Kousiouris and D.N. Serpanos Dept. of Electrical and

More information

A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing

A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing Youngji Yoo, Seung Hwan Park, Daewoong An, Sung-Shick Shick Kim, Jun-Geol Baek Abstract The yield management

More information

Post-Classification Change Detection of High Resolution Satellite Images Using AdaBoost Classifier

Post-Classification Change Detection of High Resolution Satellite Images Using AdaBoost Classifier , pp.34-38 http://dx.doi.org/10.14257/astl.2015.117.08 Post-Classification Change Detection of High Resolution Satellite Images Using AdaBoost Classifier Dong-Min Woo 1 and Viet Dung Do 1 1 Department

More information

Efficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing

Efficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing Contemporary Engineering Sciences, Vol. 7, 2014, no. 16, 785 790 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4691 Efficient Windows Query Processing with Expanded Grid Cells on Wireless

More information

High Efficiency Video Decoding on Multicore Processor

High Efficiency Video Decoding on Multicore Processor High Efficiency Video Decoding on Multicore Processor Hyeonggeon Lee 1, Jong Kang Park 2, and Jong Tae Kim 1,2 Department of IT Convergence 1 Sungkyunkwan University Suwon, Korea Department of Electrical

More information

Deep Learning Based Real-time Object Recognition System with Image Web Crawler

Deep Learning Based Real-time Object Recognition System with Image Web Crawler , pp.103-110 http://dx.doi.org/10.14257/astl.2016.142.19 Deep Learning Based Real-time Object Recognition System with Image Web Crawler Myung-jae Lee 1, Hyeok-june Jeong 1, Young-guk Ha 2 1 Department

More information

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review

COS 318: Operating Systems. NSF, Snapshot, Dedup and Review COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early

More information

Deduplication File System & Course Review

Deduplication File System & Course Review Deduplication File System & Course Review Kai Li 12/13/13 Topics u Deduplication File System u Review 12/13/13 2 Storage Tiers of A Tradi/onal Data Center $$$$ Mirrored storage $$$ Dedicated Fibre Clients

More information

Document Summarization using Semantic Feature based on Cloud

Document Summarization using Semantic Feature based on Cloud Advanced Science and echnology Letters, pp.51-55 http://dx.doi.org/10.14257/astl.2013 Document Summarization using Semantic Feature based on Cloud Yoo-Kang Ji 1, Yong-Il Kim 2, Sun Park 3 * 1 Dept. of

More information

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1

DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 Department of Computer Engineering 2 Department of Computer Engineering Maharashtra

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Parallel-Search Trie-based Scheme for Fast IP Lookup

Parallel-Search Trie-based Scheme for Fast IP Lookup Parallel-Search Trie-based Scheme for Fast IP Lookup Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong, Lin Cai, and Nirwan Ansari Department of Electrical and Computer Engineering, New Jersey Institute

More information

E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application

E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education kydman@koreatech.ac.kr

More information

Leap-based Content Defined Chunking --- Theory and Implementation

Leap-based Content Defined Chunking --- Theory and Implementation Leap-based Content Defined Chunking --- Theory and Implementation Chuanshuai Yu, Chengwei Zhang, Yiping Mao, Fulu Li Huawei Technologies Co., Ltd. {yuchuanshuai, zhangchengwei, tony.mao, lifulu}@huawei.com

More information

SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1

SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1 , pp.197-206 http//dx.doi.org/10.14257/ijca.2018.11.4.18 SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1 Jung Kyu Park 1 and Jaeho Kim 2* 1 Department of Computer Software

More information

Delta Compressed and Deduplicated Storage Using Stream-Informed Locality

Delta Compressed and Deduplicated Storage Using Stream-Informed Locality Delta Compressed and Deduplicated Storage Using Stream-Informed Locality Philip Shilane, Grant Wallace, Mark Huang, and Windsor Hsu Backup Recovery Systems Division EMC Corporation Abstract For backup

More information

Fast Natural Feature Tracking for Mobile Augmented Reality Applications

Fast Natural Feature Tracking for Mobile Augmented Reality Applications Fast Natural Feature Tracking for Mobile Augmented Reality Applications Jong-Seung Park 1, Byeong-Jo Bae 2, and Ramesh Jain 3 1 Dept. of Computer Science & Eng., University of Incheon, Korea 2 Hyundai

More information

LIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP

LIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 5, May 2018, pp. 624 632, Article ID: IJMET_09_05_068 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=5

More information

File System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

File System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University File System Internals Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics File system implementation File descriptor table, File table

More information

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate

More information

API Development for Efficiently Mapping between SEDRIS and Simulation Systems

API Development for Efficiently Mapping between SEDRIS and Simulation Systems API Development for Efficiently Mapping between SEDRIS and Simulation Systems Hyun Seung Son 1, R. Young Chul Kim 1, In-geol Chun 2, Jae Ho Jeon 2, Woo Yeol Kim 3 1 Dept. of CIC(Computer and Information

More information

Rectification of distorted elemental image array using four markers in three-dimensional integral imaging

Rectification of distorted elemental image array using four markers in three-dimensional integral imaging Rectification of distorted elemental image array using four markers in three-dimensional integral imaging Hyeonah Jeong 1 and Hoon Yoo 2 * 1 Department of Computer Science, SangMyung University, Korea.

More information

bup: the git-based backup system Avery Pennarun

bup: the git-based backup system Avery Pennarun bup: the git-based backup system Avery Pennarun 2011 04 30 The Challenge Back up entire filesystems (> 1TB) Including huge VM disk images (files >100GB) Lots of separate files (500k or more) Calculate/store

More information

Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks

Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks , pp.187-191 http://dx.doi.org/10.14257/astl.2014.63.41 Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks Hyeon-Jin Jeong 1, Seung-Sik Choi 1 1 Computer Engineering Department,

More information