Byte Index Chunking Approach for Data Compression
|
|
- Alfred Howard
- 6 years ago
- Views:
Transcription
1 Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2, Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea {Ider555, jso, jeonggun.lee, yuko}@hallym.ac.kr 2 Dept. of Computer Science and Engineering, Korea University, Seoul, Korea hxy@korea.ac.kr Abstract. This paper presents an algorithm and structure for a deduplication method which can be efficiently define identical data between files existing different machines with high rate and performing it within rapid time. The algorithm identifies to some part of the destination file, and only sends those parts which cannot be matched in this way. The fundamental aspects of reaching faster and accurately looking up result is that data are expressed as fixed-size block chunks and indexed by its anchor byte values in Index-table. Index-table is a 256x256 sized table structure; indexing the edge chunk byte values are used as their cell row and column numbers. To check commonality between two chunks by their SHA1 hash is fundamental to get stable data deduplication. Keywords: Deduplication, Cloud storage, Chunk, Index-table, Anchor Byte 1 Introduction With the explosion of data such as text, audio, video, image, and the proliferation of the data centers, the regulatory back-up data is the pending issue to be resolved. With usage of data deduplication mechanism, the required storage capacity can be reduced and the deduplication scheme is adapted to various storage systems. There are lots of data processing system [1][2], In Content-defined Chunking[3], each block size is partitioned by anchoring based on their data patterns. This scheme can prevent the data shifting problem of the Static Chunking approach. One of the well-known Content-defined Chunking algorithms is LBFS [4], a network File system designed for low bandwidth networks. However, content-defined data deduplication approach can achieve high deduplication ratio, but requires too much time to perform deduplication process in comparison to the other data deduplication approaches. Static 1 This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(mest) (No ), and this research was supported by the MKE, Korea and NHN. under IT/SW Creative research program supervised by the NIPA (NIPA-2012) IST 2013, ASTL Vol. 23, pp , 2013 SERSC
2 Proceedings, The 2nd International Conference on Information Science and Technology chunking [4] is the fastest algorithm among the others for detecting duplicated blocks but the performance is not acceptable with boundary shifting problem. The primary goal of this work is to develop simple fast and high rate data duplication ratio result approach. The key idea is to start lookup process with predict data from destination file which are highly probable to identical to source file in rapid time. Then verify these data are duplicated by sha1 hash commonality checking. If duplicate probable chunk is not verified to duplicated, we start to lookup process again for only this chunk to determine different suspicious chunk is stored in this chunk or not. Then we continue verifying process as previous steps. 2. Design In this work, we implemented a deduplication server, employing source-based approach[5] with a refined and improved touch. We transfer Index-table (size: 256*256) from the server to the client in order to perform lookup process and find high probability of the duplicated data and number of duplicated data blocks. Indextable is a 256x256 sized table structure; keeping chunk numbers and the chunk s edge chunk byte values are used as their cell row and column numbers. Server Client Take file hash DBMS File Find duplicate probable chunks. Send Index matrix Index table Send duplicated probable chunks Data deduplication Ensure suspicious chunk to duplicate Chunking update Block I/O Block I/O Local disk Storage Fig. 1 Proposed System architecture overview: Byte Index based approach First of all, we create Index-table of source file in the server; send it to client and using it to start whole file lookup to define high identical probable data from destination file in client side. Result we can found parts of data which are be very high probability to be duplicated in very fast and got a scheme as shown in Fig
3 First step, we start to byte shifting lookup and aim to find the chunks that are expected to be duplicated (highly probable duplicate chunk) using Index table by only read their boundary byte values in this algorithm. For improving our search results to be more accurate, we not only do search a single chunk, but we also aim to seek adjacent double chunks for per offset in the modified file. Adjacent chunks, we find in modified file, is not only has the same length with the any adjacent chunks in the server, but also both these chunks store same bytes of values at the position where boundaries of each chunk, that s why we call this chunk in modified file as Highly probable duplicate chunk ( Fig. 2). Fig. 2 Duplicated chunk look up process overview. Probability to be a duplicate is the only one from (4,294,967,296) occasions. Nevertheless, Highly probable duplicate chunk is possibly seen to be duplicated but we confirm whether they are duplicated or not by their SHA1 value. Chunking process is implemented on the server. We divide the source file stream into the fixed sized length chunks and calculate its hashes. The step of chunking process is similar to the fixed sized chunking. At the next step is bit difference from fixed sized chunking, in which we also consider values of edge two boundary bytes for each chunk and we call them Anchor bytes Fig. 3.Also we numbering each chunk in source file in the server. By anchor bytes with chunk hash and its chunk number (chunk-index), we create Meta data and then save them into data storage in the server. Fig.3 Overview of chunking with anchor points 319
4 Proceedings, The 2nd International Conference on Information Science and Technology After the chunking process, we then create [256,256] amount of index table. For every chunk, we need to set a value to the convenient cell of Index-table. For a chunk, first anchor point (left edge byte) value of byte represents the horizontal direction index and a last anchor point (right edge byte) value of byte is a reference to the vertical direction of the Index-table. (Fig. 4) Fig. 4 Overview of filling Index-table table Figure 4 shows how Index-table is filled with reference points of the chunk. When we create metadata (with chunk index, chunk hash and chunk anchor points (value of edge bytes)) list, we save the each chunk index to the Index-table at the location where metadata chunk s anchor point (edge bytes) values. 3. Performance evaluation Our experiments were conducted on identical dual-core1.9ghz Celeron processor, each with 2GBytes of RAM and a 7,200RPM, 8.9ms Seagate ST AIDE drive. We examined the behavior of proposed system s deduplication ratio result and performance time consumption separately with comparing Content-defined break point chunking, and Fixed-size chunking approach with performing results. Experiments are based on using a file with 20% random modification from 1110 MB file and measured when block size are 16KB, 32KB, 64KB, 128KB, 256KB, 512KB and 1MB in each case. As can be seen Figure 5, Content-based chunking shows best performance for detecting duplicated region of data. But as described previous section, the overhead of Contend-based chunking is very high. The proposed scheme shows high performance deduplication capability comparable to Content-based chunking. Our scheme consumes very small sized metadata and can be processed faster than Content-based chunking. The performance of Fixed-size chunking is not good because it suffers from boundary shift problem. 320
5 Fig 5 Deduplication ratio result of chunking based approaches. 4. Conclusion In this paper, we introduced an algorithm and structure for a deduplication method which can be efficiently used in a storage system. The algorithm identifies to some part of the destination file, and only sends those parts which cannot be matched in this way. The fundamental aspects of reaching faster and accurately looking up result is that data are expressed as fixed-size block chunks and indexed by its anchor byte values in Index-table. Index-table is a 256x256 sized table structure; indexing the edge chunk byte values are used as their cell row and column numbers. Performance evaluation result shows that the proposed approach is very useful compared to Content-based chunking and Fixed-sized chunking. References 1. JY. Oh and HJ. Kouh, A study on aes extension for large-scale data. The Journal of IWIT. 9, 6 pp (2009) 2. KY. Lee, MJ. Lim, JJ. Kim, KH. Kim and JL. Kim, Design and implementation of a data management system for mobile spatio-temporal query. The Journal of IWIT. 11,1 pp (2011) 3. K. Eshghi and H. Tang, A framework for analyzing and improving content-based chunking algorithms. Hewlett-Packard Labs Technical Report TR. 30(2005) 4. A. Muthitacharoen, B. Chen and D. Mazieres, A low-bandwidth network file system. ACM SIGOPS Operating Systems Review. 35, 5 pp (2001) 5. S. Quinlan and S. Dorward. Venti: A New Approach to Archival Storage, In Proceedings of the FAST 2002 Conference on File and Storage Technologies,
Multi-level Byte Index Chunking Mechanism for File Synchronization
, pp.339-350 http://dx.doi.org/10.14257/ijseia.2014.8.3.31 Multi-level Byte Index Chunking Mechanism for File Synchronization Ider Lkhagvasuren, Jung Min So, Jeong Gun Lee, Jin Kim and Young Woong Ko *
More informationOnline Version Only. Book made by this file is ILLEGAL. Design and Implementation of Binary File Similarity Evaluation System. 1.
, pp.1-10 http://dx.doi.org/10.14257/ijmue.2014.9.1.01 Design and Implementation of Binary File Similarity Evaluation System Sun-Jung Kim 2, Young Jun Yoo, Jungmin So 1, Jeong Gun Lee 1, Jin Kim 1 and
More informationParallelizing Inline Data Reduction Operations for Primary Storage Systems
Parallelizing Inline Data Reduction Operations for Primary Storage Systems Jeonghyeon Ma ( ) and Chanik Park Department of Computer Science and Engineering, POSTECH, Pohang, South Korea {doitnow0415,cipark}@postech.ac.kr
More informationAn Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage
, pp. 9-16 http://dx.doi.org/10.14257/ijmue.2016.11.4.02 An Efficient Provable Data Possession Scheme based on Counting Bloom Filter for Dynamic Data in the Cloud Storage Eunmi Jung 1 and Junho Jeong 2
More informationChunkStash: Speeding Up Storage Deduplication using Flash Memory
ChunkStash: Speeding Up Storage Deduplication using Flash Memory Biplob Debnath +, Sudipta Sengupta *, Jin Li * * Microsoft Research, Redmond (USA) + Univ. of Minnesota, Twin Cities (USA) Deduplication
More informationA Virtual-Synchronized-File Based Privacy Protection System
Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System
More informationRemote Direct Storage Management for Exa-Scale Storage
, pp.15-20 http://dx.doi.org/10.14257/astl.2016.139.04 Remote Direct Storage Management for Exa-Scale Storage Dong-Oh Kim, Myung-Hoon Cha, Hong-Yeon Kim Storage System Research Team, High Performance Computing
More informationAdaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network
Contemporary Engineering Sciences, Vol. 7, 2014, no. 14, 725-730 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4681 Adaptive Aggregation Scheduling Using Aggregation-degree Control in
More informationP2FS: supporting atomic writes for reliable file system design in PCM storage
LETTER IEICE Electronics Express, Vol.11, No.13, 1 6 P2FS: supporting atomic writes for reliable file system design in PCM storage Eunji Lee 1, Kern Koh 2, and Hyokyung Bahn 2a) 1 Department of Software,
More informationA Load Balancing Scheme for Games in Wireless Sensor Networks
, pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,
More informationInternational Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, ISSN
International Journal of Computer Engineering and Applications, Volume XII, Special Issue, March 18, www.ijcea.com ISSN 2321-3469 SECURE DATA DEDUPLICATION FOR CLOUD STORAGE: A SURVEY Vidya Kurtadikar
More informationAlternative Approaches for Deduplication in Cloud Storage Environment
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 10 (2017), pp. 2357-2363 Research India Publications http://www.ripublication.com Alternative Approaches for
More informationDeduplication Storage System
Deduplication Storage System Kai Li Charles Fitzmorris Professor, Princeton University & Chief Scientist and Co-Founder, Data Domain, Inc. 03/11/09 The World Is Becoming Data-Centric CERN Tier 0 Business
More informationNetwork Intrusion Forensics System based on Collection and Preservation of Attack Evidence
, pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,
More informationA DEDUPLICATION-INSPIRED FAST DELTA COMPRESSION APPROACH W EN XIA, HONG JIANG, DA N FENG, LEI T I A N, M I N FU, YUKUN Z HOU
A DEDUPLICATION-INSPIRED FAST DELTA COMPRESSION APPROACH W EN XIA, HONG JIANG, DA N FENG, LEI T I A N, M I N FU, YUKUN Z HOU PRESENTED BY ROMAN SHOR Overview Technics of data reduction in storage systems:
More informationSparse Indexing: Large-Scale, Inline Deduplication Using Sampling and Locality
Sparse Indexing: Large-Scale, Inline Deduplication Using Sampling and Locality Mark Lillibridge, Kave Eshghi, Deepavali Bhagwat, Vinay Deolalikar, Greg Trezise, and Peter Camble Work done at Hewlett-Packard
More informationDEC: An Efficient Deduplication-Enhanced Compression Approach
2016 IEEE 22nd International Conference on Parallel and Distributed Systems DEC: An Efficient Deduplication-Enhanced Compression Approach Zijin Han, Wen Xia, Yuchong Hu *, Dan Feng, Yucheng Zhang, Yukun
More informationA Personal Information Retrieval System in a Web Environment
Vol.87 (Art, Culture, Game, Graphics, Broadcasting and Digital Contents 2015), pp.42-46 http://dx.doi.org/10.14257/astl.2015.87.10 A Personal Information Retrieval System in a Web Environment YoungDeok
More informationDeploying De-Duplication on Ext4 File System
Deploying De-Duplication on Ext4 File System Usha A. Joglekar 1, Bhushan M. Jagtap 2, Koninika B. Patil 3, 1. Asst. Prof., 2, 3 Students Department of Computer Engineering Smt. Kashibai Navale College
More informationA Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup
A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington
More informationCache Replacement Strategies for Scalable Video Streaming in CCN
Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr
More informationEaSync: A Transparent File Synchronization Service across Multiple Machines
EaSync: A Transparent File Synchronization Service across Multiple Machines Huajian Mao 1,2, Hang Zhang 1,2, Xianqiang Bao 1,2, Nong Xiao 1,2, Weisong Shi 3, and Yutong Lu 1,2 1 State Key Laboratory of
More informationSMCCSE: PaaS Platform for processing large amounts of social media
KSII The first International Conference on Internet (ICONI) 2011, December 2011 1 Copyright c 2011 KSII SMCCSE: PaaS Platform for processing large amounts of social media Myoungjin Kim 1, Hanku Lee 2 and
More informationA Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space
, pp.70-74 http://dx.doi.org/10.14257/astl.2013.32.17 A Preliminary Study on Daylighting Performance of Light Shelf according to the Depth of Space Heangwoo Lee 1.1, Janghoo Seo 2.1, Yongseong Kim 2.2,
More informationSpeeding Up Cloud/Server Applications Using Flash Memory
Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta and Jin Li Microsoft Research, Redmond, WA, USA Contains work that is joint with Biplob Debnath (Univ. of Minnesota) Flash Memory
More informationDDSF: A Data Deduplication System Framework for Cloud Environments
DDSF: A Data Deduplication System Framework for Cloud Environments Jianhua Gu, Chuang Zhang and Wenwei Zhang School of Computer Science and Technology, High Performance Computing R&D Center Northwestern
More informationA Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks
A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks Daewook Shin, Jaebeom Kim, and Young-Bae Ko Department of Computer Engineering Graduate School of Ajou University Suwon, Republic
More informationA Memory Management Scheme for Hybrid Memory Architecture in Mission Critical Computers
A Memory Management Scheme for Hybrid Memory Architecture in Mission Critical Computers Soohyun Yang and Yeonseung Ryu Department of Computer Engineering, Myongji University Yongin, Gyeonggi-do, Korea
More informationOptimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing
, pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,
More informationECE Lab 8. Logic Design for a Direct-Mapped Cache. To understand the function and design of a direct-mapped memory cache.
ECE 201 - Lab 8 Logic Design for a Direct-Mapped Cache PURPOSE To understand the function and design of a direct-mapped memory cache. EQUIPMENT Simulation Software REQUIREMENTS Electronic copy of your
More informationWAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression
WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression Philip Shilane, Mark Huang, Grant Wallace, & Windsor Hsu Backup Recovery Systems Division EMC Corporation Introduction
More informationThe Design of Real-time Display Screen Control Techniques for Mobile Devices 1
, pp.189-193 http://dx.doi.org/10.14257/astl.2016.133.36 The Design of Real-time Display Screen Control Techniques for Mobile Devices 1 Jungsoo Hwang 1, Ji Hee Jeong 1, Soon-Bum Lim 1, 1 Dept. of Multimedia
More informationA Reverse Differential Archiving Method based on Zdelta
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.19 A Reverse Differential Archiving Method based
More informationClassifying Physical Storage Media. Chapter 11: Storage and File Structure. Storage Hierarchy (Cont.) Storage Hierarchy. Magnetic Hard Disk Mechanism
Chapter 11: Storage and File Structure Overview of Storage Media Magnetic Disks Characteristics RAID Database Buffers Structure of Records Organizing Records within Files Data-Dictionary Storage Classifying
More informationClassifying Physical Storage Media. Chapter 11: Storage and File Structure. Storage Hierarchy. Storage Hierarchy (Cont.) Speed
Chapter 11: Storage and File Structure Overview of Storage Media Magnetic Disks Characteristics RAID Database Buffers Structure of Records Organizing Records within Files Data-Dictionary Storage Classifying
More informationNLE-FFS: A Flash File System with PRAM for Non-linear Editing
16 IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, NOVEMBER 9 NLE-FFS: A Flash File System with PRAM for Non-linear Editing Man-Keun Seo, Sungahn Ko, Youngwoo Park, and Kyu Ho Park, Member,
More informationRobot localization method based on visual features and their geometric relationship
, pp.46-50 http://dx.doi.org/10.14257/astl.2015.85.11 Robot localization method based on visual features and their geometric relationship Sangyun Lee 1, Changkyung Eem 2, and Hyunki Hong 3 1 Department
More informationDesign and Implementation of Various File Deduplication Schemes on Storage Devices
Design and Implementation of Various File Deduplication Schemes on Storage Devices Yong-Ting Wu, Min-Chieh Yu, Jenq-Shiou Leu Department of Electronic and Computer Engineering National Taiwan University
More informationTIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD
TIBX NEXT-GENERATION ARCHIVE FORMAT IN ACRONIS BACKUP CLOUD 1 Backup Speed and Reliability Are the Top Data Protection Mandates What are the top data protection mandates from your organization s IT leadership?
More informationA Study on Multi-resolution Screen based Conference Broadcasting Technology
2 : (Young-ae Kim et al.: A Study on Multi-resolution Screen based Conference Broadcasting Technology) (Special Paper) 23 2, 2018 3 (JBE Vol. 23, No. 2, March 2018) https://doi.org/10.5909/jbe.2018.23.2.253
More informationInterference Management Scheme for Wireless Sensor Network
, pp.64-69 http://dx.doi.org/0.4257/astl.204.46.5 Interference Management Scheme for Wireless Sensor Network Sangmi Moon, Saransh Malik, Bora Kim, Hun Choi, Jinsul Kim, Cheolhong Kim, and Intae Hwang Dept.
More informationScanline-based rendering of 2D vector graphics
Scanline-based rendering of 2D vector graphics Sang-Woo Seo 1, Yong-Luo Shen 1,2, Kwan-Young Kim 3, and Hyeong-Cheol Oh 4a) 1 Dept. of Elec. & Info. Eng., Graduate School, Korea Univ., Seoul 136 701, Korea
More informationA multilingual reference based on cloud pattern
A multilingual reference based on cloud pattern G.Rama Rao Department of Computer science and Engineering, Christu Jyothi Institute of Technology and Science, Jangaon Abstract- With the explosive growth
More informationData Deduplication Overview and Implementation
Data Deduplication Overview and Implementation Somefun Olawale Mufutau 1, Nwala Kenneth 2, Okonji Charles 3, Omotosho Olawale Jacob 4 1 Computer Science Department Babcock University, Ilisan Remo Ogun
More informationMATRIX BASED INDEXING TECHNIQUE FOR VIDEO DATA
Journal of Computer Science, 9 (5): 534-542, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.534.542 Published Online 9 (5) 2013 (http://www.thescipub.com/jcs.toc) MATRIX BASED INDEXING TECHNIQUE FOR VIDEO
More informationAutomatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud
, pp.43-47 http://dx.doi.org/10.14257/astl.2014.67.11 Automatic Pipeline Generation by the Sequential Segmentation and Skelton Construction of Point Cloud Ashok Kumar Patil, Seong Sill Park, Pavitra Holi,
More informationBuilding Ubiquitous Computing Environment Using the Web of Things Platform
, pp.105-109 http://dx.doi.org/10.14257/astl.2013 Building Ubiquitous Computing Environment Using the Web of Things Platform Woo-Chang Shin Dept. of Computer Science, at SeoKyeong University 16-1 Jungneung-Dong
More informationTime Stamp based Multiple Snapshot Management Method for Storage System
Time Stamp based Multiple Snapshot Management Method for Storage System Yunsoo Lee 1, Dongmin Shin 1, Insoo Bae 1, Seokil Song 1, Seungkook Cheong 2 1 Dept. of Computer Engineering, Korea National University
More informationPage Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices
Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Ilhoon Shin Seoul National University of Science & Technology ilhoon.shin@snut.ac.kr Abstract As the amount of digitized
More informationA Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop
A Robust Cloud-based Service Architecture for Multimedia Streaming Using Hadoop Myoungjin Kim 1, Seungho Han 1, Jongjin Jung 3, Hanku Lee 1,2,*, Okkyung Choi 2 1 Department of Internet and Multimedia Engineering,
More informationDesign of Self-Adaptive System Observation over Internet of Things
, pp.165-171 http://dx.doi.org/10.14257/astl.2015.117.39 Design of Self-Adaptive System Observation over Internet of Things Young-Joo Kim 1, Jong-Soo Seok 1, Moon Soo Lee 1, Jeong-Si Kim 1, and YungJoon
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationChapter 14 HARD: Host-Level Address Remapping Driver for Solid-State Disk
Chapter 14 HARD: Host-Level Address Remapping Driver for Solid-State Disk Young-Joon Jang and Dongkun Shin Abstract Recent SSDs use parallel architectures with multi-channel and multiway, and manages multiple
More informationDesign and Implementation of Secure OTP Generation for IoT Devices
, pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research
More informationdedupv1: Improving Deduplication Throughput using Solid State Drives (SSD)
University Paderborn Paderborn Center for Parallel Computing Technical Report dedupv1: Improving Deduplication Throughput using Solid State Drives (SSD) Dirk Meister Paderborn Center for Parallel Computing
More informationImplementation of Semantic Information Retrieval. System in Mobile Environment
Contemporary Engineering Sciences, Vol. 9, 2016, no. 13, 603-608 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2016.6447 Implementation of Semantic Information Retrieval System in Mobile
More informationA Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking
A Congestion Contribution-based Traffic Engineering Scheme using Software-Defined Networking Dongjin Hong, Jinyong Kim, and Jaehoon (Paul) Jeong Department of Electrical and Computer Engineering, Sungkyunkwan
More informationDesign of a Processing Structure of CNN Algorithm using Filter Buffers
, pp.37-41 http://dx.doi.org/10.14257/astl.2016.129.08 Design of a Processing Structure of CNN Algorithm using Filter Buffers Kwan-Ho Lee 1, Jun-Mo Jeong 2, Jong-Joon Park 3 1 Dept. of Electronics and
More informationApplication of isight for Optimal Tip Design of Complex Tool Holder Spindle
Application of isight for Optimal Tip Design of Complex Tool Holder Spindle WMSCI 2010 Author: Koo Hong Kwon Won Jee Chung Ki Beom Park School of Mechatronics, Changwon National University Email: goodgoohong@hanmail.net
More informationData De-duplication for Distributed Segmented Parallel FS
Data De-duplication for Distributed Segmented Parallel FS Boris Zuckerman & Oskar Batuner Hewlett-Packard Co. Objectives Expose fundamentals of highly distributed segmented parallel file system architecture
More informationA Design of Authentication Protocol for a Limited Mobile Network Environment
Vol.29 (SecTech 2013), pp.41-45 http://dx.doi.org/10.14257/astl.2013.29.08 A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept.
More informationThe Effectiveness of Deduplication on Virtual Machine Disk Images
The Effectiveness of Deduplication on Virtual Machine Disk Images Keren Jin & Ethan L. Miller Storage Systems Research Center University of California, Santa Cruz Motivation Virtualization is widely deployed
More informationRethinking Deduplication Scalability
Rethinking Deduplication Scalability Petros Efstathopoulos Petros Efstathopoulos@symantec.com Fanglu Guo Fanglu Guo@symantec.com Symantec Research Labs Symantec Corporation, Culver City, CA, USA 1 ABSTRACT
More informationStorage Architecture and Software Support for SLC/MLC Combined Flash Memory
Storage Architecture and Software Support for SLC/MLC Combined Flash Memory Soojun Im and Dongkun Shin Sungkyunkwan University Suwon, Korea {lang33, dongkun}@skku.edu ABSTRACT We propose a novel flash
More informationLevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine
777 LevelDB-Raw: Eliminating File System Overhead for Optimizing Performance of LevelDB Engine Hak-Su Lim and Jin-Soo Kim *College of Info. & Comm. Engineering, Sungkyunkwan University, Korea {haksu.lim,
More informationThe Method of Seed Based Grouping Malicious Traffic by Deep-Learning
The Method of Seed Based Grouping Malicious Traffic by Deep-Learning Ui-Jun Baek pb1069@korea.ac.kr Jee-Tae Park pjj5846@korea.ac.kr Huru Hasanova hhuru@korea.ac.kr Myung Sup Kim tmskim@korea.ac.kr Abstract
More informationImplementation and Performance Evaluation of RAPID-Cache under Linux
Implementation and Performance Evaluation of RAPID-Cache under Linux Ming Zhang, Xubin He, and Qing Yang Department of Electrical and Computer Engineering, University of Rhode Island, Kingston, RI 2881
More informationImproving Duplicate Elimination in Storage Systems
Improving Duplicate Elimination in Storage Systems Deepak R. Bobbarjung and Suresh Jagannathan Department of Computer Sciences, Purdue University and Cezary Dubnicki NEC Laboratories America Minimizing
More informationIn-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge
In-line Deduplication for Cloud storage to Reduce Fragmentation by using Historical Knowledge Smitha.M. S, Prof. Janardhan Singh Mtech Computer Networking, Associate Professor Department of CSE, Cambridge
More informationA Study on the IoT Sensor Interaction Transmission System based on BigData
Vol.123 (SoftTech 2016), pp.220-224 http://dx.doi.org/10.14257/astl.2016.123.41 A Study on the IoT Sensor Interaction Transmission System based on BigData Jin-Tae Park 1, Gyung-Soo Phyo 1 and Il-Young
More informationAn Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks
, pp.135-140 http://dx.doi.org/10.14257/astl.2014.48.22 An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks Jin Wang 1, Bo Tang 1, Zhongqi Zhang 1, Jian Shen 1, Jeong-Uk Kim 2
More informationQuantifying FTK 3.0 Performance with Respect to Hardware Selection
Quantifying FTK 3.0 Performance with Respect to Hardware Selection Background A wide variety of hardware platforms and associated individual component choices exist that can be utilized by the Forensic
More informationCSE 4/521 Introduction to Operating Systems. Lecture 14 Main Memory III (Paging, Structure of Page Table) Summer 2018
CSE 4/521 Introduction to Operating Systems Lecture 14 Main Memory III (Paging, Structure of Page Table) Summer 2018 Overview Objective: To discuss how paging works in contemporary computer systems. Paging
More informationDetermination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS
Vol. (Architecture and Civil Engineering 2), pp.8-22 http://dx.doi.org/.42/astl.2..2 Determination of the Parameter for Transformation of Local Geodetic System to the World Geodetic System using GNSS Joon
More informationResearch on the Performance of JavaScript-based IoT Service Platform
International Journal of Control Theory and Applications ISSN : 0974-5572 International Science Press Volume 9 Number 44 2016 Research on the Performance of JavaScript-based IoT Service Platform Jin-Tae
More informationA Robust Bloom Filter
A Robust Bloom Filter Yoon-Hwa Choi Department of Computer Engineering, Hongik University, Seoul, Korea. Orcid: 0000-0003-4585-2875 Abstract A Bloom filter is a space-efficient randomized data structure
More informationIP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1
2005 IEEE International Symposium on Signal Processing and Information Technology IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 G.T. Kousiouris and D.N. Serpanos Dept. of Electrical and
More informationA Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing
A Spatial Point Pattern Analysis to Recognize Fail Bit Patterns in Semiconductor Manufacturing Youngji Yoo, Seung Hwan Park, Daewoong An, Sung-Shick Shick Kim, Jun-Geol Baek Abstract The yield management
More informationPost-Classification Change Detection of High Resolution Satellite Images Using AdaBoost Classifier
, pp.34-38 http://dx.doi.org/10.14257/astl.2015.117.08 Post-Classification Change Detection of High Resolution Satellite Images Using AdaBoost Classifier Dong-Min Woo 1 and Viet Dung Do 1 1 Department
More informationEfficient Windows Query Processing with. Expanded Grid Cells on Wireless Spatial Data. Broadcasting for Pervasive Computing
Contemporary Engineering Sciences, Vol. 7, 2014, no. 16, 785 790 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4691 Efficient Windows Query Processing with Expanded Grid Cells on Wireless
More informationHigh Efficiency Video Decoding on Multicore Processor
High Efficiency Video Decoding on Multicore Processor Hyeonggeon Lee 1, Jong Kang Park 2, and Jong Tae Kim 1,2 Department of IT Convergence 1 Sungkyunkwan University Suwon, Korea Department of Electrical
More informationDeep Learning Based Real-time Object Recognition System with Image Web Crawler
, pp.103-110 http://dx.doi.org/10.14257/astl.2016.142.19 Deep Learning Based Real-time Object Recognition System with Image Web Crawler Myung-jae Lee 1, Hyeok-june Jeong 1, Young-guk Ha 2 1 Department
More informationCOS 318: Operating Systems. NSF, Snapshot, Dedup and Review
COS 318: Operating Systems NSF, Snapshot, Dedup and Review Topics! NFS! Case Study: NetApp File System! Deduplication storage system! Course review 2 Network File System! Sun introduced NFS v2 in early
More informationDeduplication File System & Course Review
Deduplication File System & Course Review Kai Li 12/13/13 Topics u Deduplication File System u Review 12/13/13 2 Storage Tiers of A Tradi/onal Data Center $$$$ Mirrored storage $$$ Dedicated Fibre Clients
More informationDocument Summarization using Semantic Feature based on Cloud
Advanced Science and echnology Letters, pp.51-55 http://dx.doi.org/10.14257/astl.2013 Document Summarization using Semantic Feature based on Cloud Yoo-Kang Ji 1, Yong-Il Kim 2, Sun Park 3 * 1 Dept. of
More informationDATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1
DATA DEDUPLCATION AND MIGRATION USING LOAD REBALANCING APPROACH IN HDFS Pritee Patil 1, Nitin Pise 2,Sarika Bobde 3 1 Department of Computer Engineering 2 Department of Computer Engineering Maharashtra
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationParallel-Search Trie-based Scheme for Fast IP Lookup
Parallel-Search Trie-based Scheme for Fast IP Lookup Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong, Lin Cai, and Nirwan Ansari Department of Electrical and Computer Engineering, New Jersey Institute
More informationE-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application
E-Training Content Delivery Networking System for Augmented Reality Car Maintenance Training Application Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education kydman@koreatech.ac.kr
More informationLeap-based Content Defined Chunking --- Theory and Implementation
Leap-based Content Defined Chunking --- Theory and Implementation Chuanshuai Yu, Chengwei Zhang, Yiping Mao, Fulu Li Huawei Technologies Co., Ltd. {yuchuanshuai, zhangchengwei, tony.mao, lifulu}@huawei.com
More informationSSD Garbage Collection Detection and Management with Machine Learning Algorithm 1
, pp.197-206 http//dx.doi.org/10.14257/ijca.2018.11.4.18 SSD Garbage Collection Detection and Management with Machine Learning Algorithm 1 Jung Kyu Park 1 and Jaeho Kim 2* 1 Department of Computer Software
More informationDelta Compressed and Deduplicated Storage Using Stream-Informed Locality
Delta Compressed and Deduplicated Storage Using Stream-Informed Locality Philip Shilane, Grant Wallace, Mark Huang, and Windsor Hsu Backup Recovery Systems Division EMC Corporation Abstract For backup
More informationFast Natural Feature Tracking for Mobile Augmented Reality Applications
Fast Natural Feature Tracking for Mobile Augmented Reality Applications Jong-Seung Park 1, Byeong-Jo Bae 2, and Ramesh Jain 3 1 Dept. of Computer Science & Eng., University of Incheon, Korea 2 Hyundai
More informationLIGHTWEIGHT DESIGN OF SEAT CUSHION EXTENSION MODULES USING THE PROPERTIES OF PLASTIC AND HCA-SIMP
International Journal of Mechanical Engineering and Technology (IJMET) Volume 9, Issue 5, May 2018, pp. 624 632, Article ID: IJMET_09_05_068 Available online at http://www.iaeme.com/ijmet/issues.asp?jtype=ijmet&vtype=9&itype=5
More informationFile System Internals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
File System Internals Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Today s Topics File system implementation File descriptor table, File table
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationAPI Development for Efficiently Mapping between SEDRIS and Simulation Systems
API Development for Efficiently Mapping between SEDRIS and Simulation Systems Hyun Seung Son 1, R. Young Chul Kim 1, In-geol Chun 2, Jae Ho Jeon 2, Woo Yeol Kim 3 1 Dept. of CIC(Computer and Information
More informationRectification of distorted elemental image array using four markers in three-dimensional integral imaging
Rectification of distorted elemental image array using four markers in three-dimensional integral imaging Hyeonah Jeong 1 and Hoon Yoo 2 * 1 Department of Computer Science, SangMyung University, Korea.
More informationbup: the git-based backup system Avery Pennarun
bup: the git-based backup system Avery Pennarun 2011 04 30 The Challenge Back up entire filesystems (> 1TB) Including huge VM disk images (files >100GB) Lots of separate files (500k or more) Calculate/store
More informationFreeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks
, pp.187-191 http://dx.doi.org/10.14257/astl.2014.63.41 Freeze DeadLine Method for Vertical Handover in Heterogeneous Wireless Networks Hyeon-Jin Jeong 1, Seung-Sik Choi 1 1 Computer Engineering Department,
More information