期刊文献+

基于重复数据删除的连续数据保护系统的快速回滚

Data Roll-Back for CDP Based on Deduplication
下载PDF
导出
摘要 基于重复数据删除的连续数据保护系统可以实现时间点连续的数据保护,可以将数据回滚到任意的时刻,并且能够很好地降低存储开销,是一种理想的数据备份方式,而如何实现系统的快速回滚严重影响整个系统的性能.根据基于重复数据删除的连续数据保护系统的特点,系统实现了2种数据的快速回滚方法,并且通过cache对其中一种方法进行了加速.实验显示,2种回滚方式均能很好地实现数据回滚,并且cache起到了很好的加速效果.针对不同的回滚需求,灵活地选用不同的回滚方式,能够快速有效地实现数据回滚. 基于重复数据删除的连续数据保护系统可以实现时间点连续的数据保护,可以将数据回滚到任意的时刻,并且能够很好地降低存储开销,是一种理想的数据备份方式,而如何实现系统的快速回滚严重影响整个系统的性能.根据基于重复数据删除的连续数据保护系统的特点,系统实现了2种数据的快速回滚方法,并且通过cache对其中一种方法进行了加速.实验显示,2种回滚方式均能很好地实现数据回滚,并且cache起到了很好的加速效果.针对不同的回滚需求,灵活地选用不同的回滚方式,能够快速有效地实现数据回滚.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第S1期196-200,共5页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60903028 61070014) 天津市科技支撑计划重点项目(11ZCKFGX01100)
关键词 重复数据删除 连续数据保护 快速回滚 零数据拷贝 cache加速 continuous data protection deduplication rollback zero-copy cache accelerated
  • 相关文献

参考文献10

  • 1敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119
  • 2Liu Jingning,Yang Tianming,Li Zuoheng,et al.TSPSCDP:A time-stamp continuous data protection approach based on pipeline strategy. Proc of FCST’’08 . 2008
  • 3Yang Qing,Xiao Weijun,Ren Jin.TRAP-Array:A disk array architecture providing timely recovery to any point-in-time. Proc of ISCA’’06 . 2006
  • 4Sarawagi S,Bhamidipaty A.Interactive deduplication using active learning. Proc of the8th ACM SIGKDD Int Conf on Knowledge discovery and data mining . 2002
  • 5Zhu Benjamin,Li Kai,Hugo Patterson.Avoiding the disk bottleneck in the data domain deduplication file system. Proc of FAST’’08 . 2008
  • 6Meyer D T,Bolosky W J.A study of practical deduplication. Proc of FAST’’11 . 2011
  • 7Ma Liang,Zhen Caijun,Zhao Bin,et al.Towards Fast De-duplication Using Low Energy Coprocessor. Proc of20105th Int Conf on Networking,Architecture,and Storage . 2010
  • 8Verhelst W.Network Block Device (TCP version). http://nbd.sourceforge.net/ . 2011
  • 9Lzjb algorithm. http://cvs.opensolaris.org/source/xref/onnv/onnv-gate/usr/src/uts/common/fs/zfs/lzjb.c . 2010
  • 10Daemen J,Rijmen V.The Design of Rijndael:AES-The Advanced Encryption Standard. . 2002

二级参考文献42

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部