期刊文献+

DeduBS:一种基于Hash匹配的数据消重远程备份系统

DeduBS: a duplicate eliminating remote backup system based on hash matching
下载PDF
导出
摘要 数据备份规模的不断增大,网络带宽成为了远程数据备份系统的瓶颈.针对这个问题,本文提出了一种基于Hash匹配的数据消重远程备份系统:DeduBS系统.DeduBS系统通过数据消重,避免了在数据备份过程中传输重复数据,有效地提高了网络传输效率.DeduBS系统在源节点和目标节点建立Hash库存储数据块的Hash值,数据传输前通过比对Hash值判断其是否为重复数据,只传输重复数据的Hash值和非重复数据,对于重复数据接收端通过Hash库恢复数据.实验数据表明,DeduBS系统可以减少网络传输的数据量,在降低成本、节省能耗的同时,提高数据备份的效率. With data increasing, network bandwidth has become a bottleneck in remote data backup system. A new duplicate eliminating remote backup system is proposed based on Hash matching: Dedu BS. DeduB S improves the efficiency of network transmission by deduplication. In Dedu BS, a Hash library is established in both the source node and the destination node to store all data blocks Hash value. Before being transferred, the data will be judged whether it is duplication or not by its Hash value. Only the non-duplicate and the Hash value of duplicate are transferred in Dedu BS. Experiment shows that the Dedu BS can transfer less data and save the cost and energy of backup system, thus improving network utilization.
出处 《河北工业大学学报》 CAS 2015年第4期32-37,共6页 Journal of Hebei University of Technology
基金 河北省教育厅青年基金(QN2014192) 河北省自然科学基金(F2013202138) 河北省教育厅重点项目(ZH2012038)
关键词 备份 数据消重 Hash值 网络传输 backup duplicate eliminating Hash network transmission
  • 相关文献

参考文献10

  • 1Brain Babineau, Jonh Mcknight. Digital arehiving: end-user surevey and market forecast [EB/OL]. http: //www.esg-global.eom/default/assets/File/ESG%20Research%20Report%20Digital%20Archive%20Market%20Forecast%20Abstract.pdf, [2013-2-25].
  • 2Yang Jing, Cao Qiang, Li Xu, et al. ST-CDP: Snapshots in TRAP for continuous data protection [J]. IEEE Transactions on Computers, 2012, 61 (6): 753-766.
  • 3YangQing, XiaoWeijun, RenJin. TRAP-array: adiskarrayarchitecmreprovidingtimelyrecoverytoanypoint-in-time [J]. Computer Architecture News, 2006, 34 (2): 289-300.
  • 4Liu Jingning, Yang Tianming, Li Zuoheng, et al. TSPSCDP: a time-stamp continuous data protection approach based on pipeline strategy. Japan- China Joint Workshop on Frontier of Computer Science and Technology [C] //Nagasahi: IEEE 2008: 96-102.
  • 5Qian Cunhua, Huang Yingyan, Zhao Xufeng, et al. Optimal backup interval for a database system with full and periodicincremental backup [J]. Journal of Computers, 2010, 5 (4): 557-564.
  • 6敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119
  • 7付印金,肖侬,刘芳.重复数据删除关键技术研究进展[J].计算机研究与发展,2012,49(1):12-20. 被引量:64
  • 8杨义先,姚文斌,陈钊.信息系统灾备技术综论[J].北京邮电大学学报,2010,33(2):1-6. 被引量:56
  • 9Muthitacharoen A, Chen B, Mazieres D. A low-bandwidth network file system [J]. ACM SIGOPS Operating Systems Review, 2002, 35 (5): 174-187.
  • 10Liu C, Lu Y, Shi C, et al. ADMAD: Application-driven metadata aware de-duplication archival storage system. The Fifth IEEE International Workshop on Storage Network Architecture and Parallel I/Os (SNAPI) [C] //Baltimore, MD: IEEE, 2008: 29-35.

二级参考文献121

  • 1郭天杰,曹强,谢长生.远程镜像技术和方法研究[J].计算机工程与科学,2006,28(10):38-41. 被引量:6
  • 2Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 3Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 4Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 5You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 6Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 7Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 8Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 9Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.

共引文献206

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部