期刊文献+

基于重复数据删除的虚拟机镜像存储优化的研究与实现

Research and Implementation of Virtual Machine Image Storage Optimization Based on De-Duplication
下载PDF
导出
摘要 针对云环境中需要存储大量虚拟机镜像问题,提出运用重复数据删除技术,来提高虚拟机镜像的存储设备利用率;同时针对虚拟机启动的快速响应需求,采用预取机制结合固态硬盘进行磁盘读取优化。通过原型实验表明,利用4KB定长分块策略的重复数据删除技术能够节省约40%的虚拟机镜像存储空间,利用预取机制及固态硬盘读取能够提升20%以上读取速度,提升存储效率和磁盘读取速度。 For the need of mass storage for virtual machine image in cloud computing environment, proposes using de-duplication to improve the utilization of virtual machine image storage. For the demand of quick respond when virtual machine starting, uses pre-fetch mechanism combined with the use of SSD to optimize reading speed. By prototype experiments, it shows that blocking strategy with 4KB fixed length de-duplication technology can save about 40% of the virtual machine image storage space, the use of pre-fetch mechanism and SSD can speed up more than 20% when reading blocks, optimize utilization of storage device of virtual machine image and reading speed.
作者 李张娟
出处 《现代计算机(中旬刊)》 2016年第1期29-32,共4页 Modern Computer
关键词 云计算 重复数据删除 虚拟机镜像 读取优化 Clouding Computing De-Duplication Virtual Machine Image Reading Optimization
  • 相关文献

参考文献8

  • 1谢平.存储系统重复数据删除技术研究综述[J].计算机科学,2014,41(1):22-30. 被引量:25
  • 2敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119
  • 3Jin K, Miller E L. The Effectiveness of Deduplication on Virtual Machine Disk Images[C]. Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference. ACM, 2009: 7.
  • 4Liguori A, Van Hensbergen E. Experiences with Content Addressable Storage and Virtual Disk[C]. Workshop on I/O Virtualization. 2008.
  • 5付印金,肖侬,刘芳,鲍先强.基于重复数据删除的虚拟桌面存储优化技术[J].计算机研究与发展,2012,49(S1):125-130. 被引量:12
  • 6Nath P, Kozuch M A, O'hallaron D R, et al. Design Tradeoffs in Applying Content Addressable Storage to Enterprise-Scale Systems Based on Virtual Machines[J]. Management, 2006, 7(5): 20.
  • 7Lillibridge M, Eshghi K, Bhagwat D, et al. Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality[C]. Fast. 2009, 9: 111-123.
  • 8Bhagwat D, Eshghi K, Long D D E, et al. Extreme Binning: Scalable, Parallel Deduplication for Chunk-Based File Backup[C]. Model- ing, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS'09. IEEE International Symposium on. IEEE, 2009: 1-9.

二级参考文献104

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献145

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部