A cluster-based data deduplication technology

被引:1
|
作者
Tseng, Chuan-Mu [1 ]
Ciou, Jheng-Rong [2 ]
Liu, Tzong-Jye [2 ]
机构
[1] Jeh Teh Jr Coll Med Nursing & Management, Dept Appl Digital Media, Miaoli, Taiwan
[2] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung, Taiwan
来源
2014 SECOND INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR) | 2014年
关键词
Bloom filter; cluster; data deduplication;
D O I
10.1109/CANDAR.2014.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data deduplication technology usually identifies redundant data quickly and correctly by using bloom filter technology. A bloom filter can determine whether there is redundant data. However, there are the presences of false positives. In order to avoid false positives, we need to compare a new chunk with chunks that have been stored. In order to reduce the time to exclude the bloom filter false positives, current research uses many small size index tables to store chunk ID. However, the target chunk ID only stores in one index table. Searching for the target chunk ID at another index table uselessly took a great deal of time. In this paper, we cluster the stored chunks to reduce the time of excluding the false positive problem induced by bloom filter.
引用
收藏
页码:226 / 230
页数:5
相关论文
共 50 条
  • [31] A Bloom Filter-Based Data Deduplication for Big Data
    Podder, Shrayasi
    Mukherjee, S.
    ADVANCES IN DATA AND INFORMATION SCIENCES, VOL 1, 2018, 38 : 161 - 168
  • [32] Cluster-based real-time analysis of mobile healthcare application for prediction of physiological data
    Sagar B. Tambe
    Suhas S. Gajre
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 429 - 445
  • [33] Cluster-based real-time analysis of mobile healthcare application for prediction of physiological data
    Tambe, Sagar B.
    Gajre, Suhas S.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (02) : 429 - 445
  • [34] The Cluster-based Key Management Mechanism with Secure Data Transmissions Scheme in Wireless Sensor Networks
    Lin, Hua-yi
    Hsieh, Meng-yen
    Li, Kuan-ching
    INTERNATIONAL CONFERENCE ON APPLIED MECHANICS AND MECHANICAL AUTOMATION (AMMA 2017), 2017, : 302 - 309
  • [35] Cluster-based Intrusion Detection Method for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [36] A cluster-based scalable router for information centric networks
    Detti, Andrea
    Bracciale, Lorenzo
    Loreti, Pierpaolo
    Rossi, Giulio
    Melazzi, Nicola Blefari
    COMPUTER NETWORKS, 2018, 142 : 24 - 32
  • [37] Cluster-based reputation and trust for wireless sensor networks
    Crosby, Garth V.
    Pissinou, Niki
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 604 - 608
  • [38] Secure Textual Data Deduplication Scheme Based on Data Encoding and Compression
    Miri, Ali
    Rashid, Fatema
    2019 IEEE 10TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2019, : 207 - 211
  • [39] A Cluster-Based Virtual Cooperative MIMO Transmission Scheme
    Hongfang Lyu
    Journal of Harbin Institute of Technology(New series), 2017, (03) : 89 - 96
  • [40] A Bidirectional Ring Cluster-based Peer to Peer System
    Liu, Naiwen
    Liu, Fang'ai
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 568 - 571