SiLo: A Similarity-Locality based Near- Exact Deduplication Scheme with Low RAM Overhead and High Throughput
|
|
- Morgan Osborne
- 7 years ago
- Views:
Transcription
1 SiLo: A Similarity-Locality based Near- Exact Deduplication Scheme with Low RAM Overhead and High Throughput Wen Xia Hong Jiang Dan Feng Yu Hua, Huazhong University of Science and Technology University of Nebraska-Lincoln
2 Data Deduplication Why deduplication? Reduces the storage space overheads. Minimizes the network transmission of redundant data. Deduplication Technique. Data fingerprints: MD5, SHA-1, SHA-256. Remove duplicate data by checking its fingerprints. Deduplication granularity. File-level. Chunk-level. Fixed-length Chunking; Content Defined Chunking. 2
3 Deduplication Challenges Chunking Hashing Indexing Files Chunks Fingerprints Store The Scalability of Deduplication Indexing Deduplicate 800 TB unique data. SHA-1 signature. Avg. 8KB Chunk. 2TB Fingerprints are generated. Global indexing. Disk bottleneck. 3
4 A B C A Locality-based Approaches (1) Input data stream Miss RAM Hit Locality Cache DISK A B C F G H L M N Global index on the disk Input data stream A G N Q 4
5 Locality based approaches (2) DDFS, Sparse Indexing, ChunkStash. Exploit locality of backup streams. It maximizes the RAM utilization and reduces frequent accesses to on-disk index by retaining access locality in the locality cache. Limitations. Work poorly when backup stream lacks locality. High RAM consumed. 5
6 Similarity-based Approaches (1) Backup File 3 A B C J extract the similarity characteristics of File 3 RAM F C Similarity Index Lookup C in the Similarity Index DISK File 1 A B C D File 2 E F G H Achieve a single on-disk index access for chunk lookup per file thus avoid global index on the disk. Deduplicate File 3 with File 1 6
7 Limitation of These Approaches (2) Exploit similarity of backup streams. Avoid global indexing and achieve a single disk read. Minimize the RAM overhead for indexing fingerprints. Limitation. Degradation of Deduplication efficiency. Theorem 1: Consider two files S1 and S2, Let min(h(s)) denote the similarity characteristic of file S. Then similarity degree between the two files is quantified by the probability that min(h(s1))= min(h(s2)), which is dependent on the percentage of data common to both files: Pr[min( H( S )) min( H( S ))] S1 S2 S S 1 2
8 Evaluation of Similarity Approach Similarity based Deduplication efficiency is dependent on the similarity degree of data stream 8
9 Observation The deduplication of small files and large files. Percentage of total file number Percentage of total space Small files ( 64KB) Large files ( 2 MB) 80% 20% 20% 80% Grouping many highly correlated small files into a segment to minimize dedupe overheads Dividing the large files into many small segments to expose more similarity characteristics 9
10 Intuition The combination of similarity and locality. (a) Similarity approach Existing data stream Similar Similar Input data stream Locality Enhancement 10 Potential duplicate
11 System Architecture Overview A disk-inline backup storage system. File Deamon is a deamon program providing a functional interface in users computers. Backup Server is the manager of the backup system that directs all File Agents and Storage Servers. File Deamon Backup Server Deduplication Server User Interface Job MetaData Cache HashTable Block Store Chunking File Agent Job Agent Deduplication Metadata Agent MDS Storage Server is the repository for backedup data. Network Storage Server Deduplication Server is to store and look up all fingerprints of files and chunks. Storage Agent Contain Store Storage Agent Contain Store Storage Agent Contain Store Disk Disk Disk 11
12 Deduplication Server RepChunk ID RAM Similarity Hash Table Locality Cache Block ID LHTable Chunk ID Block Write Buffer Block Read Cache Seg Key SHTable DISK Segment Block Block Block Block Block Block The similarity unit, (sequence of chunks) The locality unit, (sequence of segments) Deduplication Server. It is most likely the performance bottleneck. 12
13 The Similarity Algorithm Structuring data from backup streams into segments according to the following three principles. P1. Correlated small files in a backup stream are to be grouped into a segment. P2. A large file in a backup stream is divided into several independent segments. P3. All segments are of approximately the same size (e.g., 2MB). Block Block Metadata Block Block Metadata Segment1 Metadata Small File1 Small File2 Reduce RAM usage Segment1 Segment1 Small File3 Segment2 Segment3 Segment2 Segment3 Segment2 Metadata Part 1 of large file L1 Segment3 Metadata Eliminate more data Part 2 of large file L1 13
14 The Locality Algorithm The locality algorithm groups several contiguous segments into a block and preserves their locality-layout on the disk. It maximizes the RAM utilization and reduces frequent accesses to on-disk index by retaining access locality in the locality cache. By exploiting the inherent locality in backup streams, the block-based SiLo locality algorithm can eliminate more duplicate data. B1 S 11 S 12 S 13 S 14.. S 1k Segment Similar Block Similar Duplicate more data B2 S 21 S 22 S 23 S 24.. S 2k 14
15 SiLo Workflow The locality algorithm helps detect more potentially duplicate chunks that are missed by the similarity algorithm. (a) Input backup stream (big file) (big file) (Small files) (b) Segmenting large files and grouping small files (segment) (segment) (block) (c) Similarity detection Input segments similar similar Segments in cache or on disk (d) Locality-enhanced similartity detection by chunks filtering N N N N N (potentially duplicate) (potentially duplicate) (dup chunks) (new chunks) (dup chunks) 15
16 RAM Consideration RAM usage of SiLo: The locality cache? The similarity hash table? A small portion. The main portion. RAM usage analysis: SiLo requires only 30 MB for deduplicating 1TB unique data. Extreme Binning requires 300 MB for deduplicating 1TB unique data. (Avg. file size of 200KB). Sparse Indexing uses 170 MB of RAM space for a TB-scale deduplication system, whereas the Sparse Indexing paper estimates that DDFS would require 360 MB RAM to maintain a partial index depending on locality in backup streams. 16
17 Performance Evaluation Interplay of similarity and locality algorithms. Quantitative analysis of our similarity and locality algorithms. Comparison of state-of-the-art work. Locality approach: ChunkStash-HDD. Similarity approach: Extreme Binning. Four datasets. Feature One-set Inc-set Linux-set Full-set Small files Locality Weak Weak Strong Strong Similarity Weak Strong Strong Strong 17
18 Interplay of Similarity and Locality Locality unit Block Metadata Segment1 Block Metadata Segment1 Segment1 Metadata Small File1 Small File2 Small File3 Segment size Segment2 Segment2 Segment2 Metadata Part 1 of large file L1 Similarity unit Segment3 Segment3 Segment3 Metadata Part 2 of large file L1 Percentage of duplicate data eliminated and Time overhead of SiLo deduplication as a function of block size and segment size. The larger the block size is, the more locality can be retained. The smaller the segment size is, the more similarity can be exposed. Segment size 18
19 Locality Enhancement Evaluation Duplicate data missed by our SiLo approach. Duplicate data removed by similarity-only approach. Duplicate data removed by Locality-enhanced approach. The full Exploitation of locality jointly with similarity can remove almost all of the redundant data missed by the similarity detection. 19
20 Duplicate Elimination Locality approach: ChunkStash-HDD SiLo with segment size of 4MB The similarity approach: Extreme Binning SiLo achieves near-exact duplicate elimination under all workloads. 20
21 RAM Usage for Indexing Extreme Binning performs poorly on the Linux-set. SiLo consumes a RAM capacity that is only 1/41 1/60 and 1/3 1/90 respectively of that consumed by ChunkStash and Extreme Binning. 21
22 Deduplication Throughput Our evaluations on deduplication throughput suggest that SiLo outperforms ChunkStash by a factor of about 3 and Extreme Binning by a factor of about
23 Summary SiLo, a near-exact deduplication system. effectively and complementarily exploits similarity and locality achieve high duplicate elimination and throughput at extremely low RAM overheads. Combination of similarity and locality. SiLo proposes a new similarity algorithm that groups many small strongly correlated files into a segment and segments a large file to better expose and exploit their similarity characteristics. SiLo proposes an effective locality approach that captures more similar and duplicate data missed by the probabilistic similarity detection and also improve the deduplication throughput. Our experimental evaluation of SiLo. Quantitative analysis and demonstration of our similarity and locality algorithms. SiLo system consistently and significantly outperforms two existing state-of-the-art systems. 23
24 Questions? Acknowledgements 973 Program of China under Grant No. 2011CB302301, ( 863 Program) of China under Grant No.2009AA01A401 and 2009AA01A402, NSFC No , , , , Changjiang innovative group of Education of China No. IRT0725, Fundamental Research Funds for the central universities, HUST, under grant 2010MS043, The US NSF under Grants NSF-IIS , NSF-CCF and NSF-CNS
SiLo: A Similarity-Locality based Near-Exact Deduplication Scheme with Low RAM Overhead and High Throughput
SiLo: A Similarity-Locality based Near-Exact Deduplication Scheme with Low RAM Overhead and High Throughput Wen Xia Hong Jiang Dan Feng Yu Hua, wx.hust@gmail.com jiang@cse.unl.edu dfeng@hust.edu.cn csyhua@hust.edu.cn
More informationMAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services
MAD2: A Scalable High-Throughput Exact Deduplication Approach for Network Backup Services Jiansheng Wei, Hong Jiang, Ke Zhou, Dan Feng School of Computer, Huazhong University of Science and Technology,
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationDeploying De-Duplication on Ext4 File System
Deploying De-Duplication on Ext4 File System Usha A. Joglekar 1, Bhushan M. Jagtap 2, Koninika B. Patil 3, 1. Asst. Prof., 2, 3 Students Department of Computer Engineering Smt. Kashibai Navale College
More informationALG De-dupe for Cloud Backup Services of personal Storage Uma Maheswari.M, umajamu30@gmail.com DEPARTMENT OF ECE, IFET College of Engineering
ALG De-dupe for Cloud Backup Services of personal Storage Uma Maheswari.M, umajamu30@gmail.com DEPARTMENT OF ECE, IFET College of Engineering ABSTRACT Deduplication due to combination of resource intensive
More informationA Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India
More informationMetadata Feedback and Utilization for Data Deduplication Across WAN
Zhou B, Wen JT. Metadata feedback and utilization for data deduplication across WAN. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 31(3): 604 623 May 2016. DOI 10.1007/s11390-016-1650-6 Metadata Feedback
More informationIDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE
IDENTIFYING AND OPTIMIZING DATA DUPLICATION BY EFFICIENT MEMORY ALLOCATION IN REPOSITORY BY SINGLE INSTANCE STORAGE 1 M.PRADEEP RAJA, 2 R.C SANTHOSH KUMAR, 3 P.KIRUTHIGA, 4 V. LOGESHWARI 1,2,3 Student,
More informationTop Ten Questions. to Ask Your Primary Storage Provider About Their Data Efficiency. May 2014. Copyright 2014 Permabit Technology Corporation
Top Ten Questions to Ask Your Primary Storage Provider About Their Data Efficiency May 2014 Copyright 2014 Permabit Technology Corporation Introduction The value of data efficiency technologies, namely
More informationA Novel Deduplication Avoiding Chunk Index in RAM
A Novel Deduplication Avoiding Chunk Index in RAM 1 Zhike Zhang, 2 Zejun Jiang, 3 Xiaobin Cai, 4 Chengzhang Peng 1, First Author Northwestern Polytehnical University, 127 Youyixilu, Xi an, Shaanxi, P.R.
More informationSpeeding Up Cloud/Server Applications Using Flash Memory
Speeding Up Cloud/Server Applications Using Flash Memory Sudipta Sengupta Microsoft Research, Redmond, WA, USA Contains work that is joint with B. Debnath (Univ. of Minnesota) and J. Li (Microsoft Research,
More informationData Backup and Archiving with Enterprise Storage Systems
Data Backup and Archiving with Enterprise Storage Systems Slavjan Ivanov 1, Igor Mishkovski 1 1 Faculty of Computer Science and Engineering Ss. Cyril and Methodius University Skopje, Macedonia slavjan_ivanov@yahoo.com,
More informationTradeoffs in Scalable Data Routing for Deduplication Clusters
Tradeoffs in Scalable Data Routing for Deduplication Clusters Wei Dong Princeton University Fred Douglis EMC Kai Li Princeton University and EMC Hugo Patterson EMC Sazzala Reddy EMC Philip Shilane EMC
More informationFAST 11. Yongseok Oh <ysoh@uos.ac.kr> University of Seoul. Mobile Embedded System Laboratory
CAFTL: A Content-Aware Flash Translation Layer Enhancing the Lifespan of flash Memory based Solid State Drives FAST 11 Yongseok Oh University of Seoul Mobile Embedded System Laboratory
More informationEdelta: A Word-Enlarging Based Fast Delta Compression Approach
: A Word-Enlarging Based Fast Delta Compression Approach Wen Xia, Chunguang Li, Hong Jiang, Dan Feng, Yu Hua, Leihua Qin, Yucheng Zhang School of Computer, Huazhong University of Science and Technology,
More informationInline Deduplication
Inline Deduplication binarywarriors5@gmail.com 1.1 Inline Vs Post-process Deduplication In target based deduplication, the deduplication engine can either process data for duplicates in real time (i.e.
More informationRead Performance Enhancement In Data Deduplication For Secondary Storage
Read Performance Enhancement In Data Deduplication For Secondary Storage A THESIS SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Pradeep Ganesan IN PARTIAL FULFILLMENT
More informationSecurity Ensured Redundant Data Management under Cloud Environment
Security Ensured Redundant Data Management under Cloud Environment K. Malathi 1 M. Saratha 2 1 PG Scholar, Dept. of CSE, Vivekanandha College of Technology for Women, Namakkal. 2 Assistant Professor, Dept.
More informationidedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti
idedup Latency-aware inline deduplication for primary workloads Kiran Srinivasan, Tim Bisson Garth Goodson, Kaladhar Voruganti Advanced Technology Group NetApp 1 idedup overview/context Storage Clients
More informationIMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS
IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS Nehal Markandeya 1, Sandip Khillare 2, Rekha Bagate 3, Sayali Badave 4 Vaishali Barkade 5 12 3 4 5 (Department
More informationData Deduplication for Corporate Endpoints
Data Deduplication for Corporate Endpoints This whitepaper explains deduplication techniques and describes how Druva's industry-leading technology saves storage and bandwidth by up to 90% Table of Contents
More informationA Fast Dual-level Fingerprinting Scheme for Data Deduplication
A Fast Dual-level Fingerprinting Scheme for Data Deduplication 1 Jiansheng Wei, *1 Ke Zhou, 1,2 Lei Tian, 1 Hua Wang, 1 Dan Feng *1,Corresponding Author Wuhan National Laboratory for Optoelectronics, School
More informationBuilding a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos
Building a High Performance Deduplication System Fanglu Guo and Petros Efstathopoulos Symantec Research Labs Symantec FY 2013 (4/1/2012 to 3/31/2013) Revenue: $ 6.9 billion Segment Revenue Example Business
More informationE-Guide. Sponsored By:
E-Guide An in-depth look at data deduplication methods This E-Guide will discuss the various approaches to data deduplication. You ll learn the pros and cons of each, and will benefit from independent
More informationAvoiding the Disk Bottleneck in the Data Domain Deduplication File System
Avoiding the Disk Bottleneck in the Data Domain Deduplication File System Benjamin Zhu Data Domain, Inc. Kai Li Data Domain, Inc. and Princeton University Hugo Patterson Data Domain, Inc. Abstract Disk-based
More information3Gen Data Deduplication Technical
3Gen Data Deduplication Technical Discussion NOTICE: This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice and
More informationAn Application-Aware Approach to Systems Support for Big Data
An Application-Aware Approach to Systems Support for Big Data Hong Jiang National Science Foundation & Department of Computer Science & Engineering University of Nebraska Lincoln ASAP 2013, June 5, 2013
More informationChunkStash: Speeding up Inline Storage Deduplication using Flash Memory
ChunkStash: Speeding up Inline Storage Deduplication using Flash Memory Biplob Debnath Sudipta Sengupta Jin Li Microsoft Research, Redmond, WA, USA University of Minnesota, Twin Cities, USA Abstract Storage
More informationINTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE CLOUD STORAGE BACKUP
INTENSIVE FIXED CHUNKING (IFC) DE-DUPLICATION FOR SPACE OPTIMIZATION IN PRIVATE CLOUD STORAGE BACKUP 1 M.SHYAMALA DEVI, 2 V.VIMAL KHANNA, 3 M.SHAHEEN SHAH 1 Assistant Professor, Department of CSE, R.M.D.
More informationDEDUPLICATION has become a key component in modern
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 27, NO. 3, MARCH 2016 855 Reducing Fragmentation for In-line Deduplication Backup Storage via Exploiting Backup History and Cache Knowledge Min
More informationLow-Cost Data Deduplication for Virtual Machine Backup in Cloud Storage
Low-Cost Data Deduplication for Virtual Machine Backup in Cloud Storage Wei Zhang, Tao Yang, Gautham Narayanasamy, and Hong Tang University of California at Santa Barbara, Alibaba Inc. Abstract In a virtualized
More informationCURRENTLY, the enterprise data centers manage PB or
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 61, NO. 11, JANUARY 21 1 : Distributed Deduplication for Big Storage in the Cloud Shengmei Luo, Guangyan Zhang, Chengwen Wu, Samee U. Khan, Senior Member, IEEE,
More informationWAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression
WAN Optimized Replication of Backup Datasets Using Stream-Informed Delta Compression Philip Shilane, Mark Huang, Grant Wallace, and Windsor Hsu Backup Recovery Systems Division EMC Corporation Abstract
More informationMulti-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
More informationsulbhaghadling@gmail.com
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10715-10720 Data DeDuplication Using Optimized Fingerprint Lookup Method for
More informationPrimary Data Deduplication Large Scale Study and System Design
Primary Data Deduplication Large Scale Study and System Design Ahmed El-Shimi Ran Kalach Ankit Kumar Adi Oltean Jin Li Sudipta Sengupta Microsoft Corporation, Redmond, WA, USA Abstract We present a large
More informationAssuring Demanded Read Performance of Data Deduplication Storage with Backup Datasets
Assuring Demanded Read Performance of Data Deduplication Storage with Backup Datasets Young Jin Nam School of Computer and Information Technology Daegu University Gyeongsan, Gyeongbuk, KOREA 7-7 Email:
More informationEstimating Deduplication Ratios in Large Data Sets
IBM Research labs - Haifa Estimating Deduplication Ratios in Large Data Sets Danny Harnik, Oded Margalit, Dalit Naor, Dmitry Sotnikov Gil Vernik Estimating dedupe and compression ratios some motivation
More informationCloud De-duplication Cost Model THESIS
Cloud De-duplication Cost Model THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of The Ohio State University By Christopher Scott Hocker
More informationThe assignment of chunk size according to the target data characteristics in deduplication backup system
The assignment of chunk size according to the target data characteristics in deduplication backup system Mikito Ogata Norihisa Komoda Hitachi Information and Telecommunication Engineering, Ltd. 781 Sakai,
More informationA SCALABLE DEDUPLICATION AND GARBAGE COLLECTION ENGINE FOR INCREMENTAL BACKUP
A SCALABLE DEDUPLICATION AND GARBAGE COLLECTION ENGINE FOR INCREMENTAL BACKUP Dilip N Simha (Stony Brook University, NY & ITRI, Taiwan) Maohua Lu (IBM Almaden Research Labs, CA) Tzi-cker Chiueh (Stony
More informationLeverage Similarity and Locality to Enhance Fingerprint Prefetching of Data Deduplication
Leverage Similarity and Locality to Enhance Fingerprint Prefetching of Data Deduplication Yongtao Zhou, Yuhui Deng, Junjie Xie Department of Computer Science, Jinan University, Guangzhou, P.R.China 1632
More informationImproving Backup and Restore Performance for Deduplication-based Cloud Backup Services
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Dissertations, and Student Research Computer Science and Engineering, Department
More informationTheoretical Aspects of Storage Systems Autumn 2009
Theoretical Aspects of Storage Systems Autumn 2009 Chapter 3: Data Deduplication André Brinkmann News Outline Data Deduplication Compare-by-hash strategies Delta-encoding based strategies Measurements
More informationHardware Configuration Guide
Hardware Configuration Guide Contents Contents... 1 Annotation... 1 Factors to consider... 2 Machine Count... 2 Data Size... 2 Data Size Total... 2 Daily Backup Data Size... 2 Unique Data Percentage...
More informationA Deduplication-based Data Archiving System
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System
More informationData De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication
Data De-duplication Methodologies: Comparing ExaGrid s Byte-level Data De-duplication To Block Level Data De-duplication Table of Contents Introduction... 3 Shortest Possible Backup Window... 3 Instant
More informationProbabilistic Deduplication for Cluster-Based Storage Systems
Probabilistic Deduplication for Cluster-Based Storage Systems Davide Frey, Anne-Marie Kermarrec, Konstantinos Kloudas INRIA Rennes, France Motivation Volume of data stored increases exponentially. Provided
More informationMETHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review
METHODOLOGY FOR OPTIMIZING STORAGE ON CLOUD USING AUTHORIZED DE-DUPLICATION A Review 1 Ruchi Agrawal, 2 Prof.D.R. Naidu 1 M.Tech Student, CSE Department, Shri Ramdeobaba College of Engineering and Management,
More informationSTORAGE. Buying Guide: TARGET DATA DEDUPLICATION BACKUP SYSTEMS. inside
Managing the information that drives the enterprise STORAGE Buying Guide: DEDUPLICATION inside What you need to know about target data deduplication Special factors to consider One key difference among
More informationOnline De-duplication in a Log-Structured File System for Primary Storage
Online De-duplication in a Log-Structured File System for Primary Storage Technical Report UCSC-SSRC-11-03 May 2011 Stephanie N. Jones snjones@cs.ucsc.edu Storage Systems Research Center Baskin School
More informationAA-Dedupe: An Application-Aware Source Deduplication Approach for Cloud Backup Services in the Personal Computing Environment
!000111111 IIIEEEEEEEEE IIInnnttteeerrrnnnaaatttiiiooonnnaaalll CCCooonnnfffeeerrreeennnccceee ooonnn CCCllluuusssttteeerrr CCCooommmpppuuutttiiinnnggg AA-Dedupe: An Application-Aware Source Deduplication
More informationABSTRACT 1 INTRODUCTION
DEDUPLICATION IN YAFFS Karthik Narayan {knarayan@cs.wisc.edu}, Pavithra Seshadri Vijayakrishnan{pavithra@cs.wisc.edu} Department of Computer Sciences, University of Wisconsin Madison ABSTRACT NAND flash
More informationWHITE PAPER. DATA DEDUPLICATION BACKGROUND: A Technical White Paper
WHITE PAPER DATA DEDUPLICATION BACKGROUND: A Technical White Paper CONTENTS Data Deduplication Multiple Data Sets from a Common Storage Pool.......................3 Fixed-Length Blocks vs. Variable-Length
More informationData Deduplication Background: A Technical White Paper
Data Deduplication Background: A Technical White Paper NOTICE This White Paper may contain proprietary information protected by copyright. Information in this White Paper is subject to change without notice
More informationDEXT3: Block Level Inline Deduplication for EXT3 File System
DEXT3: Block Level Inline Deduplication for EXT3 File System Amar More M.A.E. Alandi, Pune, India ahmore@comp.maepune.ac.in Zishan Shaikh M.A.E. Alandi, Pune, India zishan366shaikh@gmail.com Vishal Salve
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features to reduce the complexity of managing data protection
More informationSparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality
Sparse Indexing: Large Scale, Inline Deduplication Using Sampling and Locality Mark Lillibridge, Kave Eshghi, Deepavali Bhagwat, Vinay Deolalikar, Greg Trezise, and Peter Camble HP Labs UC Santa Cruz HP
More informationA Survey on Deduplication Strategies and Storage Systems
A Survey on Deduplication Strategies and Storage Systems Guljar Shaikh ((Information Technology,B.V.C.O.E.P/ B.V.C.O.E.P, INDIA) Abstract : Now a day there is raising demands for systems which provide
More informationDesign and Implementation of a Storage Repository Using Commonality Factoring. IEEE/NASA MSST2003 April 7-10, 2003 Eric W. Olsen
Design and Implementation of a Storage Repository Using Commonality Factoring IEEE/NASA MSST2003 April 7-10, 2003 Eric W. Olsen Axion Overview Potentially infinite historic versioning for rollback and
More informationA Deduplication File System & Course Review
A Deduplication File System & Course Review Kai Li 12/13/12 Topics A Deduplication File System Review 12/13/12 2 Traditional Data Center Storage Hierarchy Clients Network Server SAN Storage Remote mirror
More informationTrends in Enterprise Backup Deduplication
Trends in Enterprise Backup Deduplication Shankar Balasubramanian Architect, EMC 1 Outline Protection Storage Deduplication Basics CPU-centric Deduplication: SISL (Stream-Informed Segment Layout) Data
More informationQuanqing XU Quanqing.Xu@nicta.com.au. YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud
Quanqing XU Quanqing.Xu@nicta.com.au YuruBackup: A Highly Scalable and Space-Efficient Incremental Backup System in the Cloud Outline Motivation YuruBackup s Architecture Backup Client File Scan, Data
More informationVM-Centric Snapshot Deduplication for Cloud Data Backup
-Centric Snapshot Deduplication for Cloud Data Backup Wei Zhang, Daniel Agun, Tao Yang, Rich Wolski, Hong Tang University of California at Santa Barbara Pure Storage Inc. Alibaba Inc. Email: wei@purestorage.com,
More informationTwo-Level Metadata Management for Data Deduplication System
Two-Level Metadata Management for Data Deduplication System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3.,Young Woong Ko 1 1 Dept. of Computer Engineering, Hallym University Chuncheon, Korea { kongjs,
More informationDirect NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle
Direct NFS - Design considerations for next-gen NAS appliances optimized for database workloads Akshay Shah Gurmeet Goindi Oracle Agenda Introduction Database Architecture Direct NFS Client NFS Server
More informationA Efficient Hybrid Inline and Out-of-line Deduplication for Backup Storage
A Efficient Hybrid Inline and Out-of-line Deduplication for Backup Storage YAN-KIT Li, MIN XU, CHUN-HO NG, and PATRICK P. C. LEE The Chinese University of Hong Kong Backup storage systems often remove
More informationA SURVEY ON DEDUPLICATION METHODS
A SURVEY ON DEDUPLICATION METHODS A.FARITHA BANU *1, C. CHANDRASEKAR #2 *1 Research Scholar in Computer Science #2 Assistant professor, Dept. of Computer Applications Sree Narayana Guru College Coimbatore
More informationCharacteristics of Backup Workloads in Production Systems
Characteristics of Backup Workloads in Production Systems Grant Wallace Fred Douglis Hangwei Qian Philip Shilane Stephen Smaldone Mark Chamness Windsor Hsu Backup Recovery Systems Division EMC Corporation
More informationApplication-Aware Client-Side Data Reduction and Encryption of Personal Data in Cloud Backup Services
Fu YJ, Xiao N, Liao XK et al. Application-aware client-side data reduction and encryption of personal data in cloud backup services. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 28(6): 1012 1024 Nov. 2013.
More informationByte-index Chunking Algorithm for Data Deduplication System
, pp.415-424 http://dx.doi.org/10.14257/ijsia.2013.7.5.38 Byte-index Chunking Algorithm for Data Deduplication System Ider Lkhagvasuren 1, Jung Min So 1, Jeong Gun Lee 1, Chuck Yoo 2 and Young Woong Ko
More information0 %1 10 & ( )! 2/(( 3 & (! 4! 5.000! 6& /6&7.189 2 ( 2 &7
!!! #! %& ( ) +,. /.000. 1+,, 1 1+, 0 %1 10 & ( ).000. 1+,, 1 1+, 0 %1 10 & ( )! 2/(( 3 & (! 4! 5.000! 6& /6&7.189 2 ( 2 &7 4 ( (( 1 10 & ( : Dynamic Data Deduplication in Cloud Storage Waraporn Leesakul,
More informationA Method of Deduplication for Data Remote Backup
A Method of Deduplication for Data Remote Backup Jingyu Liu 1,2, Yu-an Tan 1, Yuanzhang Li 1, Xuelan Zhang 1, Zexiang Zhou 3 1 School of Computer Science and Technology, Beijing Institute of Technology,
More informationData Deduplication and Tivoli Storage Manager
Data Deduplication and Tivoli Storage Manager Dave Cannon Tivoli Storage Manager rchitect Oxford University TSM Symposium September 2007 Disclaimer This presentation describes potential future enhancements
More informationHP StoreOnce D2D. Understanding the challenges associated with NetApp s deduplication. Business white paper
HP StoreOnce D2D Understanding the challenges associated with NetApp s deduplication Business white paper Table of contents Challenge #1: Primary deduplication: Understanding the tradeoffs...4 Not all
More informationData Deduplication and Corporate PC Backup
A Druva White Paper Data Deduplication and Corporate PC Backup This Whitepaper explains source based deduplication technology and how it is used by Druva s insync product to save storage bandwidth and
More informationA Data De-duplication Access Framework for Solid State Drives
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 941-954 (2012) A Data De-duplication Access Framework for Solid State Drives Department of Electronic Engineering National Taiwan University of Science
More informationReducing Replication Bandwidth for Distributed Document Databases
Reducing Replication Bandwidth for Distributed Document Databases Lianghong Xu, Andrew Pavlo, Sudipta Sengupta Jin Li, Gregory R. Ganger Carnegie Mellon University, Microsoft Research CMU-PDL-14-108 December
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
More informationTurnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
More informationWHITE PAPER. QUANTUM S TIERED ARCHITECTURE And Approach to Data Protection
WHITE PAPER QUANTUM S TIERED ARCHITECTURE And Approach to Data Protection CONTENTS The Need to Keep More Data, Longer....................................................3 Quantum s Tiered Architecture..........................................................3
More informationEfficiently Storing Virtual Machine Backups
Efficiently Storing Virtual Machine Backups Stephen Smaldone, Grant Wallace, and Windsor Hsu Backup Recovery Systems Division EMC Corporation Abstract Physical level backups offer increased performance
More informationLessons Learned while Pushing the Limits of SecureFile LOBs. by Jacco H. Landlust. zondag 3 maart 13
Lessons Learned while Pushing the Limits of SecureFile LOBs @ by Jacco H. Landlust Jacco H. Landlust 36 years old Deventer, the Netherlands 2 Jacco H. Landlust / idba Degree in Business Informatics and
More informationCharacteristics of Backup Workloads in Production Systems
Characteristics of Backup Workloads in Production Systems Grant Wallace Fred Douglis Hangwei Qian Philip Shilane Stephen Smaldone Mark Chamness Windsor Hsu Backup Recovery Systems Division EMC Corporation
More informationHow To Make A Backup Service More Efficient
AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/anas Deduplication In Cloud Backup Services Using Geneic Algorithm For Personal
More information09'Linux Plumbers Conference
09'Linux Plumbers Conference Data de duplication Mingming Cao IBM Linux Technology Center cmm@us.ibm.com 2009 09 25 Current storage challenges Our world is facing data explosion. Data is growing in a amazing
More informationDeduplication Demystified: How to determine the right approach for your business
Deduplication Demystified: How to determine the right approach for your business Presented by Charles Keiper Senior Product Manager, Data Protection Quest Software Session Objective: To answer burning
More informationSTORAGE SOURCE DATA DEDUPLICATION PRODUCTS. Buying Guide: inside
Managing the information that drives the enterprise STORAGE Buying Guide: inside 2 Key features of source data deduplication products 5 Special considerations Source dedupe products can efficiently protect
More informationData Deduplication HTBackup
Data Deduplication HTBackup HTBackup and it s Deduplication technology is touted as one of the best ways to manage today's explosive data growth. If you're new to the technology, these key facts will help
More informationPLC-Cache: Endurable SSD Cache for Deduplication-based Primary Storage
PLC-Cache: Endurable SSD Cache for Deduplication-based Primary Storage Jian Liu, Yunpeng Chai, Yuan Xiao Renmin University of China Xiao Qin Auburn University Speaker: Tao Xie MSST, June 5, 2014 Deduplication
More informationBALANCING FOR DISTRIBUTED BACKUP
CONTENT-AWARE LOAD BALANCING FOR DISTRIBUTED BACKUP Fred Douglis 1, Deepti Bhardwaj 1, Hangwei Qian 2, and Philip Shilane 1 1 EMC 2 Case Western Reserve University 1 Starting Point Deduplicating disk-based
More informationSymantec NetBackup PureDisk Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines
Optimizing Backups with Deduplication for Remote Offices, Data Center and Virtual Machines Mayur Dewaikar Sr. Product Manager Information Management Group White Paper: Symantec NetBackup PureDisk Symantec
More informationDe-duplication-based Archival Storage System
De-duplication-based Archival Storage System Than Than Sint Abstract This paper presents the disk-based backup system in which only relational database files are stored by using data deduplication technology.
More informationWorkload Characterization and Analysis of Storage and Bandwidth Needs of LEAD Workspace
Workload Characterization and Analysis of Storage and Bandwidth Needs of LEAD Workspace Beth Plale Indiana University plale@cs.indiana.edu LEAD TR 001, V3.0 V3.0 dated January 24, 2007 V2.0 dated August
More informationSnapshots in Hadoop Distributed File System
Snapshots in Hadoop Distributed File System Sameer Agarwal UC Berkeley Dhruba Borthakur Facebook Inc. Ion Stoica UC Berkeley Abstract The ability to take snapshots is an essential functionality of any
More informationReducing Replication Bandwidth for Distributed Document Databases
Reducing Replication Bandwidth for Distributed Document Databases Lianghong Xu 1, Andy Pavlo 1, Sudipta Sengupta 2 Jin Li 2, Greg Ganger 1 Carnegie Mellon University 1, Microsoft Research 2 #1 You can
More informationDynamic Disk Pools Technical Report
Dynamic Disk Pools Technical Report A Dell Technical White Paper Dell PowerVault MD3 Dense Series of Storage Arrays 9/5/2012 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL
More informationData Deduplication in a Hybrid Architecture for Improving Write Performance
Data Deduplication in a Hybrid Architecture for Improving Write Performance Data-intensive Salable Computing Laboratory Department of Computer Science Texas Tech University Lubbock, Texas June 10th, 2013
More informationData Deduplication. Hao Wen
Data Deduplication Hao Wen What Data Deduplication is What Data Deduplication is Dedup vs Compression Compression: identifying redundancy within a file. High processor overhead. Low memory resource requirement.
More information