Browse > Article
http://dx.doi.org/10.7236/JASC2012.1.1.6

File Modification Pattern Detection Mechanism Using File Similarity Information  

Jung, Ho-Min (Dept. of Computer Engineering, Hallym University)
Ko, Yong-Woong (Dept. of Computer Engineering, Hallym University)
Publication Information
International journal of advanced smart convergence / v.1, no.1, 2012 , pp. 34-37 More about this Journal
Abstract
In a storage system, the performance of data deduplication can be increased if we consider the file modification pattern. For example, if a file is modified at the end of file region then fixed-length chunking algorithm superior to variable-length chunking. Therefore, it is important to predict in which location of a file is modified between files. In this paper, the essential idea is to exploit an efficient file pattern checking scheme that can be used for data deduplication system. The file modification pattern can be used for elaborating data deduplication system for selecting deduplication algorithm. Experiment result shows that the proposed system can predict file modification region with high probability.
Keywords
Deduplication; File modification; File pattern; Fixed-length Chunking; Variable-length Chunking;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Quinlan, S. and Dorward, S, "Venti: a new approach to archival storage," in Proc 1st USENIX conference on File and storage technologies, pp. 7-7. ,2002.
2 Eshghi, K. and Tang, H.K., "A framework for analyzing and improving content-based chunking algorithms," Hewlett-Packard Labs Technical Report TR, vol. 30, ,2005.
3 Muthitacharoen, A., Chen, B. and Mazieres, D, "A low-bandwidth network file system," ACM SIGOPS Operating Systems Review 35, pp. 174-187, 2001.   DOI
4 Douglis, F. and Iyengar, A, "Application-specific delta-encoding via resemblance detection," In Proceedings of the USENIX Annual Technical Conference, pp. 1-23. 2003.
5 Ho Min Jung, Sang Yong Park, Jeong Gun Lee and Young Woong Ko, "Efficient Data Deduplication System Considering File Modification Pattern,",International Journal of Security and Its Applications, APR. 2012.