A method of deduplication for data remote backup

Jingyu Liu*, Yu An Tan, Yuanzhang Li, Xuelan Zhang, Zexiang Zhou

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

The paper describes the Remote Data Disaster Recovery System using Hash to identify and avoid sending duplicate data blocks between the Primary Node and the Secondary Node, thereby, to reduce the data replication network bandwidth, decrease overhead and improve network efficiency. On both nodes, some extra storage spaces (the Hash Repositories) besides data disks are used to record the Hash for each data block on data disks. We extend the data replication protocol between the Primary Node and the Secondary Node. When the data, whose Hash exists in the Hash Repository, is duplication, the block address is transferred instead of the data, and that reduces network bandwidth requirement, saves synchronization time, and improves network efficiency.

Original languageEnglish
Title of host publicationComputer and Computing Technologies in Agriculture IV - 4th IFIP TC 12 Conference, CCTA 2010, Selected Papers
Pages68-75
Number of pages8
EditionPART 1
DOIs
Publication statusPublished - 2011
Event4th IFIP International Conference on Computer and Computing Technologies in Agriculture and the 4th Symposium on Development of Rural Information, CCTA 2010 - Nanchang, China
Duration: 22 Oct 201025 Oct 2010

Publication series

NameIFIP Advances in Information and Communication Technology
NumberPART 1
Volume344 AICT
ISSN (Print)1868-4238

Conference

Conference4th IFIP International Conference on Computer and Computing Technologies in Agriculture and the 4th Symposium on Development of Rural Information, CCTA 2010
Country/TerritoryChina
CityNanchang
Period22/10/1025/10/10

Keywords

  • Deduplication
  • Disaster Recovery
  • Duplicate Data
  • Hash

Fingerprint

Dive into the research topics of 'A method of deduplication for data remote backup'. Together they form a unique fingerprint.

Cite this