Data Deduplication for Data Optimization for Storage and Network Systems

  • Daehee Kim
  • Sejun Song
  • Baek-Young Choi

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Traditional Deduplication Techniques and Solutions

    1. Front Matter
      Pages 1-1
    2. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 3-21
    3. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 23-76
  3. Storage Data Deduplication

    1. Front Matter
      Pages 77-77
    2. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 79-96
    3. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 97-115
  4. Network Deduplication

    1. Front Matter
      Pages 117-117
    2. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 119-152
  5. Future Directions

    1. Front Matter
      Pages 153-153
    2. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 155-164
    3. Daehee Kim, Sejun Song, Baek-Young Choi
      Pages 165-165
  6. Daehee Kim, Sejun Song, Baek-Young Choi
    Pages E1-E1
  7. Back Matter
    Pages 167-262

About this book

Introduction

This book introduces fundamentals and trade-offs of data de-duplication techniques. It describes novel emerging de-duplication techniques that remove duplicate data both in storage and network in an efficient and effective manner. It explains places where duplicate data are originated, and provides solutions that remove the duplicate data. It classifies existing de-duplication techniques depending on size of unit data to be compared, the place of de-duplication, and the time of de-duplication. Chapter 3 considers redundancies in email servers and a de-duplication technique to increase reduction performance with low overhead by switching chunk-based de-duplication and file-based de-duplication. Chapter 4 develops a de-duplication technique applied for cloud-storage service where unit data to be compared are not physical-format but logical structured-format, reducing processing time efficiently. Chapter 5 displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small-sized payload) and decoded (restored to original size payload) in routers or switches on the way to remote servers through network. Chapter 6 introduces a mobile de-duplication technique with image (JPEG) or video (MPEG) considering performance and overhead of encryption algorithm for security on mobile device.

Keywords

Data deduplication techniques De-duplication Deduplication and cloud-based storage Deduplication and data storage Deduplication and network speed Deduplication and network storage Duplicate data Network and storage services

Authors and affiliations

  • Daehee Kim
    • 1
  • Sejun Song
    • 2
  • Baek-Young Choi
    • 3
  1. 1.Department of Computing and New Media TechnologiesUniversity of Wisconsin-Stevens PointStevens PointUSA
  2. 2.Department of Computer Science and Electrical EngineeringUniversity of Missouri-Kansas CityKansas CityUSA
  3. 3.Department of Computer Science and Electrical EngineeringUniversity of Missouri-Kansas CityKansas CityUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-42280-0
  • Copyright Information Springer International Publishing Switzerland 2017
  • Publisher Name Springer, Cham
  • eBook Packages Engineering
  • Print ISBN 978-3-319-42278-7
  • Online ISBN 978-3-319-42280-0
  • About this book
Industry Sectors
Pharma
Automotive
Biotechnology
Electronics
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences