1 / 14
文档名称:

重复数据删除技术.pdf

格式:pdf   页数:14
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

分享

预览

重复数据删除技术.pdf

上传人:陈晓翠 2011/10/3 文件大小:0 KB

下载得到文件列表

重复数据删除技术.pdf

文档介绍

文档介绍:ISSN 1000-9825, CODEN RUXUEW E-mail: ******@iscas.
Journal of Software, , , May 2010, −929
doi: . Tel/Fax: +86-10-62562563
© by Institute of Software, the Chinese Academy of Sciences. All rights reserved.


重复数据删除技术
敖莉 1, 舒继武 1,2+, 李明强 1
1(清华大学计算机科学与技术系,北京 100084)
2(清华大学信息科学与技术国家实验室(筹),北京 100084)
Data Deduplication Techniques
AO Li1, SHU Ji-Wu1,2+, LI Ming-Qiang1
1(Department puter Science and Technology, Tsinghua University, Beijing 100084, China)
2(National Laboratory for Information Science and Technology (TNList), Tsinghua University, Beijing 100084, China)
+ Corresponding author: E-mail: ******@tsinghua.
Ao L, Shu JW, Li MQ. Data deduplication techniques. Journal of Software, 2010,21(5):916−929.
/1000-9825/
Abstract: Data deduplication technologies can be divided into two categories: a) identical data detection
techniques, and b) similar data detection and encoding techniques. This paper presents a systematic survey on these
two categories of data deduplication technologies and analyzes their advantages and disadvantages. Besides, since
data deduplication technologies can affect the reliability and performance of storage systems, this paper also
surveys various kinds of technologies proposed to cope with these two aspects of problems. Based on the analysis of
the current state of research on data deduplication technologies, this paper makes several conclusions as follows:
a) How to mine data characteristic information in data deduplication has not pletely solved, and how to
use data characteristic information to effectively eliminate duplicate data also needs further study; b) From the
perspective of storage system design, it still needs further study how to introduce proper mechanisms to e
the reliability limitations of data deduplication techniques and reduce the additional system overheads caused by
data deduplication techniques.
Key words: network storage