ABSTRACT
An increased use of mobile devices such as smart phones, PDAs and tablet computers with capabilities of storing and processing is rapidly growing. It allows users to carry an increasing volume of data, the value of this information must be protected from loss, theft or any kind of accident which may occur with the devices, making the backup process a key factor.
In mobile devices the data transmission has a high cost, in price and energy, and this devices depend on batteries, optimizing the bandwidth use is crucial. Deduplication allows substantial reductions in the data volume to be transmitted over network on backup sessions, by identifying common chunks of data, transferring and storing them only once.
On the other hand, usually mobile devices communications use mobile networks, and cloud storage is a viable solution for data backup.
Consequently it is essential the use of cryptographic processes to protect data, during the transmission but also in storage.
This paper proposes a model and a process for measuring the best performance of a safe and energy efficient backup system.
- J. F. Gantz et al., ≪The diverse and exploding digital universe: An updated forecast of worldwide information growth through 2011≫, IDC white paper, 2008.Google Scholar
- X. Nie, L. Qin, J. Zhou, K. Liu, J. Zhu, e Y. Wang, ≪Optimization for data de-duplication algorithm based on file content≫, Frontiers of Optoelectronics in China, p. 1--9, 2010.Google Scholar
- Y. Won, R. Kim, J. Ban, J. Hur, S. Oh, e J. Lee, ≪PRUN: Eliminating Information Redundancy for Large Scale Data Backup System≫, Computational Science and its Applications, International Conference, pp. 139--144, 2008. Google ScholarDigital Library
- M. W. Storer, K. Greenan, D. D. E. Long, e E. L. Miller, ≪Secure data deduplication≫, in Proceedings of the 4th ACM international workshop on Storage security and survivability, New York, NY, USA, 2008, p. 1--10. Google ScholarDigital Library
- Q. He, Z. Li, e X. Zhang, ≪Data deduplication techniques≫, in Future Information Technology and Management Engineering (FITME), 2010 International Conference on, 2010, vol. 1, p. 430--433.Google Scholar
- C. Liu, Y. Lu, C. Shi, G. Lu, D. H. C. Du, e D.-S. Wang, ≪ADMAD: Application-Driven Metadata Aware De-duplication Archival Storage System≫, Storage Network Architecture and Parallel I/Os, IEEE International Workshop on, vol. 0, pp. 29--35, 2008. Google ScholarDigital Library
- B. Zhu, K. Li, e H. Patterson, ≪Avoiding the disk bottleneck in the data domain deduplication file system≫, in Proceedings of the 6th USENIX Conference on File and Storage Technologies, Berkeley, CA, USA, 2008, p. 18:1--18:14. Google ScholarDigital Library
- N. Park e D. J. Lilja, ≪Characterizing datasets for data deduplication in backup applications≫, in Workload Characterization (IISWC), 2010 IEEE International Symposium on, 2010, p. 1--10. Google ScholarDigital Library
- D. Meister e A. Brinkmann, ≪Multi-level comparison of data deduplication in a backup scenario≫, in Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference, New York, NY, USA, 2009, p. 8:1--8:12. Google ScholarDigital Library
- S. Quinlan e S. Dorward, ≪Venti: a new approach to archival storage≫, in Proceedings of the Conference on File and Storage Technologies, 2002, p. 89--101. Google ScholarDigital Library
- P. Kulkarni, F. Douglis, J. LaVoie, e J. M. Tracey, ≪Redundancy elimination within large collections of files≫, in Proceedings of the annual conference on USENIX Annual Technical Conference, Berkeley, CA, USA, 2004, p. 5--5. Google ScholarDigital Library
- N. Mandagere, P. Zhou, M. A. Smith, e S. Uttamchandani, ≪Demystifying data deduplication≫, in Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion, New York, NY, USA, 2008, p. 12--17. Google ScholarDigital Library
- J. Min, D. Yoon, e Y. Won, ≪Efficient Deduplication Techniques for Modern Backup Operation≫, IEEE Transactions on Computers, vol. 60, pp. 824--840, 2011. Google ScholarDigital Library
- M. O. Rabin, Fingerprinting by random polynomials. Center for Research in Computing Techn., Aiken Computation Laboratory, Univ., 1981.Google Scholar
- Y. Tan, D. Feng, Z. Yan, e G. Zhou, ≪DAM: A DataOwnership-Aware Multi-layered De-duplication Scheme≫, Networking, Architecture, and Storage, International Conference on, vol. 0, pp. 403--411, 2010. Google ScholarDigital Library
- J. Wei, H. Jiang, K. Zhou, e D. Feng, ≪MAD2: A scalable high-throughput exact deduplication approach for network backup services≫, in Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on, 2010, p. 1--14. Google ScholarDigital Library
- P. Anderson e L. Zhang, ≪Fast and secure laptop backups with encrypted de-duplication≫, in Proceedings of the 24th international conference on Large installation system administration, 2010, p. 1--8. Google ScholarDigital Library
- C. Wang, Z. Qin, J. Peng, e J. Wang, ≪A novel encryption scheme for data deduplication system≫, in Communications, Circuits and Systems (ICCCAS), 2010 International Conference on, p. 265--269.Google Scholar
- N. Balasubramanian, A. Balasubramanian, e A. Venkataramani, ≪Energy consumption in mobile phones: a measurement study and implications for network applications≫, in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, 2009, p. 280--293. Google ScholarDigital Library
- A. Rahmati e L. Zhong, ≪Context-for-wireless: context-sensitive energy-efficient wireless data transfer≫, in Proceedings of the 5th international conference on Mobile systems, applications and services, 2007, p. 165--178. Google ScholarDigital Library
Index Terms
- Secure deduplication on mobile devices
Recommendations
Analysis of Energy Consumption of Deduplication in Storage Systems
CYBERC '15: Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge DiscoveryEnergy efficiency of storage system is an important research topic as it largely affects the energy consumption of data centers. Although the technology of deduplication can save resources in storage systems, it cannot always achieve good energy ...
Secure asynchronous communication for mobile devices
WUP '09: Proceedings of the Warm Up Workshop for ACM/IEEE ICSE 2010Mobile devices are now used not only for communication but also as working units. As more sensitive information is stored on and transmitted through these devices, security is becoming a growing concern. This is especially true for SMS messages which do ...
Energy efficient file transfer mechanism using deduplication scheme
ICHIT'11: Proceedings of the 5th international conference on Convergence and hybrid information technologyIn a mobile device, it is important to minimize battery consumption when we operate an application. In this paper, we propose an energy efficient file transfer scheme for mobile device by exploiting deduplication scheme. Generally, a mobile phone needs ...
Comments