Proceedings 22nd International Conference on Distributed Computing Systems
DOI: 10.1109/icdcs.2002.1022312
|View full text |Cite
|
Sign up to set email alerts
|

Reclaiming space from duplicate files in a serverless distributed file system

Abstract: The Farsite distributed file system provides availability by replicating each file onto multiple desktop computers. Since this replication consumes significant storage space, it is important to reclaim used space where possible. Measurement of over 500 desktop file systems shows that nearly half of all consumed space is occupied by duplicate files. We present a mechanism to reclaim space from this incidental duplication to make it available for controlled file replication. Our mechanism includes 1) convergent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
267
0
3

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 403 publications
(281 citation statements)
references
References 37 publications
0
267
0
3
Order By: Relevance
“…One important benefit of scheme is that even root administrator also does not have access to chunk's plaintext without knowing key value. Primary disadvantage of this approach is information leakage [6]. But to achieve space efficiency such behavior is compromised in deduplication environment.…”
Section: Overview Of Secure Deduplicationmentioning
confidence: 99%
See 2 more Smart Citations
“…One important benefit of scheme is that even root administrator also does not have access to chunk's plaintext without knowing key value. Primary disadvantage of this approach is information leakage [6]. But to achieve space efficiency such behavior is compromised in deduplication environment.…”
Section: Overview Of Secure Deduplicationmentioning
confidence: 99%
“…The goal of model is to provide data protection and security from both attackers without considering access levels [6]. Both models given in paper offer data secrecy against external and internal adversaries.…”
Section: System Designmentioning
confidence: 99%
See 1 more Smart Citation
“…To protect the confidentiality of outsourced data, the notion of convergent encryption [3] has been proposed. With the convergent encryption, the confidentiality of data can be achieved while realizing deduplication.…”
Section: Introductionmentioning
confidence: 99%
“…A secure cross-client de duplication scheme should enable a storage server to detect data de duplication over the data encrypted by different clients, and efficiently prevent the practical attacks [10], [13], [14] from poor de duplication. Douceur et al [21] proposed the first solution for secure and efficient data de duplication, and they call it convergent encryption. This idea promoted many significant applications, where various schemes [15], [16] are implemented or designed based on convergent encryption.…”
mentioning
confidence: 99%