International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.7, No.8, Jul. 2015

An Extended Approach for Efficient Data Storage in Cloud Computing Environment

Full Text (PDF, 652KB), PP.30-38

Views:83   Downloads:2


Fatemeh shieh, Mostafa Ghobaei Arani, Mahboubeh Shamsi

Index Terms

Cloud computing;Virtual machine;Data storage system;De-duplication


In recent years, the advent of online data storage services has been enabled users to save their data and operational programs in cloud databases. Using an efficient and intelligent management helps to optimize quality of provided services. Also it is possible to increase throughput of services by eliminating repeated data. In following article we have offered a completely dynamic approach to detect and eliminate duplicated data which exist in shared storage resources among virtual machines. Results of simulation show that proposed approach, compared to the similar approaches, will save the storage space substantially by reducing usage of CPU, RAM, also will increase rate of de-duplication data up to 23 %.

Cite This Paper

Fatemeh shieh, Mostafa Ghobaei Arani, Mahboubeh Shamsi,"An Extended Approach for Efficient Data Storage in Cloud Computing Environment", IJCNIS, vol.7, no.8, pp.30-38, 2015.DOI: 10.5815/ijcnis.2015.08.04


[1]Monireh Fallah, Mostafa Ghobaei Arani and Mehrdad Maeen. "NASLA: Novel Auto Scaling Approach based on Learning Automata for Web Application in Cloud Computing Environment." International Journal of Computer Applications 113(2):18-23, March 2015.

[2]Monireh Fallah, Mostafa Ghobaei Arani "ASTAW: Auto-Scaling Threshold-based Approach for Web Application in Cloud Computing Environment." International Journal of u- and e- Service, Science and Technology (IJUNESST),Vol.8, No.3, pp.221-230, 2015.

[3]Chengzhang Peng, Zejun Jiangb. "Building a Cloud Storage Service System". Science Direct, 2011, pp.691-696.

[4]Afife Fereydooni, Mostafa Ghobaei Arani and Mahboubeh Shamsi "EDLT: An Extended DLT to Enhance Load Balancing in Cloud Computing." International Journal of Computer Applications 108(7):6-11, December 2014.

[5]Md. Imran Alam, Manjusha Pandey, Siddharth S Rautaray,"A Comprehensive Survey on Cloud Computing", IJITCS, vol.7, no.2, pp.68-79, 2015. DOI: 10.5815/ijitcs.2015.02.09.

[6]R. P. Goldberg. Survey of virtual machine research. Computer, 7(6): 1974, pp. 34_45.

[7]J. E. Smith and R. Nair, "The architecture of virtual machines", Computer, 38(5): 2005, pp.32-38.

[8]Carolan, Jason, Steve Gaede, James Baty, Glenn Brunette, Art Licht, Jim Remmell, Lew Tucker, and Joel Weise. "Introduction to cloud computing architecture." White Paper, 1st edn. Sun Micro Systems Inc (2009).

[9]T. E.Denehy and W. W. Hsu, "Duplicate management for reference data", Technical report, IBM Research, 2003.

[10]Hovav Shacham, Brent Waters: Compact Proofs of Retrievability. ASIACRYPT 2008, pp. 90-107.

[11]B. Zhu, K. Li, and H. Patterson, "Avoiding the Disk Bottleneck in the Data Domain De-duplication File System," Proc. FAST '08: Sixth USENIX Conf. File and Storage Technologies, 2008, pp. 1-14.

[12]Indu Arora, Dr. Anu Gupta. "Opportunities, Concerns and Challenges in the Adoption of Cloud Storage", (IJCSIT) International Journal of Computer Science and Information Technologies, vol 3(3), 2012, pp. 4543-4548. 

[13]Deepak Mishra , Dr.Sanjeev Sharma ,"Comprehensive Study Of Data de-duplication" ,International Conference On Cloud, Big Data and Trust , Nov 13-15, RGPV,2013.

[14]Jin-Yong Ha, Young-Sik Lee, and Jin-Soo Kim , "De-duplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)", IEEE International Conference on High Performance Computing and Communications & IEEE International Conference on Embedded and Ubiquitous Computing, 2013 ,pp.2.

[15]Meyer, Dutch T., and William J. Bolosky. "A study of practical de-duplication." ACM Transactions on Storage (TOS) 7, no. 4 (2012): 14.

[16]A. Gupta, R. Pisolkar, B. Urgaonkar, and A. Sivasubramaniam, "Leveraging value locality in optimizing NAND flash-based ssds," in Proc. USENIX Conference on File and Storage Technologies, 2011, pp. 7–7.

[17]Uz, Tamer, George Bebis, Ali Erol, and Salil Prabhakar. "Minutiae-based template synthesis and matching for fingerprint authentication." Computer Vision and Image Understanding 113, no. 9 (2009): 979-992.

[18]Joao Tiago, Medeiros Paulo , Escola De Engenharia , Mestrado Em Engenharia ,"Efficient Storage Of Data In Cloud Computing" , Journal Of ACM Computing Surveys(CSUR), July 2009 , pp.3-7.

[19]Youjip Won, Jongmyeong Ban, Jaehong Min , Jungpil Hur, Sangkyu Oh, Jangsun Lee, " Efficient index lookup for De-duplication backup system" , National ResearchLab at Hanyang University, 2008, pp2-3.

[20]P. Kulkarni, F. Douglis, J. LaVoie, and J. M. Tracey," Redundancy elimination within large collections of files", In ATEC '04: Proceedings of the annual conference on USENIX Annual Technical Conference, USENIX Association, 2004, pp.5-5.

[21]Policroniades, Calicrates, and Ian Pratt. "Alternatives for Detecting Redundancy in Storage Systems Data." In USENIX Annual Technical Conference, General Track, pp. 73-86. 2004.

[22]M. Szeredi, "File system in user space.", accessed 5th October, 2014.

[23]Purushottam Kulkarni, Fred Douglis, Jason LaVoie, John M. Tracey, "Redundancy Elimination Within Large Collections of Files" , In Proceedings of the 2004 USENIX Annual Technical Conference, Boston, MA, June 2004, pp.7-10.

[24]Fred Douglis and Arun Iyengar. Application-specific delta-encoding via resemblance detection. In Proceedingsof 2003 USENIX Technical Conference, June 2003.

[25]Philip Shilane, Grant Wallace, Mark Huang, Windsor Hsu," Delta Compressed and De-duplicated Storage Using Stream-Informed Locality", Journal of Backup Recovery Systems Division EMC Corporation, 2012, pp.3.