LEADER 03664nam 22005775 450 001 9910254165803321 005 20230902071816.0 010 $a3-319-42280-4 024 7 $a10.1007/978-3-319-42280-0 035 $a(CKB)3710000000852103 035 $a(EBL)4676674 035 $a(DE-He213)978-3-319-42280-0 035 $a(MiAaPQ)EBC4676674 035 $a(PPN)195513711 035 $a(EXLCZ)993710000000852103 100 $a20160908d2017 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aData Deduplication for Data Optimization for Storage and Network Systems /$fby Daehee Kim, Sejun Song, Baek-Young Choi 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (263 p.) 300 $aDescription based upon print version of record. 311 $a3-319-42278-2 327 $aIntroduction -- De-duplication Background -- Existing De-duplication Techniques -- Hybrid Email De-duplication System -- Structure-Aware File and Email De-duplication for Cloud-based Storage Systems -- Software-defined De-duplication as a Network and Storage Service -- Mobile De-duplication -- Conclusion. 330 $aThis book introduces fundamentals and trade-offs of data de-duplication techniques. It describes novel emerging de-duplication techniques that remove duplicate data both in storage and network in an efficient and effective manner. It explains places where duplicate data are originated, and provides solutions that remove the duplicate data. It classifies existing de-duplication techniques depending on size of unit data to be compared, the place of de-duplication, and the time of de-duplication. Chapter 3 considers redundancies in email servers and a de-duplication technique to increase reduction performance with low overhead by switching chunk-based de-duplication and file-based de-duplication. Chapter 4 develops a de-duplication technique applied for cloud-storage service where unit data to be compared are not physical-format but logical structured-format, reducing processing time efficiently. Chapter 5 displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small-sized payload) and decoded (restored to original size payload) in routers or switches on the way to remote servers through network. Chapter 6 introduces a mobile de-duplication technique with image (JPEG) or video (MPEG) considering performance and overhead of encryption algorithm for security on mobile device. 606 $aTelecommunication 606 $aInformation retrieval 606 $aComputer architecture 606 $aSignal processing 606 $aCommunications Engineering, Networks 606 $aData Storage Representation 606 $aSignal, Speech and Image Processing 615 0$aTelecommunication. 615 0$aInformation retrieval. 615 0$aComputer architecture. 615 0$aSignal processing. 615 14$aCommunications Engineering, Networks. 615 24$aData Storage Representation. 615 24$aSignal, Speech and Image Processing . 676 $a620 700 $aKim$b Daehee$4aut$4http://id.loc.gov/vocabulary/relators/aut$0868646 702 $aSong$b Sejun$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aChoi$b Baek-Young$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910254165803321 996 $aData Deduplication for Data Optimization for Storage and Network Systems$91939100 997 $aUNINA