Venti: A New Approach to Archival Storage
FAST '02 Proceedings of the Conference on File and Storage Technologies
Redundancy elimination within large collections of files
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Context-for-wireless: context-sensitive energy-efficient wireless data transfer
Proceedings of the 5th international conference on Mobile systems, applications and services
Avoiding the disk bottleneck in the data domain deduplication file system
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
PRUN: Eliminating Information Redundancy for Large Scale Data Backup System
ICCSA '08 Proceedings of the 2008 International Conference on Computational Sciences and Its Applications
Proceedings of the 4th ACM international workshop on Storage security and survivability
Demystifying data deduplication
Proceedings of the ACM/IFIP/USENIX Middleware '08 Conference Companion
ADMAD: Application-Driven Metadata Aware De-duplication Archival Storage System
SNAPI '08 Proceedings of the 2008 Fifth IEEE International Workshop on Storage Network Architecture and Parallel I/Os
Multi-level comparison of data deduplication in a backup scenario
SYSTOR '09 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference
Energy consumption in mobile phones: a measurement study and implications for network applications
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
DAM: A DataOwnership-Aware Multi-layered De-duplication Scheme
NAS '10 Proceedings of the 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage
MAD2: A scalable high-throughput exact deduplication approach for network backup services
MSST '10 Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST)
Characterizing datasets for data deduplication in backup applications
IISWC '10 Proceedings of the IEEE International Symposium on Workload Characterization (IISWC'10)
Fast and secure laptop backups with encrypted de-duplication
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Efficient Deduplication Techniques for Modern Backup Operation
IEEE Transactions on Computers
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
DupLESS: server-aided encryption for deduplicated storage
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
An increased use of mobile devices such as smart phones, PDAs and tablet computers with capabilities of storing and processing is rapidly growing. It allows users to carry an increasing volume of data, the value of this information must be protected from loss, theft or any kind of accident which may occur with the devices, making the backup process a key factor. In mobile devices the data transmission has a high cost, in price and energy, and this devices depend on batteries, optimizing the bandwidth use is crucial. Deduplication allows substantial reductions in the data volume to be transmitted over network on backup sessions, by identifying common chunks of data, transferring and storing them only once. On the other hand, usually mobile devices communications use mobile networks, and cloud storage is a viable solution for data backup. Consequently it is essential the use of cryptographic processes to protect data, during the transmission but also in storage. This paper proposes a model and a process for measuring the best performance of a safe and energy efficient backup system.