My name is Philipp C. Heckel and I write about nerdy things.

Minimizing remote storage usage and synchronization time using deduplication and multichunking: Syncany as an example


Cloud Computing, Distributed Systems, Security, Synchronization

Minimizing remote storage usage and synchronization time using deduplication and multichunking: Syncany as an example


Contents


1. Introduction
2. Related Work
3. Deduplication
4. Syncany
5. Implications of the Architecture
6. Experiments
7. Future Research
8. Conclusion
A. List of Configurations
B. Pre-Study Folder Statistics
C. List of Variables Recorded
D. Best Algorithms by Deduplication Ratio
E. Best Algorithms by Duration
F. Best Algorithms by CPU Usage
Bibliography

Download as PDF: This article is a web version of my Master’s thesis. Feel free to download the original PDF version.


A. List of Configurations

The following list represents the chunking/multichunking configurations which have been compared in the experiments in chapter 5.


Custom-125-0/Fixed-4/Cipher
Custom-125-0/TTTD-4-Adler32/Cipher
Custom-125-0/TTTD-4-PLAIN/Cipher
Custom-125-0/TTTD-4-Rabin/Cipher
Custom-125-0/Fixed-8/Cipher
Custom-125-0/TTTD-8-Adler32/Cipher
Custom-125-0/TTTD-8-PLAIN/Cipher
Custom-125-0/TTTD-8-Rabin/Cipher
Custom-125-0/Fixed-16/Cipher
Custom-125-0/TTTD-16-Adler32/Cipher
Custom-125-0/TTTD-16-PLAIN/Cipher
Custom-125-0/TTTD-16-Rabin/Cipher
Custom-125-0/Fixed-4/Gzip-Cipher
Custom-125-0/TTTD-4-Adler32/Gzip-Cipher
Custom-125-0/TTTD-4-PLAIN/Gzip-Cipher
Custom-125-0/TTTD-4-Rabin/Gzip-Cipher
Custom-125-0/Fixed-8/Gzip-Cipher
Custom-125-0/TTTD-8-Adler32/Gzip-Cipher
Custom-125-0/TTTD-8-PLAIN/Gzip-Cipher
Custom-125-0/TTTD-8-Rabin/Gzip-Cipher
Custom-125-0/Fixed-16/Gzip-Cipher
Custom-125-0/TTTD-16-Adler32/Gzip-Cipher
Custom-125-0/TTTD-16-PLAIN/Gzip-Cipher
Custom-125-0/TTTD-16-Rabin/Gzip-Cipher
Custom-125-0/Fixed-4/Bzip2-Cipher
Custom-125-0/TTTD-4-Adler32/Bzip2-Cipher
Custom-125-0/TTTD-4-PLAIN/Bzip2-Cipher
Custom-125-0/TTTD-4-Rabin/Bzip2-Cipher
Custom-125-0/Fixed-8/Bzip2-Cipher
Custom-125-0/TTTD-8-Adler32/Bzip2-Cipher
Custom-125-0/TTTD-8-PLAIN/Bzip2-Cipher
Custom-125-0/TTTD-8-Rabin/Bzip2-Cipher
Custom-125-0/Fixed-16/Bzip2-Cipher
Custom-125-0/TTTD-16-Adler32/Bzip2-Cipher
Custom-125-0/TTTD-16-PLAIN/Bzip2-Cipher
Custom-125-0/TTTD-16-Rabin/Bzip2-Cipher
Custom-250-0/Fixed-4/Cipher
Custom-250-0/TTTD-4-Adler32/Cipher
Custom-250-0/TTTD-4-PLAIN/Cipher
Custom-250-0/TTTD-4-Rabin/Cipher
Custom-250-0/Fixed-8/Cipher
Custom-250-0/TTTD-8-Adler32/Cipher
Custom-250-0/TTTD-8-PLAIN/Cipher
Custom-250-0/TTTD-8-Rabin/Cipher
Custom-250-0/Fixed-16/Cipher
Custom-250-0/TTTD-16-Adler32/Cipher
Custom-250-0/TTTD-16-PLAIN/Cipher
Custom-250-0/TTTD-16-Rabin/Cipher
Custom-250-0/Fixed-4/Gzip-Cipher
Custom-250-0/TTTD-4-Adler32/Gzip-Cipher
Custom-250-0/TTTD-4-PLAIN/Gzip-Cipher
Custom-250-0/TTTD-4-Rabin/Gzip-Cipher
Custom-250-0/Fixed-8/Gzip-Cipher
Custom-250-0/TTTD-8-Adler32/Gzip-Cipher
Custom-250-0/TTTD-8-PLAIN/Gzip-Cipher
Custom-250-0/TTTD-8-Rabin/Gzip-Cipher
Custom-250-0/Fixed-16/Gzip-Cipher
Custom-250-0/TTTD-16-Adler32/Gzip-Cipher
Custom-250-0/TTTD-16-PLAIN/Gzip-Cipher
Custom-250-0/TTTD-16-Rabin/Gzip-Cipher
Custom-250-0/Fixed-4/Bzip2-Cipher
Custom-250-0/TTTD-4-Adler32/Bzip2-Cipher
Custom-250-0/TTTD-4-PLAIN/Bzip2-Cipher
Custom-250-0/TTTD-4-Rabin/Bzip2-Cipher
Custom-250-0/Fixed-8/Bzip2-Cipher
Custom-250-0/TTTD-8-Adler32/Bzip2-Cipher
Custom-250-0/TTTD-8-PLAIN/Bzip2-Cipher
Custom-250-0/TTTD-8-Rabin/Bzip2-Cipher
Custom-250-0/Fixed-16/Bzip2-Cipher
Custom-250-0/TTTD-16-Adler32/Bzip2-Cipher
Custom-250-0/TTTD-16-PLAIN/Bzip2-Cipher
Custom-250-0/TTTD-16-Rabin/Bzip2-Cipher
Custom-125-20/Fixed-4/Cipher
Custom-125-20/TTTD-4-Adler32/Cipher
Custom-125-20/TTTD-4-PLAIN/Cipher
Custom-125-20/TTTD-4-Rabin/Cipher

Custom-125-20/Fixed-8/Cipher
Custom-125-20/TTTD-8-Adler32/Cipher
Custom-125-20/TTTD-8-PLAIN/Cipher
Custom-125-20/TTTD-8-Rabin/Cipher
Custom-125-20/Fixed-16/Cipher
Custom-125-20/TTTD-16-Adler32/Cipher
Custom-125-20/TTTD-16-PLAIN/Cipher
Custom-125-20/TTTD-16-Rabin/Cipher
Custom-125-20/Fixed-4/Gzip-Cipher
Custom-125-20/TTTD-4-Adler32/Gzip-Cipher
Custom-125-20/TTTD-4-PLAIN/Gzip-Cipher
Custom-125-20/TTTD-4-Rabin/Gzip-Cipher
Custom-125-20/Fixed-8/Gzip-Cipher
Custom-125-20/TTTD-8-Adler32/Gzip-Cipher
Custom-125-20/TTTD-8-PLAIN/Gzip-Cipher
Custom-125-20/TTTD-8-Rabin/Gzip-Cipher
Custom-125-20/Fixed-16/Gzip-Cipher
Custom-125-20/TTTD-16-Adler32/Gzip-Cipher
Custom-125-20/TTTD-16-PLAIN/Gzip-Cipher
Custom-125-20/TTTD-16-Rabin/Gzip-Cipher
Custom-125-20/Fixed-4/Bzip2-Cipher
Custom-125-20/TTTD-4-Adler32/Bzip2-Cipher
Custom-125-20/TTTD-4-PLAIN/Bzip2-Cipher
Custom-125-20/TTTD-4-Rabin/Bzip2-Cipher
Custom-125-20/Fixed-8/Bzip2-Cipher
Custom-125-20/TTTD-8-Adler32/Bzip2-Cipher
Custom-125-20/TTTD-8-PLAIN/Bzip2-Cipher
Custom-125-20/TTTD-8-Rabin/Bzip2-Cipher
Custom-125-20/Fixed-16/Bzip2-Cipher
Custom-125-20/TTTD-16-Adler32/Bzip2-Cipher
Custom-125-20/TTTD-16-PLAIN/Bzip2-Cipher
Custom-125-20/TTTD-16-Rabin/Bzip2-Cipher
Custom-250-20/Fixed-4/Cipher
Custom-250-20/TTTD-4-Adler32/Cipher
Custom-250-20/TTTD-4-PLAIN/Cipher
Custom-250-20/TTTD-4-Rabin/Cipher
Custom-250-20/Fixed-8/Cipher
Custom-250-20/TTTD-8-Adler32/Cipher
Custom-250-20/TTTD-8-PLAIN/Cipher
Custom-250-20/TTTD-8-Rabin/Cipher
Custom-250-20/Fixed-16/Cipher
Custom-250-20/TTTD-16-Adler32/Cipher
Custom-250-20/TTTD-16-PLAIN/Cipher
Custom-250-20/TTTD-16-Rabin/Cipher
Custom-250-20/Fixed-4/Gzip-Cipher
Custom-250-20/TTTD-4-Adler32/Gzip-Cipher
Custom-250-20/TTTD-4-PLAIN/Gzip-Cipher
Custom-250-20/TTTD-4-Rabin/Gzip-Cipher
Custom-250-20/Fixed-8/Gzip-Cipher
Custom-250-20/TTTD-8-Adler32/Gzip-Cipher
Custom-250-20/TTTD-8-PLAIN/Gzip-Cipher
Custom-250-20/TTTD-8-Rabin/Gzip-Cipher
Custom-250-20/Fixed-16/Gzip-Cipher
Custom-250-20/TTTD-16-Adler32/Gzip-Cipher
Custom-250-20/TTTD-16-PLAIN/Gzip-Cipher
Custom-250-20/TTTD-16-Rabin/Gzip-Cipher
Custom-250-20/Fixed-4/Bzip2-Cipher
Custom-250-20/TTTD-4-Adler32/Bzip2-Cipher
Custom-250-20/TTTD-4-PLAIN/Bzip2-Cipher
Custom-250-20/TTTD-4-Rabin/Bzip2-Cipher
Custom-250-20/Fixed-8/Bzip2-Cipher
Custom-250-20/TTTD-8-Adler32/Bzip2-Cipher
Custom-250-20/TTTD-8-PLAIN/Bzip2-Cipher
Custom-250-20/TTTD-8-Rabin/Bzip2-Cipher
Custom-250-20/Fixed-16/Bzip2-Cipher
Custom-250-20/TTTD-16-Adler32/Bzip2-Cipher
Custom-250-20/TTTD-16-PLAIN/Bzip2-Cipher
Custom-250-20/TTTD-16-Rabin/Bzip2-Cipher

>> Next chapter: Appendix “Pre-Study Folder Statistics”


1. Introduction
2. Related Work
3. Deduplication
4. Syncany
5. Implications of the Architecture
6. Experiments
7. Future Research
8. Conclusion
A. List of Configurations
B. Pre-Study Folder Statistics
C. List of Variables Recorded
D. Best Algorithms by Deduplication Ratio
E. Best Algorithms by Duration
F. Best Algorithms by CPU Usage
Bibliography

Pages:<12 ... 89 10 ... 1415>

3 Comments

  1. JP

    Hi,

    I would love to see a ebook version of your thesis (epub or mobi). Would that be possible ?

    thanks



  2. Thiruven Madhavan

    Hi Philipp:
    Good Morning. Possible to receive pdf version of your thesis.
    cheers
    Madhavan