My name is Philipp C. Heckel and I write about nerdy things.
This site moved here from blog.philippheckel.com/blog.heckel.xyz!

Minimizing remote storage usage and synchronization time using deduplication and multichunking: Syncany as an example


Cloud Computing, Distributed Systems, Security, Synchronization

Minimizing remote storage usage and synchronization time using deduplication and multichunking: Syncany as an example


Contents


1. Introduction
2. Related Work
3. Deduplication
4. Syncany
5. Implications of the Architecture
6. Experiments
7. Future Research
8. Conclusion
A. List of Configurations
B. Pre-Study Folder Statistics
C. List of Variables Recorded
D. Best Algorithms by Deduplication Ratio
E. Best Algorithms by Duration
F. Best Algorithms by CPU Usage
Bibliography

Download as PDF: This article is a web version of my Master’s thesis. Feel free to download the original PDF version.


A. List of Configurations

The following list represents the chunking/multichunking configurations which have been compared in the experiments in chapter 5.


Custom-125-0/Fixed-4/Cipher
Custom-125-0/TTTD-4-Adler32/Cipher
Custom-125-0/TTTD-4-PLAIN/Cipher
Custom-125-0/TTTD-4-Rabin/Cipher
Custom-125-0/Fixed-8/Cipher
Custom-125-0/TTTD-8-Adler32/Cipher
Custom-125-0/TTTD-8-PLAIN/Cipher
Custom-125-0/TTTD-8-Rabin/Cipher
Custom-125-0/Fixed-16/Cipher
Custom-125-0/TTTD-16-Adler32/Cipher
Custom-125-0/TTTD-16-PLAIN/Cipher
Custom-125-0/TTTD-16-Rabin/Cipher
Custom-125-0/Fixed-4/Gzip-Cipher
Custom-125-0/TTTD-4-Adler32/Gzip-Cipher
Custom-125-0/TTTD-4-PLAIN/Gzip-Cipher
Custom-125-0/TTTD-4-Rabin/Gzip-Cipher
Custom-125-0/Fixed-8/Gzip-Cipher
Custom-125-0/TTTD-8-Adler32/Gzip-Cipher
Custom-125-0/TTTD-8-PLAIN/Gzip-Cipher
Custom-125-0/TTTD-8-Rabin/Gzip-Cipher
Custom-125-0/Fixed-16/Gzip-Cipher
Custom-125-0/TTTD-16-Adler32/Gzip-Cipher
Custom-125-0/TTTD-16-PLAIN/Gzip-Cipher
Custom-125-0/TTTD-16-Rabin/Gzip-Cipher
Custom-125-0/Fixed-4/Bzip2-Cipher
Custom-125-0/TTTD-4-Adler32/Bzip2-Cipher
Custom-125-0/TTTD-4-PLAIN/Bzip2-Cipher
Custom-125-0/TTTD-4-Rabin/Bzip2-Cipher
Custom-125-0/Fixed-8/Bzip2-Cipher
Custom-125-0/TTTD-8-Adler32/Bzip2-Cipher
Custom-125-0/TTTD-8-PLAIN/Bzip2-Cipher
Custom-125-0/TTTD-8-Rabin/Bzip2-Cipher
Custom-125-0/Fixed-16/Bzip2-Cipher
Custom-125-0/TTTD-16-Adler32/Bzip2-Cipher
Custom-125-0/TTTD-16-PLAIN/Bzip2-Cipher
Custom-125-0/TTTD-16-Rabin/Bzip2-Cipher
Custom-250-0/Fixed-4/Cipher
Custom-250-0/TTTD-4-Adler32/Cipher
Custom-250-0/TTTD-4-PLAIN/Cipher
Custom-250-0/TTTD-4-Rabin/Cipher
Custom-250-0/Fixed-8/Cipher
Custom-250-0/TTTD-8-Adler32/Cipher
Custom-250-0/TTTD-8-PLAIN/Cipher
Custom-250-0/TTTD-8-Rabin/Cipher
Custom-250-0/Fixed-16/Cipher
Custom-250-0/TTTD-16-Adler32/Cipher
Custom-250-0/TTTD-16-PLAIN/Cipher
Custom-250-0/TTTD-16-Rabin/Cipher
Custom-250-0/Fixed-4/Gzip-Cipher
Custom-250-0/TTTD-4-Adler32/Gzip-Cipher
Custom-250-0/TTTD-4-PLAIN/Gzip-Cipher
Custom-250-0/TTTD-4-Rabin/Gzip-Cipher
Custom-250-0/Fixed-8/Gzip-Cipher
Custom-250-0/TTTD-8-Adler32/Gzip-Cipher
Custom-250-0/TTTD-8-PLAIN/Gzip-Cipher
Custom-250-0/TTTD-8-Rabin/Gzip-Cipher
Custom-250-0/Fixed-16/Gzip-Cipher
Custom-250-0/TTTD-16-Adler32/Gzip-Cipher
Custom-250-0/TTTD-16-PLAIN/Gzip-Cipher
Custom-250-0/TTTD-16-Rabin/Gzip-Cipher
Custom-250-0/Fixed-4/Bzip2-Cipher
Custom-250-0/TTTD-4-Adler32/Bzip2-Cipher
Custom-250-0/TTTD-4-PLAIN/Bzip2-Cipher
Custom-250-0/TTTD-4-Rabin/Bzip2-Cipher
Custom-250-0/Fixed-8/Bzip2-Cipher
Custom-250-0/TTTD-8-Adler32/Bzip2-Cipher
Custom-250-0/TTTD-8-PLAIN/Bzip2-Cipher
Custom-250-0/TTTD-8-Rabin/Bzip2-Cipher
Custom-250-0/Fixed-16/Bzip2-Cipher
Custom-250-0/TTTD-16-Adler32/Bzip2-Cipher
Custom-250-0/TTTD-16-PLAIN/Bzip2-Cipher
Custom-250-0/TTTD-16-Rabin/Bzip2-Cipher
Custom-125-20/Fixed-4/Cipher
Custom-125-20/TTTD-4-Adler32/Cipher
Custom-125-20/TTTD-4-PLAIN/Cipher
Custom-125-20/TTTD-4-Rabin/Cipher

Custom-125-20/Fixed-8/Cipher
Custom-125-20/TTTD-8-Adler32/Cipher
Custom-125-20/TTTD-8-PLAIN/Cipher
Custom-125-20/TTTD-8-Rabin/Cipher
Custom-125-20/Fixed-16/Cipher
Custom-125-20/TTTD-16-Adler32/Cipher
Custom-125-20/TTTD-16-PLAIN/Cipher
Custom-125-20/TTTD-16-Rabin/Cipher
Custom-125-20/Fixed-4/Gzip-Cipher
Custom-125-20/TTTD-4-Adler32/Gzip-Cipher
Custom-125-20/TTTD-4-PLAIN/Gzip-Cipher
Custom-125-20/TTTD-4-Rabin/Gzip-Cipher
Custom-125-20/Fixed-8/Gzip-Cipher
Custom-125-20/TTTD-8-Adler32/Gzip-Cipher
Custom-125-20/TTTD-8-PLAIN/Gzip-Cipher
Custom-125-20/TTTD-8-Rabin/Gzip-Cipher
Custom-125-20/Fixed-16/Gzip-Cipher
Custom-125-20/TTTD-16-Adler32/Gzip-Cipher
Custom-125-20/TTTD-16-PLAIN/Gzip-Cipher
Custom-125-20/TTTD-16-Rabin/Gzip-Cipher
Custom-125-20/Fixed-4/Bzip2-Cipher
Custom-125-20/TTTD-4-Adler32/Bzip2-Cipher
Custom-125-20/TTTD-4-PLAIN/Bzip2-Cipher
Custom-125-20/TTTD-4-Rabin/Bzip2-Cipher
Custom-125-20/Fixed-8/Bzip2-Cipher
Custom-125-20/TTTD-8-Adler32/Bzip2-Cipher
Custom-125-20/TTTD-8-PLAIN/Bzip2-Cipher
Custom-125-20/TTTD-8-Rabin/Bzip2-Cipher
Custom-125-20/Fixed-16/Bzip2-Cipher
Custom-125-20/TTTD-16-Adler32/Bzip2-Cipher
Custom-125-20/TTTD-16-PLAIN/Bzip2-Cipher
Custom-125-20/TTTD-16-Rabin/Bzip2-Cipher
Custom-250-20/Fixed-4/Cipher
Custom-250-20/TTTD-4-Adler32/Cipher
Custom-250-20/TTTD-4-PLAIN/Cipher
Custom-250-20/TTTD-4-Rabin/Cipher
Custom-250-20/Fixed-8/Cipher
Custom-250-20/TTTD-8-Adler32/Cipher
Custom-250-20/TTTD-8-PLAIN/Cipher
Custom-250-20/TTTD-8-Rabin/Cipher
Custom-250-20/Fixed-16/Cipher
Custom-250-20/TTTD-16-Adler32/Cipher
Custom-250-20/TTTD-16-PLAIN/Cipher
Custom-250-20/TTTD-16-Rabin/Cipher
Custom-250-20/Fixed-4/Gzip-Cipher
Custom-250-20/TTTD-4-Adler32/Gzip-Cipher
Custom-250-20/TTTD-4-PLAIN/Gzip-Cipher
Custom-250-20/TTTD-4-Rabin/Gzip-Cipher
Custom-250-20/Fixed-8/Gzip-Cipher
Custom-250-20/TTTD-8-Adler32/Gzip-Cipher
Custom-250-20/TTTD-8-PLAIN/Gzip-Cipher
Custom-250-20/TTTD-8-Rabin/Gzip-Cipher
Custom-250-20/Fixed-16/Gzip-Cipher
Custom-250-20/TTTD-16-Adler32/Gzip-Cipher
Custom-250-20/TTTD-16-PLAIN/Gzip-Cipher
Custom-250-20/TTTD-16-Rabin/Gzip-Cipher
Custom-250-20/Fixed-4/Bzip2-Cipher
Custom-250-20/TTTD-4-Adler32/Bzip2-Cipher
Custom-250-20/TTTD-4-PLAIN/Bzip2-Cipher
Custom-250-20/TTTD-4-Rabin/Bzip2-Cipher
Custom-250-20/Fixed-8/Bzip2-Cipher
Custom-250-20/TTTD-8-Adler32/Bzip2-Cipher
Custom-250-20/TTTD-8-PLAIN/Bzip2-Cipher
Custom-250-20/TTTD-8-Rabin/Bzip2-Cipher
Custom-250-20/Fixed-16/Bzip2-Cipher
Custom-250-20/TTTD-16-Adler32/Bzip2-Cipher
Custom-250-20/TTTD-16-PLAIN/Bzip2-Cipher
Custom-250-20/TTTD-16-Rabin/Bzip2-Cipher

>> Next chapter: Appendix “Pre-Study Folder Statistics”


1. Introduction
2. Related Work
3. Deduplication
4. Syncany
5. Implications of the Architecture
6. Experiments
7. Future Research
8. Conclusion
A. List of Configurations
B. Pre-Study Folder Statistics
C. List of Variables Recorded
D. Best Algorithms by Deduplication Ratio
E. Best Algorithms by Duration
F. Best Algorithms by CPU Usage
Bibliography

Pages:<12 ... 89 10 ... 1415>

3 Comments

  1. JP

    Hi,

    I would love to see a ebook version of your thesis (epub or mobi). Would that be possible ?

    thanks



  2. Thiruven Madhavan

    Hi Philipp:
    Good Morning. Possible to receive pdf version of your thesis.
    cheers
    Madhavan


Leave a comment

I'd very much like to hear what you think of this post. Feel free to leave a comment. I usually respond within a day or two, sometimes even faster. I will not share or publish your e-mail address anywhere.