Dell products l.p. (20240134826). DEDUPLICATION FOR CLOUD STORAGE OPERATIONS simplified abstract

From WikiPatents
Revision as of 02:55, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DEDUPLICATION FOR CLOUD STORAGE OPERATIONS

Organization Name

dell products l.p.

Inventor(s)

Sarat Kumar Behera of Bangalore (IN)

Anurag Bhatnagar of Bangalore (IN)

DEDUPLICATION FOR CLOUD STORAGE OPERATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240134826 titled 'DEDUPLICATION FOR CLOUD STORAGE OPERATIONS

Simplified Explanation

The method described in the abstract involves computing hash values for files during a file tiering operation, comparing these hash values to identify duplicate files, and moving the files to a cloud storage platform based on the results of the comparison.

  • Computing hash values for files in a file tiering operation
  • Comparing hash values to identify duplicate files
  • Moving files to a cloud storage platform based on the comparison results

Potential Applications

The technology can be applied in data deduplication systems, cloud storage services, and file management tools.

Problems Solved

This technology helps in efficiently managing storage space by identifying and eliminating duplicate files, reducing storage costs, and improving data organization.

Benefits

The benefits of this technology include optimized storage space utilization, improved data management, and cost savings in cloud storage services.

Potential Commercial Applications

The technology can be used in cloud storage platforms, data backup services, and file synchronization tools to enhance storage efficiency and reduce costs.

Possible Prior Art

One possible prior art for this technology is the use of hash values in data deduplication systems to identify duplicate files and optimize storage space.

What are the security measures in place to protect the hash values during the comparison process?

Security measures such as encryption, access controls, and secure communication protocols are typically implemented to protect the hash values during the comparison process.

How does the technology handle large volumes of files efficiently during the file tiering operation?

The technology may use parallel processing, distributed computing, or optimized algorithms to handle large volumes of files efficiently and ensure timely completion of the file tiering operation.


Original Abstract Submitted

a method comprises computing a hash value for at least one file of a plurality of files in connection with a file tiering operation of the plurality of files from a source storage location to a target storage location. the hash value is compared to one or more hash values corresponding to one or more other files of the plurality of files. based at least in part on the comparing, a determination is made whether the hash value is the same as any of the one or more hash values. the at least one file is identified as a duplicate file in response to an affirmative determination. the target storage location comprises a cloud storage platform.