Dell products l.p. (20240134826). DEDUPLICATION FOR CLOUD STORAGE OPERATIONS simplified abstract
Contents
- 1 DEDUPLICATION FOR CLOUD STORAGE OPERATIONS
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 DEDUPLICATION FOR CLOUD STORAGE OPERATIONS - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
DEDUPLICATION FOR CLOUD STORAGE OPERATIONS
Organization Name
Inventor(s)
Sarat Kumar Behera of Bangalore (IN)
Anurag Bhatnagar of Bangalore (IN)
DEDUPLICATION FOR CLOUD STORAGE OPERATIONS - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240134826 titled 'DEDUPLICATION FOR CLOUD STORAGE OPERATIONS
Simplified Explanation
The method described in the abstract involves computing hash values for files during a file tiering operation, comparing these hash values to identify duplicate files, and moving the files to a cloud storage platform based on the results of the comparison.
- Computing hash values for files in a file tiering operation
- Comparing hash values to identify duplicate files
- Moving files to a cloud storage platform based on the comparison results
Potential Applications
The technology can be applied in data deduplication systems, cloud storage services, and file management tools.
Problems Solved
This technology helps in efficiently managing storage space by identifying and eliminating duplicate files, reducing storage costs, and improving data organization.
Benefits
The benefits of this technology include optimized storage space utilization, improved data management, and cost savings in cloud storage services.
Potential Commercial Applications
The technology can be used in cloud storage platforms, data backup services, and file synchronization tools to enhance storage efficiency and reduce costs.
Possible Prior Art
One possible prior art for this technology is the use of hash values in data deduplication systems to identify duplicate files and optimize storage space.
What are the security measures in place to protect the hash values during the comparison process?
Security measures such as encryption, access controls, and secure communication protocols are typically implemented to protect the hash values during the comparison process.
How does the technology handle large volumes of files efficiently during the file tiering operation?
The technology may use parallel processing, distributed computing, or optimized algorithms to handle large volumes of files efficiently and ensure timely completion of the file tiering operation.
Original Abstract Submitted
a method comprises computing a hash value for at least one file of a plurality of files in connection with a file tiering operation of the plurality of files from a source storage location to a target storage location. the hash value is compared to one or more hash values corresponding to one or more other files of the plurality of files. based at least in part on the comparing, a determination is made whether the hash value is the same as any of the one or more hash values. the at least one file is identified as a duplicate file in response to an affirmative determination. the target storage location comprises a cloud storage platform.