KR20180113739A - Method and file system for inheritance of file hotness information - Google Patents

Method and file system for inheritance of file hotness information Download PDF

Info

Publication number
KR20180113739A
KR20180113739A KR1020170045192A KR20170045192A KR20180113739A KR 20180113739 A KR20180113739 A KR 20180113739A KR 1020170045192 A KR1020170045192 A KR 1020170045192A KR 20170045192 A KR20170045192 A KR 20170045192A KR 20180113739 A KR20180113739 A KR 20180113739A
Authority
KR
South Korea
Prior art keywords
file
access information
original
original file
temporary
Prior art date
Application number
KR1020170045192A
Other languages
Korean (ko)
Inventor
원유집
유진수
Original Assignee
한양대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 한양대학교 산학협력단 filed Critical 한양대학교 산학협력단
Priority to KR1020170045192A priority Critical patent/KR20180113739A/en
Publication of KR20180113739A publication Critical patent/KR20180113739A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/162Delete operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • G06F16/166File name conversion

Abstract

A file access information inheritance method is disclosed. According to an embodiment of the present invention, the method comprises the steps of: receiving a file replacement signal which is a signal requesting to replace an original file with a temporary file generated to replace the original file; setting access information which is information on an access frequency of the original file as access information of the temporary file when the file replacement signal is received; and replacing the original file with the temporary file.

Description

METHOD AND FILE SYSTEM FOR INHERITANCE OF FILE < RTI ID = 0.0 > HOTNESS < / RTI &

The present invention relates to a method of inheriting access information of a file and a file system to which the method is applied. More particularly, the present invention relates to a file system in which access information of an original file is updated when a file is updated by replacing an original file using a temporary file A method for inheriting to a temporary file, and a file system.

To preserve the original file, there is software that updates and creates a temporary file that is not the original file when updating the file. The software updates the temporary file created by copying the original file, changes the name of the temporary file to the name of the original file, and finishes the update by removing the original file.

At this time, the file access information managed for the original file is also removed, and the temporary file has new file access information. From the standpoint of software, however, the temporary file is a new version of the original file, so it may be desirable to have the same file access information as the original original file.

Therefore, there is a need for a method of inheriting access information of a source file to a newly created temporary file and a file system to which the method is applied.

A related prior art is Korean Patent Registration No. 10-1055287 entitled " Method for managing temporary files used in application programs, public date: November 24, 2010 ".

The present invention provides a method of inheriting access information of an original file to a temporary file when a file is updated by replacing the original file with a temporary file, and a file system to which the method is applied.

The problems to be solved by the present invention are not limited to the above-mentioned problem (s), and another problem (s) not mentioned can be clearly understood by those skilled in the art from the following description.

A method for inheriting a file access information according to an exemplary embodiment of the present invention includes receiving a file replacement signal, which is a signal requesting replacement of a source file with a temporary file generated to replace the source file; Setting access information, which is information on an access frequency of the original file, as access information of the temporary file when the file replacement signal is received; And replacing the original file with the temporary file.

Preferably, the access information may include at least one of a reading count, a writing count, an access time, and a last modification time of the original file.

Advantageously, the access information may further include information regarding an access right of the original file.

Preferably, when the original file is classified into one of the predetermined types according to the access information, a plurality of files classified into the same type may be stored so as to be located adjacent to each other according to a predetermined criterion.

The replacing of the original file with the temporary file may include deleting the original file. And renaming the temporary file to the original file.

In addition, the file system inheriting file access information according to an embodiment of the present invention includes: a receiver for receiving a file replacement signal, which is a signal requesting replacement of a source file with a temporary file generated to replace the source file; A setting unit configured to set access information, which is information on an access frequency of the original file, as access information of the temporary file when the file replacement signal is received; And a management unit for replacing the original file with the temporary file.

Preferably, the access information may include at least one of a read count, a write count, a last access time, and a last modification time of the original file.

Advantageously, the access information may further include information regarding an access right of the original file.

Preferably, when the original file is classified into one of the predetermined types according to the access information, a plurality of files classified into the same type may be stored so as to be located adjacent to each other according to a predetermined criterion.

Preferably, the management unit deletes the original file and renames the temporary file to the original file.

The present invention has the effect of allowing the access information of the original file to be set in the temporary file by inheriting the access information of the original file to the temporary file when the file is updated by replacing the original file using the temporary file.

FIG. 1 is a flowchart illustrating a file access information inheritance method according to an embodiment of the present invention.
2 is a flowchart illustrating a file access information inheritance method according to another embodiment of the present invention.
3 is a diagram for explaining a file system inheriting file access information according to an embodiment of the present invention.
4 is a diagram for explaining a file access information inheritance method according to another embodiment of the present invention.

While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the invention is not intended to be limited to the particular embodiments, but includes all modifications, equivalents, and alternatives falling within the spirit and scope of the invention. Like reference numerals are used for like elements in describing each drawing.

The terms first, second, A, B, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms are used only for the purpose of distinguishing one component from another. For example, without departing from the scope of the present invention, the first component may be referred to as a second component, and similarly, the second component may also be referred to as a first component. And / or < / RTI > includes any combination of a plurality of related listed items or any of a plurality of related listed items.

It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between.

The terminology used in this application is used only to describe a specific embodiment and is not intended to limit the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In the present application, the terms "comprises" or "having" and the like are used to specify that there is a feature, a number, a step, an operation, an element, a component or a combination thereof described in the specification, But do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, or combinations thereof.

Unless defined otherwise, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries are to be interpreted as having a meaning consistent with the contextual meaning of the related art and are to be interpreted as either ideal or overly formal in the sense of the present application Do not.

Hereinafter, preferred embodiments according to the present invention will be described in detail with reference to the accompanying drawings.

FIG. 1 is a flowchart illustrating a file access information inheritance method according to an embodiment of the present invention.

In step S110, a file replacement signal is received, which is a signal requesting the file system to replace the original file with a temporary file created to replace the original file.

A file system refers to a system that stores or organizes files and data for easy discovery and access in computers and smart devices. That is, the file system can be mounted on an operating system (OS) such as Windows, MAC OS, Linux, Android and Unix, and can store various kinds of files on a computer, a tablet PC, .

For example, the file system may receive a file replacement signal, which is a signal requesting to replace an original file named A with a temporary file named A from an application program (e.g., text editor, picture editor, etc.). At this time, the file replacement signal may include information of a source file and a temporary file. An application program calls a specific application programming interface (API) provided by an operating system (OS) in which the file system operates, can do.

In step S120, when the file system receives the file replacement signal, it sets the access information, which is information on the access frequency of the original file, as the access information of the temporary file.

At this time, the access information may mean the number of times the original file is read or written for a predetermined period of time. However, access to the original file is not limited to reading or writing to the original file, and various kinds of access methods can be recognized as access to the file.

On the other hand, the file system can set the access information of the original file as the access information of the temporary file, which is a newly generated file.

At this time, since the temporary file is a file newly generated by the application program, the access information may also be set to the initial value. That is, the temporary file may have access information corresponding to the initial value at the time the file is created. However, the access information can be set by the file system copying the contents of the access information of the original file into the access information of the temporary file.

In another embodiment, the access information may include at least one of a read count of the original file, a write count, an access time, and a last modification time.

On the other hand, the access information may include information on various methods of accessing the original file. That is, at least one of the number of times a read command has been executed in the original file, the number of times the write command has been performed, the time at which the file was last accessed, and the time at which the file was last modified . ≪ / RTI >

In another embodiment, the access information may further include information regarding access rights of the original file.

For example, the access information may further include information on a user's authority related to reading, writing, and executing the original file. In this way, when the original file is replaced with the temporary file, the temporary file to be the new original file can have the same access authority as the conventional original file, because the access information further includes the information of the access right to the original file.

Finally, in step S130, the file system replaces the original file with a temporary file.

That is, the file system can generate a new original file that maintains the access information of the conventional original file by replacing the temporary file with the original file in accordance with the received file replacement signal.

More specifically, in step S120, the source file and the temporary file have the same access information. In step S130, the temporary file is replaced with the original file, and the temporary file is replaced with a new original file having the same access information as the conventional original file Lt; / RTI > At this time, the conventional original file can be deleted.

In another embodiment, when the original file is classified into one of the predetermined types according to the access information, a plurality of files classified into the same type may be stored so as to be positioned adjacent to each other according to a predetermined criterion.

For example, the file system may classify a plurality of files included in the file system into one of three types (hot, warm, cold) according to access information. At this time, the type of hot is assigned to a file whose access frequency is higher than a predetermined first reference value, the type of warm is given to a file that is lower than the first reference value and equal to or higher than a predetermined second reference value, . ≪ / RTI >

In addition, the file system makes it possible to store a plurality of files of the same type in close proximity to each other, thereby reducing overhead in garbage collection (GC) and the like in a storage device such as an SSD based on a flash memory The effect can be obtained.

In other words, when the same type of files are gathered neighbors, the overhead in the GC process can be reduced and the system performance can be improved, as compared with the case where files of various types (hot, warm, cold) are mixed.

For example, the file system of the present invention may be a file system based on another kind of file system, such as Flash-Friendly File System (F2FS), File System For SSD (SFS) or the like.

As described above, in the method of inheriting file access information according to an embodiment of the present invention, the access information of the original file is inherited to the temporary file, and then the original file is replaced with the temporary file, The same effect can be obtained.

2 is a flowchart illustrating a file access information inheritance method according to another embodiment of the present invention.

In step S210, the file system receives a file replacement signal, which is a signal requesting the file system to replace the original file with a temporary file created to replace the original file.

In step S220, when the file system receives the file replacement signal, it sets access information, which is information on the access frequency of the original file, as access information of the temporary file.

In step S230, the file system deletes the original file.

For example, when the name of the original file is aaa.txt and the name of the temporary file is tmp-aaa.txt, the file system can delete the original file aaa.txt from the storage device in which the file system operates.

Finally, in step S240, the file system renames the temporary file to the original file.

In addition, the file system can change the name of the temporary file tmp-aaa.txt to the name of the original file aaa.txt.

In this way, after the file system deletes the original file, the name of the temporary file is rename to the name of the original file so that the access information of the updated original file can be maintained the same as the access information of the conventional original file .

In another embodiment, after the file system changes the name of the temporary file and the original file to be different from each other, the file corresponding to the name of the temporary file (i.e., the old original file) can be deleted.

For example, referring to FIG. 4, 1) a user may request an application to update an original file by opening and editing the original file (aaa.txt) with an application program (e.g., a text editor). 2) To reflect the user's modifications, the application can create a temporary file (tmp-aaa.txt) by copying the original file. 3) Your application can reflect your modifications to temporary files. 4) After the file system receives the file replacement signal transmitted by the application program (when the user executes the application program storage function), it can inherit the access information of the original file by setting the temporary file. 5) The file system can swap the names of the original file (aaa.txt) and the temporary file (tmp-aaa.txt) with each other. 6) You can delete the temporary files that the file system was swapped to (ie, the original files before swapping).

At this time, the temporary file (tmp-aaa.txt) before swapping becomes the original file (aaa.txt) by swapping the name so that a temporary file reflecting the user's modifications can be created as a new original file.

3 is a diagram for explaining a file system inheriting file access information according to an embodiment of the present invention.

Referring to FIG. 3, the file system 300 inheriting file access information according to an embodiment of the present invention includes a receiving unit 310, a setting unit 320, and a management unit 330.

At this time, the file system 300 may be installed in an OS (Operating System) such as Windows, MAC OS, Linux, and Unix.

Receiving unit 310 receives a file replacement signal requesting to replace the original file with a temporary file created to replace the original file.

When the file replacement signal is received, the setting unit 320 sets the access information, which is information on the access frequency of the original file, as the access information of the temporary file.

In another embodiment, the access information may include at least one of the number of read times of the original file, the number of times of writing, the last access time, and the last modification time.

In another embodiment, the access information may further include information regarding access rights of the original file.

Finally, the management unit 330 replaces the original file with the temporary file.

In another embodiment, the management unit 330 deletes the original file and renames the temporary file to the original file.

In another embodiment, when the original file is classified into one of the predetermined types according to the access information, a plurality of files classified into the same type may be stored so as to be positioned adjacent to each other according to a predetermined criterion.

The above-described embodiments of the present invention can be embodied in a general-purpose digital computer that can be embodied as a program that can be executed by a computer and operates the program using a computer-readable recording medium.

The computer readable recording medium includes a magnetic storage medium (e.g., ROM, floppy disk, hard disk, etc.), optical reading medium (e.g., CD ROM, DVD, etc.).

The present invention has been described with reference to the preferred embodiments. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the disclosed embodiments should be considered in an illustrative rather than a restrictive sense. The scope of the present invention is defined by the appended claims rather than by the foregoing description, and all differences within the scope of equivalents thereof should be construed as being included in the present invention.

Claims (10)

Receiving a file replacement signal that is a signal requesting to replace the original file with a temporary file created to replace the original file;
Setting access information, which is information on an access frequency of the original file, as access information of the temporary file when the file replacement signal is received; And
Replacing the original file with the temporary file
The file access information inheriting method comprising:
The method according to claim 1,
The access information
Wherein the file access information includes at least one of a read count, a write count, an access time, and a change time of the original file.
3. The method of claim 2,
The access information
Further comprising information about an access right of the original file.
The method according to claim 1,
When the original file is classified into one of the predetermined types according to the access information,
A plurality of files classified as the same type
Are stored so as to be adjacent to each other according to a predetermined criterion.
The method according to claim 1,
The replacing of the original file with the temporary file
Deleting the original file; And
Renaming the temporary file to the original file;
The file access information inheriting method comprising:
A receiving unit that receives a file replacement signal, which is a signal requesting replacement of the original file with a temporary file generated to replace the original file;
A setting unit configured to set access information, which is information on an access frequency of the original file, as access information of the temporary file when the file replacement signal is received; And
A management unit for replacing the original file with the temporary file,
Wherein the file access information includes at least one file access information.
The method according to claim 6,
The access information
The number of times of reading, the number of times of writing, the last access time, and the last modification time of the original file.
8. The method of claim 7,
The access information
Further comprising information about an access right of the original file.
The method according to claim 6,
When the original file is classified into one of the predetermined types according to the access information,
A plurality of files classified as the same type
Are stored so as to be adjacent to each other according to a predetermined criterion.
The method according to claim 6,
The management unit
Deletes the original file, and re-names the temporary file as the original file.
KR1020170045192A 2017-04-07 2017-04-07 Method and file system for inheritance of file hotness information KR20180113739A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020170045192A KR20180113739A (en) 2017-04-07 2017-04-07 Method and file system for inheritance of file hotness information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020170045192A KR20180113739A (en) 2017-04-07 2017-04-07 Method and file system for inheritance of file hotness information

Publications (1)

Publication Number Publication Date
KR20180113739A true KR20180113739A (en) 2018-10-17

Family

ID=64099586

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020170045192A KR20180113739A (en) 2017-04-07 2017-04-07 Method and file system for inheritance of file hotness information

Country Status (1)

Country Link
KR (1) KR20180113739A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102550994B1 (en) * 2022-08-01 2023-07-04 (주)내스타일 Method and system for temporal leasing digital contents by use of NFT

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102550994B1 (en) * 2022-08-01 2023-07-04 (주)내스타일 Method and system for temporal leasing digital contents by use of NFT

Similar Documents

Publication Publication Date Title
CN105938448B (en) Method and apparatus for data duplication
TWI465936B (en) File system and methods for managing files according to application
US6934822B2 (en) Organization of multiple snapshot copies in a data storage system
US9454548B1 (en) Pluggable storage system for distributed file systems
US6957362B2 (en) Instantaneous restoration of a production copy from a snapshot copy in a data storage system
US10289692B2 (en) Preserving file metadata during atomic save operations
US7640404B2 (en) File system write filtering for selectively permitting or preventing data from being written to write-protected storage
US20130073819A1 (en) Efficient file system metadata scanning using scoped snapshots
EP3497578B1 (en) Systems and methods for writing back data to a storage device
US10013312B2 (en) Method and system for a safe archiving of data
US20120030439A1 (en) Data Sharing for File Clones Using Reverse Ditto References
US20190187974A1 (en) System and method for downgrading applications
JP2010198383A (en) Storage device, software updating method, and software updating program
US10795579B2 (en) Methods, apparatuses, system and computer program products for reclaiming storage units
WO2016121083A1 (en) Computer system, distributed object sharing method, and edge node
US9934240B2 (en) On demand access to client cached files
CN111475100B (en) Method, apparatus and computer readable medium for managing a storage system
US11176089B2 (en) Systems and methods for implementing dynamic file systems
WO2019212727A1 (en) Storage reserve in a file system
KR20180113739A (en) Method and file system for inheritance of file hotness information
JP2008521120A (en) Content exchange based on usage history between base system and mobile system
US8909875B1 (en) Methods and apparatus for storing a new version of an object on a content addressable storage system
US11977559B2 (en) Providing instant and distributed access to a source blob via copy-on-read blobs and link blobs
JP2004206353A (en) Installation method of software
CN111435342A (en) Poster updating method, poster updating system and poster management system

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
AMND Amendment
E601 Decision to refuse application
AMND Amendment