Method and system for data backup

ABSTRACT

The present invention relates to a method, system, and computer program product for data backup, the method comprising: performing first chunking on current data by using the same chunking method as that used by original backup data to obtain a current chunk; calculating hash value of the current chunk; and acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing number of continuous matched chunks by one. Since the pertinence between original backup data and current data is maximally utilized, performance of de-duplication method can be efficiently improved.

CROSS REFERENCE

The present application is a continuation of and claims priority under 35 U.S.C. § 120 of U.S. patent application Ser. No. 13/909,370, filed on Jun. 4, 2013, which is incorporated by reference in its entirety.

TECHNICAL FIELD

The present invention relates to computer field, and more specifically, to a method and system for data backup.

BACKGROUND

Data backup is a procedure of preserving data in a certain form, such that when system is damaged or under other specific conditions, the data can be reused. Data backup is an important component in the field of storage, and its position and function in storage system can not be ignored. Further, for an IT system, backup task is also an indispensable component therein. This is because not only can it prevent damage due to accidental event, but also enable historical data to be saved and archived in an optimal way, that is, it provides possibility for conducting historical data query, statistics collection and analysis on historical data, and archiving and saving important information.

De-duplication technology can eliminate redundant data by deleting duplicated data in a data set and only preserving one piece thereof. Generally, since there is a large amount of duplicated data in original data, optimized data for storage can be obtained by using de-duplication technology. Storage space needed by optimized data for storage is significantly reduced. Currently, de-duplication technology is widely used in data backup and archive system, it can help an application program to reduce amount of data for storage, save network bandwidth, improve storage efficiency, thereby saving cost.

There are mainly two criteria for measuring de-duplication technology, that is de-duplication ratio and performance of executing de-duplication. The de-duplication ratio is determined by data's own feature and application schema, while performance of de-duplication depends on specific implementation technology. Current manufacturers have provided many de-duplication methods such as fixed length chunking method, non-fixed length chunking method etc, and in order to increase de-duplication ratio or performance of executing de-duplication, various manufacturers are continuously developing new de-duplication method and system.

SUMMARY

Illustrative embodiments of the invention provide a method and system for data backup which are capable of improving performance of executing de-duplication.

According to an embodiment of the present invention, there is provided a method for data backup, wherein, there is original backup data and current data to be backed up, the method comprising performing first chunking on the current data by using the same chunking method as that used by the original backup data to obtain a current chunk; calculating hash value of the current chunk; and acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing number of continuous matched chunks by one.

According to another embodiment of the present invention, there is provided a system for data backup, wherein, there is original backup data and current data to be backed up, the system comprising: a chunking unit configured to perform first chunking on the current data by using the same chunking method as that used by the original backup data to obtain a current chunk; a calculating unit configured to calculate hash value of the current chunk; and an acquiring unit configured to acquire, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and to increment number of continuous matched chunks by one.

According to an embodiment of the present invention, there is also provided a computer program product for data backup.

With the one or more above embodiments of the invention, since the relationship between original backup data and current data is maximally utilized, performance of de-duplication method can be efficiently improved, thereby improving performance of data backup.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

Through the more detailed description of some embodiments of the present disclosure in the accompanying drawings, the above and other objects, features and advantages of the present disclosure will become more apparent, wherein the same reference generally refers to the same components in the embodiments of the present disclosure.

FIG. 1 shows a block diagram of an exemplary computer system 100 which is applicable to implement the embodiments of the present invention;

FIGS. 2a-2c show flowcharts of a method 200 for data backup according to one or more embodiments of the invention; and

FIG. 3 shows a block diagram of a system 300 for data backup according to one or more embodiments of the invention.

DETAILED DESCRIPTION

Some preferable embodiments will be described in more detail with reference to the accompanying drawings, in which the preferable embodiments of the present disclosure have been illustrated. However, the present disclosure can be implemented in various manners, and thus should not be construed to be limited to the embodiments disclosed herein. On the contrary, those embodiments are provided for the thorough and complete understanding of the present disclosure, and completely conveying the scope of the present disclosure to those skilled in the art.

FIG. 1 shows an exemplary computing system 100 which is applicable to implement the embodiments of the present invention. As shown in FIG. 1, computing system 100 may include: CPU (Central Process Unit) 101, RAM (Random Access Memory) 102, ROM (Read Only Memory) 103, System Bus 104, Hard Disk Controller 105, Keyboard Controller 106, Serial Interface Controller 107, Parallel Interface Controller 108, Display Controller 109, Hard Disk 110, Keyboard 111, Serial External Equipment 112, Parallel External Device 113 and Display 114. Among above devices, CPU 101, RAM 102, ROM 103, Hard Disk Controller 105, Keyboard Controller 106, Serial Interface Controller 107, Parallel Interface Controller 108 and Display Controller 109 are coupled to the System Bus 104. Hard Disk 110 is coupled to Hard Disk Controller 105. Keyboard 111 is coupled to Keyboard Controller 106. Serial External Equipment 112 is coupled to Serial Interface Controller 107. Parallel External Equipment 113 is coupled to Parallel Interface Controller 108. And, Display 114 is coupled to Display Controller 109. It should be understood that the structure as shown in FIG. 1 is only for the exemplary purpose rather than any limitation to the present invention. In some cases, some devices may be added to or removed from computing system 100 based on specific situations.

As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.

Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM) 102, a read-only memory (ROM) 103, an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.

A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wired, optical fiber cable, RF, etc., or any suitable combination of the foregoing.

Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).

Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.

The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.

In a common de-duplication application scenario, typically, only a fraction of data files will be changed, that is, there is a huge similarity between continuous versions of backup data. Based on such an application scenario, according to the concept of the invention, prediction on data chunking is added when chunking data by using conventional de-duplication method, that is, matched data blocks are searched in original backup data. By searching matched data blocks and directly using original backup data to chunk the current data in case that number of continuous matched data blocks exceeds a certain threshold, time in chunking operation can be saved, thereby efficiently improving performance of executing de-duplication.

In a method for data backup according to an embodiment of the invention, there is original backup data D₀ and current data D₁ to be backed up. As stated above, in a common de-duplication scenario, there is a huge similarity between D₀ and D₁. Of course, here the description is made by merely taking the case that there is a large similarity between D₀ and D₁ for example, it should be appreciated that, application scope of the invention is not limited thereto. Next, a method 200 for data backup according to an embodiment of the invention will be further described in conjunction with FIGS. 2a-2c . Method 200 can be performed by, for example, a program executing on computer system 100 or by, for example, system 300 as shown in FIG. 3.

Referring to FIG. 2a , a flowchart of a method 200 for data backup according to an embodiment of the invention is shown. The method 200 starts with step 202.

Next, the method 200 proceeds to step 204: performing first chunking on the current data by using the same chunking method as that used by the original backup data to obtain a current chunk. Assume what is used by the original backup data D₀ is Content Defined Chunking (CDC), then the same chunking method is used to perform first chunking on the current data D₁ to be backed up, and data block obtained after first chunking is taken as current chunk C₁.

Next, the method 200 proceeds to step 206: calculating hash value of the current chunk. Any method in the art may be utilized to calculate hash value H₁ of the current chunk C₁, which will be omitted here for brevity.

Next, the method 200 proceeds to step 208: acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing number of continuous matched chunks by one. The hash value table records therein identifier and hash value of each data block of backup data. According to an embodiment of the invention, hash value H₁ of current chunk C₁ is used to search in the hash value table T₁ of original backup data D₀ for a data block with same hash value H₁ to be taken as matched block M₁, thereby acquiring identifier of the matched block M₁. Here, a variable C_(M) (its initial value is zero) is preset to record number of continuous matched blocks to be used in subsequent procedure. After a data block with same hash value H₁ is found in the hash value table T₁ of original backup data D₀ by using hash value H₁ of current chunk C₁, the number of continuous matched blocks, i.e. value of C_(M), is incremented by one.

By using the chunking method employed by original backup data to perform chunking on current data to be backed up and searching matched chunks from original backup data, original backup data and current data may be compared via manner of chunking, and in contrast to the method in prior art, it can improve performance of executing de-duplication and further enhance performance of data backup.

The method 200 for data backup according to one or more additional embodiments of the invention will be described below in conjunction with FIGS. 2a-2c . In FIGS. 2a-2c , dashed line blocks are used to represent steps related to these other embodiments.

Continue to refer to FIG. 2a , according to an embodiment of the invention, after acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk and incrementing number of continuous matched chunks by one, the method 200 proceeds to step 210: determining whether the number of continuous matched chunks exceeds a threshold. Here, the threshold is a preset value. If the number of continuous matched chunks (CM) exceeds that preset threshold, then it is considered that, data block following current chunk of current data D₁ to be backed up is the same as that following the matched block in the original backup data D₀.

Next, in response to the number of continuous matched chunks not exceeding the threshold, the method 200 proceeds to step 214 (FIG. 2b ): continuing to perform second chunking on the current data by using the same chunking method as that used by the original backup data to obtain a new current chunk; and calculating hash value of the new current chunk. Assume what is used by original backup data D₀ is Content Defined Chunking (CDC), then the same chunking method is employed to continue to perform second chunking on the portion of current data D₁ to be backed up remained after first chunking, and the resulting data block obtained via second chunking is taken as a new current chunk C₂. Then, hash value H₂ of the new current chunk C₂ is calculated.

According to an embodiment of the invention, the method 200 further comprises: in response to calculating hash value H₂ of new current chunk C₂, it proceeds to step 216 (FIG. 2b ): acquiring hash value of a next chunk of the matched chunk from the hash value table of the original backup data; and determine whether the hash value of the new current chunk and the hash value of the next chunk of the matched chunk are equal. Here, it is determined, by acquiring hash value of next chunk M₂ of matched chunk M₁ from hash value table T₁ of the original backup data D₀ and comparing it with the hash value of the new current chunk C₂, whether the new current chunk C₂ is the same as the next chunk M₂ of matched block M₁.

Next, in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk, the method 200 proceeds to step 218 (FIG. 2b ): incrementing number of continuous matched chunks by one; taking the next chunk of the matched chunk as a new matched chunk; and returning to the step of determining whether the number of continuous matched chunks exceeds a threshold (step 210). Here, if the hash value of the new current chunk C₂ is the same as the hash value of next chunk M₂ of the matched chunk M₁, then it indicates that, the new current chunk C₂ is also matched with next chunk M₂ of the matched chunk M₁. Thus, the number of continuous matched chunks, i.e. value of variable C_(M), is incremented by one, and the next chunk M₂ of the matched chunk M₁ is taken as a new matched chunk M₁′, then the method returns to the step of determining whether the number C_(M) of continuous matched chunks exceeds a threshold.

According to an embodiment of the invention, in response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk, the method 200 proceeds to step 220 (FIG. 2b ): clearing the number of continuous matched chunks; returning to the step of acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk (step 208). If the hash value of the new current chunk C₂ is different from the hash value of the next chunk M₂ of the matched chunk M₁, then it indicates that, the new current chunk C₂ is not matched with the next chunk M₂ of the matched chunk M₁, that is, there is a need to re-find an identifier of a matched chunk M₁′ whose hash value is the same as the calculated hash value of the current chunk C₂ from the original backup data D₀, and clear the number of continuous matched chunks to restart counting.

According to an embodiment of the invention, after acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk and incrementing the number of continuous matched chunks by one, the method 200 proceeds to step 210: determining whether the number of continuous matched chunks exceeds a threshold.

Next, in response to the number of continuous matched chunks exceeding the threshold, the method 200 proceeds to step 222 (FIG. 2c ): acquiring length of a data block corresponding to an identifier of a next chunk of the matched chunk.

Next, according to an embodiment of the invention, the method 200 proceeds to step 224 (FIG. 2c ): continuing to perform third chunking on the current data by using the acquired length of a data block corresponding to an identifier of a next chunk of the matched chunk to obtain a new current chunk; calculating hash value of the new current chunk; acquiring hash value of the next chunk of the matched chunk from a hash value table of the original backup data. According to definition of the threshold, if the number of continuous matched chunks exceeds the threshold, then it is considered that, data block following current chunk (corresponding to current chunk C_(T) of current data D₁ when number of continuous matched chunks exceeds the threshold) of current data D₁ to be backed up is the same as that following matched block (corresponding to matched chunk M_(T) of original backup data D₀ when number of continuous matched chunks exceeds the threshold) of original backup data D₀. Thus, length of the data block of original backup data D₀ may be utilized to perform chunking on current data. That is, by acquiring identifier of the next chunk M_(T+1) of the matched chunk M_(T) from hash value table T₁ of the original backup data D₀, and further acquiring length of a data block corresponding to the identifier of the next chunk M_(T+1) of the matched chunk M_(T), and in turn utilizing the acquired length of the data block corresponding to the identifier of the next chunk M_(T+1) of the matched chunk M_(T) to perform third chunking on the portion of current data remained after first chunking and second chunking, a new current chunk C₃ is obtained. Meanwhile, in order to ensure the new current chunk C₃ obtained through third chunking is the same as the data block following the matched block M_(T) in original backup data D₀, there is a need to re-calculate hash value H₃ of the new current chunk C₃, and to compare its hash value H₃ with that of the next chunk M_(T+1) of the matched chunk M_(T) so as to perform verification.

Next, according to an embodiment of the invention, the method 200 proceeds to step 226 (FIG. 2c ): determine whether the hash value of the new current chunk and the hash value of the next chunk of the matched chunk are equal. In response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk, the method 200 proceeds to step 228 (FIG. 2c ), wherein, taking the next chunk of the matched chunk as a new matched chunk; returning to the step of acquiring length of a data block corresponding to an identifier of the next chunk of the matched chunk. In response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk, the method 200 proceeds to step 230 (FIG. 2c ): clearing the number of continuous matched chunks, returning to the step of acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk.

As stated above, in order to ensure that the new current chunk C₃ obtained through third chunking is the same as the data block following the matched block M_(T) in original backup data D₀, there is a need to re-calculate hash value H₃ of current chunk C₃, and to compare its hash value H₃ with that of the next chunk M_(T+1) of the matched chunk M_(T) so as to perform verification. If hash value H₃ of the current chunk C₃ is the same as hash value of the next chunk M_(T+1) of the matched chunk M_(T), then it indicates that, the new current chunk C₃ is also matched with the next chunk M_(T+1) of the matched chunk M_(T). Thus, the next chunk M_(T+1) of the matched chunk M_(T) is taken as a new matched chunk M_(T)′, and return to the step of acquiring an identifier of a next chunk of the matched chunk from hash value table T₁ of original backup data D₀ (step 222). If hash value H₃ of the current chunk C₃ is different from that of the next chunk M_(T+1) of the matched chunk M_(T), then it indicates that, the new current chunk C₃ is not matched with the next chunk M_(T+1) of the matched chunk M_(T), that is, there is a need to re-find an identifier of a matched chunk M₁′ whose hash value is the same as the calculated hash value of the current chunk C₃ from the original backup data D₀, and clear the number of continuous matched chunks to restart counting.

One or more embodiments of the invention have been described above in detail in conjunction with FIGS. 2a-2c . It should be appreciated that, the above description is merely for purpose of illustration, and should not be construed as a limitation to the scope claimed by the invention.

Next, a system 300 for data backup according to one or more embodiments of the invention will be described in conjunction with FIG. 3. In FIG. 3, dashed line blocks represent optional structures of the system related to one or more other embodiments of the invention.

As shown in FIG. 3, system 300 for data backup according to an embodiment of the invention comprises: a chunking unit 302 configured to perform first chunking on the current data by using the same chunking method as that used by the original backup data to obtain a current chunk; a calculating unit 304 configured to calculate hash value of the current chunk; and an acquiring unit 306 configured to acquire, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and to increment number of continuous matched chunks by one.

According to an embodiment of the invention, system 300 for data backup further comprises: a determining unit 308 configured to determine whether the number of continuous matched chunks exceeds a threshold, and in response to not exceeding the threshold, the chunking unit 302 is further configured to continue to perform second chunking on the current data by using the same chunking method as that used by the original backup data to obtain a new current chunk; the calculating unit 304 is further configured to calculate hash value of the new current chunk.

According to an embodiment of the invention, system 300 for data backup further comprises: the acquiring unit 306 further configured to acquire hash value of a next chunk of the matched chunk from the hash value table of the original backup data; a comparing unit 310 configured to compare the hash value of the new current chunk with the hash value of the next chunk of the matched chunk, and in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk, system 300 is further configured to increment number of continuous matched chunks by one; take the next chunk of the matched chunk as a new matched chunk; return to determine whether the number of continuous matched chunks exceeds a threshold. In response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk, system 300 is further configured to clear the number of continuous matched chunks; return to acquire, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk.

According to an embodiment of the invention, system 300 for data backup further comprises a determining unit 308 configured to determine whether the number of continuous matched chunks exceeds a threshold, and in response to exceeding the threshold; the acquiring unit 306 is further configured to acquire length of a data block corresponding to an identifier of a next chunk of the matched chunk.

According to an embodiment of the invention, system 300 for data backup further comprises the chunking unit 302 further configured to continue to perform third chunking on the current data by using the acquired length of a data block corresponding to an identifier of a next chunk of the matched chunk to obtain a new current chunk; the calculating unit 304 is further configured to calculate hash value of the new current chunk; the acquiring unit 306 is further configured to acquire hash value of the next chunk of the matched chunk from a hash value table of the original backup data; the comparing unit 310 is further configured to compare the hash value of the new current chunk with the hash value of the next chunk of the matched chunk, and in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk, system 300 is further configured to take the next chunk of the matched chunk as a new matched chunk; return to acquire an identifier of the next chunk of the matched chunk from a hash value table of the original backup data; in response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk, system 300 is further configured to clear the number of continuous matched chunks; return to acquire, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk.

The flowchart and block diagrams in the Figs. illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the Figs. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.

The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. 

What is claimed is:
 1. A computer system for data backup, the system comprising: one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions, when executed by the at least one of the one or more of the processors, cause the at least one of the one or more of the processors to perform a method comprising: receiving, from one of the one or more computer-readable tangible storage devices, original backup data; receiving, from one of the one or more computer-readable tangible storage devices, current backup data; performing first chunking on the current data by using the same chunking method as that used on the original backup data to obtain a current chunk, wherein the original backup data is a chunking data that is defined by content; calculating a hash value of the current chunk, wherein a determination of whether a number of continuous matched chunks exceeds a threshold is determined, based on the calculated hash value, and wherein the threshold is a preset value, if a number of continuous matched chunks exceeds the preset threshold, a time for chunking the data is saved, and, wherein, then data blocks of the current chunk of data is equal to a matched block of the original backup data; in response to a number of continuous matched chunks exceeding the threshold, the length of a data block that corresponds to an identifier of a next chunk of the matched chunk is acquired; acquiring from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing a number of continuous matched chunks, based on the exceeded threshold; and clearing the number of continuous matched chunks, whereby, the hash value table of the original backup data, and the identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk are returned in response to the number of continuous matched chunks exceeding the threshold; and backing up remaining data after clearing the continuous matched chunks to one of the one or more computer-readable tangible storage devices.
 2. The computer system according to claim 1, further comprising: in response to not exceeding the threshold, continuing to perform second chunking on the current data by using the same chunking method as that used by the original backup data to obtain a new current chunk data; and calculating a hash value of the new current chunk.
 3. The computer system according to claim 2, further comprising: acquiring a hash value of a next chunk of the matched chunk from the hash value table of the original backup data; comparing the hash value of the new current chunk with the hash value of the next chunk of the matched chunk; in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk: incrementing a number of continuous matched chunks; taking the next chunk of the matched chunk as a new matched chunk; and returning to the step of determining whether the number of continuous matched chunks exceeds a threshold; in response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk: clearing the number of continuous matched chunks; and returning to the step of acquiring, from the hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk.
 4. The computer system according to claim 1, further comprising: determining whether the number of continuous matched chunks exceeds a threshold, and in response to exceeding the threshold, acquiring a length of a data block corresponding to an identifier of a next chunk of the matched chunk.
 5. The method according to claim 4, further comprising: continuing to perform a third chunking on the current data by using the acquired length of a data block corresponding to an identifier of a next chunk of the matched chunk to obtain a new current chunk; calculating a hash value of the new current chunk; acquiring a hash value of the next chunk of the matched chunk from the hash value table of the original backup data; comparing the hash value of the new current chunk with the hash value of the next chunk of the matched chunk; in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk: taking the next chunk of the matched chunk as a new matched chunk; and returning to the step of acquiring an identifier of the next chunk of the matched chunk from a hash value table of the original backup data; in response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk: clearing the number of continuous matched chunks; and returning to the step of acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk.
 6. A computer program product for data backup, computer program product comprising: one or more non-transitory computer-readable tangible storage devices and program instructions stored on at least one of the one or more non-transitory computer-readable tangible storage devices, the program instructions executable to perform a method comprising: receiving, from one of the one or more computer-readable tangible storage devices, original backup data; receiving, from one of the one or more computer-readable tangible storage devices, current backup data; performing first chunking on the current data by using the same chunking method as that used on the original backup data to obtain a current chunk, wherein the original backup data is a chunking data that is defined by content; calculating a hash value of the current chunk, wherein a determination of whether a number of continuous matched chunks exceeds a threshold is determined, based on the calculated the hash value, and wherein the threshold is a preset value, if a number of continuous matched chunks exceeds the preset threshold, a time for chunking the data is saved, and, wherein, then data blocks of the current chunk of data is equal to a matched block of the original backup data; in response to a number of continuous matched chunks exceeding the threshold, the length of a data block that corresponds to an identifier of a next chunk of the matched chunk is acquired; acquiring from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk, and incrementing a number of continuous matched chunks based on the exceeded threshold; and clearing the number of continuous matched chunks, whereby, the hash value table of the original backup data, and the identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk are returned in response to the number of continuous matched chunks exceeding the threshold; and backing up remaining data after clearing the continuous matched chunks to one of the one or more computer-readable tangible storage devices.
 7. The computer program product according to claim 6, wherein the method further comprises: in response to not exceeding the threshold, continuing to perform second chunking on the current data by using the same chunking method as that used by the original backup data to obtain a new current chunk; and calculating a hash value of the new current chunk.
 8. The computer program product according to claim 7, wherein the method further comprises: acquiring a hash value of a next chunk of the matched chunk from the hash value table of the original backup data; comparing the hash value of the new current chunk with the hash value of the next chunk of the matched chunk; in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk: incrementing a number of continuous matched chunks; taking the next chunk of the matched chunk as a new matched chunk; and returning to the step of determining whether the number of continuous matched chunks exceeds a threshold; in response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk: clearing the number of continuous matched chunks; and returning to the step of acquiring, from the hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk.
 9. The computer program product according to claim 6, wherein the method further comprises: determining whether the number of continuous matched chunks exceeds a threshold, and in response to exceeding the threshold, acquiring a length of a data block corresponding to an identifier of a next chunk of the matched chunk.
 10. The computer program product according to claim 9, wherein the method further comprises: continuing to perform a third chunking on the current data by using the acquired length of a data block corresponding to an identifier of a next chunk of the matched chunk to obtain a new current chunk; calculating a hash value of the new current chunk; acquiring a hash value of the next chunk of the matched chunk from the hash value table of the original backup data; comparing the hash value of the new current chunk with the hash value of the next chunk of the matched chunk; in response to the hash value of the new current chunk being the same as the hash value of the next chunk of the matched chunk: taking the next chunk of the matched chunk as a new matched chunk; and returning to the step of acquiring an identifier of the next chunk of the matched chunk from a hash value table of the original backup data; in response to the hash value of the new current chunk being different from the hash value of the next chunk of the matched chunk: clearing the number of continuous matched chunks; and returning to the step of acquiring, from a hash value table of the original backup data, an identifier of a matched chunk whose hash value is the same as the calculated hash value of the current chunk. 