De-duplication in File Sharing Network

被引:0
|
作者
Yadav, Divakar [1 ]
Dani, Deepali [1 ]
Kumari, Preeti [1 ]
机构
[1] Jaypee Inst Informat Technol, Noida, India
来源
CONTEMPORARY COMPUTING | 2011年 / 168卷
关键词
De-duplication; three-tier architecture; Hash Algorithm; Bandwidth conservation; Storage reduction;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Redundant data transfer over a network is one of the important reasons of traffic congestion today. In this paper, we proposed an efficient and secure file sharing model using de-duplication technology to resolve it. A file sharing based de-duplication system reduce bandwidth and storage at both client and server machine. It does not download duplicate blocks that already have been downloaded. To achieve the security of client data, three-tier architecture is proposed in this work. For this purpose SHA-1 hash function is being used, in which 8KB block of data is converted into a 20 bytes digest. Thus the design presents a dramatic reduction in storage space requirement for various workloads and hence reduces time to perform backup in bandwidth constraint environment.
引用
收藏
页码:551 / 553
页数:3
相关论文
共 50 条
  • [1] Data De-duplication on Similar File Detection
    Zhu, Yueguang
    Zhang, Xingjun
    Zhao, Runting
    Dong, Xiaoshe
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 66 - 73
  • [2] SECURED AND RELIABLE FILE SHARING SYSTEM WITH DE-DUPLICATION USING ERASURE CORRECTION CODE
    Jacob, Chippy
    Rekha, V. R.
    2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 221 - 228
  • [3] Provable Ownership of File in De-duplication Cloud Storage
    Yang, Chao
    Ren, Jian
    Ma, Jianfeng
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 695 - 700
  • [4] Optimization for data de-duplication algorithm based on file content
    Xuejun NIE
    Leihua QIN
    Jingli ZHOU
    Ke LIU
    Jianfeng ZHU
    Yu WANG
    Frontiers of Optoelectronics in China, 2010, 3 (03) : 308 - 316
  • [5] Optimization for data de-duplication algorithm based on file content
    Nie, Xuejun
    Qin, Leihua
    Zhou, Jingli
    Liu, Ke
    Zhu, Jianfeng
    Wang, Yu
    FRONTIERS OF OPTOELECTRONICS, 2010, 3 (03) : 308 - 316
  • [6] Hashing Fingerprints for Identity De-duplication
    Wang, Yi
    Yuen, Pong C.
    Cheung, Yiu-ming
    PROCEEDINGS OF THE 2013 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'13), 2013, : 49 - 54
  • [7] De-Duplication Of Passports Using Aadhaar
    Prathilothamai, M.
    Nair, Priyanka Sunil
    2017 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2017,
  • [8] Stormy weather, redundancy, and de-duplication
    Ojala, Marydee
    ONLINE, 2008, 32 (05): : 5 - 5
  • [9] Secure Static Data De-duplication
    Pawar, Rohit
    Zanwar, Payal
    Bora, Shruti
    Kullkarni, Shweta
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (03): : 69 - 73
  • [10] VMDedup: Memory De-duplication in Hypervisor
    Shaikh, Furquan
    Yao, Fangzhou
    Gupta, Indranil
    Campbell, Roy H.
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 379 - 384