Flash News
Welcome to IARC

Publisher Login

Latest News
Welcome to IARC- JCR Report

Submit your Journal to get IARC-JCRR Indexing and Impact Factor

Impact Factor calculated by IARC on the basis of Journal Citation Reference (JCR) Report.


Contact: iarcdpi@gmail.com


M. Manjusha, S. Rajesh

Published in: International Journal of Current Engineering And Scientific Research ( IJCESR)
Volume- 4, Issue-9, pp.77-83, Sep 2017
DPI :-> 16.10046.IJCESR.2017.V4I9.7783.1986

Distributed Storage Data Storages reduces tremendous load on users with respect to their local storages but introduces new issues with respect to data duplicates in the distributed Storage. Although some earlier approaches deal with the problem of implementing an approach to handle distributed Storage security and performance with respect to de-duplication by properly defining the concerned parties in the distributed Storage and invoking file signature identification process using traditional hash message authentication code(HMAC). Due to these hash code algorithms like SHA-1 and MD5 the file integrity values are huge leading to latency factor at the de- duplication estimation. Due to this above problem the storage array accommodates prior integrity hash codes leading to performance issues. So we propose a better Data Signature Algorithm know as Check summing in place of SHA that can be used as a statistical study of chains of chunks that would enable multiple possibilities in both the chunk order which is very less compared to SHA and the corresponding predictions and a developed prototype validates our claim. Providing a way to check the integrity of information stored in an unreliable medium is a prime necessity in the field of secure storage systems. Checksums that are generated using cryptographic hash functions prevent unauthorized users from generating custom checksums to match the malicious data modification that they have made. This report discusses the various design choices in file system check summing and describes an implementation using an in-kernel database in a stackable encryption file system.

Key-Words / Index Term
Distributed Storage computing, Distributed Storage security, SHA, MD5, Message Authentication Codes, Genetic programming, Cross-over Mutation, Similarity Function, and Checksum.

How to cite this article
M. Manjusha, S. Rajesh , “DATA DEDUPLICATION FOR DISTRIBUTED STORAGE SYSTEMS”, International Journal of Current Engineering And Scientific Research ( IJCESR), 4, Issue-9, pp.77-83, Sep 2017. DPI:16.10046.IJCESR.V4.I9.1986