File Synchronization between Digital Safes

Shah Vishal, Sushma V, Shweta Hiremath, Vijayalaxmi ., Manjunath P C

Abstract


The main concern of Cloud storage solutions is to provide the availability of mobility needs and different devices to end users. To provide such services to end user which resolve to a challenge for cloud services. This challenge is solved by developing a secure framework which ensures that the end user data is continuously and automatically synchronized when user moves from one device to another device. Additionally the framework provides with property of secured sharing the data of end user with specific user. To provide this framework we propose a protocol known as synchronization protocol through which we can detect the changes of two different file versions which are located in a system in variety of devices. To detect the changes between two different file versions in a system we adopt Hierarchical Hash Tree and to provide the sharing of data for user we adopt Web Socket protocol which increases the efficiency of synchronization protocol.


Keywords


File synchronization, Web socket, Hierarchical hash tree, cloud storage service, synchronization protocol.

Full Text:

PDF

References


M. Msahli and A. Serhrouchni, “Sbaas: Safe box as a service,” in 9th IEEE International Conference on Collaborative. Computing: Networking, Applications and Worksharing, Nov 2013. [2] “Afnor groups.” [Online]. Available: http://www.afnor.org/en [3] M. D. N. Jain and R. Tewari., “Taper: Tiered approach for eliminating redundancy in replica synchronization,” in. In Proc. of the USENIX Conference on File And Storage Systems, 2005. [4] Dropbox. http://www.dropbox.com/ [5]J. H. Howard. Using reconciliation to share files between occasionally connected computers. Proceedings IEEE Workshop on Workstation Operating Systems, Napa ,California, October 1993, pages 56-60. [6] SyncML : The new era in data synchronization. http://syncml.org. [7] H. Yan, U. Irmak, and T. Suel, “Algorithms for lowlatency remote file synchronization,” in The 27th Conference on Computer Communications. IEEE INFOCOM 2008, April 2008. [8] A. Tridgell and P. Mackerras, “The rsync algorithm. technical report trcs- 96-05, department of computer science,” in The Australian National University, Canberra, Australia, 1996. [9] Benjamin, C.Pierce, and J. Vouillon, “What’s in unison? a formal specification and reference implementation of a file synchronizer,” in Tech. rep. MSCIS-03-36, Department of Computer and Information Science, University of Pennsylvania, 2004. [10] C. Liang, L. Hu, Z. Lei, and J. Wang, “Synccs: A cloud storage based file synchronization approach,” Jul 2014. [11] I. Drago, M. Mellia, M. M. Munafo, A. Sperotto, R. Sadre, and A. Pras, “Inside dropbox: Understanding personal cloud storage services,” in Proceedings of the 2012 ACM Conference on Internet Measurement Conference, ser. IMC ’12, 2012. [12] R. Al-Ekram, A. Adma, and O. Baysal, “diffx: An algorithm to detect changes in multi-version xml documents,” in Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, ser. CASCON ’05, 2005. [13] . S. Chawathe, A. Rajaraman, H. Garcia-Molina, and J. Widom, “Change detection in hierarchically structured information,” in Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD ’96, 1996. [14] S. S. Chawathe and H. Garcia-Molina, “Meaningful change detection in structured data,” in Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD ’97, 1997. [15] J. C. Anderson, J. Lehnardt, and N. Slater, “Couchdb

the definitive guide.” [Online]. Available: http://guide.couchdb.org/ [16] M. jemel and A. serhrouchni, “Security assurance of local data stored [17] N. Jain, M. Dahlin, and R. Tewari, Taper: Tiered approach for eliminating redundancy in replica synchronization,” in In Proc. of the USENIX Conference on File And Storage Systems, 2005




DOI: https://doi.org/10.26483/ijarcs.v9i0.6261

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 International Journal of Advanced Research in Computer Science