File Synchronization between Digital Safes
Main Article Content
Abstract
The main concern of Cloud storage solutions is to provide the availability of mobility needs and different devices to end users. To provide such services to end user which resolve to a challenge for cloud services. This challenge is solved by developing a secure framework which ensures that the end user data is continuously and automatically synchronized when user moves from one device to another device. Additionally the framework provides with property of secured sharing the data of end user with specific user. To provide this framework we propose a protocol known as synchronization protocol through which we can detect the changes of two different file versions which are located in a system in variety of devices. To detect the changes between two different file versions in a system we adopt Hierarchical Hash Tree and to provide the sharing of data for user we adopt Web Socket protocol which increases the efficiency of synchronization protocol.
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
M. Msahli and A. Serhrouchni, “Sbaas: Safe box as a service,†in 9th IEEE International Conference on Collaborative. Computing: Networking, Applications and Worksharing, Nov 2013. [2] “Afnor groups.†[Online]. Available: http://www.afnor.org/en [3] M. D. N. Jain and R. Tewari., “Taper: Tiered approach for eliminating redundancy in replica synchronization,†in. In Proc. of the USENIX Conference on File And Storage Systems, 2005. [4] Dropbox. http://www.dropbox.com/ [5]J. H. Howard. Using reconciliation to share files between occasionally connected computers. Proceedings IEEE Workshop on Workstation Operating Systems, Napa ,California, October 1993, pages 56-60. [6] SyncML : The new era in data synchronization. http://syncml.org. [7] H. Yan, U. Irmak, and T. Suel, “Algorithms for lowlatency remote file synchronization,†in The 27th Conference on Computer Communications. IEEE INFOCOM 2008, April 2008. [8] A. Tridgell and P. Mackerras, “The rsync algorithm. technical report trcs- 96-05, department of computer science,†in The Australian National University, Canberra, Australia, 1996. [9] Benjamin, C.Pierce, and J. Vouillon, “What’s in unison? a formal specification and reference implementation of a file synchronizer,†in Tech. rep. MSCIS-03-36, Department of Computer and Information Science, University of Pennsylvania, 2004. [10] C. Liang, L. Hu, Z. Lei, and J. Wang, “Synccs: A cloud storage based file synchronization approach,†Jul 2014. [11] I. Drago, M. Mellia, M. M. Munafo, A. Sperotto, R. Sadre, and A. Pras, “Inside dropbox: Understanding personal cloud storage services,†in Proceedings of the 2012 ACM Conference on Internet Measurement Conference, ser. IMC ’12, 2012. [12] R. Al-Ekram, A. Adma, and O. Baysal, “diffx: An algorithm to detect changes in multi-version xml documents,†in Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, ser. CASCON ’05, 2005. [13] . S. Chawathe, A. Rajaraman, H. Garcia-Molina, and J. Widom, “Change detection in hierarchically structured information,†in Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD ’96, 1996. [14] S. S. Chawathe and H. Garcia-Molina, “Meaningful change detection in structured data,†in Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD ’97, 1997. [15] J. C. Anderson, J. Lehnardt, and N. Slater, “Couchdb
the definitive guide.†[Online]. Available: http://guide.couchdb.org/ [16] M. jemel and A. serhrouchni, “Security assurance of local data stored [17] N. Jain, M. Dahlin, and R. Tewari, Taper: Tiered approach for eliminating redundancy in replica synchronization,†in In Proc. of the USENIX Conference on File And Storage Systems, 2005