• DocumentCode
    713031
  • Title

    Redundant file finder, remover in mobile environment through SHA-3 algorithm

  • Author

    Meera, K. ; Sankar, P. Krishna ; Kumar, K. Sriram

  • fYear
    2015
  • fDate
    26-27 Feb. 2015
  • Firstpage
    1440
  • Lastpage
    1447
  • Abstract
    Mobile environment provides storage as a main service. Data storage is a desired property when users outsource their data to be stored in a place irrespective of the locations. File systems are designed to control how files are stored and retrieved. Without knowing the context and semantics of file contents, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a complex and challenging issue for enterprises to seek deduplication technologies to reduce cost and increase the storage efficiency. To solve such problem, Hash values for files has been computed. The hash function competition to design a new cryptographic hash standard `SHA-3´ is currently one of the well-known topics in cryptologic research, its outcome heavily depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions. Focus of computation is performed for duplicate knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. It helps to reclaim valuable disk space and improve data efficiency in mobile environment.
  • Keywords
    cryptography; mobile computing; storage management; SHA-3 algorithm; SHA3 signature comparison; cost reduction; cryptographic hash standard; cryptologic research; data efficiency; data storage; deduplication technology; duplicate copy; file content; file system; hash computation; hash function competition; hash value; knowledge removal; mobile environment; network bandwidth; public evaluation; redundant consumption; redundant file finder; secure hashing algorithm; storage efficiency; storage space; Algorithm design and analysis; Conferences; Cryptography; Memory management; Mobile communication; Redundancy; Deduplication; Hash code; SHA3; Similarity Measure;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronics and Communication Systems (ICECS), 2015 2nd International Conference on
  • Conference_Location
    Coimbatore
  • Print_ISBN
    978-1-4799-7224-1
  • Type

    conf

  • DOI
    10.1109/ECS.2015.7124824
  • Filename
    7124824