Title :
Redundant file finder, remover in mobile environment through SHA-3 algorithm
Author :
Meera, K. ; Sankar, P. Krishna ; Kumar, K. Sriram
Abstract :
Mobile environment provides storage as a main service. Data storage is a desired property when users outsource their data to be stored in a place irrespective of the locations. File systems are designed to control how files are stored and retrieved. Without knowing the context and semantics of file contents, file systems often contain duplicate copies and result in redundant consumptions of storage space and network bandwidth. It has been a complex and challenging issue for enterprises to seek deduplication technologies to reduce cost and increase the storage efficiency. To solve such problem, Hash values for files has been computed. The hash function competition to design a new cryptographic hash standard `SHA-3´ is currently one of the well-known topics in cryptologic research, its outcome heavily depends on the public evaluation. Testing the finalists in the competition for a new SHA-3 standard shows generally fast, secure hashing algorithms with few collisions. Focus of computation is performed for duplicate knowledge removal. Hash computation is done by the method of comparing files initially and followed by SHA3 signature comparison. It helps to reclaim valuable disk space and improve data efficiency in mobile environment.
Keywords :
cryptography; mobile computing; storage management; SHA-3 algorithm; SHA3 signature comparison; cost reduction; cryptographic hash standard; cryptologic research; data efficiency; data storage; deduplication technology; duplicate copy; file content; file system; hash computation; hash function competition; hash value; knowledge removal; mobile environment; network bandwidth; public evaluation; redundant consumption; redundant file finder; secure hashing algorithm; storage efficiency; storage space; Algorithm design and analysis; Conferences; Cryptography; Memory management; Mobile communication; Redundancy; Deduplication; Hash code; SHA3; Similarity Measure;
Conference_Titel :
Electronics and Communication Systems (ICECS), 2015 2nd International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-7224-1
DOI :
10.1109/ECS.2015.7124824