25 research outputs found

    FNT-based reed-solomon erasure codes

    Get PDF
    This paper presents a new construction of Maximum-Distance Separable (MDS) Reed-Solomon erasure codes based on Fermat Number Transform (FNT). Thanks to FNT, these codes support practical coding and decoding algorithms with complexity O(n log n), where n is the number of symbols of a codeword. An open-source implementation shows that the encoding speed can reach 150Mbps for codes of length up to several 10,000s of symbols. These codes can be used as the basic component of the Information Dispersal Algorithm (IDA) system used in a several P2P systems

    A New Secure Protected De-duplication Structure With Upgraded Reliability

    Get PDF
    This makes the essential attempt to formalize the possibility of dispersed strong deduplication system. We propose new conveyed deduplication structures with higher unfaltering quality in which the data lumps are appropriated over different cloud servers. The security requirements of data protection and name consistency are in like manner achieved by introducing a deterministic puzzle sharing arrangement in appropriated stockpiling systems, as opposed to using simultaneous encryption as a piece of past deduplication structures. Security examination displays that our deduplication systems are secure the extent that the definitions decided in the proposed security illustrate. As a proof of thought, we complete the proposed systems and display that the procured overhead is especially limited in sensible circumstances

    An Exploration of Optimization Algorithms and Heuristics for the Creation of Encoding and Decoding Schedules in Erasure Coding

    Get PDF
    Erasure codes are employed by disk systems to tolerate failures. They are typically characterized by bit-matrices that are used for encoding and decoding. The efficiency of an erasure code using a bit-matrix is directly related to the number of exclusive-or (XOR) operations required during the encoding process. Thus, a problem within the field of erasure coding is how to schedule the XOR operations for any given bit-matrix so that the fewest number of XOR operations are required. This paper develops an algorithm for finding the optimum solution and analyzes the performance of two known heuristics on a set of encoding matrices

    A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud

    Get PDF
    Information De-duplication strategy is utilized for wiping out the copy duplicates of rehashed information in distributed storage and to diminish the information duplication. This method is utilized to enhance stockpiling use furthermore be connected to network information exchanges to diminish the quantity of bytes that must be sent. Keeping numerous information duplicates with the comparative substance, de-duplication disposes of excess information by keeping one and only physical duplicate and allude other repetitive information to that duplicate. Information de-duplication happens document level and also square level. The copy duplicates of indistinguishable document take out by record level de-duplication. For the piece level duplication which takes out copies squares of information that happen in non-indistinguishable records. In spite of the fact that information deduplication takes a great deal of advantages, security, and in addition protection concerns, emerges as client's delicate information are able to both insider and outcast assaults. In the conventional encryption giving information privacy, is opposing with information de-duplication. To keep up trustworthiness we are giving the Third Party Auditor plot which makes the review of the record put away at cloud and advises the information proprietor about document status put away at cloud server. This framework underpins security difficulties, for example, an approved copy check, honesty, information classification and unwavering quality. In this paper new disseminated deduplication frameworks with higher dependability in which the information lumps are circulated over different cloud servers is being proposed

    An Exploration of Optimization Algorithms and Heuristics for the Creation of Encoding and Decoding Schedules in Erasure Coding

    Get PDF
    Erasure codes are employed by disk systems to tolerate failures. They are typically characterized by bit-matrices that are used for encoding and decoding. The efficiency of an erasure code using a bit-matrix is directly related to the number of exclusive-or (XOR) operations required during the encoding process. Thus, a problem within the field of erasure coding is how to schedule the XOR operations for any given bit-matrix so that the fewest number of XOR operations are required. This paper develops an algorithm for finding the optimum solution and analyzes the performance of two known heuristics on a set of encoding matrices
    corecore