Back close

Implementation of data integrity and regenerating data using erasure code

Publication Type : Journal Article

Publisher : International Journal of Applied Engineering Research, Research India Publication

Source : International Journal of Applied Engineering Research, Research India Publications, Volume 10, Number 17, p.37469-37472 (2015)

Url :

Campus : Bengaluru

School : Department of Computer Science and Engineering, School of Engineering

Department : Computer Science

Year : 2015

Abstract : To ensure outsourced information in distributed storage against defilements, adding adaptation to non-critical failure to distributed storage, alongside proficient information respectability checking and recuperation systems, gets to be discriminating. Recovering codes give adaptation to internal failure by striping information crosswise over numerous servers, while utilizing less repair movement than conventional eradication codes amid disappointment recuperation. In this way, we ponder the issue of remotely checking the respectability of recovering coded information against debasements under a genuine distributed storage setting. We outline and execute a useful information uprightness security Data Integrity Protection (DIP) plan for a particular recovering code, while safeguarding its natural properties of adaptation to internal failure and repair-activity sparing. Our DIP plan is composed under a versatile Byzantine ill-disposed model, and empowers a customer to plausibly check the respectability of arbitrary subsets of outsourced information against general or vindictive debasements. It lives up to expectations under the straightforward supposition of slim distributed storage and permits diverse parameters to be adjusted for an execution security exchange off. We actualize and assess the overhead of our DIP conspire in a genuine distributed storage test bed under diverse parameter decisions. We further dissect the security qualities of our DIP plan by means of numerical models. We exhibit that remote trustworthiness checking can be possibly coordinated into recovering codes in handy organization.

Cite this Research Publication : and Nalini S., “Implementation of data integrity and regenerating data using erasure code”, International Journal of Applied Engineering Research, vol. 10, pp. 37469-37472, 2015.

Admissions Apply Now