A Network-Coding-Based Storage System in a Cloud-of-Clouds
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
NCCloud is constructed on high of a network-coding-based storage theme referred to as the practical minimumstorage make (FMSR) codes, that maintain a similar fault tolerance and knowledge redundancy as in ancient erasure codes (e.g., RAID-6), however use less repair traffic and, hence, incur less financial value thanks to knowledge transfer. Largescale distributed storage systems square measure vulnerable to node failures. To supply fault tolerance, information is commonly encoded to keep up information redundancy over multiple storage nodes. If a node fails, it may be repaired by downloading information from living nodes and make the lost information in a very new node. Network secret writing has recently been projected to come up with information redundancy. it\'s shown that network secret writing will minimize the number of knowledge being transferred for repair, whereas maintaining a similar fault tolerance as in typical erasure secret writing schemes. Its plan is to possess storage nodes initial encode their keep information then send the inscribed information for regeneration. On the opposite hand, the subject of network cryptography in storage systems is generally investigated in theoretical studies. Its performance in real readying remains associate degree open issue. This motivates United States of America to review the utility of deploying network cryptography in real-world distributed storage systems.
Authors and Affiliations
Kousalya S, Dr. S Uma, Jeya Shree R
Quality Improvement and Inventory Cost Reduced By Implementation of JIT
In today’s highly competitive work environment, companies have to find ways to be able to compete effectively with their competitors. JIT production system identifies the hidden problems in the value chain and reduces t...
A Novel Cryptography Scheme Based on Decomposition of an Image or Its Transformed Version to be watermarked
Cryptography and watermarking are two key aspects for information hiding to communicate secure information from one source to other source over network. The communication over network is very secure due to these techniq...
Agriculture Information Extraction Using Data Analytics in Weka
With the development of PC based information stockpiling frameworks we have gone over a gigantic measure of storehouse of information. In any case, this information is not extremely accommodating until we realize what w...
Path Planning in Outdoor and Unknown Environment using BAPSO Algorithm
The path planning through BAPSO algorithm in outdoor and unknown environments is a novel approach for robotic path planning. The BAPSO is a hybrid (BAT and PSO) algorithm. The main challenges of robotics are its automat...
Processing Weather Sensor Data Using Iterative MapReduce Approach
Big Data is the most promising research area in the field of Cloud Computing. In areas like social networking applications, e- commerce, finance, health care, education, etc, huge amount of data is being accumulated. As...