Browse > Article
http://dx.doi.org/10.9708/jksci.2014.19.10.081

Design of System for Avoiding upload of Identical-file using SA Hash Algorithm  

Hwang, Sung-Min (Dept. of Information Communication, College of Engineering, Andong National University)
Kim, Seog-Gyu (Dept. of Information Communication, College of Engineering, Andong National University)
Abstract
In this paper, we propose SA hash algorithm to avoid upload identical files and design server system using proposed SA hash algorithm. Client to want to upload file examines the value of SA hash and if the same file is found in server system client use the existing file without upload. SA hash algorithm which is able to examine the identical-file divides original file into blocks of n bits. Original file's mod i bit and output hash value's i bit is calculated with XOR operation. It is SA hash algorithm's main routine to repeat the calculation with XOR until the end of original file. Using SA hash algorithm which is more efficient than MD5, SHA-1 and SHA-2, we can design server system to avoid uploading identical file and save storage capacity and upload-time of server system.
Keywords
Identical-file; Hash algorithm; Server system;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Berson, Thomas A.. "Differential Cryptanalysis Mod 232 with Applications to MD5". EUROCRYPT. pp. 71-80, Nov 1992.
2 Bert den Boer, and Antoon Bosselaers, "Collisions for the Compression Function of MD5", Berlin London, Springer, pp. 293-304, 1993.
3 Hans Dobbertin, "Cryptanalysis of MD5 compress.", Announcement on Internet, "http://Citeseer.ist.psu.edu", May 1996.
4 Dobbertin, Hans, "The Status of MD5 After a Recent Attack", CryptoBytes, Vol.3, No.2, pp. 9-14, 1996.
5 Xiaoyun Wang, and Hongbo Yu, "How to Break MD5 and Other Hash Functions", Lecture Notes in Computer Science Volume 3494, pp. 19-35, 2005.
6 Stephane Manuel, "Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1", Spring Science Business Media, Volume 59, Issue 1-3, pp. 247-263, April 2011.
7 SHA-1 wikipedia "http://www.saylor.org/site/wp-content/uploads/2012/07/SHA-1-1.pdf"
8 Ho-Min, Jeong, "Design of Deduplication Supported Clustering Backup System using File Finger Printing", Korea Information Processing Society, Vol 14 No 2, pp. 0737-0740, Nov 2007.
9 Jung Hoon Kim, Byoung Hong Lim, Young Ik Eom, "Eliminating Redundant Data for Storage Efficiency on Distributed File Systems", Korea Information Processing Society, Vol 16 No 2, pp. 0111-0112, Nov 2009.