SlideShare a Scribd company logo
3rd International Conference On
Computing, Communication, Control And
Automation IEEE
(ICCUBEA-August 2017)
Presentation On
“Improving the availability and reducing
redundancy using deduplication of cloud storage
system “
By,
Mr. Dhanaraj S. Patil
Department of Technology, Shivaji university, Kolhapur
INTRODUCTION
• Cloud storage system
• Cloud of clouds
• Replication
• Erasure code
• Existing system
• Proposed system
CLOUD STORAGE SYSTEM
• The digital data is stored in logical pools
• Public, private and hybrid
• Advantages:-
Pay-per-Use
Availability
• Disadvantages:-
Data outage
Vendor lock in problem
• Example:-
Amazon s3, windows Azure
CLOUD-OF-CLOUD
• The digital data is stored in logical pools
• Multiple cloud venders at one point
• low cost
• no vender-lock
• example:- Depsky
REPLICATION
• Creating multiple copies of data
• Widely used in cloud storage systems
• 3- replica strategy
• Improves reliability, fault-tolerance, accessibility
ERASURE CODE
• Data is broken into fragments, expanded and encoded with
redundant data pieces
• consumes less storage
• Data can be rebuild from any fragment.
• drawback:- CPU-intensive
PROBLEM STATEMENT
To develop a system which implements efficient
cloud storage using data deduplication technique to avoid
data redundancy problem.
ACHIEVED OBJECTIVES
• To study the different data distribution technique in
cloud system.
• To analyze the hybrid redundant [HyRD] data
distribution scheme.
• To design system for data redundancy problem by
applying data deduplication with versioning.
• To measure the performance of proposed system with
existing system.
SYSTEM ARCHITECTURE
SYSTEM ARCHITECTURE
Modules :
• Data owner
• File verification
• File versioning
• Hybrid redundancy
Message Digest 5 algorithm [MD5] :
Step 1: Appending padding bits
message is extended to length 448 modulo 512.
Step 2: Appending length
A 64- bit representation of message is added.
Step 3: Initialize MD buffer
It used to store the result.
word A: 01 23 45 67
word B: 89 ab cd ef
word C: fe dc ba 98
word D: 76 54 32 10
Message Digest 5 algorithm [MD5]
contd.
Step 4: process message in 16- word blocks
Define 4 Auxiliary functions. Which helps in
processing message in 512 –bit block
Step 5: Output
To produce digest just add a,b,c,d and convert it
into hexadecimal.
SYSTEM REQUIREMENT
1. Hardware Requirements
Processor: Pentium Dual-Core 2.50 GHz (Or Above)
Memory: 1GB (Or Above)
2. Software Requirements
Operating System: Windows 7/ 8 and above
Front End & Back end: HTML, PHP
Database: MySql
RESULTS
RESULTS
RESULTS
RESULTS
CONCLUSION
Availability is one of the main key constraint of the cloud
storage service that user must consider while uploading data to cloud
with single cloud storage system problem may arise such as, vendor-
lock-in, service outage etc. In existing system, the inter cloud system was
based on hybrid redundancy distribution technique but still it shows data
redundancy issues. The paper tries to solve above problem with the help
of MD5 and versioning.
The paper describes several techniques to reduce the data
redundancy problem. To implement this MD5 algorithm is used for
verification of the hash values of the file and file versions are maintain
for availability and durability of the data. An experimental study shows
that redundancy problem can be reduced and data availability maintains
with our approach. For the future work we are trying to add security to
our system while sharing our data and we can also tries to provide access
control policies.
REFERENCES
[1] Bo Mao, Suzhen Wu and Hong Jiang “Exploiting Workload Characteristics and Service Diversity to
Improve the Availability of Cloud Storage Systems”, IEEE Transactions on Parallel and Distributed
Systems, Pages: 2010 – 2021, Year: 2016.
[2] Wenhao Li, Yun Yang, Dong Yuan, “Ensuring Cloud data reliability with minimum replication by
proactive replica checking”, IEEE TRANSACTIONS ON COMPUTERS, Pages: 1494 - 1506, Year: 2016.
[3] Maomeng Su, Lei Zhang, Yongwei Wu, Kang Chen, and Keqin Li, “Systematic Data Placement
Optimization in Multi-Cloud Storage for Complex Requirements”, IEEE TRANSACTIONS ON
COMPUTERS, Pages: 1964 –1977, Year: 2016.
[4] Amir Nahir, Ariel Orda, and Danny Raz, “Replication-based Load Balancing”, IEEE TRANSACTIONS
ON PARALLEL AND DISTRIBUTED SYSTEMS, Pages: 494 – 507, Year: 2016.
[5] Shiuan-Tzuo Shen, Hsiao-Ying Lin, and Wen-Guey Tzeng, “An Effective Integrity Check Scheme for
Secure Erasure Code-Based Storage Systems”, IEEE TRANSACTIONS ON RELIABILITY, Pages: 840 –
851, Year: 2015.
[6] Ayad F. Barsoum and M. Anwar Hasan, “Provable Multicopy Dynamic Data Possession in Cloud
Computing Systems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND
SECURITY,Pages: 485 - 497, Year: 2015.
[7] Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef, “Transparent Data
Deduplication in the Cloud”, In Proceedings of the 22nd ACM SIGSAC Conference on Computer and
Communications Security, October 2015.
[8] N.Jayapandian, Dr.A.M.J.Md.Zubair Rahman, I.Nandhini, “A Novel Approach for Handling Sensitive
Data with Deduplication Method in Hybrid Cloud”, 2015 Online International Confernece on Green
Engineering and Technologies (IC-GET 2015), Pages: 1 – 6, Year: 2015.
[9] Ghazal Riahi “E-learning systems based on cloud computing: A Review”, Procedia Computer Science
62, 352 – 359, 2015.
[10] Hui Zhang, Guofei Jiang, Kenji Yoshihira, and Haifeng Chen, “Proactive Workload Management in
Hybrid Cloud Computing”, IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT,
Pages: 90 – 100, Year: 2014.
REFERENCES
[11] X. Zhang, M. Tsugawa, Y. Zhang, H. Song, C. Cao, G. Huang, and J. Fortes. Towards Model-Defined
Cloud of Clouds, In Proceedings of the 17th International Conference on Model Driven Engineering
Languages and Systems (MODELS‟14), pages 41–45, Sep. 2014.
[12] Osama Khan, Randal Burns, James Plank, William Pierce Cheng Huang, “Rethinking Erasure Codes for
Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads”, In Proceedings of the 10th
USENIX conference on File and Storage Technologies, Pages 20-20, February 2012.
[13] Jain, A. and S. chawla.”E-learning in the cloud”, International Journal of Latest Research in Science and
Technology 2(1): 478-481. 2013.
[14] Y. Ma, T. Nandagopal, K. Puttaswamy, and S. Banerjee, “An Ensemble of Replication and Erasure Codes
for Cloud File Systems”, In Proceedings of the 32nd IEEE International Conference on Computer
Communications (INFOCOM‟13), pages 1276–1284, Apr. 2013.
[15] Cloud computing:- https://en.wikipedia.org/wiki/Cloud_computing
[16] Y. Wang, L. Alvisi, and Mike Dahlin. Gnothi: Separating Data and Metadata for Efficient and Available
Storage Replication, In Proceedings of the 2012 USENIX Annual Technical Conference (ATC‟12), pages
413–424, Jun. 2012.
[17] Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry “CRYPTANALYZING
OF MESSAGE DIGEST ALGORITHMS MD4 AND MD5”, International Journal on Cryptography and
Information Security(IJCIS),Vol.2, No.1,March 2012.
[18] DepSky:- http://cloud-of-clouds.github.io/depsky/
[19] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon, “RACS: A Case for Cloud Storage
Diversity”, In Proceedings of the 1st ACM symposium on Cloud computing, Pages 229-240, June 2010.
[20] Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando Andr´e, Paulo Sousa, “DEPSKY:
Dependable and Secure Storage in a Cloud-of-Clouds”, In Proceedings of the sixth conference on
Computer systems, Pages 31-46, April 2011.
[21] Rivest R., 1992, “The MD5 Message-Digest Algorithm,”RFC 1321,MIT LCS and RSA Data Securit y,
Inc.
THANK YOU

More Related Content

PPTX
Improving availability and reducing redundancy using deduplication of cloud s...
PDF
Guaranteed Availability of Cloud Data with Efficient Cost
PDF
iaetsd Controlling data deuplication in cloud storage
PDF
Ijarcet vol-2-issue-3-951-956
PDF
An asynchronous replication model to improve data available into a heterogene...
PDF
Secure Distributed Deduplication Systems with Improved Reliability
PDF
Authenticated Key Exchange Protocols for Parallel Network File Systems
PDF
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...
Improving availability and reducing redundancy using deduplication of cloud s...
Guaranteed Availability of Cloud Data with Efficient Cost
iaetsd Controlling data deuplication in cloud storage
Ijarcet vol-2-issue-3-951-956
An asynchronous replication model to improve data available into a heterogene...
Secure Distributed Deduplication Systems with Improved Reliability
Authenticated Key Exchange Protocols for Parallel Network File Systems
Resist Dictionary Attacks Using Password Based Protocols For Authenticated Ke...

What's hot (19)

PDF
An4201262267
PDF
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
PDF
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
PDF
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
PPTX
A physical view
PPTX
seed block algorithm
PPTX
Secry poster
PDF
Providing Secure Cloud for College Campus
PDF
WJCAT2-13707877
PDF
Cloud Data De Duplication in Multiuser Environment DeposM2
PDF
A scalabl e and cost effective framework for privacy preservation over big d...
PPTX
Secure cloud storage
PPTX
Open Cloud Consortium: An Update (04-23-10, v9)
PDF
Preserving Privacy Policy- Preserving public auditing for data in the cloud
PDF
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
PDF
Seed block algorithm
PPTX
Applications of SOA and Web Services in Grid Computing
PDF
An Efficient Approach to Manage Small Files in Distributed File Systems
PDF
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
An4201262267
ANALYSIS OF ATTACK TECHNIQUES ON CLOUD BASED DATA DEDUPLICATION TECHNIQUES
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
[IJET-V2I1P12] Authors:Nikesh Pansare, Akash Somkuwar , Adil Shaikh and Satya...
A physical view
seed block algorithm
Secry poster
Providing Secure Cloud for College Campus
WJCAT2-13707877
Cloud Data De Duplication in Multiuser Environment DeposM2
A scalabl e and cost effective framework for privacy preservation over big d...
Secure cloud storage
Open Cloud Consortium: An Update (04-23-10, v9)
Preserving Privacy Policy- Preserving public auditing for data in the cloud
Securely Data Forwarding and Maintaining Reliability of Data in Cloud Computing
Seed block algorithm
Applications of SOA and Web Services in Grid Computing
An Efficient Approach to Manage Small Files in Distributed File Systems
NEW SECURE CONCURRECY MANEGMENT APPROACH FOR DISTRIBUTED AND CONCURRENT ACCES...
Ad

Similar to Improving the availability and reducing redundancy using deduplication of cloud storage system (20)

PDF
A hybrid cloud approach for secure authorized
PDF
Fs2510501055
PPTX
Dependable Storage and Computing using Multiple Cloud Providers
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Perceiving and recovering degraded data on secure cloud
PDF
Improved deduplication with keys and chunks in HDFS storage providers
PDF
IRJET- Cloud based Deduplication using Middleware Approach
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
PDF
An Auditing Protocol for Protected Data Storage in Cloud Computing
PDF
IRJET - Confidential Image De-Duplication in Cloud Storage
DOCX
Gre322me
PDF
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
PDF
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
PPT
Ensuring d.s
PDF
Review and Analysis of Self Destruction of Data in Cloud Computing
PDF
Iw qo s09 (1)
PDF
Iw qo s09
A hybrid cloud approach for secure authorized
Fs2510501055
Dependable Storage and Computing using Multiple Cloud Providers
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Perceiving and recovering degraded data on secure cloud
Improved deduplication with keys and chunks in HDFS storage providers
IRJET- Cloud based Deduplication using Middleware Approach
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
An Auditing Protocol for Protected Data Storage in Cloud Computing
IRJET - Confidential Image De-Duplication in Cloud Storage
Gre322me
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Ensuring d.s
Review and Analysis of Self Destruction of Data in Cloud Computing
Iw qo s09 (1)
Iw qo s09
Ad

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
OOP with Java - Java Introduction (Basics)
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
Lecture Notes Electrical Wiring System Components
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Well-logging-methods_new................
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
web development for engineering and engineering
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
OOP with Java - Java Introduction (Basics)
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mechanical Engineering MATERIALS Selection
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Lecture Notes Electrical Wiring System Components
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Well-logging-methods_new................
Automation-in-Manufacturing-Chapter-Introduction.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
R24 SURVEYING LAB MANUAL for civil enggi
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
web development for engineering and engineering

Improving the availability and reducing redundancy using deduplication of cloud storage system

  • 1. 3rd International Conference On Computing, Communication, Control And Automation IEEE (ICCUBEA-August 2017) Presentation On “Improving the availability and reducing redundancy using deduplication of cloud storage system “ By, Mr. Dhanaraj S. Patil Department of Technology, Shivaji university, Kolhapur
  • 2. INTRODUCTION • Cloud storage system • Cloud of clouds • Replication • Erasure code • Existing system • Proposed system
  • 3. CLOUD STORAGE SYSTEM • The digital data is stored in logical pools • Public, private and hybrid • Advantages:- Pay-per-Use Availability • Disadvantages:- Data outage Vendor lock in problem • Example:- Amazon s3, windows Azure
  • 4. CLOUD-OF-CLOUD • The digital data is stored in logical pools • Multiple cloud venders at one point • low cost • no vender-lock • example:- Depsky
  • 5. REPLICATION • Creating multiple copies of data • Widely used in cloud storage systems • 3- replica strategy • Improves reliability, fault-tolerance, accessibility
  • 6. ERASURE CODE • Data is broken into fragments, expanded and encoded with redundant data pieces • consumes less storage • Data can be rebuild from any fragment. • drawback:- CPU-intensive
  • 7. PROBLEM STATEMENT To develop a system which implements efficient cloud storage using data deduplication technique to avoid data redundancy problem.
  • 8. ACHIEVED OBJECTIVES • To study the different data distribution technique in cloud system. • To analyze the hybrid redundant [HyRD] data distribution scheme. • To design system for data redundancy problem by applying data deduplication with versioning. • To measure the performance of proposed system with existing system.
  • 10. SYSTEM ARCHITECTURE Modules : • Data owner • File verification • File versioning • Hybrid redundancy
  • 11. Message Digest 5 algorithm [MD5] : Step 1: Appending padding bits message is extended to length 448 modulo 512. Step 2: Appending length A 64- bit representation of message is added. Step 3: Initialize MD buffer It used to store the result. word A: 01 23 45 67 word B: 89 ab cd ef word C: fe dc ba 98 word D: 76 54 32 10
  • 12. Message Digest 5 algorithm [MD5] contd. Step 4: process message in 16- word blocks Define 4 Auxiliary functions. Which helps in processing message in 512 –bit block Step 5: Output To produce digest just add a,b,c,d and convert it into hexadecimal.
  • 13. SYSTEM REQUIREMENT 1. Hardware Requirements Processor: Pentium Dual-Core 2.50 GHz (Or Above) Memory: 1GB (Or Above) 2. Software Requirements Operating System: Windows 7/ 8 and above Front End & Back end: HTML, PHP Database: MySql
  • 18. CONCLUSION Availability is one of the main key constraint of the cloud storage service that user must consider while uploading data to cloud with single cloud storage system problem may arise such as, vendor- lock-in, service outage etc. In existing system, the inter cloud system was based on hybrid redundancy distribution technique but still it shows data redundancy issues. The paper tries to solve above problem with the help of MD5 and versioning. The paper describes several techniques to reduce the data redundancy problem. To implement this MD5 algorithm is used for verification of the hash values of the file and file versions are maintain for availability and durability of the data. An experimental study shows that redundancy problem can be reduced and data availability maintains with our approach. For the future work we are trying to add security to our system while sharing our data and we can also tries to provide access control policies.
  • 19. REFERENCES [1] Bo Mao, Suzhen Wu and Hong Jiang “Exploiting Workload Characteristics and Service Diversity to Improve the Availability of Cloud Storage Systems”, IEEE Transactions on Parallel and Distributed Systems, Pages: 2010 – 2021, Year: 2016. [2] Wenhao Li, Yun Yang, Dong Yuan, “Ensuring Cloud data reliability with minimum replication by proactive replica checking”, IEEE TRANSACTIONS ON COMPUTERS, Pages: 1494 - 1506, Year: 2016. [3] Maomeng Su, Lei Zhang, Yongwei Wu, Kang Chen, and Keqin Li, “Systematic Data Placement Optimization in Multi-Cloud Storage for Complex Requirements”, IEEE TRANSACTIONS ON COMPUTERS, Pages: 1964 –1977, Year: 2016. [4] Amir Nahir, Ariel Orda, and Danny Raz, “Replication-based Load Balancing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Pages: 494 – 507, Year: 2016. [5] Shiuan-Tzuo Shen, Hsiao-Ying Lin, and Wen-Guey Tzeng, “An Effective Integrity Check Scheme for Secure Erasure Code-Based Storage Systems”, IEEE TRANSACTIONS ON RELIABILITY, Pages: 840 – 851, Year: 2015. [6] Ayad F. Barsoum and M. Anwar Hasan, “Provable Multicopy Dynamic Data Possession in Cloud Computing Systems”, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,Pages: 485 - 497, Year: 2015. [7] Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef, “Transparent Data Deduplication in the Cloud”, In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 2015. [8] N.Jayapandian, Dr.A.M.J.Md.Zubair Rahman, I.Nandhini, “A Novel Approach for Handling Sensitive Data with Deduplication Method in Hybrid Cloud”, 2015 Online International Confernece on Green Engineering and Technologies (IC-GET 2015), Pages: 1 – 6, Year: 2015. [9] Ghazal Riahi “E-learning systems based on cloud computing: A Review”, Procedia Computer Science 62, 352 – 359, 2015. [10] Hui Zhang, Guofei Jiang, Kenji Yoshihira, and Haifeng Chen, “Proactive Workload Management in Hybrid Cloud Computing”, IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, Pages: 90 – 100, Year: 2014.
  • 20. REFERENCES [11] X. Zhang, M. Tsugawa, Y. Zhang, H. Song, C. Cao, G. Huang, and J. Fortes. Towards Model-Defined Cloud of Clouds, In Proceedings of the 17th International Conference on Model Driven Engineering Languages and Systems (MODELS‟14), pages 41–45, Sep. 2014. [12] Osama Khan, Randal Burns, James Plank, William Pierce Cheng Huang, “Rethinking Erasure Codes for Cloud File Systems: Minimizing I/O for Recovery and Degraded Reads”, In Proceedings of the 10th USENIX conference on File and Storage Technologies, Pages 20-20, February 2012. [13] Jain, A. and S. chawla.”E-learning in the cloud”, International Journal of Latest Research in Science and Technology 2(1): 478-481. 2013. [14] Y. Ma, T. Nandagopal, K. Puttaswamy, and S. Banerjee, “An Ensemble of Replication and Erasure Codes for Cloud File Systems”, In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM‟13), pages 1276–1284, Apr. 2013. [15] Cloud computing:- https://en.wikipedia.org/wiki/Cloud_computing [16] Y. Wang, L. Alvisi, and Mike Dahlin. Gnothi: Separating Data and Metadata for Efficient and Available Storage Replication, In Proceedings of the 2012 USENIX Annual Technical Conference (ATC‟12), pages 413–424, Jun. 2012. [17] Md. Alam Hossain, Md. Kamrul Islam, Subrata Kumar Das and Md. Asif Nashiry “CRYPTANALYZING OF MESSAGE DIGEST ALGORITHMS MD4 AND MD5”, International Journal on Cryptography and Information Security(IJCIS),Vol.2, No.1,March 2012. [18] DepSky:- http://cloud-of-clouds.github.io/depsky/ [19] Hussam Abu-Libdeh, Lonnie Princehouse, Hakim Weatherspoon, “RACS: A Case for Cloud Storage Diversity”, In Proceedings of the 1st ACM symposium on Cloud computing, Pages 229-240, June 2010. [20] Alysson Bessani, Miguel Correia, Bruno Quaresma, Fernando Andr´e, Paulo Sousa, “DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds”, In Proceedings of the sixth conference on Computer systems, Pages 31-46, April 2011. [21] Rivest R., 1992, “The MD5 Message-Digest Algorithm,”RFC 1321,MIT LCS and RSA Data Securit y, Inc.