Data Positioning Technique for Data Recovery
Main Article Content
Abstract
The objectives of this study are 1) to investigate the data positioning pattern of the recovery block through XOR technique, 2) to find out data positioning pattern through software development, and 3) to propose the recovery testing results of data positioning pattern of the recovery block.
The results reveal that 1) from the previous studies, XOR is the only one technique offered for data positioning which is stripping the data into 6 parts and creating 3 parity, then positioning all 9 parts into the 3x3. However, the technique mentioned earlier can be done when 3 lost data is in the same row or the same column. 2) The results from C++ software development to find out the data positioning of 3x3 data block through XOR technique show that 2,592 data could be recovered. 3) To test the data recovery of 2,592 patterns from program development by stimulating 3 servers found that the data could be recovered for 100 % under the condition of less than 3 lost data in the same row or same column.
Article Details
References
บทที-10-การคงสภาพของข-อมูล-Data-Integrity
[2] จตุชัย แพงจันทร์. (2553). Master in Security (2nd edition). นนทบุรี: ไอดีซีฯ.
[3] Pfleeger P., Charles, and Pfleeger L. Shari. (2007) Security in Computing (4th ed.). upper SaddleRiver,
N.J.: PrenticeHall.
[4] Wiwat, S. (2013). DR Code : The Two Dimensions Barcode supporting high rate data recovery. IEEE 16th
International Conference on Computational Science and Engineering 2013. (DOI : 10.1109/CSE 2013.180).
[5] Ping-Hsun H., Ing-Yi Chen, Yu-Ting Lin, & Sy-Yen Kuo. (2004). An XOR based Reed-Solomon algorithm for
Advanced Raid System.Proceedings 19th IEEE International Symposium 2004. (DFT2004 : 165-172).
[6] Overclockzone. (2558). RAID. สืบค้นจาก https://www.overclockzone.com/spin9/raid/
[7] Vmodtech. (2558). RAID เทคโนโลยีสูงสุดของการป้องกันความเสียหายของข้อมูลและความเร็วในฮาร์ดดิสก์. สืบค้นจาก
http://www.vmodtech.com/main/article/raid/all/1/
[8] Department of Computer Science and Engineering. (2015). Recover of Failure Data In Data Integrity Checking
With Erasure Code and Replica Server Management System. International Journal of Emerging
Technology & Research, 2(1).
[9] CAT Cyfence. (2012). Cloud Computing Security. Retrieved from https://www.catcyfence.com/
it-security/article/cloud-computing-security