Font Size: a A A

Efficient Data Synchronization Model With Identity Authentication And Disaster Backup

Posted on:2014-01-15Degree:MasterType:Thesis
Country:ChinaCandidate:Y JiaoFull Text:PDF
GTID:2248330395983801Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Data synchronization is one technology which keeps data consistency of multiple devices, andplays an important role in mobile Internet environment. But during the data synchronizationprocess, unauthorized access and unstable status of devices undermine the safety and efficiency ofdata synchronization.In order to solve these problems, researches towards key technologies of synchronization havebeen done, and an efficient data synchronization model with identity authentication and disasterbackup (SyncAB) is presented. This model uses P2P architecture to build synchronizationnetwork and eliminates the bottleneck effect of the model in Client/Server architecture. Threeroles, i.e. central synchronization device, backup synchronization device and membersynchronization device exist in the synchronization network to conform data switch to triggeredupdates. Central synchronization device manages key to perform encrypted transmit whileconducts authentication. Fetching main parameters of devices in the synchronization network,priority in the model is calculated to elect backup synchronization device and perform seamlessswitch of different roles. Simulation results show that the model improves the safety andefficiency of synchronization network.Meanwhile, to reduce backup data in SyncAB, researches have been made towards backupprocess, and an XML-EN-Diff algorithm based on Longest Common Subsequence is presentedfor structured document. To cut down the repository of all edit scripts, global similarity ispresented, which guides mixed backup scheme. The mixed backup scheme combines full backupand incremental backup to minimize the backup data. Performance test results show itssuperiority.At last, based on iOS platform, a prototype of SyncAB to perform synchronization of addressbook is implemented, which proves the model is feasible and practical.
Keywords/Search Tags:Data Synchronization, Identity Authentication, Disaster Backup, IncrementalBackup, Longest Common Subsequence, Global Similarity
PDF Full Text Request
Related items