International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 116 - Number 21 |
Year of Publication: 2015 |
Authors: Reshma Balasaheb Murkute, Nikita Sanjayrao Pattiwar, Shalaka Suryakant Shere, Nalini Tukaram Thombare, G.v.mane |
10.5120/20457-2814 |
Reshma Balasaheb Murkute, Nikita Sanjayrao Pattiwar, Shalaka Suryakant Shere, Nalini Tukaram Thombare, G.v.mane . Stegtorrent using De-Clustering of Data. International Journal of Computer Applications. 116, 21 ( April 2015), 1-5. DOI=10.5120/20457-2814
Nowadays, For uploading and downloading of data using torrent people widely use internet. Existing system was less secure and time consuming. To avoid this problem stegtorrent using de-clustering of data is implemented. For file transfer service, StegTorrent is a new network steganographic method. To achieve availability and scalability of storage systems are important for existing information systems. One approach to achieving high availability of parallel disk systems is to replicate the data items on separate disk drives. Many applications require considerable space, which is increasing rapidly, and essential data kept in storage must be retained. Parallel storage configurations with multiple disk drives are used to satisfy these requirements. Because of the disk failure, when one copy is damaged then other can continue to be used. In the replication-based approach, it is also important to lower the cost of update operations. To ensure that the data mapping and requests are evenly divided among disks. In replication-based approach, it takes the advantages of low cost data modification and data recovery.