Efficient Method for Backup and Restore of Data Using Compression Techniques
Total Page:16
File Type:pdf, Size:1020Kb
Volume-4, Issue-4, August-2014, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 290-293 Efficient Method for Backup and Restore of Data using Compression Techniques C. M. Manasa1, Prof. Kumarswamy. H2 1,2Computer Science and Engineering P.G Department, INDIA ABSTRACT As a number of service providers such as Drop box [2] and In the present decade smart phones are becoming Zumo-drive [3] offer online storage services. In the present part of most of the people lives because of its multi paper we try to purpose hear a solution to save our data by functionality, out of which the storage of valuable data by keeping backup online and minimized the time and storage saving size of memory is one of the most important function. space while backup the data by applying compression Storage function can be done with the help of internet techniques and then back up the data. It helps to increase connectivity. Most of the data stored in smart phones is important then the physical device. This paper is bandwidth and also performance of the data. concentrated on safety backing up of important data in the storage medium with the help of compression and restoring II. PRIOR APPROACH the same data. Here an effort is made to compress the data using RLE and Huffman algorithms. Using these techniques A. Android storage space can be utilized well and performance is Android is the most booming mobile OS in present enhanced. days. Google used Linux Version 2.6 to develop the android and also anyone can develop Android on their Keywords— RLE, Huffman, backup and restore. hardware. The architecture of the android is made up of several levels of software. Kernel is the first level, and it I. INTRODUCTION forms the base. Kernel includes all the functionalities such as memory management programs, security settings, Today, Smartphone is common for various classes of power management software and also hardware drivers. people. As Smartphone having various functionality with The next level of software is an android library which internet facility user saves their not only contacts but also helps to handle different kind of data. In this layer Java all valuable personal data with high security as an example programming language is used to develop android password, ATM pin, PAN card no etc. Survey conducted applications and it also includes Dalvik virtual machine to by Lifestyle Services Group says that one third of run applications as its own process. Smartphone owners give more value to the data stored on The advantages of Dalvik virtual machines are their handset, than the actual handset itself [1]. 1. Applications are independent. It is important to protect the data to prevent it 2. No interruptions between the applications. from hacking, misplacing and destruction of the device. 3. Simplified memory management [4]. We can achieve the security, by making copies of data The next level of software is application framework. called “Backup” retrieve the same data back from storage This includes functionalities such as resource allocation, called “Restore”. Various backups and restore data telephone applications and keeping track of physical techniques are available in market such as cloud storage location of device etc. Developers can directly access this services and application software. Backup can be done in framework. The next level of software is applications what various forms as online backup, offline backup, full actually we can view on the device screen. backup and incremental backup. Initially this paper tells about the problems faced commonly, while doing backup process. Such as, huge amount of time as file size is increased, failure of internet connection, limited storage space and battery, we can use cloud storage services and database services to store data. 290 compression techniques .in this paper we compress the data using RLE and Huffman algorithms. A. Login Module In this module, fill all the personal details of the user and save it in the server database. Now user gets user id and the password. With the help of these users can always login to the application which is installed in device. This is the first step to backup the data. Figure 1: Architecture of android B. Backup and restore The number of smart phone users and mobile applications are growing rapidly. Though Smartphone‟s are expected to have PC-like functionality, hardware resources such as CPU‟s, memory and batteries are still limited. Since all personal valuable data is included in the Figure 2: User Login Window Smartphone we need to backup the data .whenever the device is lost the data which has been made backup is [6] B. Backup and Restore Module restored. This module is used to backup the data. Functional Backups can be classified in several types; it is possible options by the means of buttons are provided at this stage to distinguish the data repository model in full backups vs. to the user such as backup and restore. User can click on incremental backups, data can be stored in a file-based or a backup to make copies of data or restore to retrieve the device-based style, and the data repository management same data back. can be classified as on-line vs. off-line; those approaches can be combined in different ways, according to accessibility, security and cost needs. Many service providers provide storage place to backup the data.eg cloud storage, databases, zumodrives, dropboxes etc. Making backups on external memory devices, such as on Secure Digital (SD) cards or on laptop disks, suffers from the same risks of failure or loss. The drawbacks of the existing backup and restore methods are considered and it has been overcome. Such as where Compression techniques are not implemented so efficient memory management is not satisfied. This can be achieved using Figure 3: Application Window with user Options compression algorithms. Backup and restore is not made with the help of web services. Since almost all the android After this the user will get the choice window in that Smartphone‟s are connected to the internet this can be various applications need to be backup will be present. achieved. They can select call logs, calendar, messages or contacts. C. Text compression algorithms One application choice is provided such that all the data There are many lossless text compression can be made backup once that is backup all. algorithms. There are two techniques in text compression such as statistical compression technique and dictionary based compression techniques [5]. Compression is the technique data is represented in the compact form to save memory space .The following are the some of the statistical compression techniques such as SHANNON FANO CODING, ARITHMETIC CODING, ADAPTIVE HUFFMAN CODING. III. OUR APPROACH In this paper we try to propose solution to save Figure 4: Selecting Back up Window our data by keeping backup online and minimised the time and storage space while doing backup of data by applying 291 We need to again login for restoring the data a student in a class on information theory at MIT in 1950. After successfully login open the same window as fig no 2. It is a more successful method used for text compression. Just by clicking the button “Restore” window with a list of Huffman‟s idea is to replace fixed-length codes (such as data wish to restore is open select it and click on restore. ASCII) by variable-length codes, assigning shorter Data is restored from user account to the device. Again codeword‟s to the more frequently occurring symbols and using the created operation in interactive language and my thus decreasing the overall length of the data. When using SQL we can easily restore data from database to the variable-length codeword‟s, it is desirable to create a device. (uniquely decipherable) prefix-code, avoiding the need for a separator to determine codeword boundaries. Huffman coding creates such a code. These algorithms employ a variable bit probabilistic coding method. Huffman uses bottom-up approach The Huffman algorithm is simple and can be described in terms of creating a Huffman code tree. The procedure for building this tree is: 1. Start with a list of free nodes, where each node corresponds to a symbol in the alphabet. 2. Select two free nodes with the lowest weight from the list. 3. Create a parent node for these two nodes selected and Figure 5: Restore Window the weight is equal to the weight of the sum of two child nodes. In addition to this PHP module is important to run the 4. Remove the two child nodes from the list and the front end of this project. It provides interactive pages. parent node is added to the list of free nodes. C. PHP Module 5. Repeat the process starting from step-2 until only a In this module we have to create a PHP for interaction single tree remains. between application and server. This module helps to take After building the Huffman tree, the algorithm backup of data and restore the same. For taking backup creates a prefix code for each symbol from the from the device and another query for restoring from the alphabet simply by traversing the binary tree from the server write the query in SQL format. The queries such as root to the node, which corresponds to the symbol. It “select * from calendar” etc helps to view respective tables assigns 0 for a left branch and 1 for a right branch. which are created in the database. The algorithm presented above is called as a semi D. Compression Module adaptive or semi-static Huffman coding as it requires 1.