International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.6, No.9, Aug. 2014

SysProp: A Web-based Data Backup, Synchronization and System Administration

Full Text (PDF, 1133KB), PP.1-11

Views:231   Downloads:5


Salekul Islam, Mohammad Amanul Islam

Index Terms

Storage system, data backup, synchronization, Web service, remote system admin


From the inception of computer based computing, preventing data loss or data corruption is considered as one of the difficult challenges. In early days, data reliability had been increased by replicating data in multiple disks, which were attached with the same system and later located inside the same network. Later, to avoid potential risk of single point of failure, the replicated data storage has been separated from the network from which the data has been originated. Thus, following the concept of peer-to-peer (P2P) networking, P2P storage system has been designed, where data has been replicated inside multiple remote peers’ redundant storages. With the advent of Cloud computing, a similar but more reliable Cloud-based storage system has been developed. Note that Cloud storages are expensive for small and medium enterprises. Moreover, users are often reluctant to store their sensitive data inside a third-party’s network that they do now own or control. In this paper, we design, develop and deploy a storage system that we named SysProp. Two widely used tools—Web applications and UNIX daemon—have been incorporated in the development process of SysProp. Our goal is to congregate benefits of different storage systems (e.g., networked, P2P and Cloud storages) in a single application. SysProp provides a remotely accessible, Web-based interface, where users have full control over their data and data is being transferred in encrypted form. Moreover, for data backup, a powerful UNIX tool, rsync has been used that synchronize data by transferring only the updated portion. Finally, SysProp is a successful demonstration of the concept that UNIX daemons can be remotely executed and controlled over the Web. Hence, this concept might be exploited to build many system administrative applications.

Cite This Paper

Salekul Islam, Mohammad Amanul Islam,"SysProp: A Web-based Data Backup, Synchronization and System Administration", IJCNIS, vol.6, no.9, pp.1-11, 2014. DOI: 10.5815/ijcnis.2014.09.01


[1]Webmin. [Online].

[2]Dropbox. [Online].

[3]David Cane, David Hirschman, Philip Speare, Lev Vaitzblit, and Howard Marson, "FileComparison for Data Backup," U.S. Patent 6,101,507, August 8, 2000.

[4]Peter M. Chen, Edward K. Lee, Garth A. Gibson, Randy H. Katz, and David A. Patterson, "RAID: High-Performance, Reliable Secondary Storage," ACM Computing Surveys, vol. 26, no. 2, pp. 145-185 , 1994.

[5]Charles Blake and Rodrigo Rodrigues, "High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two," in Proceedings of 9th Workshop on Hot Topics in Operating Systems, 2003.

[6]Michael Armbrust and et al., "Above the Clouds: A Berkeley View of Cloud," University of California at Berkeley, UCB/EECS-2009-28, 2009.

[7]Richard Chow and et al., "Controlling Data in the Cloud:Outsourcing Computation without Outsourcing Control," in ACM Workshop on Cloud Computing Security (CCSW), 2009, pp. 85-90.

[8]Devin Watson, "Linux Daemon Writing HOWTO,", 2004.

[9]Garth A. Gibson and Rodney Van Meter, "Network attached storage architecture," Communications of the ACM, vol. 43, no. 11, pp. 37-45, 2000.

[10]Laszlo Toka, Matteo Dell’Amico, and Pietro Michiardi, "On Scheduling and Redundancy for P2P Backup," Arxiv preprint arXiv:1009.1344, 2010.

[11]Serge Defrance and et al., "Efficient peer-to-peer backup services through buffering at the edge," in IEEE International Conference on Peer-to-Peer Computing (P2P), 2011, pp. 142-151.

[12]Dinh Nguyen Tran, Frank Chiang, and Jinyang Li, "Friendstore: cooperative online backup using trusted nodes," in 1st ACM workshop on Social network systems, 2008, pp. 37-42.

[13]Lori M. Kaufman, "Data Security in the World of Cloud Computing," IEEE Security & Privacy, vol. 7, no. 4, pp. 61-64, 2009.

[14]Xi Chen,Yong Li,"Efficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage", International Journal of Computer Network and Information Security, vol.3, no.2, pp.50-56, 2011.

[15]J. Broberg and Z. Tari, "MetaCDN: Harnessing storage clouds for high performance content delivery," in Sixth International Conference on Service-Oriented Computing, Sydney, 2008.

[16]Idilio Drago and et al., "Inside Dropbox: Understanding Personal Cloud Storage Services," in ACM conference on Internet measurement, 2012, pp. 481-494.

[17]Google Drive. [Online].

[18]Amazon S3, Cloud Computing Storage for Files, Images, Videos. [Online].

[19]Rsync. [Online].

[20]Microsoft Patterns & Practices Team, "Chapter 21: Designing Web Applications," in Microsoft Application Architecture Guide (Patterns & Practices).: Microsoft Press, 2009.

[21]OpenSSH. [Online].

[22]EncFS Encrypted Filesystem. [Online].

[23]PHP: Hypertext Preprocessor. [Online].

[24]The Apache HTTP Server Project. [Online].