Open Access   Article Go Back

A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast

S. Hemanjali1 , I.M.V. Krishna2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-10 , Page no. 17-21, Oct-2015

Online published on Oct 31, 2015

Copyright © S. Hemanjali , I.M.V. Krishna . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Hemanjali , I.M.V. Krishna, “A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.10, pp.17-21, 2015.

MLA Style Citation: S. Hemanjali , I.M.V. Krishna "A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast." International Journal of Computer Sciences and Engineering 3.10 (2015): 17-21.

APA Style Citation: S. Hemanjali , I.M.V. Krishna, (2015). A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast. International Journal of Computer Sciences and Engineering, 3(10), 17-21.

BibTex Style Citation:
@article{Hemanjali_2015,
author = {S. Hemanjali , I.M.V. Krishna},
title = {A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2015},
volume = {3},
Issue = {10},
month = {10},
year = {2015},
issn = {2347-2693},
pages = {17-21},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=696},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=696
TI - A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast
T2 - International Journal of Computer Sciences and Engineering
AU - S. Hemanjali , I.M.V. Krishna
PY - 2015
DA - 2015/10/31
PB - IJCSE, Indore, INDIA
SP - 17-21
IS - 10
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2770 2486 downloads 2386 downloads
  
  
           

Abstract

P2P network stands amidst one of the best and attractive network tool. This approach made the allocation of contents through internet accessible. For unstructured P2P networks Bloom Cast deliver as an efficient technique for text sending scheme. In order to conclude a guaranteed recall at a communication cost of the network, Bloom Cast makes copies of the capacity in the network constantly at a random across the P2P networks. To abutment random node sampling and network size appraisal Bloom Cast appropriate its hybrid network which is an aggregate of a lightweight DHT (distributed hash table) and an unstructured P2P overlay. There are prospects of malicious codes and false agreement in unstructured P2P networks. At times it achieves false identities resulting in false activity with other character. The normal method here uses the conception of DHT and influence management which arrange efficient file transmission. In the expected system, we propose a novel strategy, called Bloom Cast, an efficient and effective full-text transportation scheme, in satisfied networks. The query demand independent archetype strategy, we propose a novel strategy, called Bloom Cast, to support efficient and adequate text transmission. Bloom Cast are mathematically that the recall can be guaranteed at a communication cost of O (square root N), where N is the size of the network.

Key-Words / Index Term

P2P network, Bloom Cast, Bloom Filter, Content Sharing, Distributed Hash Table

References

[1] aSmallW orld. http://www .asmallworld.net.
[2] Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Comm.of the ACM, 13(7):422–426, 1970.
[3] Title=Bittorentprotocol,http://www.bittorrent.com/protocol/html Bram Cohen.
[4] A. Broder and M. Mitzenmacher. Network applications of bloom lters: A survey .In Proc. of the 40th Annual Allerton Conference on Communication, Control and Computing, pages 636 – 646, Illinios, USA, 2002.
[5] Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, and A yellet T al. The bloomier filter an efficient data structure for static support lookup tables. In SODA '04: Proc. of the Fifteenth Annual ACM-SIAM Symp. on Discrete Algorithms, pages 30–39, Philadel-phia, P A, USA, 2004.
[6] Saar Cohen and Y ossi Matias. Spectral bloom filters. In SIGMOD '03: Proc. of the 2003 ACM SIGMOD Int. conference on Management of data, pages 241–252, New York, NY , USA, 2003. ACM Press.
[7] S. Dharmapurikar, P . Krishnamurthy, T . Sproull, and J. Lockwood. Deep packetinspection using parallel bloom filters. Micro, IEEE, 24(1):52 – 61, 2003.
[8] Henrich Eisenhardt, Muller. Spektrale bloom-filter fur peer-to-peer information re-trieval. In Proceedings Informatik 2004, pages 44–48, 2004.
[9] Li Fan, Pei Cao, Jussara Almeida, and Andrei Z. Broder. Summary cache: a scal-able wide-area web cache sharing protocol. IEEE/ACM Trans. Netw., 8(3):281–293, 2000.
[10] Mohd. Amjad, "Wireless Network Security: Susceptibilities, Extortion and kiosk", International Journal of Computer Sciences and Engineering, Volume-01, Issue-03, Page No (10-14), Nov -2013, E-ISSN: 2347-2693
[11] Maciej Ceglowski Joshua Schachter. Loaf, a simple emailextension for contactrecognition using bloomlter, http://loaf.cantbedone.org, 2004.
[12] R.A. Ferreira, M.K. Ramanathan, A. Awan, A. Grama, and S. Jagannathan, “Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks,” Proc. IEEE Fifth Int‟l Conf. Peer to Peer Computing (P2P ‟05), pp. 165-172, 2005.
[13] E. Cohen and S. Shenker, “Replication Strategies in Unstructured Peer-to-Peer Networks,” Proc. ACM SIGCOMM ‟02. pp. 177-190, 2002.
[14] P. Reynolds and A. Vahdat, “Efficient Peer-to-Peer Keyword Searching,” Proc. ACM/IFIP/USENIX 2003 Int‟l Conf. Middleware (Middleware ‟03), pp. 21-40, 2003.
[15] H. Song, S. Dharmapurikar, J. Turner, and J. Lockwood, “Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing,” Proc. ACM SIGCOMM, 2005.
[16] C. Tang and S. Dwarkadas, “Hybrid Global-Local Indexing for Effcient Peer-to-Peer Information Retrieval,” Proc. First Conf. Symp. Networked Systems Design and Implementation (NSDI ‟04),p. 16, 2004.
[17] D. Li, J. Cao, X. Lu, and K. Chen, “Efficient Range Query Processing in Peer-to-Peer Systems,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 1, pp. 78-91, Jan. 2008.
[18] G.S. Manku, “Routing Networks for Distributed Hash Tables,” Proc. ACM 22nd Ann. Symp. Principles of Distributed Computing (PODC ‟03), pp. 133-142, 2003.
[19] H. Shen, Y. Shu, and B. Yu, “Efficient Semantic-Based Content Search in P2P Network,” IEEE Trans. Knowledge and Data Eng.,vol. 16, no. 7, pp. 813-826, July 2004.
[20] A. Broder and M. Mitzenmacher, “Network Applications of Bloom Filters: A Survey,” Internet Math., vol. 1, no. 4, pp. 485-509, 2004.
[21] V. King and J. Saia, “Choosing a Random Peer,” Proc. ACM 23rdAnn. Symp. Principles of Distributed Computing (PODC ‟04), pp. 125-130, 2004.
[22] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H.Balakrishnan, “Chord: A Scalable Peer -to-Peer Lookup Service for Internet Applications,” Proc. ACM SIGCOMM ‟01, pp. 149 -160, 2001.