A Secure and Effective Content Transmission in Content Based Networks Using Bloom Cast
Keywords:
P2P network, Bloom Cast, Bloom Filter, Content Sharing, Distributed Hash TableAbstract
P2P network stands amidst one of the best and attractive network tool. This approach made the allocation of contents through internet accessible. For unstructured P2P networks Bloom Cast deliver as an efficient technique for text sending scheme. In order to conclude a guaranteed recall at a communication cost of the network, Bloom Cast makes copies of the capacity in the network constantly at a random across the P2P networks. To abutment random node sampling and network size appraisal Bloom Cast appropriate its hybrid network which is an aggregate of a lightweight DHT (distributed hash table) and an unstructured P2P overlay. There are prospects of malicious codes and false agreement in unstructured P2P networks. At times it achieves false identities resulting in false activity with other character. The normal method here uses the conception of DHT and influence management which arrange efficient file transmission. In the expected system, we propose a novel strategy, called Bloom Cast, an efficient and effective full-text transportation scheme, in satisfied networks. The query demand independent archetype strategy, we propose a novel strategy, called Bloom Cast, to support efficient and adequate text transmission. Bloom Cast are mathematically that the recall can be guaranteed at a communication cost of O (square root N), where N is the size of the network.
References
aSmallW orld. http://www .asmallworld.net.
Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Comm.of the ACM, 13(7):422–426, 1970.
Title=Bittorentprotocol,http://www.bittorrent.com/protocol/html Bram Cohen.
A. Broder and M. Mitzenmacher. Network applications of bloom lters: A survey .In Proc. of the 40th Annual Allerton Conference on Communication, Control and Computing, pages 636 – 646, Illinios, USA, 2002.
Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, and A yellet T al. The bloomier filter an efficient data structure for static support lookup tables. In SODA '04: Proc. of the Fifteenth Annual ACM-SIAM Symp. on Discrete Algorithms, pages 30–39, Philadel-phia, P A, USA, 2004.
Saar Cohen and Y ossi Matias. Spectral bloom filters. In SIGMOD '03: Proc. of the 2003 ACM SIGMOD Int. conference on Management of data, pages 241–252, New York, NY , USA, 2003. ACM Press.
S. Dharmapurikar, P . Krishnamurthy, T . Sproull, and J. Lockwood. Deep packetinspection using parallel bloom filters. Micro, IEEE, 24(1):52 – 61, 2003.
Henrich Eisenhardt, Muller. Spektrale bloom-filter fur peer-to-peer information re-trieval. In Proceedings Informatik 2004, pages 44–48, 2004.
Li Fan, Pei Cao, Jussara Almeida, and Andrei Z. Broder. Summary cache: a scal-able wide-area web cache sharing protocol. IEEE/ACM Trans. Netw., 8(3):281–293, 2000.
Mohd. Amjad, "Wireless Network Security: Susceptibilities, Extortion and kiosk", International Journal of Computer Sciences and Engineering, Volume-01, Issue-03, Page No (10-14), Nov -2013, E-ISSN: 2347-2693
Maciej Ceglowski Joshua Schachter. Loaf, a simple emailextension for contactrecognition using bloomlter, http://loaf.cantbedone.org, 2004.
R.A. Ferreira, M.K. Ramanathan, A. Awan, A. Grama, and S. Jagannathan, “Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks,” Proc. IEEE Fifth Int‟l Conf. Peer to Peer Computing (P2P ‟05), pp. 165-172, 2005.
E. Cohen and S. Shenker, “Replication Strategies in Unstructured Peer-to-Peer Networks,” Proc. ACM SIGCOMM ‟02. pp. 177-190, 2002.
P. Reynolds and A. Vahdat, “Efficient Peer-to-Peer Keyword Searching,” Proc. ACM/IFIP/USENIX 2003 Int‟l Conf. Middleware (Middleware ‟03), pp. 21-40, 2003.
H. Song, S. Dharmapurikar, J. Turner, and J. Lockwood, “Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing,” Proc. ACM SIGCOMM, 2005.
C. Tang and S. Dwarkadas, “Hybrid Global-Local Indexing for Effcient Peer-to-Peer Information Retrieval,” Proc. First Conf. Symp. Networked Systems Design and Implementation (NSDI ‟04),p. 16, 2004.
D. Li, J. Cao, X. Lu, and K. Chen, “Efficient Range Query Processing in Peer-to-Peer Systems,” IEEE Trans. Knowledge and Data Eng., vol. 21, no. 1, pp. 78-91, Jan. 2008.
G.S. Manku, “Routing Networks for Distributed Hash Tables,” Proc. ACM 22nd Ann. Symp. Principles of Distributed Computing (PODC ‟03), pp. 133-142, 2003.
H. Shen, Y. Shu, and B. Yu, “Efficient Semantic-Based Content Search in P2P Network,” IEEE Trans. Knowledge and Data Eng.,vol. 16, no. 7, pp. 813-826, July 2004.
A. Broder and M. Mitzenmacher, “Network Applications of Bloom Filters: A Survey,” Internet Math., vol. 1, no. 4, pp. 485-509, 2004.
V. King and J. Saia, “Choosing a Random Peer,” Proc. ACM 23rdAnn. Symp. Principles of Distributed Computing (PODC ‟04), pp. 125-130, 2004.
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H.Balakrishnan, “Chord: A Scalable Peer -to-Peer Lookup Service for Internet Applications,” Proc. ACM SIGCOMM ‟01, pp. 149 -160, 2001.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
