• Title/Summary/Keyword: Distributed Hash Tables

Search Result 7, Processing Time 0.024 seconds

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

Distributed Hash Table based Service Discovery in Mobile Ad Hoc Network (모바일 애드 혹 네트워크에서 분산 해쉬 테이블 기반의 서비스 탐색 기법)

  • Jung, Jae-Hoon;Lee, Seung-Hak;Kim, Nam-Gi;Yoon, Hyn-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.1
    • /
    • pp.91-97
    • /
    • 2008
  • In order to get a desired service in such environments, we need a service discovery method for discovering a device providing that service. In this paper, we propose a service discovery protocol which is based on DHTs (Distributed Hash Tables) to solve these problems. Our protocol is scalable since it does not require a central lookup server and does not rely on multicast or flooding. Simulation results show that our protocol is scalable and outperforms existing service discovery protocols.

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data

  • Ma, Yanping;Zou, Hailin;Xie, Hongtao;Su, Qingtang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2599-2613
    • /
    • 2015
  • Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it di-vides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes the distance measure ambiguous. In this paper, we propose a data-oriented multi-index hashing method (DOMIH). We first compute the covariance ma-trix of bits and learn adaptive projection vector for each binary substring. Instead of using substrings as direct indices into hash tables, we project them with corresponding projection vectors to generate new indices. With adaptive projection, the indices in each hash table are near uniformly distributed. Then with covariance matrix, we propose a ranking method for the binary codes. By assigning different bit-level weights to different bits, the returned bina-ry codes are ranked at a finer-grained binary code level. Experiments conducted on reference large scale datasets show that compared to MIH the time performance of DOMIH can be improved by 36.9%-87.4%, and the search accuracy can be improved by 22.2%. To pinpoint the potential of DOMIH, we further use near-duplicate image retrieval as examples to show the applications and the good performance of our method.

Conversion of Large RDF Data using Hash-based ID Mapping Tables with MapReduce Jobs (맵리듀스 잡을 사용한 해시 ID 매핑 테이블 기반 대량 RDF 데이터 변환 방법)

  • Kim, InA;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.236-239
    • /
    • 2021
  • With the growth of AI technology, the scale of Knowledge Graphs continues to be expanded. Knowledge Graphs are mainly expressed as RDF representations that consist of connected triples. Many RDF storages compress and transform RDF triples into the condensed IDs. However, if we try to transform a large scale of RDF triples, it occurs the high processing time and memory overhead because it needs to search the large ID mapping table. In this paper, we propose the method of converting RDF triples using Hash-based ID mapping tables with MapReduce, which is the software framework with a parallel, distributed algorithm. Our proposed method not only transforms RDF triples into Integer-based IDs, but also improves the conversion speed and memory overhead. As a result of our experiment with the proposed method for LUBM, the size of the dataset is reduced by about 3.8 times and the conversion time was spent about 106 seconds.

  • PDF

An Efficient Hybrid Lookup Service Exploiting Localized Query Traffic (질의의 지역성을 이용한 효율적인 하이브리드 검색 서비스)

  • Lee, Sang-Hwan;Han, Jae-Il;Kim, Chul-Su;Hwang, Jae-Gak
    • Journal of Information Technology Services
    • /
    • v.8 no.3
    • /
    • pp.171-184
    • /
    • 2009
  • Since the development of the Distributed Hash Tables (DHTs), the distributed lookup services are one of the hot topics in the networking area. The main reason of this popularity is the simplicity of the lookup structure. However, the simple key based search mechanism makes the so called "keyword" based search difficult if not impossible. Thus, the applicability of the DHTs is limited to certain areas. In this paper. we find that DHTs can be used as the ubiquitous sensor network (USN) metadata lookup service across a large number of sensor networks. The popularity of the Ubiquitous Sensor Network has motivated the development of the USN middleware services for the sensor networks. One of the key functionalities of the USN middleware service is the lookup of the USN metadata, by which users get various information about the sensor network such as the type of the sensor networks and/or nodes, the residual of the batteries, the type of the sensor nodes. Traditional distributed hash table based lookup systems are good for one sensor network. However, as the number of sensor network increases, the need to integrate the lookup services of many autonomous sensor networks so that they can provide the users an integrated view of the entire sensor network. In this paper, we provide a hybrid lookup model, in which the autonomous lookup services are combined together and provide seamless services across the boundary of a single lookup services. We show that the hybrid model can provide far better lookup performance than a single lookup system.

Trend of Distributed Hash Tables-Based P2P (분산 해시 테이블 기반 P2P 기술 동향)

  • Kim, B.O.;Lee, I.W.;Park, H.J.
    • Electronics and Telecommunications Trends
    • /
    • v.21 no.6 s.102
    • /
    • pp.179-189
    • /
    • 2006
  • 정보의 바다라고 널리 알려진 인터넷은 클라이언트-서버 커뮤니케이션 모델을 기반으로 하여 패킷의 송/수신자가 정해져 있는 단방향 통신을 사용하고 있다. 하지만, 실제사람들 사이의 맨투맨 커뮤니케이션에서는 송신과 수신이 정해져 있는 경우보다 대화에 참여하는 모든 사람들이 송/수신의 역할을 동시에 수행하는 양방향의 형태가 대부분이며, 이러한 불일치는 인터넷을 통해 제공되는 서비스의 가능성을 제한하는 요소가 되고 있다. 이에 따라, 각각의 단말이 송신과 수신의 역할을 동시에 수행할 수 있는 양방향 통신이 가능한 P2P 커뮤니케이션 방법이 고안되었고, 현재, 이러한 P2P를 이용한 다양한 서비스 모델이 제안되고 있다. 본 고에서는 이러한 P2P 네트워크의 구현 기술 중 하나인 분산 해시 테이블을 바탕으로 한 연구의 동향과 그 응용 현황에 대해서 살펴 보고자 한다.

Analysis of Blockchain-based Access Control Technology (블록체인 기반 접근제어 기술 동향)

  • Kim, Seung-Hyun;Kim, Soohyung
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.4
    • /
    • pp.117-128
    • /
    • 2019
  • As companies use increasing amounts of data more and more, people are more concerned about protecting their privacy. Many researches studies have been conducted with a to securely view of manage managing and share sharing private information securely using the Bblockchain technology. These studies have suggested a Bblockchain-based approaches to provide efficiency, scalability, data ownership, and systematic data lifecycles that were are the limitations of lacking in traditional access controls. More Sspecifically, these studies have introduced a new access control models, distributed hash tables, trusted execution environments, and hierarchical ID-based cryptographic mechanisms to provide reliable access control even in complex environments such as IoT Internet of Things. In this paperstudy, we present the criteria to for classifying the functional characteristics of the Bblockchain-based access control methods and derive the differentiateion between of each the several methods.