期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Research on IPFS Image Copyright Protection Method Based on Blockchain
1
作者 Xin Cong Lanjin Feng Lingling Zi 《Computers, Materials & Continua》 SCIE EI 2024年第10期663-684,共22页
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advanta... In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files. 展开更多
关键词 Blockchain copyright protection IPFS distributed hash table digital sig
下载PDF
Load distributions of some classic DHTs
2
作者 Nie Xiaowen Lu Xianliang +2 位作者 Zhou Xu Tang Hui Li Lin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期400-404,共5页
The load balance is a critical issue of distributed Hash table (DHT), and the previous work shows that there exists O(logn) imbalance of load in Chord. The load distribution of Chord, Pastry, and the virtual serve... The load balance is a critical issue of distributed Hash table (DHT), and the previous work shows that there exists O(logn) imbalance of load in Chord. The load distribution of Chord, Pastry, and the virtual servers (VS) balancing scheme and deduces the closed form expressions of the probability density function (PDF) and cumulative distribution function (CDF) of the load in these DHTs is analyzes. The analysis and simulation show that the load of all these DHTs obeys the gamma distribution with similar formed parameters. 展开更多
关键词 distributed Hash table load balance probability density function cumulative distribution function
下载PDF
Scalable and Identifier/Locator-Splitting Routing Protocol for Mobile Ad Hoc Networks 被引量:3
3
作者 Wang Haiquan Chen Meng +1 位作者 Hu Junshun Xia Chunhe 《China Communications》 SCIE CSCD 2012年第1期102-110,共9页
In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for ... In the traditional Intemet Protocol (IP) architecture, there is an overload of IP sermntic problems. Existing solutions focused mainly on the infrastructure for the fixed network, and there is a lack of support for Mobile Ad Hoc Networks (MANETs). To improve scalability, a routing protocol for MANETs is presented based on a locator named Tree-structure Locator Distance Vector (TLDV). The hard core of this routing method is the identifier/locator split by the Distributed Hash Table (DHT) method, which provides a scalable routing service. The node locator indicates its relative location in the network and should be updated whenever topology changes, kocator space ks organized as a tree-structure, and the basic routing operation of the TLDV protocol is presented. TLDV protocol is compared to some classical routing protocols for MANETs on the NS2 platform Results show that TLDV has better scalability. Key words: 展开更多
关键词 MANETS multi-hop routing identifi- er/locator split distributed hash tables
下载PDF
SDHT: Efficient One-Hop DHT Lookup Framework for P2P Live Streaming 被引量:2
4
作者 Chen Zhuo Feng Gang +1 位作者 Zhou Yang Lu Yi 《China Communications》 SCIE CSCD 2012年第8期88-104,共17页
Video data location plays a key role for Peer-to-Peer (P2P) live streaming applications. In this paper, we propose a new one-hop Distributed Hash Table (DHT) lookup frarrework called Strearre ing-DHT (SDHT) to p... Video data location plays a key role for Peer-to-Peer (P2P) live streaming applications. In this paper, we propose a new one-hop Distributed Hash Table (DHT) lookup frarrework called Strearre ing-DHT (SDHT) to provide efficient video data location service. By adopting an enhanced events dissemination mechanism-EDRA+, the accuracy of routing table at peers can be guaranteed. More importantly, in order to enhance the perforlmnce of video data lookup operation without incurring extra overhead, we design a so-called Distributed Index Mapping and Management Mechanism (DIMM) for SDHT. Both analytical modeling and intensive simulation experiments are conducted to demonstrate the effectiveness of SDHT framework. Numerical results show that almost 90% requested video data can be retrieved within one second in SDHT based systems, and SDHT needs only 26% average bandwidth consumption when compared with similar one-hop DHT solutions such as D1HT. This indicates that SDHT framework is an appropriate data lookup solution for time-sensitive network applications such as P2P live streaming. 展开更多
关键词 PEER-TO-PEER distributed hash table streaming application live streaming EDRA
下载PDF
Using bidirectional links to improve peer-to-peer lookup performance 被引量:1
5
作者 JIANG Jun-jie TANG Fei-long +1 位作者 PAN Feng WANG Wei-nong 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第6期945-951,共7页
Efficient lookup is essential for peer-to-peer networks and Chord is a representative peer-to-peer lookup scheme based on distributed hash table (DHT). In peer-to-peer networks, each node maintains several unidirectio... Efficient lookup is essential for peer-to-peer networks and Chord is a representative peer-to-peer lookup scheme based on distributed hash table (DHT). In peer-to-peer networks, each node maintains several unidirectional application layer links to other nodes and forwards lookup messages through such links. This paper proposes use of bidirectional links to improve the lookup performance in Chord. Every original unidirectional link is replaced by a bidirectional link, and accordingly every node becomes an anti-finger of all its finger nodes. Both theoretical analyses and experimental results indicate that these anti-fingers can help improve the lookup performance greatly with very low overhead. 展开更多
关键词 Distributed hash table (DHT) PEER-TO-PEER Lookup performance
下载PDF
PipeCF:a DHT-based Collaborative Filtering recommendation system
6
作者 申瑞民 杨帆 +1 位作者 韩鹏 谢波 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第2期118-125,共8页
Collaborative Filtering (CF) technique has proved to be one of the most successful techniques in recommendation systems in recent years. However, traditional centralized CF system has suffered from its limited scalabi... Collaborative Filtering (CF) technique has proved to be one of the most successful techniques in recommendation systems in recent years. However, traditional centralized CF system has suffered from its limited scalability as calculation complexity increases rapidly both in time and space when the record in the user database increases. Peer-to-peer (P2P) network has attracted much attention because of its advantage of scalability as an alternative architecture for CF systems. In this paper, authors propose a decentralized CF algorithm, called PipeCF, based on distributed hash table (DHT) method which is the most popular P2P routing algorithm because of its efficiency, scalability, and robustness. Authors also propose two novel approaches: significance refinement (SR) and unanimous amplification (UA), to improve the scalability and prediction accuracy of DHT-based CF algorithm. The experimental data show that our DHT-based CF system has better prediction accuracy, efficiency and scalability than traditional CF systems. 展开更多
关键词 Collaborative Filtering Distributed hash table Significance refinement Unanimous amplification
下载PDF
Novel load balancing DHT scheme for the heterogeneous system
7
作者 Li Yujun Lu Xianliang Hou Mengshu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期835-842,共8页
The capacities of the nodes in the peer-to-peer system are strongly heterogeneous, hence one can benefit from distributing the load, based on the capacity of the nodes. At first a model is discussed to evaluate the lo... The capacities of the nodes in the peer-to-peer system are strongly heterogeneous, hence one can benefit from distributing the load, based on the capacity of the nodes. At first a model is discussed to evaluate the load balancing of the heterogeneous system, and then a novel load balancing scheme is proposed based on the concept of logical servers and the randomized binary tree, and theoretical guarantees are given. Finally, the feasibility of the scheme using extensive simulations is proven. 展开更多
关键词 distributed hash table HETEROGENEITY randomized binary tree load balancing
下载PDF
Control DHT maintenance costs with session heterogeneity
8
作者 邹福泰 吴增德 +1 位作者 张亮 马范援 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第5期378-386,共9页
The maintaining overheads of Distributed Hash Table (DHT) topology have recently received considerable attention. This paper presents a novel SHT (Session Heterogeneity Topology) model, in which DHT is reconstructed w... The maintaining overheads of Distributed Hash Table (DHT) topology have recently received considerable attention. This paper presents a novel SHT (Session Heterogeneity Topology) model, in which DHT is reconstructed with session hetero- geneity. SHT clusters nodes by means of session heterogeneity among nodes and selects the stable nodes as the participants of DHT. With an evolving process, this model gradually makes DHT stable and reliable. Therefore the high maintaining overheads for DHT are effectively controlled. Simulation with real traces of session distribution showed that the maintaining overheads are reduced dramatically and that the data availability is greatly improved. 展开更多
关键词 Peer-to-peer (P2P) Distributed Hash table (DHT) Finite element method Session heterogeneity Topology model
下载PDF
PChord:a distributed hash table for P2P network 被引量:1
9
作者 Haiping HUANG Yan ZHENG +1 位作者 Hongwei CHEN Ruchuan WANG 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2010年第1期49-58,共10页
As a solution for data storage and information sharing for peer-to-peer(P2P)networks,a novel distributed hash table(DHT)structure called PChord is presented in this paper.PChord adopts a bi-directional searching mecha... As a solution for data storage and information sharing for peer-to-peer(P2P)networks,a novel distributed hash table(DHT)structure called PChord is presented in this paper.PChord adopts a bi-directional searching mechanism superior to Chord and enhances the structure of the finger table.Based on Hilbert space filling curve,PChord realizes the mapping mechanism for multikeyword approximate searching.Compared with the Chord and Kademlia protocols,PChord evidently increases speed on resource searching and message spreading via theoretic proof and simulation results,while maintaining satisfactory load balance. 展开更多
关键词 distributed hash table(DHT) peer-to-peer(P2P) bi-directional searching
原文传递
HAPS:Supporting Effective and Effcient Full-Text P2P Search with Peer Dynamics 被引量:1
10
作者 任祖杰 陈珂 +3 位作者 寿黎但 陈刚 贝毅君 李晓燕 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第3期482-498,共17页
Recently, peer-to-peer (P2P) search technique has become popular in the Web as an alternative to centralized search due to its high scalability and low deployment-cost. However, P2P search systems are known to suffe... Recently, peer-to-peer (P2P) search technique has become popular in the Web as an alternative to centralized search due to its high scalability and low deployment-cost. However, P2P search systems are known to suffer from the problem of peer dynamics, such as frequent node join/leave and document changes, which cause serious performance degradation. This paper presents the architecture of a P2P search system that supports full-text search in an overlay network with peer dynamics. This architecture, namely HAPS, consists of two layers of peers. The upper layer is a DHT (distributed hash table) network interconnected by some super peers (which we refer to as hubs). Each hub maintains distributed data structures called search directories, which could be used to guide the query and to control the search cost. The bottom layer consists of clusters of ordinary peers (called providers), which can receive queries and return relevant results. Extensive experimental results indicate that HAPS can perform searches effectively and efficiently. In addition, the performance comparison illustrates that HAPS outperforms a fiat structured system and a hierarchical unstructured system in the environment with peer dynamics. 展开更多
关键词 P2P network DHT (distributed hash table CHURN keyword search
原文传递
Modeling structured peer-to-peer systems 被引量:1
11
作者 HAN Li LEI Zhen-ming 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第3期76-80,共5页
Distributed network architecture and dynamic change of nodes makes the operation of structured peer-to-peer networks unpredictable. This article aims to present a research on the running rule of structured peer-to-pee... Distributed network architecture and dynamic change of nodes makes the operation of structured peer-to-peer networks unpredictable. This article aims to present a research on the running rule of structured peer-to-peer networks through a mathematical model. The proposed model provides a low-complexity means to estimate the performance of a structured peer-to-peer network from two aspects: the average existent time of a node and probability of returning to a temporarily steady state of network. On the basis of the results, it can be concluded that the proposed structured peer-to-peer network is suitable for those conditions where the frequency of node change is under limited value, and this value mainly depends on the initializing time of the node. Otherwise, structured peer-to-peer network can be abstracted as a network queuing system, which is composed of many node queuing systems in a meshy way and the relation between the throughput of the node system and network system is analyzed. 展开更多
关键词 peer-to-peer network distributed hash table bith and death Markov model average existent time temporarily steady state
原文传递
A P2P Load Balancing-Supported ID Management Algorithm
12
作者 WANG Bin SHEN Qingguo 《Wuhan University Journal of Natural Sciences》 CAS 2011年第4期293-300,共8页
Load balancing is a critical issue in peer-to-peer networks. DHT (distributed hash tables) do not evenly partition the hash-function range, and some nodes get a larger portion of it. The loads of some nodes are as m... Load balancing is a critical issue in peer-to-peer networks. DHT (distributed hash tables) do not evenly partition the hash-function range, and some nodes get a larger portion of it. The loads of some nodes are as much as O(log n) times the average. In this paper, a low-cost, decentralized algorithm for ID allocation with complete knowledge in DHT-based system is proposed. It can adjust system load on nodes’ departure. It is proved that the ratio of longest arc to shortest arc is no more than 4 with high probability when network scale increases non-strictly. When network scale decreases from one stable state to another, algorithm can repair the unevenness of nodes distribution. The performance is analyzed in simulation. Simulating results show that updating messages only occupy a little of network bandwidth. 展开更多
关键词 P2P load balance ID allocation DHT (distributed hash tables)
原文传递
Publish/subscribe based information dissemination over VANET utilizing DHT
13
作者 Tulika PANDEY Deepak GARG Manoj Madhav GORE 《Frontiers of Computer Science》 SCIE EI CSCD 2012年第6期713-724,共12页
A vehicular ad-hoc network (VANET) can be visualized as a network of moving vehicles communicating in an asynchronous and autonomous fashion. Efficient and scalable information dissemination in VANET applications is... A vehicular ad-hoc network (VANET) can be visualized as a network of moving vehicles communicating in an asynchronous and autonomous fashion. Efficient and scalable information dissemination in VANET applications is a major challenge due to the movement of vehicles which causes unpredictable changes in network topology. The publish/subscribe communication paradigm provides decoupling in time, space, and synchronization between communicating entities, and presents itself as an elegant solution for information dissemination for VANET like environments. In this paper, we propose our approach for information dissemination which utilizes publish/subscribe and distributed hash table (DHT) based overlay networks. In our approach, we assume a hybrid VANET consisting of stationary info-stations and moving vehicles. These info-stations are installed at every major intersection of the city and vehicles can take the role of publisher, subscriber, or broker depending upon the context. The info-stations form a DHT based broker overlay among themselves and act as rendezvous points for related publications and subscriptions. Further, info-stations also assist in locating vehicles that have subscribed to information items. We consider different possible deployments of this hybrid VANET with respect to the number of info-stations and their physical connectivity with each other. We perform simulations to assess the performance of our approach in these different deployment scenarios and discuss their applicability in urban and semi-urban areas. 展开更多
关键词 vehicular ad-hoc network (VANET) peer-to- peer overlay network publish/subscribe communication paradigm distributed hash table (DHT)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部