Abstract
Currently, websites provide web services to people for expressing their feelings and promoting their relationship with friends. The web service allows people to reveal their current status, view other users’ statuses, and send instant messages online. The number of users’ current statuses and message data will increase over time, and the number of user accounts will increase. Information technology has ushered a new era with the development of the big data technology. In big data, there may be thousands of users who will generate millions of records and create petabytes or exabytes of information by replicating the records in the big data era. This study proposes a system that uses the Rivest–Shamir–Adleman algorithm to encrypt users’ current status or messages and send them to specific people. This system enhances users’ privacy and security. We developed this system on a peer-to-peer network to improve system availability and prevent system crash caused by single user offline. Subsequently, we used the gambler’s ruin method to calculate the number of replicas of each record to achieve data availability which is set by users.





























Similar content being viewed by others
References
Bhagwan, R., Tati, K., Cheng, Y., Savage, S., Voelker, G. (2004). Total recall: System support for automated availability management. In NSDI’04 proceedings of the 1st conference on symposium on networked systems design and implementation (Vol. 1, pp. 25–25).
Blake, C., Rodrigues R. (2003). High availability, scalable storage, dynamic peer networks: Pick two. In HOTOS’03 proceedings of the 9th conference on hot topics in operating systems (Vol. 9, pp. 1).
Rodrigues, R., Liskov, B. (2005). High availability in DHTs: Erasure coding vs. replication. In International workshop on peer-to-peer systems: Peer-to-peer systems IV (pp. 226–239).
Weatherspoon, H., Kubiatowicz, J. (2002). Erasure coding vs. replication: A quantitative comparison. In International workshop on peer-to-peer systems, IPTPS 2002: Peer-to-peer systems (pp. 328–337).
Wang, G., Tang, J. (2012). The NoSQL principles and basic application of cassandra model. In International conference on computer science and service system, (pp. 1332–1335).
Ramabhadran, S., Pasquale, J. (2006). Analysis of long-running replicated systems. In Proceedings IEEE INFOCOM. 25th IEEE international conference on computer communications (pp. 1–9).
Hongxing, L., Chen, G. (2007). Data persistence in structured P2P networks with redundancy schemes. In Sixth international conference on grid and cooperative computing, (pp. 542–549).
Bitmessage Wiki, https://bitmessage.org/wiki/Main_Page.
Dr Clifford Cocks CB. University of Bristol. Retrieved 14 August 2011.
Rivest R. L., Shamir A., Adleman, L. M. (1983). The original RSA patent as filed with the U.S. patent office. Patent 4,405,829. 14th, 1977.
Reed, I. S., & Solomon, G. (1960). Polynomial codes over certain finite field. Journal of the Society for Industrial and Applied Mathematics, 8(2), 300–304.
Naicken, S., Basu, A., Livingston, B. (2013). A survey of peer-to-peer network simulators. ACM Computing Surveys (CSUR) Surveys Homepage Archive, 45(4).
OMNeT++ official website, http://www.omnetpp.org/.
INET official website, http://inet.omnetpp.org/.
OverSim official website, http://www.oversim.org/.
Baumgart, I., Heep, B., Krause, S. (2007). OverSim: A flexible overlay network simulation framework. In IEEE global internet symposium (pp. 79–84).
Merzbacher, M., Patterson, D. (2002). Measuring end-user availability on the web: Practical experience. In Proceedings international conference on dependable systems and networks (pp. 473–477).
Wu, F., Qiu, T., Chen, Y., Chen, G. (2005). Redundancy schemes for high availability in DHTs. In Parallel and distributed processing and applications. ISPA 2005. Lecture notes in computer science (Vol 3758). Springer, Berlin.
Hsu, C.-H., Chang, C.-L. (2007) Design of Reed–Solomon decoder and implement on FPGA. National Yunlin University of Science and Technology.
Simo, S. (2009). Simulating a mobile peer-to-peer network. Espoo: Networking Laboratory, Department of Communications and Networking, Helsinki University of Technology.
Bellini, P., Nesi, P., & Pazzaglia, F. (2014). Exploiting P2P scalability for grant authorization in digital rights management solutions. Floernce: Distributed Systems and Internet Technology Lab, Dipartimento di Sistemi e Informatica, Università degli Studi di Firenze.
Gilmore, J. S. (2013). A state management and persistency architecture for peer-to-peer massively multi-user virtual environments. Stellenbosch: Faculty of Engineering, Stellenbosch University.
Mutombo, D. M. (2013). A performance evaluation of peer-to-peer storage systems. Johannesburg: School of Computer Science, the Faculty of Science, University of the Witwatersrand.
Muñoz-Gea, J. P., Malgosa-Sanahuja, J., Manzanares-Lopez, P., Sanchez-Aarnoutse, J. C., Martinez-Rojo, A. M. (2009) Simulation of a P2P application using overSim. In First international conference on advances in future internet.
Baumgart, I., Heep, B., Krause, S. (2007). OverSim: A flexible overlay network simulation framework. In IEEE global internet symposium, pp. 79–84
Shankar, V., Graduate Student, Indiana University Bloomington, Cassandra DHT-based storage system. Indiana University, Indianapolis, Indiana.
Acknowledgements
This work was supported by the “Allied Advanced Intelligent Biomedical Research Center, STUST” under Higher Education Sprout Project, Ministry of Education, Taiwan.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lee, TY., Chen, YJ. & Horng, GJ. Forming High-Availability Cloud Mechanism for Secure Peer-Servicing Networks. Wireless Pers Commun 109, 361–391 (2019). https://doi.org/10.1007/s11277-019-06569-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-019-06569-7