Abstract
In Peer to Peer systems (P2P); an only companion is connected to another associate in a different stockpiling framework. A different gathering of resolutions depicts disseminated hash tables outlines resources onto hubs in P2P system. It offers a “find – obtain” development where getting the advantages in the framework is available, and like this it can get back. DHT offers a liberal position of hubs and administrations yet don’t protect adjacent to vindictive hub moving lookups (the movement used to arrange the benefits in the system). Malicious hubs on a look-up pathway can precisely undermine question. Frameworks like Halo (in light of the harmony) reduction such ambushes by utilizing pointless lookup inquiries. To supply better affirmation; Reputation for Directory administrations is an establishment for training so as to boost lookups in abundance DHT how well new hubs administration lookup wishes. ReDS technique can be executed too for all intents and purposes any abundance DHT containing corona. Additionally, it perceives shared acknowledgment and dispenses with of difficult lookup paths. This acknowledgment does not wager on the partitioning of notoriety numbers and isolating is helpless to assaults that make larger part use of ReDS unfit. Corona is a plan that deeds the deterministic arranging of access to hubs in the harmony to introduce a “high-affirmation situate” through pointless investigates. Radiance was proposed to contain dynamic lookups and can browse different ways. Partitioned notoriety technique for Halo, has deterministic finger gathering. In deciding notoriety organize; the holes of attackers are diminished by utilizing unique Reciprocal Channel Variation based Identification (RCVI) technique. Load imbalance issue emerges through this lookup activity. Each Peer handles the heap by contrasting its ability. ReDS creates accomplishment lookup rates for Halo, yet next to think assailant was trying to brandish their notoriety achieves and in the presence of hub twirl.
Similar content being viewed by others
Change history
20 September 2022
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11042-022-13977-8
References
Akavipat R, Dhadphale A, Kapadia A, Wright M (2008) ReDS: reputation for directory services in p2p systems. In: Proceedings of The ACM Workshop on Insider Threats
Ruj Akavipat, N. Mahdi AI-Ameen, Apu Kapadia (2014) ReDS:a framework for reputation- enhanced DHTs. In IEEE transaction on parallel and distributed systems 25(2) 321–331
Artigas MS, Lopez PG, Ahullo JP, Skarmeta AFG (2005) Cyclone: a novel design schema for hierarchical DHTs. Proc IEEE Fifth Int’l Conf Peer-to-Peer Computing (P2P)
Awerbuch B, Scheideler C (2006) Towards a scalable and robust DHT. Proc. ACM 18th Ann. Symp. Parallelism in algorithms and architectures (SPAA)
Bandara HMND, Jayasumana A (2011) Evaluation of p2p resource discovery architectures using real-life multi-attribute resource and query characteristics. IEEE Consumer Communications and Networking Conf
Bandara HMSD, Jayasumana AP (2012) Collaborative applications over peer-to-peer systems – challenges and solutions. Peer-to-Peer Networking and Applications
Bianchi S, Serbu S, Felber P, Kropf P (2006) Adaptive load balancing for DHT lookups. In: Proc. 15th International Conference on Computer Communications and Networks (ICCCN), pp 411–418
Castro M, Druschel P, Ganesh AJ, Rowstron AIT, Wallach DS (2006) Secure routing for structured peer-to-peer overlay networks. In: OSDI
Dabek F, Brunskill E, Kaashoek M, Karger F, Morris D, Stoica R, Balakrishnan H (2001) Building peer-to-peer systems with Chord, a distributed location service. In Proceedings of the 8th IEEE workshop on hot topics in operating ystems (HotOS-VIII) (ElmauiOberbayern, Germany, May 2001), pp 71–76
Dabek F, Zhao B, Druschel P, Kubiatowicz J, Stoica I(2003) Toward a common API for structured P2P overlays, IPTPS, pp 33–44
Efthymiopoulos N, Christakidis A, Denazis S, Koufopavlou O (2006) Enabling locality in a balanced peer-to-peer overlay. In: IEEE Global Telecommunications Conference (GLOBECOM), pp 1–5
Gopalakrishnan V, Silaghi B, Bhattacharjee B, Keleher P (2004) Adaptive replication in peer-to-peer systems. In: Proc. 24th International Conference on Distributed Computing Systems (ICDCS). IEEE Computer Society, pp 360–369
Hildrum K, Kubiatowicz JD, Rao S, Zhao BY (2002) Distributed object location in a dynamic network. In Proc. of the 14th ACM Symp. On parallel algorithms and architectures (SPAA), p 41-52
Kapadia A, Triandopoulos N (2008) Halo: high-assurance locate for distributed hash tables. In: proc. network and distributed system security symposium (NDSS)
Kapadia A, Triandopoulos N (2008) Halo: high-assurance locate for distributed hash tables. Proc. 15th Ann. Network and distributed system security Symp. (NDSS)
Mickens JW, Noble BD (2007) Concilium: collaborative diagnosis of broken overlay routes. Proc. IEEE/IFIP 37th Ann. Int’l Conf. Dependable Systems and Networks (DSN ‘07), pp 225-234
Nambiar A, Wright M (2006) “Salsa: A Structured Approach to Large-Scale Anonymity” in computer- Communication Networks, Alexandria, Virginia, ACM 1–59593–518-5/06/0010 ...$5.00. October 30–November 3, 2006
Naor M, Wieder U (2003) A simple fault tolerant distributed hash table. Proc. second Int’l workshop peer-to-peer systems (IPTPS)
Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) Chord: a scalable content-addressable network. In Proc. ACM SIGCOMM, San Diego
A. Rowstron and P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In: IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), ser. Lecture Notes in Computer Science, R. Guerraoui, Ed., no. 2218. Springer Heidelberg, Germany, 2001, pp 329–350
Rowstron A, Druschel P (2001) Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In: 18th ACM Symposium on Operating Systems Principles (SOSP), pp 188–201
Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to- peer lookup service for internet applications. Tech Rep TR-819, MIT LCS SIGCOMM'01, PP 1–12
Stutzbach D, Rejaie R (2006) Improving lookup performance over a widely-deployed DHT. In: Proc. of INFOCOM
Wang P, Osipkov I, Hopper N, Kim Y (2006) Myrmic: provably secure and efficient DHT routing. DTC Technical Report 2006/20, Univ. of Minnesota
Yin L, Cao G (2005) Dup: dynamic-tree based update propagation in peer-to-peer networks. In: Proc. 21st International Conference on Data Engineering, ser. ICDE ‘05. Washington, DC, USA: IEEE Computer Society, pp 258–259
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Vijayaraj, A., Suresh, R.M. & Poonkuzhali, S. RETRACTED ARTICLE: Load balancing in wireless networks using reputation-ReDS in the magnified distributed hash table. Multimed Tools Appl 77, 10347–10364 (2018). https://doi.org/10.1007/s11042-018-5620-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-5620-6