distributed hash tables
Recently Published Documents


TOTAL DOCUMENTS

141
(FIVE YEARS 1)

H-INDEX

15
(FIVE YEARS 0)

2020 ◽  
Vol 12 (5) ◽  
pp. 1-9
Author(s):  
Telesphore Tiendrebeogo ◽  
Mamadou Diarra

The Big Data is unavoidable considering the place of the digital is the predominant form of communication in the daily life of the consumer. The control of its stakes and the quality its data must be a priority in order not to distort the strategies arising from their treatment in the aim to derive profit. In order to achieve this, a lot of research work has been carried out companies and several platforms created. MapReduce, is one of the enabling technologies, has proven to be applicable to a wide range of fields. However, despite its importance recent work has shown its limitations. And to remedy this, the Distributed Hash Tables (DHT) has been used. Thus, this document not only analyses the and MapReduce implementations and Top-Level Domain (TLD)s in general, but it also provides a description of a model of DHT as well as some guidelines for the planification of the future research.


Author(s):  
Ahmad Rabay'a ◽  
Pascal Kudla ◽  
Lukas Kubitza ◽  
Kalman Graffi ◽  
Michael Schottner

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 175194-175204
Author(s):  
Mansoor Nasir ◽  
Khan Muhammad ◽  
Paolo Bellavista ◽  
Mi Young Lee ◽  
Muhammad Sajjad

Author(s):  
Agustín San Román Guzmán ◽  
Diego Valdeolmillos ◽  
Alberto Rivas ◽  
Angélica González Arrieta ◽  
Pablo Chamoso

2018 ◽  
Vol 2018 ◽  
pp. 1-16
Author(s):  
Riccardo Pecori ◽  
Luca Veltri

A Sybil attack is one of the main challenges to be addressed when securing peer-to-peer networks, especially those based on Distributed Hash Tables (DHTs). Tampering routing tables by means of multiple fake identities can make routing, storing, and retrieving operations significantly more difficult and time-consuming. Countermeasures based on trust and reputation have already proven to be effective in some contexts, but one variant of the Sybil attack, the Spartacus attack, is emerging as a new threat and its effects are even riskier and more difficult to stymie. In this paper, we first improve a well-known and deployed DHT (Chord) through a solution mixing trust with standard operations, for facing a Sybil attack affecting either routing or storage and retrieval operations. This is done by maintaining the least possible overhead for peers. Moreover, we extend the solution we propose in order for it to be resilient also against a Spartacus attack, both for an iterative and for a recursive lookup procedure. Finally, we validate our findings by showing that the proposed techniques outperform other trust-based solutions already known in the literature as well.


Sign in / Sign up

Export Citation Format

Share Document