2018
DOI: 10.1016/j.future.2018.02.007
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized and locality aware replication method for DHT-based P2P storage systems

Abstract: Skip Graph, a type of DHT, plays an important role in P2P cloud storage applications, where nodes publicly or privately store, share, and access data. Nowadays P2P storage systems are widely using replication to support data availability, reliability, and maintainability. With replication, the main consideration is determining peers to replicate the data. Traditional replication algorithms are partially randomized and employ rigid assumptions about nodes' distribution. This results in high access delay between… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(13 citation statements)
references
References 46 publications
0
12
0
1
Order By: Relevance
“…Thus, arithmetic operations and absolute values are well-defined on K. Moreover, we also assume that there is at most one node for each key. In practice, the uniqueness of keys is not always guaranteed because replication [26], [27] is often used to provide data availability and fault tolerance. A simple way to eliminate duplicate keys is to add some random bits on the right side of identical keys [28].…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, arithmetic operations and absolute values are well-defined on K. Moreover, we also assume that there is at most one node for each key. In practice, the uniqueness of keys is not always guaranteed because replication [26], [27] is often used to provide data availability and fault tolerance. A simple way to eliminate duplicate keys is to add some random bits on the right side of identical keys [28].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…3 and for this mid definition, mid (9, 18) = 27 2 holds, and thus closeToRight(k target , 9, 18) ⇐⇒ 27 2 < k target . This means the target node is located to the right of the estimated center if 27 2 < k target , and is located to the left if k target ≤ 27 2 . Next, if…”
Section: A Utilizing Detour Routesmentioning
confidence: 96%
“…The rapid development of modern computer network technology and the increasing transmission bandwidth provide the possibility to use the network to build a storage system with large capacity, high reliability and scalability. Thus, recently large-scale network storage systems based on structured overlay networks and distributed hash tables have become a new trend in the development of distributed storage technologies [5]. Because such systems often contain a large number of nodes and data, how to efficiently store and retrieve the required metadata in the system to locate the corresponding nodes and data is the cornerstone and key to the construction of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Dessa forma, elaé atrativa para uma diversidade de aplicações como em [Rodrigues et al 2016], em que a rede DHTé utilizada para propagação de regras de firewall. Por outro lado, em [Hassanzadeh-Nazarabadi et al 2018], a tecnologiaé usada para redundância de dados. [Eisele et al 2017] usa a rede DHT para prover um serviço de descoberta de aplicações e [Hassanzadeh-Nazarabadi et al 2019] utiliza para implementação de uma Blockchain em ambientes com recursos computacionais limitados.…”
Section: Introductionunclassified