2017
DOI: 10.1109/tcc.2014.2385063
|View full text |Cite
|
Sign up to set email alerts
|

kBF: Towards Approximate and Bloom Filter based Key-Value Storage for Cloud Computing Systems

Abstract: As one of the most popular cloud services, data storage has attracted great attention in recent research efforts. Key-value (k-v) stores have emerged as a popular option for storing and querying billions of key-value pairs. So far, existing methods have been deterministic. Providing such accuracy, however, comes at the cost of memory and CPU time. In contrast, we present an approximate k-v storage for cloud-based systems that is more compact than existing methods. The tradeoff is that it may, theoretically, r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…In consequence, graph databases with few vertices and more edges are compressed to a relatively lower size (BSBM, DyLDO-ext in Table 1). In light of this data overhead, future extensions may be to further compress L2 by using approximative data structures such as Bloom filters [28]. However, as pointed out by Fan et al [9], many real-life applications require exact matches.…”
Section: Countmentioning
confidence: 99%
“…In consequence, graph databases with few vertices and more edges are compressed to a relatively lower size (BSBM, DyLDO-ext in Table 1). In light of this data overhead, future extensions may be to further compress L2 by using approximative data structures such as Bloom filters [28]. However, as pointed out by Fan et al [9], many real-life applications require exact matches.…”
Section: Countmentioning
confidence: 99%
“…We analyze the search failure probability of the proposed structure composed of two FBFs. In this section, S F in (1) represents the event of a search failure for the proposed structure, and the P (I) and P (F P ) in (1) are to be formulated. The P (I|A) and P (I|A c ) probabilities in (2), (4), and (5) need to be modified for the proposed structure.…”
Section: B Theoretical Analysis Of Search Failure Probabilitymentioning
confidence: 99%
“…K ey-value data structures have been used in various applications, such as Facebook, Twitter, Google's BigTable, and Amazon's Dynamo [1]- [4]. As the most representative key-value data structure, a hash table stores both keys and their return values.…”
Section: Introductionmentioning
confidence: 99%
“…A key-value data structure that returns a value corresponding to an input key has been used in many fields [1][2][3]. Various network applications, such as Internet Protocol (IP) address lookup, packet classification, name lookup in Named Data Networking (NDN), traffic classification in Software-Defined Networking (SDN), and cloud computing [4][5][6][7][8], use key-value structures for data storage.…”
Section: Introductionmentioning
confidence: 99%