Distributed hash table ≈ Distributed hash table
View article
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER Open
The blockchain is an innovative technology which opened doors to new applications for solving numerous problems in distributed environments. In this study, we design a blockchain-based data storage and access framework for PingER (worldwid…
View article
Edge-Centric Distributed Discovery and Access in the Internet of Things Open
Massive diffusion of constrained devices communicating through low-power wireless technologies in the future Internet of Things will require in many scenarios the deployment of IoT gateways to allow applications to discover and access IoT …
View article
Data Storage in the Decentralized World: Blockchain and Derivatives Open
We have entered an era where the importance of decentralized solutions has become more obvious. Blockchain technology and its derivatives are distributed ledger technologies that keep the registry of data between peers of a network. This l…
View article
Efficient Decentralized Data Storage Based on Public Blockchain and IPFS Open
Blockchain technology has enabled the keeping of a decentralized, tamper-proof, immutable, and ordered ledger of transactional events. Efforts to leverage such a ledger may be challenging when data storage requirements exceed most blockcha…
View article
Reasoning About Identifier Spaces: How to Make Chord Correct Open
The Chord distributed hash table (DHT) is well-known and often used to implement peer-to-peer systems. Chord peers find other peers, and access their data, through a ring-shaped pointer structure in a large identifier space. Despite claims…
View article
CAUDHT: Decentralized Contact Tracing Using a DHT and Blind Signatures Open
Contact tracing is a promising approach to combat the COVID-19 pandemic. Various systems have been proposed to automatise the process. Many designs rely heavily on a centralised server or reveal significant amounts of private data to healt…
View article
LightChain: A DHT-based Blockchain for Resource Constrained Environments Open
As an append-only distributed database, blockchain is utilized in a vast variety of applications including the cryptocurrency and Internet-of-Things (IoT). The existing blockchain solutions have downsides in communication and storage effic…
View article
Distributed reflection denial of service attack: A critical review Open
As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on…
View article
Distributed Partition Detection With Dynamic Replication Management in a DHT-Based MANET Open
Curtailing the information loss due to network partitioning is imperative for the reliable communication in a distributed hash table (DHT)-based routing protocol for mobile ad hoc networks (MANETs). Both the limited transmission range and …
View article
Holochain: An Agent-Centric Distributed Hash Table Security in Smart IoT Applications Open
The accomplishment of blockchain has increased the focus on the various applications for simplifying the confidentiality and transaction sanctuary using the decentralized architecture via consensus mechanisms between different internet of …
View article
Attred: Attribute Based Resource Discovery for IoT Open
While the number of devices connected together as the Internet of Things (IoT) is growing, the demand for an efficient and secure model of resource discovery in IoT is increasing. An efficient resource discovery model distributes the regis…
View article
Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking Open
Due to the distributed and dynamic characteristics of the Internet of Vehicles (IoV) and the continuous growth in the number of devices, content-centric decentralized vehicular named data networking (VNDN) has become more suitable for cont…
View article
DHT- and blockchain-based smart identification for video conferencing Open
Video conferencing applications help people communicate via the Internet and provide a significant and consistent basis for virtual meetings. However, integrity, security, identification, and authentication problems are still universal. Cu…
View article
Prioritization and Alert Fusion in Distributed IoT Sensors Using Kademlia Based Distributed Hash Tables Open
Distributed intrusion detection systems (IDS) are primarily deployed across the network to monitor, detect, and report anomalies, as well as to respond in real-time. Predominantly, an IDS is equipped with a set of rules that it needs to in…
View article
Towards Dynamic Fog Resource Provisioning for Smart City Applications Open
Over the past few years, the Internet of Things (IoT) has transformed the Smart City concept into an attractive and relevant opportunity. Smart Cities aim to connect billions of objects of everyday life to the Internet to improve sustainab…
View article
IOTA-BT: A P2P File-Sharing System Based on IOTA Open
BitTorrent (BT) is the most popular peer-to-peer file-sharing system. According to official BT information, more than 100 million active users use BT for file transfers every month. However, BT mainly relies on either a central tracker (tr…
View article
Fault Tolerant DHT-Based Routing in MANET Open
In Distributed Hash Table (DHT)-based Mobile Ad Hoc Networks (MANETs), a logical structured network (i.e., follows a tree, ring, chord, 3D, etc., structure) is built over the ad hoc physical topology in a distributed manner. The logical st…
View article
<i>BloomStore</i>: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN Open
Software-defined networking (SDN) provides an efficient way of managing traffic load by shifting complex and rigid computing tasks to the centralized controller. It reduces the burden on the switches, task of which is to perform the routin…
View article
A fog-based distributed look-up service for intelligent transportation systems Open
Future intelligent transportation systems and applications are expected to greatly benefit from the integration with a cloud computing infrastructure for service reliability and efficiency. More recently, fog computing has been proposed as…
View article
Decentralized Utility- and Locality-Aware Replication for Heterogeneous DHT-Based P2P Cloud Storage Systems Open
As a Distributed Hash Table (DHT), Skip Graph routing overlays are exploited in several peer-to-peer (P2P) services, including P2P cloud storage. The fully decentralized replication algorithms that are applicable to the Skip Graph-based P2…
View article
DART Open
© 2018 Association for Computing Machinery. Affix-based search is a fundamental functionality for storage systems. It allows users to find desired datasets, where attributes of a dataset match an affix. While building inverted index to fac…
View article
Parallel <i>d</i>-D Delaunay Triangulations in Shared and Distributed Memory Open
Computing the Delaunay triangulation (DT) of a given point set in ℝD is one of the fundamental operations in computational geometry. In this paper we present a novel divide-and-conquer (D&C) algorithm that lends itself equally well to shar…
View article
Routing performance of structured overlay in Distributed Hash Tables (DHT) for P2P Open
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the…
View article
Scalable Name Lookup for NDN Using Hierarchical Hashing and Patricia Trie Open
Named data networking (NDN) is a content-centric network for the future of the internet. An NDN a packet is delivered based on a content name instead of a destination IP address. The name lookup for packet forwarding is challenging because…
View article
Totoro: A Scalable Federated Learning Engine for the Edge Open
Federated Learning (FL) is an emerging distributed machine learning (ML) technique that enables in-situ model training and inference on decentralized edge devices. We propose Totoro, a novel scalable FL engine, that enables massive FL appl…
View article
Lock-Free Hopscotch Hashing Open
In this paper we present a lock-free version of Hopscotch Hashing. Hopscotch Hashing is an open addressing algorithm originally proposed by Herlihy, Shavit, and Tzafrir [10], which is known for fast performance and excellent cache locality…
View article
WiCHORD+: A Scalable, Sustainable, and P2P Chord-Based Ecosystem for Smart Agriculture Applications Open
In the evolving landscape of Industry 4.0, the convergence of peer-to-peer (P2P) systems, LoRa-enabled wireless sensor networks (WSNs), and distributed hash tables (DHTs) represents a major advancement that enhances sustainability in the m…
View article
DHT-Based Blockchain Dual-Sharding Storage Extension Mechanism Open
The expansion of blockchain storage has become a major problem limiting the application of blockchain. From the perspective of improving the scalability of blockchain storage, a DHT (distributed hash table)-based blockchain dual-sharding s…
View article
Blockchains Meet Distributed Hash Tables: Decoupling Validation from State Storage Open
The first obstacle that regular users encounter when setting up a node for a public blockchain is the time taken for downloading all the data needed for the node to start operating correctly. In fact, this may last from hours to weeks for …
View article
DHT-based Edge and Fog Computing Systems: Infrastructures and Applications Open
Intending to support new emerging applications with latency requirements below what can be offered by the cloud data centers, the edge and fog computing paradigms have reared. In such systems, the real-time instant data is processed closer…