SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 3, Issue 4 (November 2013) PP: 51-55

Optimizing of Bloom Filters by Automatic Bloom Filter Updating
and Instantly Updating Service Availability on Peers in P2P
Network
Amulia P.M1, Jisha G2
1

Department of Information Technology, RSET, Kakkanad,

Abstract: P2P networks have become popular in the distributed computing paradigm. Different search
mechanisms are used in P2P networks. Although flooding search technique, often provide required search
results, this technique incurs lot of unnecessary traffic in the network. Bloom filter technique was developed to
reduce the network traffic and thereby reduce communication cost. The main drawback of bloom filter is false
positive results. False positives increase when data becomes stale. To reduce the stale data problem the paper
proposes a mechanism to automatically updating the bloom filter information. The optimized bloom filter
technology we propose provides automatic registering and deregistering of services. So information in the
encoded bloom filters will be current and only contain the membership from the currently service-available
registered peers. This reduces overloading the network with search request and also guarantees required search
result with minimum overhead and wastage of resources. The expiry-date based encoded bloom filters we
propose provide automatic refreshing of the bloom filter set. This also minimizes stale information and there by
reduces the chance of false positive results.
Keywords: P2P, bloom filter, service discovery, optimizing, query

I.

INTRODUCTION

Peer-to-peer (P2P) network is a popular information sharing tool where data is located in a distributed
manner mostly in geographically separate locations. It also includes distribution of resources.
Currently, the common search process in p2p network includes the following steps:
1.
Locating the service providing peers.
2.
Forwarding the query to peers providing the service.
3.
Local processing of the query.
4.
Retrieving the results for the query.
The search efficiency depends greatly on the time taken to provide the result. The common blind search
technique is flooding. Flooding uses the basic Breadth First Search (BFS) and floods the network with query.
This requires contacting unnecessary nodes that in no way can contribute to the search result. Query search
requires the result of the query to be received with minimum delay and lesser bandwidth wastage. With user
queries becoming broad and complex multi-keyword searches are becoming popular. Contacting only the peer
nodes that can provide the required search result becomes crucial in reducing communication cost. In a query
that includes “distributed computing” the multi keywords are separated into individual keywords “distributed”
and “computing”. The traditional flooding method includes that each keyword be separately searched at all the
peers in the network and the results to be merged at the selected peer node. This causes flooding technique to
contact large number of unnecessary peers and also waste bandwidth and other scarce resources. The search will
be heavily time consuming leading to user frustration. The bloom filter search mechanism reduces the wastage
of resources by using encoded filters. This reduces unnecessary traffic in the network as it requires contacting
only the required peers for the keyword result. The main drawback of bloom filter is false positive results. False
positives increase when data becomes stale. Optimizing bloom filters is very important to reduce
communication cost in multi keyword search that require intersection or union (AND or OR) [1] query
operations. The mechanism we propose uses checking service availability by polling peer nodes in the network.
By getting the current service-providing peers, only these peers need to be contacted with query request. Using
this information about the service providing peers encoded bloom filter [3] data can be updated automatically
with timestamp based current information. The current information available with bloom filter minimizes stale
data in the bloom filter set. This provides current search result and reduces search delay and wastage of
resources. The number of unnecessary nodes contacted is reduced and there by reduces the communication cost.
Optimizing bloom filters using expiry date method improves multi keyword search.
The rest of this paper is organized as follows. Section 2 elaborates on flooding and bloom filter search
techniques and the requirement for optimizing bloom filter search technique. Section 3 elaborates on the design

www.ijeijournal.com

Page | 51
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating…
of optimizing bloom filter search technique using automatic polling of peers and expiry date based bloom filter
data. Implementation procedures for generating optimized bloom filter based search mechanism and the
graphical performance results are given in section 4. Conclusion is given in section 5.

II.

FLOODING AND BLOOM FILTER SEARCH MECHANISMS AND THE
REQUIREMENT FOR OPTIMIZING BLOOM FILTER SEARCH

The common search technique [6] used in a P2P network is flooding. Flooding comes under blind
search [2]. The flooding technique uses simple broadcasting method where each node contacts all its neighbors.
The query is propagated throughout the network or until the search result is obtained. This provides unnecessary
load in the network and drastic increase in search time. The method to reduce the load in the network and to
reduce the search time is to include Time to Live (TTL) [5] or hop count with the query search. TTL or hop
count can be used to control the number of hops the query needs to be propagated in case the required search
result is not obtained. Choosing the appropriate TTL or hop count is difficult. If the TTL is too high it creates
unnecessary burden on the network. If it is too low the required result may not be obtained even though the
result might be somewhere in the network. Bloom Filter reduces the unnecessary overload generated in the
network when using flooding search technique.
In multi keyword search the difficulty is in locating the peer nodes which is responsible for the
keywords. The multi-word query is separated into single keywords and each keyword is separately searched. If
the result requires an intersection (AND) operation the common documents of the entire keyword search is
taken. Only those document identifiers that have all the keywords in the query are sent to the searching node as
the final result. For a union operation the keywords could be searched in separate nodes and all the document
identifiers that have at least one keyword in the query could be transmitted to the searching node. The merged
result of all the documents is the final result. The regular multi keyword search requires large replication of
documents at peers across the network resulting in storage and consistency problems. The large volume of raw
data transmission could produce unnecessary traffic in the network leading to bandwidth wastage. Thus P.
Reynolds and A.Vahdat [7] suggested bloom filters to recursively encode the transmitted lists. Bloom filter [3,4]
is an efficient data structure that can represent a set S and also process a membership query „is x in set S‟.
Bloom filters are space efficient data structures. This minimizes storage and transmission cost that is a huge
problem in flooding based search technique. The mapping of which location to look for the result, greatly
reduces unnecessary load in the network and wastage of resources. The problem with bloom filter is, these
encoded sets could include stale or false information. The documents that are old or removed from the network
could be included in the bloom filter encoded set. The peers located for performing the search could be removed
from the network. There should be a mechanism to automatically update the current service providing peers.
There should also be a mechanism to reduce the possibility of obtaining stale result for the search.
Bloom Filter reduces the unnecessary overload generated in the network when flooding search technique is
used. There should be some mechanism to improve bloom filter search mechanism. With multi keyword search
becoming popular in peer-to-peer network, there should be techniques to guarantee required search results with
minimum overhead and delay. This will reduce the communication cost and wastage of resources.

III.

DESIGN FOR THE OPTIMIZING OF BLOOM FILTER BASED SEARCH
TECHNIQUE

In this section we give a brief overview of the design of our proposed system for multi keyword search
in a peer-to-peer network. In search the important aspect is to locate the appropriate peer node which is
responsible for the search result.
The design uses a P2P network. The technique to locate the peer nodes for the search service is the
random probing. The service discovery and update mechanism sends automatic messages to the peer nodes in
the network. The peer nodes that respond to the message are added to the service registry. These peers are
considered registered for the multi keyword search service. The nodes in the network that no longer respond to
the requests are deregistered from the service registry. When service discovery is performed an automatic
refreshing of the service registry is also done, that is registering new services and deregistering of services if
they are no longer available. This removes the chance of any deleted or unauthorised service to be added to the
service registry. It also adds new peers that have started providing the service. Only the registered peers need to
be contacted for the required document service search. This reduces overloading the network with search
request and also guarantees required search result with minimum overhead.
The encoded bloom filters are generating so as to reduce stale data in the bloom filter set. This uses an
expiry date based mapping technique. If the current date is greater than expiry date the encoded bloom filter
table is populated again with new mapping information. This reduces the chance of stale membership in the
bloom filter set.

www.ijeijournal.com

Page | 52
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating…
IV.

IMPLEMENTATION PROCEDURES AND GRAPHICAL RESULT COMPARISON FOR THE
TIME TAKEN FOR AND/OR (INTERSECTION/UNION)QUERY USING BLOOM FILTER VS
OPTIMIZED BLOOM FILTER BASED SEARCH
Table 1
Expiry Date based Bloom Filter Optimization Table with Keyword-Document-Peer Mapping
Keyword
Document
Peer Nodes
Keyword
Expiry
Occurrence in Each
Date
Document
Keyword1

Doc1.txt
Doc2.txt
Doc3.txt

Peer1
Peer2
Peer3

2
3
1

Date1
Date1
Date1

The implementation of a p2p network was done by creating an overlay network with automatic Service
Discovery those polls for any new service. The new service is registered for responding peers and any nonresponding peer nodes are deregistered from the registry table. This is done using a polling mechanism. Bloom
filters are generated using query-document-peer mapping. The Optimized Bloom Filter checks with the registry
service, for available peers that provide the search. Then from the expiry date based encoded bloom filter
optimization table the peers with documents that contain the “search keyword” is selected. For the search the
query containing multi keywords is split into a set of individual keyword and searched separately. For AND
query the intersection operation for the document results for each individual keyword is obtained by using a
document-name matching mechanism. For OR query all the documents for each individual keyword search
result are merged. The merge result does not include duplicates. Our results show about 185 times improvement
in search time when compared to regular bloom filter search.
A test suite was created to check the performance of Flooding Vs. Regular Bloom Filter search
technique and also check the performance of Bloom Filters Vs. Optimised Bloom Filters. We compared the time
taken to obtain query search results for both intersection and union operation. The testing was done for various
number of test runs. The ratio of run-time against the number of tests ran stayed almost the same. Even during
stress testings the improvement in time for optimised bloom filters were same.
Steps Involved in the Implementation of Optimised Bloom Filter Search Mechanism in a P2P Network.

Create an overlay P2P network with automatic service discovery.

Allocate evenly the available documents (files) to be searched for the keyword on each peer node.

Create a hash-map with keyword-document-peer mapping.

Using the hash-map, generate bloom filters showing membership of each document on the available
peers.

Also give an expiry date to the mapping so as to populate the bloom filter table if the expiry date has
reached.

Perform the multi keyword search by splitting the query into individual keywords.

Get the multi keyword search results using AND (intersection of individual keyword search results) or
OR (union of individual keyword search results) operation.

Retrieve the result document from the peer node.

Fig 1. Graphical representation of the time taken for a intersection (AND query) operation in Flooding and
Bloom Filter based search against the number of test runs.

www.ijeijournal.com

Page | 53
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating…

Fig 2. Graphical representation of the time taken for a union (OR query) operation in Flooding and Bloom Filter
based search against the number of test runs.

Fig 3. Graphical representation of the time taken for intersection operation (AND query) Bloom Filters and
Optimized Bloom Filter based search against the number of test runs.

Fig 4. Graphical representation of the time taken for union operation (OR query) Bloom Filters and Optimised
Bloom Filter based search against the number of test runs.
The performance analysis shows improvement in search time for multi keyword search using optimized
bloom filter based search for both intersection and union operation.

V.

CONCLUSION

Significant research has been done in the P2P research field. Efficient search mechanisms have to be
developed to improve efficiency and cost effectiveness in multi keyword search. Flooding technique is the basic
search mechanism commonly used in a P2P network. This method is reliable but affects the scalability and
efficiency of the P2P network. The techniques specified in this paper provide optimum query forwarding with
the quick and current search result. In multi keyword search which required AND or OR operation minimizing
traffic in the network is crucial. The improvement to the bloom filter search technique proposed in this paper
reduces communication cost as it reduces traffic in the network and also avoids wastage of resources.

REFERENCES
[1].

Efficient Multi-keyword Search over P2P Web; Hanhua Chen, Hai Jin , School of Computer Science and Technology Huazhong
University of Science and Technology Wuhan, 430073, China {chenhanhua,hjin}@hust.edu.cn Jiliang Wang,Lei Chen,Yunhao

www.ijeijournal.com

Page | 54
Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating…

[2].
[3].

[4].

[5].

[6].
[7].

Liu,Lionel Ni Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear
Water Bay, Kowloon, Hong Kong {aliang,leichen,liu,ni}@cse.ust.hk. Proceedings of the 17th international conference on
World Wide Web, 2008, ISBN: 978-1-60558-0852 DOI:10.1145/1367497.
Efficient Search Techniques in Peer to Peer Networks, Tarunpreet Bhatia, Dr Deepak Garg, Computer Science Department,
Thapar University, Patiala. International Journal of Computer Applications (0975- 8887) Volume 36– No.1, December 2011.
Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Hanhua Chen,Member, IEEE, Hai Jin, Senior
Member, IEEE, Lei Chen, Member, IEEE Yunhao Liu,Senior Member, IEEE, and Lionel M. Ni, Fellow, IEEE, IEEE
Transactions on Knowledge and Data Engineering, VOL. 24, NO. 4
Bloomcast Efficient and Effective full-text retrieval in unstructured P2P networks. Hanhua Chen, Member, IEEE, Hai Jin, Senior
Member, IEEE, Xucheng Luo, Yunhao Liu, Senior Member, IEEE, Tao Gu, Member, IEEE, Kaiji Chen, and Lionel M. Ni,
Fellow, IEEE, Transaction on parallel and distributed systems, Vol.23, No.2, February 2012.
Search and Replication in Unstructured Peer-to-Peer Networks, Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Sheenier. 2002.
Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th international conference on
Supercomputing
(ICS
'02).
ACM,
New
York,
NY,
USA,
84-95.
DOI=10.1145/514191.514206.
http://doi.acm.org/10.1145/514191.514206.
Search Methods in P2P Networks : German Sakaryan, Markus Wulff, Herwig Unger , 4 th International Workshop, IICS 2004,
Guadalajara,Mexico,June21-23, DOI:10.1007/11553762_6, Online ISBN : 978-3-540-33995-3.
Efficient Peer-to-Peer Keyword Searching, Patrick Reynolds, Amin Vahdat, Computer Science Department of Duke University.
International Conference on Distributed Systems Platforms and Open Distributed Processing, 2003.

www.ijeijournal.com

Page | 55

Más contenido relacionado

La actualidad más candente

AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSIJNSA Journal
 
A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...
A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...
A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...IOSR Journals
 
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
 
data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacksNilu Desai
 
An Enhanced P2P Architecture for Dispersed Service Discovery
An Enhanced P2P Architecture for Dispersed Service DiscoveryAn Enhanced P2P Architecture for Dispersed Service Discovery
An Enhanced P2P Architecture for Dispersed Service DiscoveryIJRES Journal
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...IJNSA Journal
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Uvaraj Shan
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
 
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...IJNSA Journal
 
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...IJERA Editor
 
Collecting Usage Statistics for E-Government Resources
Collecting Usage Statistics for E-Government ResourcesCollecting Usage Statistics for E-Government Resources
Collecting Usage Statistics for E-Government ResourcesChristopher Brown
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
 

La actualidad más candente (17)

AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOSAN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
AN EFFECTIVE PREVENTION OF ATTACKS USING GI TIME FREQUENCY ALGORITHM UNDER DDOS
 
A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...
A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...
A survey on Stack Path Identification and Encryption Adopted as Spoofing Defe...
 
IRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET- Adopting Encryption for Intranet File Communication System
IRJET- Adopting Encryption for Intranet File Communication System
 
data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
An Enhanced P2P Architecture for Dispersed Service Discovery
An Enhanced P2P Architecture for Dispersed Service DiscoveryAn Enhanced P2P Architecture for Dispersed Service Discovery
An Enhanced P2P Architecture for Dispersed Service Discovery
 
G0434045
G0434045G0434045
G0434045
 
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksTextual based retrieval system with bloom in unstructured Peer-to-Peer networks
Textual based retrieval system with bloom in unstructured Peer-to-Peer networks
 
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PAR...
 
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
Flexible Bloom for Searching Textual Content Based Retrieval System in an Uns...
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksA Proposal for End-to-End QoS Provisioning in Software-Defined Networks
A Proposal for End-to-End QoS Provisioning in Software-Defined Networks
 
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
 
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
 
Peer to peer connection
Peer to peer connectionPeer to peer connection
Peer to peer connection
 
Collecting Usage Statistics for E-Government Resources
Collecting Usage Statistics for E-Government ResourcesCollecting Usage Statistics for E-Government Resources
Collecting Usage Statistics for E-Government Resources
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 

Similar a Optimizing Bloom Filters for Efficient P2P Searches

Adaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevanceAdaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevanceeSAT Journals
 
Effective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkEffective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkUvaraj Shan
 
Effective data retrieval system with bloom in a unstructured p2p network
Effective data retrieval system with bloom in a unstructured p2p networkEffective data retrieval system with bloom in a unstructured p2p network
Effective data retrieval system with bloom in a unstructured p2p networkUvaraj Shan
 
IRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation SystemIRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation SystemIRJET Journal
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17redpel dot com
 
IRJET- Determining Document Relevance using Keyword Extraction
IRJET-  	  Determining Document Relevance using Keyword ExtractionIRJET-  	  Determining Document Relevance using Keyword Extraction
IRJET- Determining Document Relevance using Keyword ExtractionIRJET Journal
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule miningStudsPlanet.com
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSijp2p
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSijp2p
 
Bsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexingBsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexingijp2p
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSijp2p
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSijp2p
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSijp2p
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
 
Perception Determined Constructing Algorithm for Document Clustering
Perception Determined Constructing Algorithm for Document ClusteringPerception Determined Constructing Algorithm for Document Clustering
Perception Determined Constructing Algorithm for Document ClusteringIRJET Journal
 
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesVenu Madhav
 

Similar a Optimizing Bloom Filters for Efficient P2P Searches (20)

Adaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevanceAdaptive focused crawling strategy for maximising the relevance
Adaptive focused crawling strategy for maximising the relevance
 
Effective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p NetworkEffective Data Retrieval System with Bloom in a Unstructured p2p Network
Effective Data Retrieval System with Bloom in a Unstructured p2p Network
 
Effective data retrieval system with bloom in a unstructured p2p network
Effective data retrieval system with bloom in a unstructured p2p networkEffective data retrieval system with bloom in a unstructured p2p network
Effective data retrieval system with bloom in a unstructured p2p network
 
IRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation SystemIRJET- E-commerce Recommendation System
IRJET- E-commerce Recommendation System
 
Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17Data mining for_java_and_dot_net 2016-17
Data mining for_java_and_dot_net 2016-17
 
IRJET- Determining Document Relevance using Keyword Extraction
IRJET-  	  Determining Document Relevance using Keyword ExtractionIRJET-  	  Determining Document Relevance using Keyword Extraction
IRJET- Determining Document Relevance using Keyword Extraction
 
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...
 
Hardware enhanced association rule mining
Hardware enhanced association rule miningHardware enhanced association rule mining
Hardware enhanced association rule mining
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...Study on security and quality of service implementations in p2 p overlay netw...
Study on security and quality of service implementations in p2 p overlay netw...
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
 
Bsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexingBsi bloom filter based semantic indexing
Bsi bloom filter based semantic indexing
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
 
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKSBSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
BSI: BLOOM FILTER-BASED SEMANTIC INDEXING FOR UNSTRUCTURED P2P NETWORKS
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
 
presentation_SB_v01
presentation_SB_v01presentation_SB_v01
presentation_SB_v01
 
Perception Determined Constructing Algorithm for Document Clustering
Perception Determined Constructing Algorithm for Document ClusteringPerception Determined Constructing Algorithm for Document Clustering
Perception Determined Constructing Algorithm for Document Clustering
 
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association RulesA New Data Stream Mining Algorithm for Interestingness-rich Association Rules
A New Data Stream Mining Algorithm for Interestingness-rich Association Rules
 

Más de International Journal of Engineering Inventions www.ijeijournal.com

Más de International Journal of Engineering Inventions www.ijeijournal.com (20)

H04124548
H04124548H04124548
H04124548
 
G04123844
G04123844G04123844
G04123844
 
F04123137
F04123137F04123137
F04123137
 
E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 

Último

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Optimizing Bloom Filters for Efficient P2P Searches

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 4 (November 2013) PP: 51-55 Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating Service Availability on Peers in P2P Network Amulia P.M1, Jisha G2 1 Department of Information Technology, RSET, Kakkanad, Abstract: P2P networks have become popular in the distributed computing paradigm. Different search mechanisms are used in P2P networks. Although flooding search technique, often provide required search results, this technique incurs lot of unnecessary traffic in the network. Bloom filter technique was developed to reduce the network traffic and thereby reduce communication cost. The main drawback of bloom filter is false positive results. False positives increase when data becomes stale. To reduce the stale data problem the paper proposes a mechanism to automatically updating the bloom filter information. The optimized bloom filter technology we propose provides automatic registering and deregistering of services. So information in the encoded bloom filters will be current and only contain the membership from the currently service-available registered peers. This reduces overloading the network with search request and also guarantees required search result with minimum overhead and wastage of resources. The expiry-date based encoded bloom filters we propose provide automatic refreshing of the bloom filter set. This also minimizes stale information and there by reduces the chance of false positive results. Keywords: P2P, bloom filter, service discovery, optimizing, query I. INTRODUCTION Peer-to-peer (P2P) network is a popular information sharing tool where data is located in a distributed manner mostly in geographically separate locations. It also includes distribution of resources. Currently, the common search process in p2p network includes the following steps: 1. Locating the service providing peers. 2. Forwarding the query to peers providing the service. 3. Local processing of the query. 4. Retrieving the results for the query. The search efficiency depends greatly on the time taken to provide the result. The common blind search technique is flooding. Flooding uses the basic Breadth First Search (BFS) and floods the network with query. This requires contacting unnecessary nodes that in no way can contribute to the search result. Query search requires the result of the query to be received with minimum delay and lesser bandwidth wastage. With user queries becoming broad and complex multi-keyword searches are becoming popular. Contacting only the peer nodes that can provide the required search result becomes crucial in reducing communication cost. In a query that includes “distributed computing” the multi keywords are separated into individual keywords “distributed” and “computing”. The traditional flooding method includes that each keyword be separately searched at all the peers in the network and the results to be merged at the selected peer node. This causes flooding technique to contact large number of unnecessary peers and also waste bandwidth and other scarce resources. The search will be heavily time consuming leading to user frustration. The bloom filter search mechanism reduces the wastage of resources by using encoded filters. This reduces unnecessary traffic in the network as it requires contacting only the required peers for the keyword result. The main drawback of bloom filter is false positive results. False positives increase when data becomes stale. Optimizing bloom filters is very important to reduce communication cost in multi keyword search that require intersection or union (AND or OR) [1] query operations. The mechanism we propose uses checking service availability by polling peer nodes in the network. By getting the current service-providing peers, only these peers need to be contacted with query request. Using this information about the service providing peers encoded bloom filter [3] data can be updated automatically with timestamp based current information. The current information available with bloom filter minimizes stale data in the bloom filter set. This provides current search result and reduces search delay and wastage of resources. The number of unnecessary nodes contacted is reduced and there by reduces the communication cost. Optimizing bloom filters using expiry date method improves multi keyword search. The rest of this paper is organized as follows. Section 2 elaborates on flooding and bloom filter search techniques and the requirement for optimizing bloom filter search technique. Section 3 elaborates on the design www.ijeijournal.com Page | 51
  • 2. Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating… of optimizing bloom filter search technique using automatic polling of peers and expiry date based bloom filter data. Implementation procedures for generating optimized bloom filter based search mechanism and the graphical performance results are given in section 4. Conclusion is given in section 5. II. FLOODING AND BLOOM FILTER SEARCH MECHANISMS AND THE REQUIREMENT FOR OPTIMIZING BLOOM FILTER SEARCH The common search technique [6] used in a P2P network is flooding. Flooding comes under blind search [2]. The flooding technique uses simple broadcasting method where each node contacts all its neighbors. The query is propagated throughout the network or until the search result is obtained. This provides unnecessary load in the network and drastic increase in search time. The method to reduce the load in the network and to reduce the search time is to include Time to Live (TTL) [5] or hop count with the query search. TTL or hop count can be used to control the number of hops the query needs to be propagated in case the required search result is not obtained. Choosing the appropriate TTL or hop count is difficult. If the TTL is too high it creates unnecessary burden on the network. If it is too low the required result may not be obtained even though the result might be somewhere in the network. Bloom Filter reduces the unnecessary overload generated in the network when using flooding search technique. In multi keyword search the difficulty is in locating the peer nodes which is responsible for the keywords. The multi-word query is separated into single keywords and each keyword is separately searched. If the result requires an intersection (AND) operation the common documents of the entire keyword search is taken. Only those document identifiers that have all the keywords in the query are sent to the searching node as the final result. For a union operation the keywords could be searched in separate nodes and all the document identifiers that have at least one keyword in the query could be transmitted to the searching node. The merged result of all the documents is the final result. The regular multi keyword search requires large replication of documents at peers across the network resulting in storage and consistency problems. The large volume of raw data transmission could produce unnecessary traffic in the network leading to bandwidth wastage. Thus P. Reynolds and A.Vahdat [7] suggested bloom filters to recursively encode the transmitted lists. Bloom filter [3,4] is an efficient data structure that can represent a set S and also process a membership query „is x in set S‟. Bloom filters are space efficient data structures. This minimizes storage and transmission cost that is a huge problem in flooding based search technique. The mapping of which location to look for the result, greatly reduces unnecessary load in the network and wastage of resources. The problem with bloom filter is, these encoded sets could include stale or false information. The documents that are old or removed from the network could be included in the bloom filter encoded set. The peers located for performing the search could be removed from the network. There should be a mechanism to automatically update the current service providing peers. There should also be a mechanism to reduce the possibility of obtaining stale result for the search. Bloom Filter reduces the unnecessary overload generated in the network when flooding search technique is used. There should be some mechanism to improve bloom filter search mechanism. With multi keyword search becoming popular in peer-to-peer network, there should be techniques to guarantee required search results with minimum overhead and delay. This will reduce the communication cost and wastage of resources. III. DESIGN FOR THE OPTIMIZING OF BLOOM FILTER BASED SEARCH TECHNIQUE In this section we give a brief overview of the design of our proposed system for multi keyword search in a peer-to-peer network. In search the important aspect is to locate the appropriate peer node which is responsible for the search result. The design uses a P2P network. The technique to locate the peer nodes for the search service is the random probing. The service discovery and update mechanism sends automatic messages to the peer nodes in the network. The peer nodes that respond to the message are added to the service registry. These peers are considered registered for the multi keyword search service. The nodes in the network that no longer respond to the requests are deregistered from the service registry. When service discovery is performed an automatic refreshing of the service registry is also done, that is registering new services and deregistering of services if they are no longer available. This removes the chance of any deleted or unauthorised service to be added to the service registry. It also adds new peers that have started providing the service. Only the registered peers need to be contacted for the required document service search. This reduces overloading the network with search request and also guarantees required search result with minimum overhead. The encoded bloom filters are generating so as to reduce stale data in the bloom filter set. This uses an expiry date based mapping technique. If the current date is greater than expiry date the encoded bloom filter table is populated again with new mapping information. This reduces the chance of stale membership in the bloom filter set. www.ijeijournal.com Page | 52
  • 3. Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating… IV. IMPLEMENTATION PROCEDURES AND GRAPHICAL RESULT COMPARISON FOR THE TIME TAKEN FOR AND/OR (INTERSECTION/UNION)QUERY USING BLOOM FILTER VS OPTIMIZED BLOOM FILTER BASED SEARCH Table 1 Expiry Date based Bloom Filter Optimization Table with Keyword-Document-Peer Mapping Keyword Document Peer Nodes Keyword Expiry Occurrence in Each Date Document Keyword1 Doc1.txt Doc2.txt Doc3.txt Peer1 Peer2 Peer3 2 3 1 Date1 Date1 Date1 The implementation of a p2p network was done by creating an overlay network with automatic Service Discovery those polls for any new service. The new service is registered for responding peers and any nonresponding peer nodes are deregistered from the registry table. This is done using a polling mechanism. Bloom filters are generated using query-document-peer mapping. The Optimized Bloom Filter checks with the registry service, for available peers that provide the search. Then from the expiry date based encoded bloom filter optimization table the peers with documents that contain the “search keyword” is selected. For the search the query containing multi keywords is split into a set of individual keyword and searched separately. For AND query the intersection operation for the document results for each individual keyword is obtained by using a document-name matching mechanism. For OR query all the documents for each individual keyword search result are merged. The merge result does not include duplicates. Our results show about 185 times improvement in search time when compared to regular bloom filter search. A test suite was created to check the performance of Flooding Vs. Regular Bloom Filter search technique and also check the performance of Bloom Filters Vs. Optimised Bloom Filters. We compared the time taken to obtain query search results for both intersection and union operation. The testing was done for various number of test runs. The ratio of run-time against the number of tests ran stayed almost the same. Even during stress testings the improvement in time for optimised bloom filters were same. Steps Involved in the Implementation of Optimised Bloom Filter Search Mechanism in a P2P Network.  Create an overlay P2P network with automatic service discovery.  Allocate evenly the available documents (files) to be searched for the keyword on each peer node.  Create a hash-map with keyword-document-peer mapping.  Using the hash-map, generate bloom filters showing membership of each document on the available peers.  Also give an expiry date to the mapping so as to populate the bloom filter table if the expiry date has reached.  Perform the multi keyword search by splitting the query into individual keywords.  Get the multi keyword search results using AND (intersection of individual keyword search results) or OR (union of individual keyword search results) operation.  Retrieve the result document from the peer node. Fig 1. Graphical representation of the time taken for a intersection (AND query) operation in Flooding and Bloom Filter based search against the number of test runs. www.ijeijournal.com Page | 53
  • 4. Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating… Fig 2. Graphical representation of the time taken for a union (OR query) operation in Flooding and Bloom Filter based search against the number of test runs. Fig 3. Graphical representation of the time taken for intersection operation (AND query) Bloom Filters and Optimized Bloom Filter based search against the number of test runs. Fig 4. Graphical representation of the time taken for union operation (OR query) Bloom Filters and Optimised Bloom Filter based search against the number of test runs. The performance analysis shows improvement in search time for multi keyword search using optimized bloom filter based search for both intersection and union operation. V. CONCLUSION Significant research has been done in the P2P research field. Efficient search mechanisms have to be developed to improve efficiency and cost effectiveness in multi keyword search. Flooding technique is the basic search mechanism commonly used in a P2P network. This method is reliable but affects the scalability and efficiency of the P2P network. The techniques specified in this paper provide optimum query forwarding with the quick and current search result. In multi keyword search which required AND or OR operation minimizing traffic in the network is crucial. The improvement to the bloom filter search technique proposed in this paper reduces communication cost as it reduces traffic in the network and also avoids wastage of resources. REFERENCES [1]. Efficient Multi-keyword Search over P2P Web; Hanhua Chen, Hai Jin , School of Computer Science and Technology Huazhong University of Science and Technology Wuhan, 430073, China {chenhanhua,hjin}@hust.edu.cn Jiliang Wang,Lei Chen,Yunhao www.ijeijournal.com Page | 54
  • 5. Optimizing of Bloom Filters by Automatic Bloom Filter Updating and Instantly Updating… [2]. [3]. [4]. [5]. [6]. [7]. Liu,Lionel Ni Department of Computer Science and Engineering Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong {aliang,leichen,liu,ni}@cse.ust.hk. Proceedings of the 17th international conference on World Wide Web, 2008, ISBN: 978-1-60558-0852 DOI:10.1145/1367497. Efficient Search Techniques in Peer to Peer Networks, Tarunpreet Bhatia, Dr Deepak Garg, Computer Science Department, Thapar University, Patiala. International Journal of Computer Applications (0975- 8887) Volume 36– No.1, December 2011. Optimizing Bloom Filter Settings in Peer-to-Peer Multikeyword Searching Hanhua Chen,Member, IEEE, Hai Jin, Senior Member, IEEE, Lei Chen, Member, IEEE Yunhao Liu,Senior Member, IEEE, and Lionel M. Ni, Fellow, IEEE, IEEE Transactions on Knowledge and Data Engineering, VOL. 24, NO. 4 Bloomcast Efficient and Effective full-text retrieval in unstructured P2P networks. Hanhua Chen, Member, IEEE, Hai Jin, Senior Member, IEEE, Xucheng Luo, Yunhao Liu, Senior Member, IEEE, Tao Gu, Member, IEEE, Kaiji Chen, and Lionel M. Ni, Fellow, IEEE, Transaction on parallel and distributed systems, Vol.23, No.2, February 2012. Search and Replication in Unstructured Peer-to-Peer Networks, Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Sheenier. 2002. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th international conference on Supercomputing (ICS '02). ACM, New York, NY, USA, 84-95. DOI=10.1145/514191.514206. http://doi.acm.org/10.1145/514191.514206. Search Methods in P2P Networks : German Sakaryan, Markus Wulff, Herwig Unger , 4 th International Workshop, IICS 2004, Guadalajara,Mexico,June21-23, DOI:10.1007/11553762_6, Online ISBN : 978-3-540-33995-3. Efficient Peer-to-Peer Keyword Searching, Patrick Reynolds, Amin Vahdat, Computer Science Department of Duke University. International Conference on Distributed Systems Platforms and Open Distributed Processing, 2003. www.ijeijournal.com Page | 55