Digital.Maag Repository

Evaluation and Application of Bloom Filters in Computer Network Security

Show simple item record

dc.contributor.author Agbeko, Joseph en_US
dc.date.accessioned 2013-12-03T21:23:18Z
dc.date.accessioned 2019-09-08T02:38:30Z
dc.date.available 2013-12-03T21:23:18Z
dc.date.available 2019-09-08T02:38:30Z
dc.date.issued 2009
dc.identifier 502161385 en_US
dc.identifier.other b2055168x en_US
dc.identifier.uri http://hdl.handle.net/1989/10699
dc.description vii, 42 leaves : ill. ; 29 cm. en_US
dc.description.abstract Unstructured Peer-to-Peer (P2P) networks for content distribution are decentralized and robust. Searching for content in the network is based on the Gnutella Protocol. Broadcast Updates Look-up Search Protocol (BULLS) reverses Gnutella and enables a local look-up search at the cost of storing all the files shared in the network. In this thesis we introduce the use of bloom filters in the design and evaluation of a data structure that reduces space and search time in P2P networks based on BULLS. We also discuss the main ideas of a new Space Efficient Local Look-up Search (SELLS) protocol that is based on BULLS and uses this new data structure. The new data structured is called the Inverse Bloom Filter (IBF) and uses bloom filters. A bloom filter is a space efficient probabilistic structure for membership queries. That is, they can be used to efficiently determine if a file is stored at a host. The cost is a small probability of error called false positive. The challenge is to evaluate the search efficiency (i.e., remember searches that have not been successful) of bloom filters as the primary data structure of SELLS. The empirical evaluation can be achieved using real file names from a P2P network and determining the false positive rate of the bloom filter. Novel applications of SELLS could possibly include secure key distribution; building block towards securing P2P networks. en_US
dc.description.statementofresponsibility by Joseph Dzidefo Kwadwo Mensah Asempapa Agbeko. en_US
dc.language.iso en_US en_US
dc.relation.ispartofseries Master's Theses no. 1162 en_US
dc.subject.lcsh Computer networks--Security measures. en_US
dc.subject.lcsh Peer-to-peer architecture (Computer networks) en_US
dc.title Evaluation and Application of Bloom Filters in Computer Network Security en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital.Maag


Advanced Search

Browse

My Account