dc.contributor.author |
Agbeko, Joseph |
en_US |
dc.date.accessioned |
2013-12-03T21:23:18Z |
|
dc.date.accessioned |
2019-09-08T02:38:30Z |
|
dc.date.available |
2013-12-03T21:23:18Z |
|
dc.date.available |
2019-09-08T02:38:30Z |
|
dc.date.issued |
2009 |
|
dc.identifier |
502161385 |
en_US |
dc.identifier.other |
b2055168x |
en_US |
dc.identifier.uri |
http://hdl.handle.net/1989/10699 |
|
dc.description |
vii, 42 leaves : ill. ; 29 cm. |
en_US |
dc.description.abstract |
Unstructured Peer-to-Peer (P2P) networks for content distribution are decentralized and robust. Searching for content in the network is based on the Gnutella Protocol. Broadcast Updates Look-up Search Protocol (BULLS) reverses Gnutella and enables a local look-up search at the cost of storing all the files shared in the network. In this thesis we introduce the use of bloom filters in the design and evaluation of a data structure that reduces space and search time in P2P networks based on BULLS. We also discuss the main ideas of a new Space Efficient Local Look-up Search (SELLS) protocol that is based on BULLS and uses this new data structure. The new data structured is called the Inverse Bloom Filter (IBF) and uses bloom filters. A bloom filter is a space efficient probabilistic structure for membership queries. That is, they can be used to efficiently determine if a file is stored at a host. The cost is a small probability of error called false positive. The challenge is to evaluate the search efficiency (i.e., remember searches that have not been successful) of bloom filters as the primary data structure of SELLS. The empirical evaluation can be achieved using real file names from a P2P network and determining the false positive rate of the bloom filter. Novel applications of SELLS could possibly include secure key distribution; building block towards securing P2P networks. |
en_US |
dc.description.statementofresponsibility |
by Joseph Dzidefo Kwadwo Mensah Asempapa Agbeko. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.relation.ispartofseries |
Master's Theses no. 1162 |
en_US |
dc.subject.lcsh |
Computer networks--Security measures. |
en_US |
dc.subject.lcsh |
Peer-to-peer architecture (Computer networks) |
en_US |
dc.title |
Evaluation and Application of Bloom Filters in Computer Network Security |
en_US |
dc.type |
Thesis |
en_US |