Strewn Effective Hiding In Shared Wireless Networks

Kotari Havila, A Rajesh

Abstract


This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET).SWNETs are formed by mobile devices, such as modern cell phones etc. sharing common takings in electronic content, and actually meeting together in public places. Electronic object caching in such SWNETs are shown to be able to reduce the content provisioning cost which depends heavily on the service and pricing dependences among various stakeholders including content providers (CP), network service providers, and End Consumers (EC).This paper develops practical network, service, and pricing models which are then used for creating two object caching strategies for reducing content provisioning costs in networks with homogenous and heterogeneous object demands. The paper develops analytical and simulation designs for analysing the proposed caching strategies in the presence of selfish users that deviate from network-wide costoptimal policies. It also reports results from an Android phone based prototype SWNET, validating the presented analytical and simulation results.


Keywords


cooperative cache; cost-optimal policies; distributed search engines; selfish users

References


M. Zhao, L. Mason, and W. Wang,

“Empirical Study on Human Mobility for Mobile Wireless Networks,” Proc. IEEE Military Comm. Conf. (MILCOM), 2008. [2] “Cambridge Trace File, Human Interaction Study,”

http://www.crawdad.org/download/cambrid ge/haggle/Exp6.tar.gz,2012.

E. Cohen, B. Krishnamurthy, and J.

Rexford, “Evaluating Server-Assisted Cache Replacement in the Web,” Proc. Sixth Ann.European Symp. Algorithms, pp. 307319, 1998.

S. Banerjee and S. Karforma, “A Prototype Design for DRM Based Credit Card Transaction in E-Commerce,” Ubiquity, vol. 2008,2008.

L. Breslau, P. Cao, L. Fan, and S. Shenker, “Web Caching and Zipf-Like Distributions: Evidence and Implications,” Proc. IEEE INFOCOM, 1999.

C. Perkins and E. Royer, “Ad-Hoc OnDemand Distance Vector Routing,” Proc. IEEE Second Workshop Mobile Systems and Applications,1999.

S. Podlipnig and L. Boszormenyi, “A Survey of Web Cache Replacement

Strategies,” ACM Computing Surveys, vol. 35, pp. 374-398, 2003.

A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott,“Impact of Human Mobility on Opportunistic Forwarding

Algorithms,” IEEE Trans. Mobile Computing, vol. 6, no. 6, pp. 606-620, June 2007.

“BU-Web-Client - Six Months of Web

Client Traces,” http://www.cs.bu.edu/techreports/1999-011usertrace-98.gz, 2012.

L. Yin and G. Cao, “Supporting Cooperative Caching in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 1, pp. 77-89, Jan. 2006.

Y. Du, S. Gupta, and G. Varsamopoulos,

“Improving On-Demand Data Access Efficiency in MANETs with Cooperative Caching,” Ad Hoc Networks, vol. 7, pp. 579-598, May 2009.

C. Chow, H. Leong, and A. Chan,

“GroCoca: Group-Based Peerto-Peer Cooperative Caching in Mobile Environment,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 179-191, Jan. 2007.

C. Chow, H. Leong, and A. Chan, “Peer-toPeer Cooperative Caching in Mobile Environments,” Proc. 24th Int’l Conf. Distributed Computing Systems Workshops, pp. 528-533, 2004.

A. Schrijver, Theory of Linear and Integer Programming. Wiley-Interscience, 1986. [19] H.K. Kuhn, “The Hungarian Method for the

Assignment Problem,” Naval Research

Logistics, vol 52, no. 1, pp. 7-21, 2005.

N. Laoutaris et al., “Mistreatment in Distributed Caching: Causes and Implications,” Proc. IEEE INFOCOM,

B. Chun et al., “Selfish Caching in Distributed Systems: A Game-Theoretic Analysis,” Proc. 23th ACM Symp.

Principles of Distributed Computing, 2004.

M. Goemans, L. Li, and M. Thottan, “Market Sharing Games Applied to Content Distribution in Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 5, pp. 1020-1033, May 2006.

National Laboratory of Applied Network Research, Sanitized Access Log, ftp://ircache.nlanr.net/Traces, July 1997.

NASA Kennedy Space Center, WWW

Server Access Log, ftp://ita.ee.lbl.gov/traces/NASA_access_log _Jul95.gz, 2012.

Univ. of Saskatchewan, WWW Server

Access Log, ftp://ita.ee.lbl.gov/traces/usask_access_log.g z, 2012.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.