scholarly journals Group-Interest-Based Verifiable CCN

2016 ◽  
Vol 2016 ◽  
pp. 1-9
Author(s):  
DaeYoub Kim

To solve various problems of the Internet, content centric networking (CCN), one of information centric networking architectures (ICN), provides both an in-network content caching scheme and a built-in content verification scheme. However, a user is still asked to generate many request messages when retrieving fragmented content through CCN. This model can seriously increase the amount of network traffic. Furthermore, when receiving content, a user is asked to verify the received content before using it. This verification process can cause a serious service delay. To improve such inefficiencies, this paper proposes a transmission process to handle request messages at one time. Also, it suggests an efficient content verification method using both hash chains and Merkel-hash tree.

2021 ◽  
Vol 11 (13) ◽  
pp. 6088
Author(s):  
Nazib Abdun Nasir ◽  
Seong-Ho Jeong

Users can access the Internet anywhere they go at any time due to the advancement of communications and networking technologies. The number of users and connected devices are rapidly increasing, and various forms of content are becoming increasingly available on the Internet. Consequently, several research ideas have emerged regarding the storage policy for the enormous amount of content, and procedures to remove existing content due to the lack of storage space have also been discussed. Many of the proposals related to content caching offer to identify the popularity of certain content and hold the popular content in a repository as long as possible. Although the host-based Internet has been serving its users for a long time, managing network resources efficiently during high traffic load is problematic for the host-based Internet because locating the host with their IP address is one of the primary mechanisms behind this architecture. A more strategical networking paradigm to resolve this issue is Content-Centric Networking (CCN), a branch of the networking paradigm Information-Centric Networking (ICN) that is focused on the name of the content, and therefore can deliver the requested content efficiently, securely, and faster. However, this paradigm has relatively simple content caching and content removal mechanisms, as it caches all the relevant content at all the nodes and removes the content based on the access time only when there is a lack of space. In this paper, we propose content popularity ranking (CPR) mechanism, content caching scheme, and content removal scheme. The proposed schemes are compared to existing caching schemes such as Leave Copy Everywhere (LCE) and Leave Copy Down (LCD) in terms of the Average Hop Count, content removal schemes such as Least Recently Used (LRU) and Least Frequently Used (LFU) in terms of the Cache Hit Ratio, and finally, the CCN paradigm incorporating the LCE and the LRU schemes and the host-based Internet architecture in terms of Content Delivery Time. Graphical presentations of performance results utilizing the proposed schemes show that the proposed CPR-based schemes for content caching and content removal provide better performance than the host-based Internet and the original CCN utilizing LCE and LRU schemes.


Author(s):  
Reno Renaldi Tibyan ◽  
Dermawan Wibisono ◽  
Mursyid Hasan Basri

Purpose – This paper aims to discuss the verification process of the theoretical concepts of the proposed performance management (PM) framework in practice. Design/methodology/approach – A case study based on a focus group discussion (FGD) method is used to describe the application a PM framework and the implementation of a PM system in a case organisation. Findings – The findings show that the case organisation has been applying the Balanced Scorecard framework and show that it needs to add some important aspects to the framework to support the better implementation of its PM system. Research limitations/implications – This paper is based on a single case study due to the need for an effective FGD in a selected organisation. Originality/value – The study drives the development of PM research in the use of a theoretical verification method to confirm the application of the theoretical concepts of PM framework in practice.


2019 ◽  
Vol 68 (10) ◽  
pp. 10216-10226 ◽  
Author(s):  
Yin Zhang ◽  
Ranran Wang ◽  
M. Shamim Hossain ◽  
Mohammed F. Alhamid ◽  
Mohsen Guizani

2013 ◽  
Vol 791-793 ◽  
pp. 1497-1500
Author(s):  
Jin Hui Zhao ◽  
Xiao Hong Wang

On the Internet, most of media information is transmitted in plaintext. Some others can easily tamper or intercut the information, so there are threats to those information transmitted in plaintext. This paper designs a model of video encryption which uses AES algorithm and the model is based on FPGA platform. The model does the encryption in paralleling on XUPV5-110T development board. The encryption model can ensure the security and integrity of media information during the transmission process between a certain links on the network.


2016 ◽  
Vol 25 (2) ◽  
pp. 375-396 ◽  
Author(s):  
Jun Li ◽  
Hao Wu ◽  
Bin Liu ◽  
Zhaoxi Fang ◽  
Shaozhong Zhang ◽  
...  

2019 ◽  
Vol 4 (1) ◽  
pp. 164-189
Author(s):  
Lilik Ummi Kaltsum

The Quranic verse which is believed has multi-interpretation and can be understood from many aspects of sciences frequently brings people who did not have any competency in this field interpreting it based on their own desire and purpose to win a specific group from another. The phenomenon of interpreting some of the Qur‘anic verses by some groups in the process of a gubernatorial election in DKI Jakarta produces different interpretations. Finally, this differences cause conflict and debate which cannot be avoided. Every groups assume their interpretation is absolute. As a result, they blame or infidel another group. This research examines the interpretations of the Qur‘anic verses which are used during a gubernatorial election in DKI Jakarta. The object of this study based on texts and audio which are spread on the sites of the internet. All of the data will be interpreted based on the theory of interpretation rules approach. This research concludes that the personal or group interest is able to change the paradigm of the Qur‘anic interpretation including political interest.


2021 ◽  
Vol 5 (2) ◽  
pp. 105
Author(s):  
Wasswa Shafik ◽  
S. Mojtaba Matinkhah ◽  
Mamman Nur Sanda ◽  
Fawad Shokoor

In recent years, the IoT) Internet of Things (IoT) allows devices to connect to the Internet that has become a promising research area mainly due to the constant emerging of the dynamic improvement of technologies and their associated challenges. In an approach to solve these challenges, fog computing came to play since it closely manages IoT connectivity. Fog-Enabled Smart Cities (IoT-ESC) portrays equitable energy consumption of a 7% reduction from 18.2% renewable energy contribution, which extends resource computation as a great advantage. The initialization of IoT-Enabled Smart Grids including (FESC) like fog nodes in fog computing, reduced workload in Terminal Nodes services (TNs) that are the sensors and actuators of the Internet of Things (IoT) set up. This paper proposes an integrated energy-efficiency model computation about the response time and delays service minimization delay in FESC. The FESC gives an impression of an auspicious computing model for location, time, and delay-sensitive applications supporting vertically -isolated, service delay, sensitive solicitations by providing abundant, ascendable, and scattered figuring stowage and system associativity. We first reviewed the persisting challenges in the proposed state-of-the models and based on them. We introduce a new model to address mainly energy efficiency about response time and the service delays in IoT-ESC. The iFogsim simulated results demonstrated that the proposed model minimized service delay and reduced energy consumption during computation. We employed IoT-ESC to decide autonomously or semi-autonomously whether the computation is to be made on Fog nodes or its transfer to the cloud.


Sign in / Sign up

Export Citation Format

Share Document