Design of an information system for HUNETs

39
THE DESIGN OF AN INFORMATION SHARING SYSTEM FOR HUMAN NETWORKS Presented by, RESHMA FRANK S7, CSE-β RollNo:34

description

it is a design of an information system for human networks

Transcript of Design of an information system for HUNETs

Page 1: Design of an information system for HUNETs

THE DESIGN OF AN INFORMATION SHARING

SYSTEM FOR HUMAN NETWORKS

Presented by,RESHMA FRANKS7, CSE-βRollNo:34

Page 2: Design of an information system for HUNETs

INTRODUCTION• Existing mobile devices rely on the

wireless infrastructure to access Internet services provided by central application providers

• This architecture is inefficient in many situations

Page 3: Design of an information system for HUNETs

INTRODUCTION•Human network (HUNET) A network architecture that enables

information sharing between mobile devices through direct interdevice communication.

• Does not rely on the wireless infrastructure to access Internet services provided by central application providers

Page 4: Design of an information system for HUNETs

EXISTING SYSTEM

• DELAY TOLERANT NETWORKS [ DTNs]

“STORE-AND-FORWARD” approach ,where data is incrementally moved and stored throughout the network in “hopes” that it will eventually reach its destination.

Page 5: Design of an information system for HUNETs

LIMITATIONS OF THE EXISTING ARCHITECTURE

1)DTNsdo not support interest-driven communication.

2)DTN routing is based on the end-to-end model which is not applicable in HUNETs

3)DTN routing protocols require complex offline

processing to achieve optimal performance.

Page 6: Design of an information system for HUNETs

PROPOSED SYSTEM

• HUNET-a novel network architecture that facilitates efficient information sharing between portable mobile devices.

• B-SUB-an interest-driven information sharing system for HUNETs, a content-based publish/subscribe that achieves infrastructure-less communication between mobile devices.

• Temporal Counting Bloom filter (TCBF) -to facilitate efficient data dissemination

Page 7: Design of an information system for HUNETs

THE ARCHITECTURE OF HUNET

• It’s a dynamic networks composed of human-carried wireless devices.

• Applications in HUMNETs require content-based networking services

Page 8: Design of an information system for HUNETs

THE ARCHITECTURE OF HUNET

Page 9: Design of an information system for HUNETs

CONTENT-BASED NETWORKING

• The flow of messages through the network is driven by the content of the messages, rather than by explicit addresses

• receivers declare their interests to the network by means of predicates

• senders simply inject messages into the network• The network is responsible for delivering to each

receiver any and all messages matching the predicate declared by that receiver

Page 10: Design of an information system for HUNETs

CONTENT-BASED PUBLISH\SUBSCRIBE (CBPS)

• Content-based matching is the problem of finding all the subscriptions that match a given notification.

• CBPS represents a compromise between the extremes of publisher-side filtering of messages ( with event directly transmitted to interested subscribers ) and subscriber-side filtering of messages ( with events broadcasted to all subscribers ).

• Event delivery is the task of delivering the notification to the set of interested subscribers selected with content-based matching.

Page 11: Design of an information system for HUNETs

THE ARCHITECTURE OF HUNET[conti]

•A swarm of nodes form a mobile broker network.

•Multiple nodes serve as brokers to carry messages for users.

•Information sharing system for HUNETs-BLOOM-FILTER-BASED PUBLISH/SUBSCRIBE

Page 12: Design of an information system for HUNETs

HOW THE B-SUB

WORKS?????????

Page 13: Design of an information system for HUNETs

BLOOM FILTER-BASED PUB-SUB

[B-SUB]

• It’s a content-based publish-subscribe system.

• In B-SUB, messages are identified by using strings that summarize their contents. ( called keys )

Page 14: Design of an information system for HUNETs

B-SUB COMPONENTS

Page 15: Design of an information system for HUNETs

B-SUB COMPONENTS … cont,

1)Broker Allocation:• Group of socially active nodes are selected to be

brokers.

• Brokers are responsible for collecting interests and forwarding messages

• A Broker stores a TCBF for propagating other users’ interests. (which is called relay filters)

Page 16: Design of an information system for HUNETs

DESIGN OF

TEMPORAL

COUNTING BLOOM

FILTER[TCBF]…..

Page 17: Design of an information system for HUNETs

BLOOM FILTERS [BF]• A space-efficient probabilistic data

structure that is used to test whether an element is a member of a set or not.

• BF maps a key through multiple hash functions into a bit vector of a few bits being set.

• User’s interests are represented as keys .• Messages are identified by strings that

summarize their contents called as Keys .

Page 18: Design of an information system for HUNETs

BLOOM FILTER OPERATIONS

• The basic bloom filter supports two operations: test and add.

• Test -To check whether a given element is in the set or not.

• If it returns:

False, then the element is definitely not in the set.

True ,then the element is probably in the set.

• Add simply adds an element to the set.

Page 19: Design of an information system for HUNETs

BLOOM FILTERS (BF) … CONT,

• The locations of the set bits are determined by the hash functions.

• A query of a key to a BF checks if all the hashed bits of the key are set, which indicates if the key is contained in the BF

Page 20: Design of an information system for HUNETs

COUNTING BLOOM FILTERS [BF] … CONT,

• The basic BF doesn’t support deletions

• The counting bloom filter (CBF) is proposed to provide deletion.

• In a CBF each bit is associated with a counter, which will be set to an Initial counter value

• To delete a key from a CBF we decrement the counters of the key’s hashed bits. A bit will be reset once its counter reaches 0.

Page 21: Design of an information system for HUNETs

TEMPORAL COUNTING BLOOM FILTER (TCBF)

• Extension to BF, proposed to perform content-based networking tasks.

• It only supports temporal deletion.

• A filter constantly decrements the counter’s values of all its set bits, which is called Decaying

• B-SUB uses TCBF to encode user’s interest & embed information needed for brokers to make forwarding decisions.

Page 22: Design of an information system for HUNETs

DECAYING FACTOR (DF)

• The decay of a TCBF is to constantly decrement its counters’ values with a rate given by the decay factor (DF).

• If decaying is not used, the counters of the set bits don’t change after being set, then no interests will be removed.

• An obvious consequence is that a broker will end up with carrying the interests from the users that it meets rarely.

Page 23: Design of an information system for HUNETs

DECAYING FACTOR [DF]…CONT,

• Suppose that each message has a delay limit of time T, we should set the DF in such a way that an interest will get removed after T

• If the broker contains the interest, then the broker should meet a consumer that is interested in it within T.

• If a message is forwarded by the broker it’s likely that the message will be delivered within T.

Page 24: Design of an information system for HUNETs

HOW BLOOM FILTERS WORK?“Message Forwarding”

• B-SUB makes forwarding decisions through querying the TCBFs

• When a broker meets a consumer, the broker requests a TCBF containing the consumer’s interests, then forwards the matched messages to the consumer.

• The operations performed are only hashing and table lookup.

• Message are removed from brokers’ memory after being forwarded to prevent excessive copies in the network.

Page 25: Design of an information system for HUNETs

BLOOM FILTER-BASED PUB-SUB [B-SUB] …Cont,

• Advantages:

1- Frees users from addressing & routing tasks. (reduces the overall overhead in the system)

2- Message producers & consumers are separated.

3- Messages are forwarded only by brokers (Perform content matching for the users)

Page 26: Design of an information system for HUNETs

B-SUB COMPONENTS … Cont,

2)pub-sub forwarding

Page 27: Design of an information system for HUNETs

INTEREST PROPAGATION

• A user stores its own interests in a TCBF, which is called the genuine filter.

• A broker stores the interests collected from

other users in another TCBF called the relay filter.

• TCBFs serve as a “compressed” matching hint for delivery.

Page 28: Design of an information system for HUNETs

INTEREST PROPAGATION

• Exchange of TCBFs that contain their genuine interests and relay interests.

• A then merges Bs genuine interests and relay interests with its own relay interests.

• All operations are performed on the TCBFs instead of the raw strings that are corresponding to the interests.

Page 29: Design of an information system for HUNETs

MESSAGE FORWARDING

• When two nodes meet, they exchange their relay interests and genuine interests encoded in TCBFs.

• Let A and B to denote the two nodes.

• At first, node A queries all of its buffered messages against the genuine filter of B, and then forward all the messages that match the filter to B.

• A then examines Bs relay filter to determine which other messages should be forwarded to B.

Page 30: Design of an information system for HUNETs

MESSAGE FORWARDING

• The query that checks if a key is in a TCBF is called the existential query (E-query).

• the preferential query (P-query).• For a key k and two TCBFs, Fi and Fj, we get

the values of the counters associated with k in Fi and Fj, which are two sets, Ci and Cj.

• We obtain the minimum values of Ci and Cj, which is denoted as ci and cj.

Page 31: Design of an information system for HUNETs

MESSAGE FORWARDING

• A maintains a table of the preference values of all of the buffered messages, which is called a preference table.

• For each of the messages that have not been forwarded to B, A performs a preferential query of the message’s tag to the relay filter of B, and then compares the obtained preference value to the one associated with the message in the preference table.

• If Bs preference value is larger, the message is forwarded to B, and the preference value of the message in the preference table is updated to Bs preference value.

• Otherwise, the message will not be forwarded.

Page 32: Design of an information system for HUNETs

WHAT HAPPENS IF A

HACKER ATTACK

OCCURS??????????

Page 33: Design of an information system for HUNETs

PRIVACY GUARANTEE IN HUNET

• The basic privacy guarantee provided by the original B-SUB is called NON-DIRECT LINKAGE.

• the attacker cannot obtain direct linkage between a user’s identity and his/her interests.

• The attacker cannot reverse back the hashed bit-vector to the real interests.

• Interests gathered by an attacker are encoded.

Page 34: Design of an information system for HUNETs

B-SUB WITH PRIVACY GUARANTEE[B-SUB-P]

• An extension of B-SUB that provides stronger privacy guarantee.

• B-SUB-P mixes the user’s own interests and relayed interests when two encountered nodes exchange interests.

• When two nodes meet, say node A and B, B sends a single TCBF to A instead of two as the original B-SUB does.

• This filter is obtained by merging Bs genuine interests and relay interests which is called the MIXED RELAY INTERESTS.

Page 35: Design of an information system for HUNETs

B-SUB WITH PRIVACY GUARANTEE[B-SUB-P]

• The mixed relay interests do not disclose the linkage between node Bs identity and its interests, because A cannot distinguish between Bs own interests and its relayed interests.

• That is, A cannot guess Bs interests.

• A then performs a preferential query to determine what messages should be forwarded to B, which is the same as what the original B-SUB does.

Page 36: Design of an information system for HUNETs

CONCLUSION• B-SUB is an interest-driven information sharing

system for HUNETs.• It employs content-based networking to achieve

infrastructure-less communication between mobile devices.

• BSUB employs a tag-based content description model.• The TCBF, is invented to compress user interests and

guide content routing. • The use of TCBF reduces the memory and bandwidth

consumption of B-SUB.

Page 37: Design of an information system for HUNETs

REFERENCES

[1] K. Fall, “A Delay-Tolerant Network Architecture for ChallengedInternets,” Proc. Conf. Applications, Technologies, Architectures, andProtocols for Computer Comm., pp. 27-34, 2003.

[2] A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, “Content-BasedAddressing and Routing: A General Model and its Application,”2000.

[3] P.T. Eugster, P.A. Felber, R. Guerraoui, and A.M. Kermarrec, “TheMany Faces of Publish/Subscribe,” ACM Computing Surveys,vol. 35, no. 2, pp. 114-131, 2003.

[4] A. Carzaniga, D.S. Rosenblum, and A.L. Wolf, “Design andEvaluation of a Wide-Area Event Notification Service,” ACMTrans. Computer Systems, vol. 19, pp. 332-383, Aug. 2001.

[5] B.H. Bloom, “Space/Time Trade-Offs in Hash Coding withAllowable Errors,” Comm. ACM, vol. 13, no. 7, pp. 422-426, 1970.

Page 38: Design of an information system for HUNETs

THANK

YOU…..

Page 39: Design of an information system for HUNETs

QUERIES?????