Automatic Membership Service For Large-Scale Dependable Storage Systems
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Byzantine-fault-tolerant replication increases the reliability and availability of Internet services that store significant state and protect it in spite of attacks or software errors. Existing Byzantine-fault-tolerant storage systems either imagine a static set of replicas, or have restrictions in how they handle reconfigurations and it represented in terms of the consistency and levels they provide the scalability of the solutions. This can be difficult in large-scale, long-lived systems where system connection is likely to change during the system existence. Here present a service that follows system membership and from time to time reports other system nodes of membership vary. The membership service runs typically repeatedly, to avoid human configuration errors and is itself Byzantine fault- tolerant and reconfigurable and provides appliances with a sequence of consistent views of the system membership. The practical result demonstrates that the membership service works well and the membership service is able to manage large system and the cost to maintain the service is low. The solution for dynamically changing system membership in a largescale Byzantine-fault-tolerant system. We present a service that tracks system membership and periodically notifies other system nodes of membership changes. To avoid human configuration errors; is itself Byzantine faulttolerant and reconfigurable; and provides applications with a sequence of consistent views of the system membership. dBQS is exciting in its own right because its storage algorithms extend existing Byzantine quorum protocols to handle changes in the replica set, and because it differs from preceding DHTs by providing Byzantine fault tolerance and offering strong semantics.
Authors and Affiliations
P. Rajitha, D Anil, M. Kanchana
LD: A Leak Detector Mechanism For Finding Misbehaving Nodes In MANETS
MANET is a collection of mobile nodes equipped with both a wireless-transmitter and receiver that communicate with each other via bi-directional wireless links either directly or indirectly. Due to the open medium an...
An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks
Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...
Accurately Computing Aggregates Using Synopsis Diffusion Framework
The communication wounded resultant from node and transmission failures, which are frequent in WSNs, can unfavorably affect tree-based aggregation approaches. To address this dilemma, we can make use of multi-path ro...
Security Approach Induction of Client Transferred Pictures on Content Sharing Website
Online Social networking’s gotten to be a standout amongst the most critical piece of our daily life as it empowers us to correspond with many people. Production of interpersonal interaction locales, for example, Mys...