Open Access Open Access  Restricted Access Subscription or Fee Access

A Secure Distributed Cache Invalidation Method for Maintaining Cache Consistency in MANETS

G. Umamageswari, K. Umamaheswri

Abstract


This paper proposes a secure distributed cache invalidation mechanism (DCIM), simply known as a client-based cache consistency scheme. The goal of secure DCIM is to improve the efficiency of the cache updating process in a network of mobile devices (MANETs). In which cached data retrieved from a data server, without requiring the latter to maintain the status information about the caches. In this paper the COACS plays a vital role in the form of caching the queries and addresses of the nodes that stores the responses to these queries. It introduces the Secure DCIM that is totally client-based when compared to the others like SSUM and SACCS. Based on the pull-based algorithm, the secure DCIM achieves the strong consistency with the help of the implementation of the adaptive time-to-live (TTL), piggybacking, and prefetching In a secure DCIM, The Centralized server will maintain the database records and files. Cache node will pull the data items from the server and also the data items can be upload by the user. After the request was sent by the cache node (CN), the server receive the request and the response is sent by the server with the TTL value and its hit rate. The server autonomously sends the data updates to the CNs, meaning that it has to keep the track of which CNs caches the corresponding data items. The consistency ratio, delay, and overhead traffic are reported versus several variables, where the secure DCIM showed to be superior when compared to the other systems.


Keywords


Cache Consistency, Cache Updating, Client-Based, MANET, TTL

Full Text:

PDF

References


H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, “COACS: A Cooperative and Adaptive Caching System for MANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961- 977, Aug. 2008.

G. Cao, “A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1251-1265, Sept./Oct. 2003.

A. X. Liu, C.R.Meiners, andE.Torng, “TCAMrazor: A systematic approach towards minimizing packet classifiers in TCAMs,” IEEE/ACM Trans. Netw., vol. 18, no. 2, pp. 490–500, Apr. 2010.

W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, and B. Palter, “Layer two tunneling protocol (L2TP),” RFC 2661, 1999.

Cisco Systems, San Jose, CA, “Internetworking design basics,” 2012 [Online]. Available: http://www.cisco.com/en/US/ docs/internetworking/design/guide/nd2002. tml

J. Cao, Y. Zhang, G. Cao, and X. Li, “Data Consistency for Cooperative Caching in Mobile Environments,” Computer, vol. 40, no. 4, pp. 60-66, 2007.

W. Li, E. Chan, D. Chen, and S. Lu, “Maintaining Probabilistic Consistency for Frequently Offline Devices in Mobile Ad Hoc Networks,” Proc. IEEE 29th Int’l Conf. Distributed Computing Systems, pp. 215-222, 2009.

B. Krishnamurthy and C. Wills, “Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web,” Proc.USENIX Symp. Internet Technologies and Systems, Dec. 1997.

J. Lee, K. Whang, B. Lee, and J. Chang, “An Update-Risk Based Approach to TTL Estimation in Web Caching,” Proc. Third Int’l Conf. Web Information Systems Eng. (WISE ’02), pp. 21-29, 2002.

O. Bahat and A. Makowski, “Measuring Consistency in TTLBased Caches,” Performance Evaluation, vol. 62, pp. 439-455, 2005.

V. Cate, “Alex - A Global Filesystem,” Proc. USENIX File System Workshop, pp. 1-12, May 1992.

L. Yin and G. Cao, “Supporting Cooperative Caching in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 1, pp. 77-89, Jan. 2006.

G. Cao, L. Yin, and C. Das, “Cooperative Cache-Based Data Access in Ad Hoc Networks,” Computer, vol. 37, no. 2, pp. 32-39, 2004.

X. Tang, J. Xu, and W-C. Lee, “Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 12, pp. 1683-1694, Dec. 2008.

L. Bright, A. Gal, and L. Raschid, “Adaptive Pull-Based Policies for Wide Area Data Delivery,” ACM Trans. Database Systems, vol. 31, no. 2, pp. 631-671, 2006.

K. Mershad and H. Artail, “SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments,” IEEE Trans. Mobile Computing, vol. 9, no. 6, pp. 778-795, June 2010.

A.L. Baraba´si and Z.N. Oltvai, “Network Biology: Understanding the Cell’s Functional Organization,” Nature Rev. Genetics, vol. 5, no. 2, pp. 101-113, 2004.

B. Krishnamurthy and C.E. Wills, “Piggyback Server Invalidation for Proxy Cache Coherency,” Proc. Seventh Int’l Conf. World Wide Web, Apr. 1998.

Y. Fang, Z. Haas, B. Liang, and Y.B. Lin, “TTL Prediction Schemes and the Effects of Inter-Update Time Distribution on Wireless Data Access,” Wireless Networks, vol. 10, pp. 607-619, 2004.

H. Maalouf and M. Gurcan, “Minimisation of the Update Response Time in a Distributed Database System,” Performance Evaluation, vol. 50, no. 4, pp. 245-66, 2002.

K. Fawaz and H. Artail, “A Two-Layer Cache Replication Scheme for Dense Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. Conf. (GlobeCom), Dec. 2012.

C. Courcoubetis and R. Weber, Pricing Communication Networks: Economics, Technology and Modelling. Hoboken, NJ, USA: Wiley, 2003.


Refbacks

  • There are currently no refbacks.