An Efficient Caching Strategy of Hierarchical Clustering and Privacy of data in Named Data Network
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2017 by IJETT Journal|
|Year of Publication : 2017|
|Authors : Maddireddi Mahesh, Mula Sudhakar
Maddireddi Mahesh, Mula Sudhakar "An Efficient Caching Strategy of Hierarchical Clustering and Privacy of data in Named Data Network", International Journal of Engineering Trends and Technology (IJETT), V50(6),316-320 August 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
In Named Data networking one of the unique features is caching of content in the routers along with shortest path. In-network caching allow users to obtain the contents from nearer intermediate routers, reducing the need for content fetching from the servers often located deep in the network. In the network caching of content is taken by intermediate routers and providing content can be loaded into server. Before performing content forwarding we can generate peer-to-peer shortest route for reduce traffic and also overcome chance of congestion. Finally the response time and the transmission overhead for fetching of contents are reduced. In this paper we are proposed three concepts i.e. authentication of clients or users, generating hierarchical clustering of shortest path, data encryption and decryption. In the named data networking each user will be identify of server by using hash based signature generation algorithm. After completion of authentication process the server will generate hierarchical clustering of nodes in the network. The completion of clustering process the server will generate shortest routing from source node to destination node. Before performing shortest routing the server will find out cluster head by using cluster head election process. After completion of cluster head the server will find out shortest route from source node to destination node by using Nodes Signal Strength Shortest Path Algorithm. After finding shortest route the server will send path to both nodes of source node and destination node. The source node will enter transferred message and encrypt that message by using hybrid bit transpose bioinformatics technique. After completion of encryption process the source node will send to destination node. The destination node will retrieve cipher format data and perform the decryption process of hybrid bit transpose bioinformatics technique. By implementing those concepts we are reduce response time and transmission overhead of content.
 Jacobson V, Smetters D K, Thornton J D, et al. Networking named content[C]//Proceedings of the 5th international conference on Emerging networking experiments and technologies. ACM, 2009: 1-12.
 Breslau L, Cao P, Fan L. Web caching and zipf-like distributions: evidence and implications. In: INFOCOM` 99. Proceedings of the IEEE 18th annual joint conference of the IEEE computer and communications societies, vol.1.IEEE; 1999.p.126–34.
 Rossi D, Rossini G, Caching performance of content centric networks under multi path routing (and more). Technical report, Telecom ParisTech; 2011.
 D. Kutscher and et al. Icn research challenges. IRTF, draft-kutscher-icnrg-challenges-00, Februady 2013.  P. Krishnan, D. Raz, and Y. Shavitt. The cache location problem. IEEE/ACM Trans. Netw., 8(5), 2000.
 V. Pacifici and G. Dan. Content-peering dynamics of autonomous caches in a content-centric network. In IEEE INFOCOM, 2013.
. J. A. Torkestani and M. R. Meybodi, “A mobility-based cluster formation algorithm for wireless mobile ad-hoc networks,” Cluster Computing, vol. 14, no. 4, pp. 311–324, 2011.
 J. Y. Yu and P. H. J. Chong, “A survey of clustering schemes for mobile ad hoc networks.” IEEE Communications Surveys and Tutorials, vol. 7, no. 1-4, pp. 32–48, 2005.
 H. J. Choe, P. Ghosh, and S. K. Das, “QoS-aware data reporting control in cluster-based wireless sensor networks,” Computer Communications, vol. 33, no. 11, pp. 1244–1254, 2010.
 G. Chen, C. Li, M. Ye, and J. Wu, “An unequal cluster-based routing protocol in wireless sensor networks,” Wireless Networks, vol. 15, no. 2, pp. 193–207, 2009.
hierarchical clustering, authentication, cryptography, security, routing, caching strategy.