CFP last date
20 December 2024
Reseach Article

Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce

by K. Rajasekhar, Niraj Upadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 18
Year of Publication: 2022
Authors: K. Rajasekhar, Niraj Upadhyay
10.5120/ijca2022922200

K. Rajasekhar, Niraj Upadhyay . Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce. International Journal of Computer Applications. 184, 18 ( Jun 2022), 53-59. DOI=10.5120/ijca2022922200

@article{ 10.5120/ijca2022922200,
author = { K. Rajasekhar, Niraj Upadhyay },
title = { Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2022 },
volume = { 184 },
number = { 18 },
month = { Jun },
year = { 2022 },
issn = { 0975-8887 },
pages = { 53-59 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number18/32421-2022922200/ },
doi = { 10.5120/ijca2022922200 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:21:48.518922+05:30
%A K. Rajasekhar
%A Niraj Upadhyay
%T Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 18
%P 53-59
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The present day solution to any useful, secure, highly scalable system with high concurrency and high availability involve very expensive Data Centre Resources such as application servers, database servers, firewalls, load balancers etc., which involves high CAPEX and OPEX. To reduce the CAPEX and OPEX, a network of devices which can interact reliable to provide secure solution has been presented in this paper. Any Network has to be protected from several attacks such as DDOS to ensure its reliability and high availability. Special Hash tables to create addressable content to increase the reliability, availability and security of the real time advance inexpensive networks. A special category of content addressable network is proposed which can be used reliably for performing e-commerce transactions. The proposed network is robust and can with stand safely the massive DDOS and other attacks practically. No central servers and associated infrastructure is needed to maintain our network. Any node can deterministically search and obtain the target content reliably, cost-effectively and securely in our distributed network.

References
  1. Attacks - Types of Attacks [WWW Document], 2021. . Engineering LibreTexts. URL https://eng.libretexts.org/Courses/Delta_College/Information_Security/01%3A_Information_Security_Defined/1.4_Attacks_-_Types_of_Attacks (accessed 5.20.22).
  2. Chowdhury, F., Furness, J., Kolberg, M., 2017. Performance analysis of structured peer-to-peer overlays for mobile networks. Int. J. Parallel Emerg. Distrib. Syst. 32, 522–548. https://doi.org/10.1080/17445760.2016.1203917
  3. Dabek, F., Cox, R., Kaashoek, F., Morris, R., n.d. Vivaldi: A Decentralized Network Coordinate System 12.
  4. Dhamodharan, U.S.R.K., Vayanaperumal, R., 2015. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method. The Scientific World Journal 2015, e841267. https://doi.org/10.1155/2015/841267
  5. Fantar, S.G., Youssef, H., 2009. Locality-aware Chord over Mobile Ad Hoc Networks, in: 2009 Global Information Infrastructure Symposium. Presented at the 2009 Global Information Infrastructure Symposium, pp. 1–6. https://doi.org/10.1109/GIIS.2009.5307057
  6. Feldman, S., 2000. Mobile Commerce for the Masses. IEEE Internet Computing 4, 74–75.
  7. Garcia Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., Barcellos, M., Felber, P., Riviere, E., 2015. Edge-centric Computing: Vision and Challenges. SIGCOMM Comput. Commun. Rev. 45, 37–42. https://doi.org/10.1145/2831347.2831354
  8. Ginter, K.L., Shear, V.H., Sibert, W.O., Spahn, F.J., Wie, D.M.V., 2011. Systems and methods for secure transaction management and electronic rights protection. US8055913B2.
  9. Girlich, F., Rossberg, M., Schaefer, G., Boehme, T., Schreyer, J., 2013. Bounds for the Security of the Vivaldi Network Coordinate System. Presented at the Proceedings - International Conference on Networked Systems, NetSys 2013, pp. 66–75. https://doi.org/10.1109/NetSys.2013.21
  10. Jo, M., Maksymyuk, T., Strykhalyuk, B., Cho, C.-H., 2015. Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. Wireless Communications, IEEE 22, 50–58. https://doi.org/10.1109/MWC.2015.7143326
  11. Leong, B., Liskov, B., Demaine, E.D., 2004. EpiChord: Parallelizing the Chord Lookup Algorithm with Reactive Routing State Management, in: In Proceedings of the 12th International Conference on Networks. pp. 1243–1259.
  12. Liu, J., Pan, B., Zhang, X., Li, D., 2021. Mobile E-Commerce Information System Based on Industry Cluster under Edge Computing. Mobile Information Systems 2021, e7930799. https://doi.org/10.1155/2021/7930799
  13. Manian, Z.N., n.d. (71) Applicant: SkuChain, Inc., Mountain View , CA (US) 27.
  14. Ng, T.S.E., Zhang, H.,n.d. A Network Positioning System for the Internet 15.
  15. Rajasekhar, K., Upadhyaya, N. (2014). Modified Real-Time Advanced Inexpensive Networks for Critical Infrastructure Security and Resilience. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_84
  16. K. Rajasekhar and N. Upadhyaya, "Communication Security in Real-Time Advanced Inexpensive Networks," 2014 International Conference on Devices, Circuits and Communications (ICDCCom), 2014, pp. 1-6, doi: 10.1109/ICDCCom.2014.7024704.
  17. Rajasekhar, K., Upadhyaya, N. (2016). Low-Cost Supply Chain Management and Value Chain Management with Real-Time Advance Inexpensive Network Computing. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2523-2_68
  18. K. Rajasekhar and N. Upadhayaya, "Data driven mobile commerce intelligence: With real-time advanced inexpensive network computing," 2014 International Conference on Data Science & Engineering (ICDSE), 2014, pp. 6-11, doi: 10.1109/ICDSE.2014.6974603.
  19. Saia, J., Fiat, A., Gribble, S., Karlin, A.R., Saroiu, S., 2002. Dynamically Fault-Tolerant Content Addressable Networks, in: Druschel, P., Kaashoek, F., Rowstron, A. (Eds.), Peer-to-Peer Systems, Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 270–279. https://doi.org/10.1007/3-540-45748-8_26
  20. Sarkar, S., Chauhan, S., Khare, A., 2020. A meta-analysis of antecedents and consequences of trust in mobile commerce. International Journal of Information Management 50, 286–301. https://doi.org/10.1016/j.ijinfomgt.2019.08.008
  21. Shu, X., Li, X., 2012. A Scalable and Robust DHT Protocol for Structured P2P Network. IJCNS 05, 802–809. https://doi.org/10.4236/ijcns.2012.512084
  22. The IBM Cyclops-64 Architecture [WWW Document], 2013. URL https://web.archive.org/web/20130606000628/http://www.capsl.udel.edu/~venetis/Cyclops-64.html (accessed 4.20.22).
  23. Wararkar, P., Kapil, N., Rehani, V., Mehra, Y., Bhatnagar, Y., 2016. Resolving Problems Based on Peer to Peer Network Security Issue’s. Procedia Computer Science, 1st International Conference on Information Security & Privacy 2015 78, 652–659. https://doi.org/10.1016/j.procs.2016.02.113
Index Terms

Computer Science
Information Sciences

Keywords

Advanced Networks Real-time Advanced Inexpensive Networks (RAIN) computing. Real-time Advanced Inexpensive Networks (RAIN) computing. Device Based Computing Distributed Hash Tables Content Addressable Networks DDOS Security.