Research Article

Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce

by  K. Rajasekhar, Niraj Upadhyay
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Issue 18
Published: Jun 2022
Authors: K. Rajasekhar, Niraj Upadhyay
10.5120/ijca2022922200
PDF

K. Rajasekhar, Niraj Upadhyay . Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce. International Journal of Computer Applications. 184, 18 (Jun 2022), 53-59. DOI=10.5120/ijca2022922200

                        @article{ 10.5120/ijca2022922200,
                        author  = { K. Rajasekhar,Niraj Upadhyay },
                        title   = { Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce },
                        journal = { International Journal of Computer Applications },
                        year    = { 2022 },
                        volume  = { 184 },
                        number  = { 18 },
                        pages   = { 53-59 },
                        doi     = { 10.5120/ijca2022922200 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2022
                        %A K. Rajasekhar
                        %A Niraj Upadhyay
                        %T Real-time Advanced Inexpensive Networks (RAIN) of Devices for Reliable M Commerce%T 
                        %J International Journal of Computer Applications
                        %V 184
                        %N 18
                        %P 53-59
                        %R 10.5120/ijca2022922200
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The present day solution to any useful, secure, highly scalable system with high concurrency and high availability involve very expensive Data Centre Resources such as application servers, database servers, firewalls, load balancers etc., which involves high CAPEX and OPEX. To reduce the CAPEX and OPEX, a network of devices which can interact reliable to provide secure solution has been presented in this paper. Any Network has to be protected from several attacks such as DDOS to ensure its reliability and high availability. Special Hash tables to create addressable content to increase the reliability, availability and security of the real time advance inexpensive networks. A special category of content addressable network is proposed which can be used reliably for performing e-commerce transactions. The proposed network is robust and can with stand safely the massive DDOS and other attacks practically. No central servers and associated infrastructure is needed to maintain our network. Any node can deterministically search and obtain the target content reliably, cost-effectively and securely in our distributed network.

References
  • Attacks - Types of Attacks [WWW Document], 2021. . Engineering LibreTexts. URL https://eng.libretexts.org/Courses/Delta_College/Information_Security/01%3A_Information_Security_Defined/1.4_Attacks_-_Types_of_Attacks (accessed 5.20.22).
  • Chowdhury, F., Furness, J., Kolberg, M., 2017. Performance analysis of structured peer-to-peer overlays for mobile networks. Int. J. Parallel Emerg. Distrib. Syst. 32, 522–548. https://doi.org/10.1080/17445760.2016.1203917
  • Dabek, F., Cox, R., Kaashoek, F., Morris, R., n.d. Vivaldi: A Decentralized Network Coordinate System 12.
  • Dhamodharan, U.S.R.K., Vayanaperumal, R., 2015. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method. The Scientific World Journal 2015, e841267. https://doi.org/10.1155/2015/841267
  • Fantar, S.G., Youssef, H., 2009. Locality-aware Chord over Mobile Ad Hoc Networks, in: 2009 Global Information Infrastructure Symposium. Presented at the 2009 Global Information Infrastructure Symposium, pp. 1–6. https://doi.org/10.1109/GIIS.2009.5307057
  • Feldman, S., 2000. Mobile Commerce for the Masses. IEEE Internet Computing 4, 74–75.
  • Garcia Lopez, P., Montresor, A., Epema, D., Datta, A., Higashino, T., Iamnitchi, A., Barcellos, M., Felber, P., Riviere, E., 2015. Edge-centric Computing: Vision and Challenges. SIGCOMM Comput. Commun. Rev. 45, 37–42. https://doi.org/10.1145/2831347.2831354
  • Ginter, K.L., Shear, V.H., Sibert, W.O., Spahn, F.J., Wie, D.M.V., 2011. Systems and methods for secure transaction management and electronic rights protection. US8055913B2.
  • Girlich, F., Rossberg, M., Schaefer, G., Boehme, T., Schreyer, J., 2013. Bounds for the Security of the Vivaldi Network Coordinate System. Presented at the Proceedings - International Conference on Networked Systems, NetSys 2013, pp. 66–75. https://doi.org/10.1109/NetSys.2013.21
  • Jo, M., Maksymyuk, T., Strykhalyuk, B., Cho, C.-H., 2015. Device-to-device-based heterogeneous radio access network architecture for mobile cloud computing. Wireless Communications, IEEE 22, 50–58. https://doi.org/10.1109/MWC.2015.7143326
  • Leong, B., Liskov, B., Demaine, E.D., 2004. EpiChord: Parallelizing the Chord Lookup Algorithm with Reactive Routing State Management, in: In Proceedings of the 12th International Conference on Networks. pp. 1243–1259.
  • Liu, J., Pan, B., Zhang, X., Li, D., 2021. Mobile E-Commerce Information System Based on Industry Cluster under Edge Computing. Mobile Information Systems 2021, e7930799. https://doi.org/10.1155/2021/7930799
  • Manian, Z.N., n.d. (71) Applicant: SkuChain, Inc., Mountain View , CA (US) 27.
  • Ng, T.S.E., Zhang, H.,n.d. A Network Positioning System for the Internet 15.
  • Rajasekhar, K., Upadhyaya, N. (2014). Modified Real-Time Advanced Inexpensive Networks for Critical Infrastructure Security and Resilience. In: Satapathy, S., Avadhani, P., Udgata, S., Lakshminarayana, S. (eds) ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol II. Advances in Intelligent Systems and Computing, vol 249. Springer, Cham. https://doi.org/10.1007/978-3-319-03095-1_84
  • K. Rajasekhar and N. Upadhyaya, "Communication Security in Real-Time Advanced Inexpensive Networks," 2014 International Conference on Devices, Circuits and Communications (ICDCCom), 2014, pp. 1-6, doi: 10.1109/ICDCCom.2014.7024704.
  • Rajasekhar, K., Upadhyaya, N. (2016). Low-Cost Supply Chain Management and Value Chain Management with Real-Time Advance Inexpensive Network Computing. In: Satapathy, S., Raju, K., Mandal, J., Bhateja, V. (eds) Proceedings of the Second International Conference on Computer and Communication Technologies. Advances in Intelligent Systems and Computing, vol 380. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2523-2_68
  • K. Rajasekhar and N. Upadhayaya, "Data driven mobile commerce intelligence: With real-time advanced inexpensive network computing," 2014 International Conference on Data Science & Engineering (ICDSE), 2014, pp. 6-11, doi: 10.1109/ICDSE.2014.6974603.
  • Saia, J., Fiat, A., Gribble, S., Karlin, A.R., Saroiu, S., 2002. Dynamically Fault-Tolerant Content Addressable Networks, in: Druschel, P., Kaashoek, F., Rowstron, A. (Eds.), Peer-to-Peer Systems, Lecture Notes in Computer Science. Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 270–279. https://doi.org/10.1007/3-540-45748-8_26
  • Sarkar, S., Chauhan, S., Khare, A., 2020. A meta-analysis of antecedents and consequences of trust in mobile commerce. International Journal of Information Management 50, 286–301. https://doi.org/10.1016/j.ijinfomgt.2019.08.008
  • Shu, X., Li, X., 2012. A Scalable and Robust DHT Protocol for Structured P2P Network. IJCNS 05, 802–809. https://doi.org/10.4236/ijcns.2012.512084
  • The IBM Cyclops-64 Architecture [WWW Document], 2013. URL https://web.archive.org/web/20130606000628/http://www.capsl.udel.edu/~venetis/Cyclops-64.html (accessed 4.20.22).
  • Wararkar, P., Kapil, N., Rehani, V., Mehra, Y., Bhatnagar, Y., 2016. Resolving Problems Based on Peer to Peer Network Security Issue’s. Procedia Computer Science, 1st International Conference on Information Security & Privacy 2015 78, 652–659. https://doi.org/10.1016/j.procs.2016.02.113
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Advanced Networks Real-time Advanced Inexpensive Networks (RAIN) computing. Real-time Advanced Inexpensive Networks (RAIN) computing. Device Based Computing Distributed Hash Tables Content Addressable Networks DDOS Security.

Powered by PhDFocusTM