BloomCast: efficient and effective full-text retrieval in unstructured P2P networks

Hanhua Chen, Hai Jin, Xucheng Luo, Yunhao Liu, Tao Gu, Kaiji Chen, Lionel Ni

Research output: Contribution to journalArticlepeer-review

17 Citations (Scopus)

Abstract

Efficient and effective full-text retrieval in unstructured peer-to-peer networks remains a challenge in the research community. First, it is difficult, if not impossible, for unstructured P2P systems to effectively locate items with guaranteed recall. Second, existing schemes to improve search success rate often rely on replicating a large number of item replicas across the wide area network, incurring a large amount of communication and storage costs. In this paper, we propose BloomCast, an efficient and effective full-text retrieval scheme, in unstructured P2P networks. By leveraging a hybrid P2P protocol, BloomCast replicates the items uniformly at random across the P2P networks, achieving a guaranteed recall at a communication cost of O(√N), where N is the size of the network. Furthermore, by casting Bloom Filters instead of the raw documents across the network, BloomCast significantly reduces the communication and storage costs for replication. We demonstrate the power of BloomCast design through both mathematical proof and comprehensive simulations based on the query logs from a major commercial search engine and NIST TREC WT10G data collection. Results show that BloomCast achieves an average query recall of 91 percent, which outperforms the existing WP algorithm by 18 percent, while BloomCast greatly reduces the search latency for query processing by 57 percent.
Original languageEnglish
Pages (from-to)232-241
Number of pages10
JournalIEEE Transactions on Parallel and Distributed Systems
Volume23
Issue number2
DOIs
Publication statusPublished - Feb 2012
Externally publishedYes

Keywords

  • Peer-to-peer systems
  • Bloom Filter
  • replication

Fingerprint

Dive into the research topics of 'BloomCast: efficient and effective full-text retrieval in unstructured P2P networks'. Together they form a unique fingerprint.

Cite this