Computer Science ›› 2015, Vol. 42 ›› Issue (7): 156-161.doi: 10.11896/j.issn.1002-137X.2015.07.034

Previous Articles     Next Articles

Network Behavior-oriented CDN Cache Allocation Strategy

FENG Xiang YANG Tan LI Song   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Lying behavior may destroy the fairness of CDN cache allocation.The selfish lying behavior of servers during CDN cache allocation with the game theory was studied.The essence of lying behavior is that servers will apply more cache when the total cache is not enough, otherwise honestly apply requisite cache volume when the total cache is enough.We proposed fairness algorithm to deal with lying behaviors.We considered the historical application volume while calculating the new one.In addition,we introduced the age factor to calculate the application’s effectiveness in different phase.In this way,we could urge the lying servers to stop lying by making them lose more than the honest ser-vers.At the same time,we guaranteed the optimal throughput of system and introduced price mechanism to make honest servers to be more demand-satisfying.The experiment shows the fairness algorithm has a good improvement for lying behavior.

Key words: Lying behavior,CDN cache allocation,Age factor,Price mechanism

[1] Wang Zhan,Jiang Hai,Sun Yi,et al.A k-coordinated decentra-lized replica placement algorithm for the ring-based CDN-P2P architecture[C]∥ 2010 IEEE Symposium on Computers and Communications (ISCC).2010:811-816
[2] Chen Jian-bo,Chen Chu-chuan.Using Particle Swarm Optimization Algorithm in Multimedia CDN Content placement[C]∥ 2012 Fifth International Symposium on Parallel Architectures,Algorithms and Programming(PAAP).2012:45-51
[3] 冯翔,刘智满,帅典勋.内容分布网络缓存资源并行分配的博弈粒子场方法[J].计算机学报,2007,30(3):368-379 Feng Xiang,Lau Francis C M,Shuai Dian-xun.A Novel Game Particle-Field Approach to Parallel Cache Resource Allocation of CDN[J].Chinese Journal of Computers,2007,30(3):368-379
[4] 乐光学,李仁发,陈志,等.P2P网络中搭便车行为分析与抑制机制建模[J].计算机研究与发展,2011,48(3):382-297Yue Guang-xue,Li Ren-fa,Chen Zhi,et al.Analysis of Free-ri-ding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J].Journal of Computer Research and Development,2011,48(3):382-397
[5] Tang Ping-zhong,Yoav Shoham,Lin Fang-zhen.Designing competitions between teams of individuals[J].Artificial Intelligence,2010,174(11):749-766
[6] Meir R,Procaccia A D,Rosenschein J S.Algorithm for strategyproof classification[J].Artificial Intelligence,2012,186:123-156
[7] Teacy W T L,Luck M,Rogers A,et al.An efficient and versatile approach to trust and reputation using hierarchical Bayesian modelling[J].Aritificial Intelligence,2012,193(6):149-185
[8] Guo Ming-yu,Conitzer V.Optimal-in-expectation redistribution mechanisms[J].Artificial Intelligence,2010,174(5/6):363-381
[9] Kaizoji T.Multiple equilibria and chaos in a discrete tatonnement process[J].Journal of Economic Behavior & Organization,2010,76(3):597-599
[10] Kitti M.Convergence of iterative tatonnement without pricenormalization[J].Journal of Economic Dynamics & Control,2010,34(6):1077-1091
[11] Mersch,Danielle P,Crespi A,et al.Tracking individuals shows spatial fidelity is a key regulator of ant social organization[J].Science 340,2013(6136):1090-1093

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .