Cache management in content delivery networks using the metadata of online social networks

被引:2
作者
Ghasemi, Abdorasoul [1 ,2 ]
Ahmadi, Amirhosein [1 ]
机构
[1] KN Toosi Univ Technol, Fac Comp Engn, Tehran 1631714191, Iran
[2] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
关键词
Content delivery networks; Cache management; Online social networks; Multilayer networks;
D O I
10.1016/j.comcom.2022.02.021
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The number of requests on content delivery networks (CDN) originating from the online social networks (OSN) by sharing the content weblink increases according to recorded data. The sequence of the OSN originated requests shows temporal burstiness with a typical interval shorter than the ordinary requests. We consider CDN and OSN as a multilayer network and exploit the average spreading power of each user in the OSN to predict the temporal pattern of the corresponding consecutive social requests that may originate from this user to improve the underlying cache management mechanism. The traditional least recently used (LRU) content replacement algorithm uses the statistical popularity of contents to increase the cache's hit ratio. We propose LRU-Social, which defers the eviction of social requests for a specific amount of time to take advantage of the possible burstiness in the underlying interval without missing the popular contents' hits. We model the content link sharing by the susceptible-infected-recovered (SIR) spreading process in the underlying OSN to compute the user spreading power. We provide numerical studies for synthetic streams consisting of ordinary requests that follow Zipf's popularity model and social requests to justify the effectiveness of the LRU-Social compared to the LRU.
引用
收藏
页码:11 / 17
页数:7
相关论文
共 23 条
[1]  
Abrams M., 1995, CACHING PROXIES LIMI
[2]  
[Anonymous], 2018, [No title captured], P44
[3]  
Asur S., 2010, Proceedings 2010 IEEE/ACM International Conference on Web Intelligence-Intelligent Agent Technology (WI-IAT), P492, DOI 10.1109/WI-IAT.2010.63
[4]  
Bird C., 2008, Proceedings of the 2008 ACM SIGSOFT Symposium on the Foundations of Software Engineering, P24
[5]  
Breslau L, 1999, IEEE INFOCOM SER, P126, DOI 10.1109/INFCOM.1999.749260
[6]  
Brodersen A., 2012, WWW, P241, DOI DOI 10.1145/2187836.2187870
[7]   Catching a viral video [J].
Broxton, Tom ;
Interian, Yannet ;
Vaver, Jon ;
Wattenhofer, Mirjam .
JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2013, 40 (02) :241-259
[8]   The Spread of Behavior in an Online Social Network Experiment [J].
Centola, Damon .
SCIENCE, 2010, 329 (5996) :1194-1197
[9]   THRESHOLD MODELS OF COLLECTIVE BEHAVIOR [J].
GRANOVETTER, M .
AMERICAN JOURNAL OF SOCIOLOGY, 1978, 83 (06) :1420-1443
[10]   Adapting caching to audience retention rate [J].
Maggi, Lorenzo ;
Gkatzikis, Lazaros ;
Paschos, Georgios ;
Leguay, Jeremie .
COMPUTER COMMUNICATIONS, 2018, 116 :159-171