PARALLEL PROCESSING IN DYNAMIC HASH STRUCTURES AND MODELING THEIR PERFORMANCE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1015

Keywords:

extendible hashing, parallel data processing, dynamic directory, concurrent access, verification mechanism, simulation modeling, transaction blocking, operational databases, high-performance databases, scalability

Abstract

This paper presents a new algorithm for concurrent access to extendible hashing with cautious waiting (Extendible Hashing with Cautious Waiting, EHCW), which combines two-phase locking and optimistic verification mechanisms to reduce overhead under high load. The proposed approach ensures data consistency during parallel access to dynamic hash structures without the need for full locking, addressing the challenge of efficient synchronized access under high parallelism. The algorithm enables adaptive reconfiguration of the directory structure, enhancing scalability and performance under varying loads. To evaluate the effectiveness, a simulation model of the system's operation in an environment with limited computational resources (single-core processor and disk) and a memory page buffer pool for simulating page splitting operations and dynamic directory restructuring was implemented. The developed simulation model demonstrated that the proposed algorithm outperforms traditional static hashing schemes in terms of throughput and blocking frequency, making it promising for use in operational databases, cloud computing environments, and distributed information systems, where ensuring high performance and data integrity under high transactional loads is crucial. The task of high-performance data processing with dynamic hash structures is important for scalable systems, particularly for databases and cloud computing, where providing fast parallel data access is critical.

Downloads

Download data is not yet available.

References

Li, W., Cheng, Z., Chen, Y., Li, A., & Deng, L. (2023). Lock-free bucketized cuckoo hashing. In J. Cano, M. D. Dikaiakos, G. A. Papadopoulos, M. Pericàs, & R. Sakellariou (Eds.), Euro-Par 2023: Parallel Processing (Lecture Notes in Computer Science, Vol. 14100, pp. 290–305). Springer. https://doi.org/10.1007/978-3-031-39698-4_19

Ren, Z., Gu, Y., Li, C., Wang, Q., & Zhao, X. (2021). GPU-based dynamic hyperspace hash with full concurrency. Data Science and Engineering, 6, (pp. 265–279). https://doi.org/10.1007/s41019-021-00161-5

Jünger, D., Teich, J., & Hannig, F. (2020). WarpCore: A library for fast hash tables on GPUs. In Proceedings of the 27th IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC) (pp. 11–20). https://doi.org/10.1109/HiPC50609.2020.00015

Wu, H., Wang, S., Jin, Z., Zhang, Y., Ma, R., Fan, S., & Chao, R. (2023). CostCounter: A better method for collision mitigation in cuckoo hashing. ACM Transactions on Storage, 19(3), Article 28, p. 24. https://doi.org/10.1145/3596910

Bender, M. A., Farach-Colton, M., Kuszmaul, J., Kuszmaul, W., & Liu, M. (2022). On the optimal time/space tradeoff for hash tables. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing (pp. 1284–1297). ACM. https://doi.org/10.1145/3519935.3519969

Tapia-Fernández, S., García-García, D., & García-Hernandez, P. (2022). Key concepts, weaknesses and benchmark on hash table data structures. Algorithms, 15(3), 100. https://doi.org/10.3390/a15030100

Hu, J., Chen, J., Zhu, Y., Yang, Q., Peng, Z., & Yu, Y. (2023). PMEH: A parallel and write-optimized extendible hashing for persistent memory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 42(11), (pp. 3801–3814). https://doi.org/10.1109/TCAD.2023.3271579

Zuo, P., & Hua, Y. (2018). A write-friendly and cache-optimized hashing scheme for non-volatile memory systems. IEEE Transactions on Parallel and Distributed Systems, 29(5), (pp. 985–998). https://doi.org/10.1109/TPDS.2017.2782251

Wang, J., Huo, Z., Xiao, L., Yang, J., Huo, J., & Guo, M. (2025). Hierarchical hashing: A dynamic hashing method with low write amplification and high performance for non-volatile memory. IEEE Transactions on Computers, 74(4), (pp. 1138–1151). https://doi.org/10.1109/TC.2024.3517737

Dong, J., Lu, S., Zhang, P., Zheng, F., & Xiao, F. (2023). G-SM3: High-performance implementation of GPU-based SM3 hash function. In Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems (ICPADS) (pp. 201–208). https://doi.org/10.1109/ICPADS56603.2022.00034

Kostiuk, Y., Dovzhenko, N., Mazur, N., Skladannyi, P., & Rzaeva, S. (2025). The methodology for protecting grid environments from malicious code during the execution of computational tasks. Cybersecurity: Education, Science, Technique, 3(27), (pp. 22–40). https://doi.org/10.28925/2663-4023.2025.27.710

Mancini, T., Melatti, I., & Tronci, E. (2023). Optimizing highly-parallel simulation-based verification of cyber-physical systems. IEEE Transactions on Software Engineering, 49(9), (pp. 4443–4455). https://doi.org/10.1109/TSE.2023.3298432

Kostiuk, Y., Skladannyi, P., Sokolov, V., Hulak, H., & Korshun, N. (2025). Models and algorithms for analyzing information risks during the security audit of personal data information system. In Proceedings of the Third International Conference on Cyber Hygiene & Conflict Management in Global Information Networks (CH&CMiGIN’24) (Vol. 3925, pp. 155–171).

Khorasani, F., Belviranli, M. E., Gupta, R., & Bhuyan, L. N. (2015). Stadium hashing: Scalable and flexible hashing on GPUs. In 2015 International Conference on Parallel Architecture and Compilation (PACT) (pp. 63–74). https://doi.org/10.1109/PACT.2015.13

Kostiuk, Y., Skladannyi, P., Korshun, N., Bebeshko, B., & Khorolska, K. (2024). Integrated protection strategies and adaptive resource distribution for secure video streaming over a Bluetooth network. Information Technology, 4(6), 14–33.

Cheng, L., Kotoulas, S., Ward, T. E., & Theodoropoulos, G. (2014). Design and evaluation of parallel hashing over large-scale data. In 2014 21st International Conference on High Performance Computing (HiPC) (pp. 1–10). https://doi.org/10.1109/HiPC.2014.7116909

Kostiuk, Y., Skladannyi, P., Samoilenko, Y., Khorolska, K., Bebeshko, B., & Sokolov, V. (2025). A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps. In Proceedings of the Third International Conference on Cyber Hygiene & Conflict Management in Global Information Networks (CH&CMiGIN’24) (Vol. 3925, pp. 249–264).

Ashkiani, S., Farach-Colton, M., & Owens, J. D. (2018). A dynamic hash table for the GPU. In 2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS) (pp. 419–429). https://doi.org/10.1109/IPDPS.2018.00052

Kostiuk, Y., Skladannyi, P., Samoilenko, Y., Khorolska, K., Bebeshko, B., & Sokolov, V. (2025). A system for assessing the interdependencies of information system agents in information security risk management using cognitive maps. In Cyber Hygiene & Conflict Management in Global Information Networks (Vol. 3925, pp. 249–264).

Wang, J., Huo, Z., Xiao, L., Yang, J., Huo, J., & Guo, M. (2025). Hierarchical hashing: A dynamic hashing method with low write amplification and high performance for non-volatile memory. IEEE Transactions on Computers, 74(4), (pp. 1138–1151). https://doi.org/10.1109/TC.2024.3517737

Dong, J., Lu, S., Zhang, P., Zheng, F., & Xiao, F. (2023). G-SM3: High-performance implementation of GPU-based SM3 hash function. In 2022 IEEE 28th International Conference on Parallel and Distributed Systems (ICPADS) (pp. 201–208). https://doi.org/10.1109/ICPADS56603.2022.00034

Downloads


Abstract views: 4

Published

2025-12-16

How to Cite

Skladannyi, P., Kostiuk, Y., Rzaeva , S., & Mazur, N. (2025). PARALLEL PROCESSING IN DYNAMIC HASH STRUCTURES AND MODELING THEIR PERFORMANCE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 242–269. https://doi.org/10.28925/2663-4023.2025.31.1015

Most read articles by the same author(s)

<< < 1 2 3 4 5 > >>