M-Chord: a Scalable Distributed Similarity Search Structure

M-Chord: a Scalable Distributed Similarity Search Structure

M-Chord: A Scalable Distributed Similarity Search Structure David Novak and Pavel Zezula Masaryk University, Brno, Czech Republic xnovak8,zezula @fi.muni.cz Abstract ject and a constraint on the required proximity to the query object. Many principles and index structures have been pro- Theneed for a retrieval based not on the attribute val- posed in this field, summarized in several comprehensive ues but on the very data content has recently led to rise of surveys [14, 21]. the metric-based similarity search. The computational com- In real-life applications, the distance function is typically plexity of such a retrieval and large volumes of processed expensive to compute. Unfortunately, even with sophisti- data call for distributed processing which allows to achieve cated index structures [9, 10] the similarity search is expen- scalability. In this paper, we propose M-Chord, a dis- sive and the increase of the costs is linear with respect to the tributed data structure for metric-based similarity search. size of the dataset indexed. Since the volumes of managed The structure takes advantage of the idea of a vector index data become still larger, there is an evident need for dis- method iDistance in order to transform the issue of simi- tributed processing that brings two benefits distribution larity searching into the problem of interval search in one of the storage and parallelization of the time-consuming dimension. The proposed peer-to-peer organization, based query execution. Most of the recent effort in the field of on theChord protocol, distributes the storage space and distributed data structures has focused on the vector-based parallelizes the execution of similarity queries. Promising approach [20, 8, 12, 2, 6, 1]. As far as we know, the only features of the structure are validated by experiments on the metric-based distributed structure published are the GHT prototype implementation and two real-life datasets. index [4, 3] and, very recently, MCAN [11]. In this paper, we introduce a new distributed data struc- ture called M-Chord. It maps the metric space into one- dimensional domain using a generalized and adapted vari- 1. Introduction ant of iDistance [15] a vector index method for nearest- neighbors search. In this way, M-Chord reduces the issue Thefield of similarity data retrieval has recently made a of similarity search to the interval search problem. The data rapid progress. Generally, the objective of this search mech- is divided among the nodes of the structure and the Peer-to- anism is to retrieve all indexed data that are similar with Peer protocol Chord [17] is utilized for intra-system naviga- a given query object a digital image, a text document, etc. tion. Finally, the similarity search algorithms are designed One way towards the similarity search is adapting the for the proposed architecture. traditional attribute-based retrieval which usually leads to The paper is organized as follows. Section 2 reminds the complex queries in multi-dimensional vector spaces. The theoretical background of the metric-based searching and standard index structures that are able to process such describes the iDistance and Chord techniques. In Section 3, queries, e.g. kd-tree or quadtree, seem to become ineffi- we provide both the ideas behind and the architecture of the cient for high number of dimensions that are common for proposed structure. Section 4 presents results of the perfor- current data. Furthermore, data types that do not use the mance trials and the paper concludes with related work and Euclidian distance to measure similarity (e.g., digital im- a future work outline in Sections 5 and 6. ages compared by the Earth Moover’s Distance) and some specialdata types (e.g., texts or DNA sequences) cannot be indexed efficiently by vector-based data structures at all. 2. Preliminaries These research challenges have led to the development of the area of metric-based similarity search. This approach In this section, we shortly remind basic concepts of the considers the data space as a metric space dataset together similarity searching and indexing in metric spaces and then with a distance function applicable to every pair of objects. mention two techniques important for this work the iDis- The queries in this model are defined by a sample query ob- tance and the Chord. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. INFOSCALE '06. Proceedings of the First International Conference on Scalable Information Systems, May 29-June 1 2006, Hong Kong © 2006 ACM 1-59593-428-6/06/05...$5.00 N4 K4 Mathematically, metric space is a pair , 0 where is the domain of objects and is the total distance N3 K N 3 K1 1 function satisfying the following condi- tions for all objects : K2 (non-negativity) N iff (identity) 2 (symmetry) Figure 2. The Chord structure (triangle inequality) that possibly contain objects from the query range these Let us define two types of similarity queries [21] we that are all clusters that satisfy focus on. Let be a finite set of indexed objects. Definition 1: Given an object and a maximal search max-dist radius , range query selects a set of in- dexed objects: . where max-dist is the maximum distance between and Definition 2: Given an object and an integer , objects in cluster . Figure 1(b) shows the clusters influ- -nearest neighbors query retrieves a set enced by the query ( , ) and specifies more precisely . the space areas to be searched. Such an area within cluster corresponds to the iDistance interval (2) The iDistance [15] is an index method for similarity So, several iDistance intervals are determined, distance search in vector spaces. It partitions the data space into is evaluated for all objects from these intervals clusters and selects a reference point for each cluster , and the query answer set is created as . Every data object is assigned a one-dimensional . iDistance key according to the distance to its cluster’s ref- The iDistance algorithm is based on repeti- erence object. Having a constant to separate individual tive range queries with growing radius. Such a policy is not clusters, the iDistance key for an object is very convenient for distributed environment and we propose a different one (see below). (1) Expecting that is large enough, all objects in cluster are mapped to the interval see Figure 1(a) The Chord [17] is a P2P protocol providing the function- for the mapping visualization. The data is then stored in a ality of a Distributed Hash Table an efficient localization B -tree according to the iDistance keys. of the node that stores the data item corresponding to a given search key. It is a message driven dynamic structure that is C2 C2 able to adapt as nodes (cooperating computers) join or leave C C the system. 0 p2 0 p2 Using consistent hashing, the protocol uniformly maps p p 0 0 the domain of search keys into the Chord domain of keys q C1 C1 .EveryChord node is assigned a key from r p p1 1 thesamedomain . The identifiers are ordered (iDistance) in an identifier circle modulo , . Node 0 c 2*c 3*c 0 c 2*c3 *c is responsible for all keys from interval (a) (b) (mod ) see Figure 2 for visualization. Figure 1. The principles of iDistance Notation: For every key , let us denote the node responsible for key . Although the iDistance is primarily proposed as a Every node stores addresses of its predecessor and suc- search method, the algorithm for queries is cessor on the identifier circle and, furthermore, it maintains quite straightforward. It searches separately those clusters a routing table called the finger table with addresses of up to other nodes [17]. Due to the uniformity of the Chord inequality property of function implies the standard fil- domain distribution, the protocol preserves, with high prob- tering criterion for query [21]: Every object ability, that: may be excluded without evaluating if in an -node system, the node responsible for a given (3) key is located via number of messages to other nodes (number of hops); This criterion is applied to reduce number of distance com- putations at query-time. the storage load of the nodes is balanced. Pivot selection Let us discuss the way in which the piv- 3. M-Chord ots are selected. The proposed selection algorithm is gen- eral and applicable to any metric dataset. Exploiting some In this section, we describe basic ideas and architecture additional knowledge about the particular dataset, various of M-Chord the proposed distributed data structure for data-tailored methods can be developed. similarity searching in general metric spaces. The M-Chord Because the pivots are used for filtering, their selection approach can be summarized as follows: influences the performance of the search algorithm. So, the main objective of the pivoting technique is to increase the generalize the idea of iDistance to metric spaces and efficiency of the filtering criterion (3). We follow the ap- map the dataset to a domain of keys; proach described by Ch·avez et al. [7] which corresponds divide the domain into intervals and let every with our requirements. node store data with keys from one interval; First, let us deduce a formula for comparing the quality of two sets of pivots.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us