Preserving Peer Replicas by Rate-Limited Sampled Voting - PowerPoint PPT Presentation

About This Presentation
Title:

Preserving Peer Replicas by Rate-Limited Sampled Voting

Description:

Preserving Peer Replicas by Rate-Limited Sampled Voting Petros Maniatis Mema Roussopoulos TJ Giuli David S. H. Rosenthal Mary Baker Yanto Muliadi – PowerPoint PPT presentation

Number of Views:51
Avg rating:3.0/5.0
Slides: 29
Provided by: par7157
Learn more at: https://www2.cs.uh.edu
Category:

less

Transcript and Presenter's Notes

Title: Preserving Peer Replicas by Rate-Limited Sampled Voting


1
Preserving Peer Replicas by Rate-Limited Sampled
Voting
  • Petros Maniatis Mema RoussopoulosTJ Giuli
    David S. H. RosenthalMary Baker Yanto Muliadi
  • Stanford University

2
INTRODUCTION (I)
  • Paper addresses issue of maintaining access to
    important online documents
  • Web-published academic journals
  • Must at the same time
  • Ensure long-term access
  • Guarantee authenticity of document copies

3
INTRODUCTION (II)
  • Their solution is LOCKSSLot Of Copies Keep
    Stuff Safe
  • A digital preservation system
  • Having many copies ensures the long-term survival
    of the documents
  • Same as for hard copies
  • Peer-to-peer opinion polls guarantee the
    authenticity of the documents

4
Digital Preservation Systems
  • Must resist random failures and deliberate
    digital attacks for a long time
  • Have unusual requirements
  • Lack of central control
  • Must avoid long-term secrets like encryption keys
  • Can make some operations very time consuming
    without sacrificing usability

5
DESIGN REQUIREMENTS
  • Digital preservation systems
  • Must be very cheap to build and maintain
  • No high-performance hardware (RAID)
  • Need not to operate quickly
  • Should prevent rather than expedite changes
  • Must properly operate for decades without central
    control

6
DESIGN PRINCIPLES (I)
  • Cheap storage is unreliable
  • Write-once media are a least as unreliable as
    disks
  • No long-term secrets
  • Too hard to preserve too hard to recover from
    leak
  • Use inertia
  • Prevent change, do not make it too easy

7
DESIGN PRINCIPLES (II)
  • Avoid third party reputation
  • Too vulnerable to slander or subversion(eBay
    problem)
  • Intrusion detection is intrinsic
  • Not done by extrinsic system
  • Assume a strong adversary
  • Attackers will be able to use very large numbers
    of hosts

8
KEY IDEAS
  • LOCKSS is about preserving
  • Very conservative design
  • LOCKSS is also about detecting tampering
  • Can deal with powerful adversaries

9
EXISTING LOCKKS SYSTEM
  • Makes it appear to library patrons that pages
    remain available at their original URL even when
    they are gone
  • Just like a regular library
  • Peer-to-peer system

10
EXISTING LOCKKS SYSTEM
  • Libraries run persistent web caches that
  • Collect documents by crawling journal websites
  • Distribute by acting as limited proxy cache for
    the librarys patrons
  • Preserve by cooperating with other caches to
    detect and repair damages

11
Opinion Polls
  • Let sample of peers vote on the hash of a
    specified part of the contents
  • Provide peers with confidence in content
    authenticity and integrity

X
X
X
X
12
Why?
  • On-line journals
  • Do not sign the materials they publish
  • Do not provide manifest enumerating the files
    forming a paper, issue or volume
  • Crawling is unreliable
  • NO completely reliable storage medium exists
  • All media can be stolen or destroyed
  • Better to put our trust in number of replicas

13
Organization (I)
  • Peers vote on large archival units (AU)
  • Year run of a journal
  • Each peer will hold a different set of Aus
  • No universal library
  • A peer that loses a poll has a bad AU
  • Will call a series of increasingly specific
    partial polls to locate the damage

14
Organization (II)
  • Once damage is detected, peers provide site
    having a damaged copy with a good copy provided
    that the site has participated in a previous
    poll
  • Prevents free-loading
  • Peers only supply materials to peers that can
    prove they own these materials
  • Prevents theft

15
Organization (II)
  • System is inexpensive
  • One PC with three 180GB disk can preserve 210
    years of the largest journal(J. of Biological
    Chemistry)

16
THE NEW PROTOCOL
  • Assumes no common-mode failure
  • Several kind of peers
  • Malign peers
  • Loyal Peerscan be either
  • Damaged (has bad AU)
  • Healthy (has correct AU)

17
NEW OPINION POLL PROTOCOL
  • Objective is to ensure that loyal peers have a
    high probability to be in a healthy state
  • A LOKSS peer
  • calls a poll much more frequently than any
    anticipated rate of random damage
  • invites into its poll a random subset of peers

18
Poll Outcomes
  • Landslide win votes overwhelmingly agree with
    peers version of AU
  • Do nothing
  • Landslide loss votes overwhelmingly disagree
    with peers version of AU
  • Repair peers version of AU (by updating it)
  • Inconclusive poll
  • Require human intervention

19
Roles for participating peers
  • Poll initiator
  • Poll participants
  • Need not find out the result of polls
  • Inner circle participants are selected by the
    poll initiator from its Reference List
  • Only their votes count
  • Outer circle participants are nominated by inner
    circle participants and selected by poll
    initiator
  • Could be invited into further inner circles

20
Exchanges
  • Encrypted via symmetric session keys

21
Poll Initiation and Poll Effort Proof
  • Initiator sends to each inner circle peer a Poll
    message containing a fresh public key
  • Inner circle peers reply with Poll Challenge
  • For each Poll Challenge it has received,
    initiator produces some computational effort that
    is provable via a pool effort proof and sends it
    in a Poll Proof message
  • Nominate and Vote messages follow

22
Objectives
  • Prevent adversary from gaining a foothold in a
    polls initiator reference list
  • Make it expensive for adversary to waste another
    peers resources
  • Make it likely that the adversary s attack will
    be detected on time

23
Mechanisms Used
  • Poll effort proof
  • Mechanism to modify reference list
  • Reference list churning
  • Obfuscation of protocol state
  • Almost everything is encrypted

24
Types of Attacks (I)
  • Main objective is getting a foothold in a
    reference list
  • Must first take over peers that used to be loyal
  • Can later nominate other malign peers
  • Lines of defense are
  • Loyal peers only change their reference list
    after a poll they call
  • Reference lists change (churning)

25
Types of Attacks (II)
  • Session Hijacking
  • Malign peer responds to initiators Poll message
    with spoofed Poll Challenge
  • If loyal invitee also replies, initiator will
    receive two Poll Challenges and discard both
  • Otherwise malign peer will be able to vote

26
Types of Attacks (III)
  • Stealth Modification Attack
  • Malign peers behave exactly as loyal peers until
    they have an overwhelming majority in a poll
  • Can then damage loyal peers
  • Fortunately for us, damaged loyal peers still
    behave as loyal peers
  • Facilitates their detection and repair

27
SIMULATION RESULTS
  • Absent an attack, substantial random damages at
    peers result in low rates of false alarms
  • Worst case is a false alarm every 44 days
  • With up to 1/3 of the peers subverted, the
    stealth adversary fails.

28
CONCLUSIONS
  • Can use
  • massive replication
  • rate limitation
  • inherent intrusion detection
  • costly operations
  • to build an archival system capable of resisting
    attacks by powerful adversaries over decades
Write a Comment
User Comments (0)
About PowerShow.com