skip to main content
10.1145/1461469.1461472acmotherconferencesArticle/Chapter ViewAbstractPublication PagessosocConference Proceedingsconference-collections
research-article

Reputation and audits for self-organizing storage

Published:22 September 2008Publication History

ABSTRACT

Reputation systems have demonstrated their interest in stimulating cooperation in peer-to-peer (P2P) systems. Their key operation relies on collecting, processing, and disseminating the feedback about some peers' past behavior in order to boost their cooperation, albeit this is susceptible to collusion and bashing. Additionally, estimating reputation generally relies on a partial assessment of the behavior of peers only, which might delay the detection of selfish peers. This situation is rendered even worse in self-organized storage applications, since storage is not an instantaneous operation and data are vulnerable throughout their entire storage lifetime. This paper compares reputation to an audit-based approach where peer observations are carried out through the periodic verification of a proof of data possession, and shows how the latter approach better addresses the aforementioned issues of inciting cooperation in P2P storage.

References

  1. AllMydata web site: http://www.allmydata.com/Google ScholarGoogle Scholar
  2. AllMyData Tahoe: http://allmydata.org/trac/tahoe/Google ScholarGoogle Scholar
  3. Wuala web site: http://wua.la/en/home.htmlGoogle ScholarGoogle Scholar
  4. Ubistorage web site: http://www.ubistorage.com/Google ScholarGoogle Scholar
  5. Nouha Oualha, Melek Önen, and Yves Roudier, "A Security Protocol for Self-Organizing Data Storage", to appear in IFIP Sec 2008.Google ScholarGoogle Scholar
  6. Nouha Oualha, Melek Önen, and Yves Roudier, "A Security Protocol for Self-Organizing Data Storage", (extended version) Technical Report N° RR-08-208, EURECOM, January 2008.Google ScholarGoogle Scholar
  7. Patrick P. C. Lee, John C. S. Lui and David K. Y. Yau, "Distributed collaborative key agreement and authentication protocols for dynamic peer group", IEEE/ACM Transactions on Networking, 2006 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. François Lesueur, Ludovic Mé, Valérie Viet Triem Tong, "Contrôle d'accès distribué à un réseau Pair-à-Pair", SAR-SSI 2007, Annecy, France.Google ScholarGoogle Scholar
  9. François Lesueur, Ludovic Mé, and Valérie Viet Triem Tong, "A Sybilproof Distributed Identity Management for P2P Networks", Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC) 2008, IEEE Computer Society, Marrakech, Morocco.Google ScholarGoogle Scholar
  10. Roger R. Dingledine, "The Free Haven project: Design and deployment of an anonymous secure data haven", Master's thesis, MIT, June 2000.Google ScholarGoogle Scholar
  11. Mark Lillibridge, Sameh Elnikety, Andrew Birrell, and Mike Burrows, "A Cooperative Internet Backup Scheme", In Proceedings of the 2003 Usenix Annual Technical Conference, pp. 29--41, San Antonio, Texas, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker, "A scalable content-addressable network", In Proceedings of SIGCOMM, San Diego, CA, Aug. 27--31, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Antony Rowstron and Peter Druschel, "Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems", In IFIP/ACMInternational Conference on Distributed Systems Platforms, Heidelberg, Germany, Nov. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek and Hari Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications", In Proceedings of SIGCOMM, San Diego, CA, Aug. 27--31, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Ben Y. Zhao, John Kubiatowicz, and Anthony D. Joseph, "Tapestry: An infrastructure for fault-tolerant wide-area location and routing", Technical Report UCB//CSD-01-1141, University of California, Berkeley, Apr. 2000 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Emmanuelle Anceaume and Aina Ravoaja, "Incentive-Based Robust Reputation Mechanism for P2P Services", Research Report PI 1816 (2006), IRISA, http://hal.inria.fr/inria-00121609/fr/ Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Emil Sit and Robert Morris, "Security Considerations for P2P Distributed Hash Tables", IPTPS 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron and Dan S. Wallach, "Secure routing for structured peer-to-peer overlay networks", Symposium on Operating Systems and Implementation, OSDI'02, Boston, MA, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Michael Piatek, Tomas Isdal, Thomas Anderson, and Arvind Krishnamurthy, "Do incentives build robustness in BitTorrent?", In Proceedings of the ACM/USENIX Fourth Symposium on Networked Systems Design and Implementation (NSDI 2007), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Robin I. M. Dunbar, "Co-Evolution of Neocortex Size, Group Size and Language in Human", Behavioral and Brain Sciences 16 (1993), no. 4, pp. 681--735.Google ScholarGoogle Scholar

Index Terms

  1. Reputation and audits for self-organizing storage

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        SOSOC '08: Proceedings of the workshop on Security in Opportunistic and SOCial networks
        September 2008
        28 pages
        ISBN:9781450378789
        DOI:10.1145/1461469

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 22 September 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader