skip to main content
10.1145/3357150.3357396acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open Access

Secure Scuttlebutt: An Identity-Centric Protocol for Subjective and Decentralized Applications

Published:24 September 2019Publication History

ABSTRACT

Secure Scuttlebutt (SSB) is a novel peer-to-peer event-sharing protocol and architecture for social apps. In this paper we describe SSB's features, its operations as well as the rationale behind the design. We also provide a comparison with Named Data Networking (NDN), an existing information-centric networking architecture, to motivate a larger exploration of the design space for information-centric networking primitives by formulating an identity-centric approach. We finally discuss SSB's limitations and evolution opportunities.

References

  1. 2002 - 2019. meetup.com. https://www.meetup.com/Google ScholarGoogle Scholar
  2. 2008 - 2019. Github. https://github.comGoogle ScholarGoogle Scholar
  3. 2014. DAT Project. https://datproject.org/Google ScholarGoogle Scholar
  4. 2015. Designing a Secret Handshake: Key Exchange as a Capability System. http://dominictarr.github.io/secret-handshake-paper/shs.pdfGoogle ScholarGoogle Scholar
  5. Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Borje Ohlman. 2012. A Survey of Information-Centric Networking. IEEE Communications Magazine 50, 7 (2012), 26--36.Google ScholarGoogle ScholarCross RefCross Ref
  6. Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).Google ScholarGoogle Scholar
  7. Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2012. High-speed high-security signatures. Journal of Cryptographic Engineering 2, 2 (2012), 77--89.Google ScholarGoogle ScholarCross RefCross Ref
  8. Neil Briscoe. 2000. Understanding the OSI 7-layer model. PC Network Advisor 120, 2 (2000).Google ScholarGoogle Scholar
  9. Ahto Buldas and Peeter Laud. 1998. New linking schemes for digital time-stamping.. In ICISC, Vol. 98. 3--14.Google ScholarGoogle Scholar
  10. Ahto Buldas, Helger Lipmaa, and Berry Schoenmakers. 2000. Optimally efficient accountable time-stamping. In International Workshop on Public Key Cryptography. Springer, 293--305.Google ScholarGoogle ScholarCross RefCross Ref
  11. Christian Cachin, Rachid Guerraoui, and Luís Rodrigues. 2011. Introduction to reliable and secure distributed programming. Springer Science & Business Media.Google ScholarGoogle Scholar
  12. Antonio Carzaniga, Michele Papalini, and Alexander L. Wolf. 2011. Content-based Publish/Subscribe Networking and Information-centric Networking. In Proceedings of the ACM SIGCOMM Workshop on Information-centric Networking (ICN '11). ACM, New York, NY, USA, 56--61. https://doi.org/10.1145/2018584.2018599Google ScholarGoogle Scholar
  13. Vinton Cerf and Robert Kahn. 1974. A Protocol for Packet Network Intercommunication. IEEE Transactions on communications 22, 5 (1974), 637--648.Google ScholarGoogle ScholarCross RefCross Ref
  14. Scott Chacon and Ben Straub. 2014. Pro git (2nd Edition). Apress. https://gitscm.com/book/en/v2Google ScholarGoogle Scholar
  15. David Gelernter. 1985. Generative Communication in Linda. ACM Trans. Program. Lang. Syst. 7, 1 (Jan. 1985), 80--112. http://doi.acm.org/10.1145/2363.2433Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Piet Geursen. 2017. patch-gatherings. https://github.com/pietgeursen/patch-gatheringsGoogle ScholarGoogle Scholar
  17. Stuart Haber and W Scott Stornetta. 1990. How to time-stamp a digital document. In Conference on the Theory and Application of Cryptography. Springer, 437--455.Google ScholarGoogle Scholar
  18. Internet Archive. 2018. Decentralized Web Summit 2018, Jul 31 - Aug 2, San Francisco. https://decentralizedweb.net/Google ScholarGoogle Scholar
  19. Van Jacobson. 2006. A New Way to look at Networking. https://www.youtube.com/watch?v=oCZMoY3q2uMGoogle ScholarGoogle Scholar
  20. Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica. 2007. A Data-oriented (and Beyond) Network Architecture. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '07). 181--192. https://doi.org/10.1145/1282380.1282402Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Charles Lehner. 2018. Git-SSB: Social Coding on Secure-Scuttlebutt. https://git.scuttlebot.io/%25n92DiQh7ietE%2BR%2BX%2FI403LQoyf2DtR3WQfCkDKlheQU%3D.sha256Google ScholarGoogle Scholar
  22. Joao Leitao, Jose Pereira, and Luis Rodrigues. 2007. Epidemic broadcast trees. In 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007). IEEE, 301--310.Google ScholarGoogle ScholarCross RefCross Ref
  23. Gordon Martin. 2017. ssb-chess. https://github.com/Happy0/ssb-chessGoogle ScholarGoogle Scholar
  24. David Mazières and M. Frans Kaashoek. 1998. Escaping the Evils of Centralized Control with Self-certifying Pathnames. In Proceedings of the 8th ACM SIGOPS European Workshop on Support for Composing Distributed Applications (EW 8). ACM, New York, NY, USA, 118--125. https://doi.org/10.1145/319195.319213Google ScholarGoogle Scholar
  25. Christopher Meiklejohn and Peter Van Roy. 2015. Lasp: A language for distributed, coordination-free programming. In Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming. ACM, 184--195.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Christopher Meiklejohn and Peter Van Roy. 2015. Selective hearing: An approach to distributed, eventually consistent edge computation. In 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW). IEEE, 62--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Christopher S. Meiklejohn, Vitor Enes, Junghun Yoo, Carlos Baquero, Peter Van Roy, and Annette Bieniusa. 2017. Practical Evaluation of the Lasp Programming Model at Large Scale: An Experience Report. In Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming (PPDP '17). ACM, New York, NY, USA, 109--114. https://doi.org/10.1145/3131851.3131862Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Aljoscha Meyer. 2018. SSB Specification. https://spec.scuttlebutt.nz/feed/messages.htmlGoogle ScholarGoogle Scholar
  29. Ilya Moiseenko and Lixia Zhang. 2014. Consumer-producer API for Named Data Networking. In Proceedings of the 1st ACM Conference on Information-Centric Networking (ACM-ICN '14). ACM, New York, NY, USA, 177--178. https://doi.org/10.1145/2660129.2660158Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Philipp Moll, Sebastian Theuermann, and Hermann Hellwagner. 2018. Persistent Interests in Named Data Networking. In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring). IEEE, 1--5.Google ScholarGoogle Scholar
  31. David Nelson. 2011. Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS). Technical Report.Google ScholarGoogle Scholar
  32. Noffle. 2016. git-ssb-intro. https://github.com/noffle/git-ssb-intro#push-conflictsGoogle ScholarGoogle Scholar
  33. Diego Ongaro and John K. Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In Proc USENIX Annual Technical Conference. 305--319. https://www.usenix.org/system/files/conference/atc14/atc14-paper-ongaro.pdfGoogle ScholarGoogle Scholar
  34. Mikko Pitkänen, Teemu Kärkkäinen, Jörg Ott, Marco Conti, Andrea Passarella, Silvia Giordano, Daniele Puccinelli, Franck Legendre, Sacha Trifunovic, Karin Hummel, et al. 2012. SCAMPI: Service platform for social aware mobile and pervasive computing. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM, 7--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Mauro Sardara, Luca Muscariello, and Alberto Compagno. 2018. A Transport Layer and Socket API for (H)ICN: Design, Implementation and Performance Analysis. In Proceedings of the 5th ACM Conference on Information-Centric Networking (ICN '18). ACM, New York, NY, USA, 137--147. https://doi.org/10.1145/3267955.3267972Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Bruce Schneier and John Kelsey. 1998. Cryptographic support for secure logs on untrusted machines.. In USENIX Security Symposium, Vol. 98. 53--62.Google ScholarGoogle Scholar
  37. James Scott, Jon Crowcroft, Pan Hui, and Christophe Diot. 2006. Haggle: A networking architecture designed around mobile users.Google ScholarGoogle Scholar
  38. Marc Shapiro, Nuno Preguiça, Carlos Baquero, and Marek Zawirski. 2011. Conflict-free replicated data types. In Symposium on Self-Stabilizing Systems. Springer, 386--400.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Atul Singh et al. 2006. Eclipse attacks on overlay networks: Threats and defenses. In In IEEE INFOCOM. Citeseer.Google ScholarGoogle Scholar
  40. Dominic Tarr, Paul Frazee, Christian Bundy, Matt McKegg, Anders Rune Jensen, Mix Irving, et al. 2014. SSB Server. https://github.com/ssbc/ssb-serverGoogle ScholarGoogle Scholar
  41. Dominic Tarr, Mix Irving, Christian Bundy, Michael Williams, Anders Rune Jensen, Andre Staltz, and Matt McKegg. 2014. SSB Server. https://github.com/ssbc/ssb-friendsGoogle ScholarGoogle Scholar
  42. Christian Tschudin. 2019. A Broadcast-Only Communication Model Based on Replicated Append-Only Logs. SIGCOMM Comput. Commun. Rev. 49, 2 (May 2019), 37--43. https://doi.org/10.1145/3336937.3336943Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Yingdi Yu, Alexander Afanasyev, Jan Seedorf, Zhiyi Zhang, and Lixia Zhang. 2017. NDN DeLorean: An authentication system for data archives in named data networking. In Proceedings of the 4th ACM Conference on Information-Centric Networking. ACM, 11--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Zhenkai Zhu, Chaoyi Bian, Alexander Afanasyev, Van Jacobson, and Lixia Zhang. 2012. Chronos: Serverless multi-user chat over NDN. Technical Report NDN-0008 (2012).Google ScholarGoogle Scholar

Index Terms

  1. Secure Scuttlebutt: An Identity-Centric Protocol for Subjective and Decentralized Applications

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICN '19: Proceedings of the 6th ACM Conference on Information-Centric Networking
            September 2019
            187 pages
            ISBN:9781450369701
            DOI:10.1145/3357150

            Copyright © 2019 Owner/Author

            This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs International 4.0 License.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 September 2019

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate133of482submissions,28%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader