ABSTRACT
Secure Scuttlebutt (SSB) is a novel peer-to-peer event-sharing protocol and architecture for social apps. In this paper we describe SSB's features, its operations as well as the rationale behind the design. We also provide a comparison with Named Data Networking (NDN), an existing information-centric networking architecture, to motivate a larger exploration of the design space for information-centric networking primitives by formulating an identity-centric approach. We finally discuss SSB's limitations and evolution opportunities.
- 2002 - 2019. meetup.com. https://www.meetup.com/Google Scholar
- 2008 - 2019. Github. https://github.comGoogle Scholar
- 2014. DAT Project. https://datproject.org/Google Scholar
- 2015. Designing a Secret Handshake: Key Exchange as a Capability System. http://dominictarr.github.io/secret-handshake-paper/shs.pdfGoogle Scholar
- Bengt Ahlgren, Christian Dannewitz, Claudio Imbrenda, Dirk Kutscher, and Borje Ohlman. 2012. A Survey of Information-Centric Networking. IEEE Communications Magazine 50, 7 (2012), 26--36.Google ScholarCross Ref
- Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).Google Scholar
- Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2012. High-speed high-security signatures. Journal of Cryptographic Engineering 2, 2 (2012), 77--89.Google ScholarCross Ref
- Neil Briscoe. 2000. Understanding the OSI 7-layer model. PC Network Advisor 120, 2 (2000).Google Scholar
- Ahto Buldas and Peeter Laud. 1998. New linking schemes for digital time-stamping.. In ICISC, Vol. 98. 3--14.Google Scholar
- Ahto Buldas, Helger Lipmaa, and Berry Schoenmakers. 2000. Optimally efficient accountable time-stamping. In International Workshop on Public Key Cryptography. Springer, 293--305.Google ScholarCross Ref
- Christian Cachin, Rachid Guerraoui, and Luís Rodrigues. 2011. Introduction to reliable and secure distributed programming. Springer Science & Business Media.Google Scholar
- Antonio Carzaniga, Michele Papalini, and Alexander L. Wolf. 2011. Content-based Publish/Subscribe Networking and Information-centric Networking. In Proceedings of the ACM SIGCOMM Workshop on Information-centric Networking (ICN '11). ACM, New York, NY, USA, 56--61. https://doi.org/10.1145/2018584.2018599Google Scholar
- Vinton Cerf and Robert Kahn. 1974. A Protocol for Packet Network Intercommunication. IEEE Transactions on communications 22, 5 (1974), 637--648.Google ScholarCross Ref
- Scott Chacon and Ben Straub. 2014. Pro git (2nd Edition). Apress. https://gitscm.com/book/en/v2Google Scholar
- David Gelernter. 1985. Generative Communication in Linda. ACM Trans. Program. Lang. Syst. 7, 1 (Jan. 1985), 80--112. http://doi.acm.org/10.1145/2363.2433Google ScholarDigital Library
- Piet Geursen. 2017. patch-gatherings. https://github.com/pietgeursen/patch-gatheringsGoogle Scholar
- Stuart Haber and W Scott Stornetta. 1990. How to time-stamp a digital document. In Conference on the Theory and Application of Cryptography. Springer, 437--455.Google Scholar
- Internet Archive. 2018. Decentralized Web Summit 2018, Jul 31 - Aug 2, San Francisco. https://decentralizedweb.net/Google Scholar
- Van Jacobson. 2006. A New Way to look at Networking. https://www.youtube.com/watch?v=oCZMoY3q2uMGoogle Scholar
- Teemu Koponen, Mohit Chawla, Byung-Gon Chun, Andrey Ermolinskiy, Kye Hyun Kim, Scott Shenker, and Ion Stoica. 2007. A Data-oriented (and Beyond) Network Architecture. In Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '07). 181--192. https://doi.org/10.1145/1282380.1282402Google ScholarDigital Library
- Charles Lehner. 2018. Git-SSB: Social Coding on Secure-Scuttlebutt. https://git.scuttlebot.io/%25n92DiQh7ietE%2BR%2BX%2FI403LQoyf2DtR3WQfCkDKlheQU%3D.sha256Google Scholar
- Joao Leitao, Jose Pereira, and Luis Rodrigues. 2007. Epidemic broadcast trees. In 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007). IEEE, 301--310.Google ScholarCross Ref
- Gordon Martin. 2017. ssb-chess. https://github.com/Happy0/ssb-chessGoogle Scholar
- David Mazières and M. Frans Kaashoek. 1998. Escaping the Evils of Centralized Control with Self-certifying Pathnames. In Proceedings of the 8th ACM SIGOPS European Workshop on Support for Composing Distributed Applications (EW 8). ACM, New York, NY, USA, 118--125. https://doi.org/10.1145/319195.319213Google Scholar
- Christopher Meiklejohn and Peter Van Roy. 2015. Lasp: A language for distributed, coordination-free programming. In Proceedings of the 17th International Symposium on Principles and Practice of Declarative Programming. ACM, 184--195.Google ScholarDigital Library
- Christopher Meiklejohn and Peter Van Roy. 2015. Selective hearing: An approach to distributed, eventually consistent edge computation. In 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW). IEEE, 62--67.Google ScholarDigital Library
- Christopher S. Meiklejohn, Vitor Enes, Junghun Yoo, Carlos Baquero, Peter Van Roy, and Annette Bieniusa. 2017. Practical Evaluation of the Lasp Programming Model at Large Scale: An Experience Report. In Proceedings of the 19th International Symposium on Principles and Practice of Declarative Programming (PPDP '17). ACM, New York, NY, USA, 109--114. https://doi.org/10.1145/3131851.3131862Google ScholarDigital Library
- Aljoscha Meyer. 2018. SSB Specification. https://spec.scuttlebutt.nz/feed/messages.htmlGoogle Scholar
- Ilya Moiseenko and Lixia Zhang. 2014. Consumer-producer API for Named Data Networking. In Proceedings of the 1st ACM Conference on Information-Centric Networking (ACM-ICN '14). ACM, New York, NY, USA, 177--178. https://doi.org/10.1145/2660129.2660158Google ScholarDigital Library
- Philipp Moll, Sebastian Theuermann, and Hermann Hellwagner. 2018. Persistent Interests in Named Data Networking. In 2018 IEEE 87th Vehicular Technology Conference (VTC Spring). IEEE, 1--5.Google Scholar
- David Nelson. 2011. Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS). Technical Report.Google Scholar
- Noffle. 2016. git-ssb-intro. https://github.com/noffle/git-ssb-intro#push-conflictsGoogle Scholar
- Diego Ongaro and John K. Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In Proc USENIX Annual Technical Conference. 305--319. https://www.usenix.org/system/files/conference/atc14/atc14-paper-ongaro.pdfGoogle Scholar
- Mikko Pitkänen, Teemu Kärkkäinen, Jörg Ott, Marco Conti, Andrea Passarella, Silvia Giordano, Daniele Puccinelli, Franck Legendre, Sacha Trifunovic, Karin Hummel, et al. 2012. SCAMPI: Service platform for social aware mobile and pervasive computing. In Proceedings of the first edition of the MCC workshop on Mobile cloud computing. ACM, 7--12.Google ScholarDigital Library
- Mauro Sardara, Luca Muscariello, and Alberto Compagno. 2018. A Transport Layer and Socket API for (H)ICN: Design, Implementation and Performance Analysis. In Proceedings of the 5th ACM Conference on Information-Centric Networking (ICN '18). ACM, New York, NY, USA, 137--147. https://doi.org/10.1145/3267955.3267972Google ScholarDigital Library
- Bruce Schneier and John Kelsey. 1998. Cryptographic support for secure logs on untrusted machines.. In USENIX Security Symposium, Vol. 98. 53--62.Google Scholar
- James Scott, Jon Crowcroft, Pan Hui, and Christophe Diot. 2006. Haggle: A networking architecture designed around mobile users.Google Scholar
- Marc Shapiro, Nuno Preguiça, Carlos Baquero, and Marek Zawirski. 2011. Conflict-free replicated data types. In Symposium on Self-Stabilizing Systems. Springer, 386--400.Google ScholarDigital Library
- Atul Singh et al. 2006. Eclipse attacks on overlay networks: Threats and defenses. In In IEEE INFOCOM. Citeseer.Google Scholar
- Dominic Tarr, Paul Frazee, Christian Bundy, Matt McKegg, Anders Rune Jensen, Mix Irving, et al. 2014. SSB Server. https://github.com/ssbc/ssb-serverGoogle Scholar
- Dominic Tarr, Mix Irving, Christian Bundy, Michael Williams, Anders Rune Jensen, Andre Staltz, and Matt McKegg. 2014. SSB Server. https://github.com/ssbc/ssb-friendsGoogle Scholar
- Christian Tschudin. 2019. A Broadcast-Only Communication Model Based on Replicated Append-Only Logs. SIGCOMM Comput. Commun. Rev. 49, 2 (May 2019), 37--43. https://doi.org/10.1145/3336937.3336943Google ScholarDigital Library
- Yingdi Yu, Alexander Afanasyev, Jan Seedorf, Zhiyi Zhang, and Lixia Zhang. 2017. NDN DeLorean: An authentication system for data archives in named data networking. In Proceedings of the 4th ACM Conference on Information-Centric Networking. ACM, 11--21.Google ScholarDigital Library
- Zhenkai Zhu, Chaoyi Bian, Alexander Afanasyev, Van Jacobson, and Lixia Zhang. 2012. Chronos: Serverless multi-user chat over NDN. Technical Report NDN-0008 (2012).Google Scholar
Index Terms
- Secure Scuttlebutt: An Identity-Centric Protocol for Subjective and Decentralized Applications
Recommendations
Secure Sensing over Named Data Networking
NCA '14: Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and ApplicationsThe anticipated proliferation of smart devices, the "Internet of Things" (IoT), is one of the motivations for some large-scale research efforts aiming to design a new Internet architecture. One such effort is Named-Data Networking (NDN) - a "future ...
Performance analysis of in-network caching for content-centric networking
With the explosion of multimedia content, Internet bandwidth is wasted by repeated downloads of popular content. Recently, Content-Centric Networking (CCN), or the so-called Information-Centric Networking (ICN), has been proposed for efficient content ...
Content discovery for information-centric networking
The information-centric networking (ICN) adopts a content name as a network identifier and utilizes in-network storages to cache the contents. With the name-based routing and content caching, ICN can provide substantial benefits such as faster content ...
Comments