skip to main content
10.1145/945445.945451acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Preserving peer replicas by rate-limited sampled voting

Published:19 October 2003Publication History

ABSTRACT

The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and simulations of a novel protocol for voting in systems of this kind. It incorporates rate limitation and intrusion detection to ensure that even some very powerful adversaries attacking over many years have only a small probability of causing irrecoverable damage before being detected.

References

  1. M. Abadi, M. Burrows, M. Manasse, and T. Wobber. Moderately Hard, Memory-bound Functions. In 10th Annual Network and Distributed System Security Symp., San Diego, CA, USA, February 2003.]]Google ScholarGoogle Scholar
  2. R. J. Anderson. The Eternity Service. In 1st Intl. Conf. on the Theory and Applications of Cryptology, Prague, Czech Republic, 1996.]]Google ScholarGoogle Scholar
  3. Assoc. of Research Libraries. ARL Statistics 2000-01. http://www.arl.org/stats/arlstat/01pub/intro.html, 2001.]]Google ScholarGoogle Scholar
  4. K. Birman, M. Hayden, O. Ozkasap, Z. Xiao, M. Budiu, and Y. Minsky. Bimodal Multicast. ACM Trans. on Computer Systems, 17(2):41--88, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Castro and B. Liskov. Practical Byzantine Fault Tolerance. In 3rd Symp. on Operating Systems Design and Implementation, pages 273--287, New Orleans, LA, USA, February 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Chen, J. Edler, A. Goldberg, A. Gottlieb, S. Sobti, and P. Yianilos. A Prototype Implementation of Archival Intermemory. In Intl. Conf. on Digital Libraries, pages 28--37, Berkeley, CA, USA, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. Chor and C. Dwork. Randomization in Byzantine Agreement. Advances in Computing Research, 5:443--497, 1989.]]Google ScholarGoogle Scholar
  8. I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In Workshop on Design Issues in Anonymity and Unobservability, pages 46--66, Berkeley, CA, USA, July 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. ConservationOnline. Electronic Storage Media. http://palimpsest.stanford.edu/bytopic/electronic-records/electronic-storage-media/, 2003.]]Google ScholarGoogle Scholar
  10. F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area Cooperative Storage with CFS. In 18th ACM Symp. on Operating Systems Principles, pages 202--215, Chateau Lake Louise, Banff, Alberta, Canada, October 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Davis. Compliance Defects in Public-Key Cryptography. In 6th USENIX Security Symp., pages 171--178, San Jose, CA, USA, July 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. W. Diffie. Perspective: Decrypting The Secret to Strong Security. http://news.com.com/2010-1071-980462.html, January 2003.]]Google ScholarGoogle Scholar
  13. W. Diffie and M. E. Hellman. New Directions in Cryptography. IEEE Trans. on Information Theory, IT-22(6):644--654, November 1976.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Dingledine, M. J. Freedman, and D. Molnar. The Free Haven Project: Distributed Anonymous Storage Service. In Workshop on Design Issues in Anonymity and Unobservability, pages 67--95, Berkeley, CA, USA, July 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. John Douceur. The Sybil Attack. In 1st Intl. Workshop on Peer-to-Peer Systems, pages 251--260, Boston, MA, USA, March 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Dwork, A. Goldberg, and M. Naor. On Memory-Bound Functions for Fighting Spam. In 23rd Annual Intl. Cryptology Conference, Santa Barbara, CA, USA, August 2003. To appear.]]Google ScholarGoogle Scholar
  17. C. Dwork and M. Naor. Pricing via Processing. In Advances on Cryptology (CRYPTO 1992), volume 740 of Lecture Notes in Computer Science, pages 139--147. Springer, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Electronic Frontier Found. DMCA Archive. http://www.eff.org/IP/DMCA/.]]Google ScholarGoogle Scholar
  19. M. Erdos and S. Cantor. Shibboleth Architecture DRAFT v05. http://shibboleth.internet2.edu/docs/draft-internet2-shibboleth-arch-v05.pdf, May 2002. Work in progress.]]Google ScholarGoogle Scholar
  20. TJ Giuli and M. Baker. Narses: A Scalable, Flow-Based Network Simulator. Technical Report cs.PF/0211024, Computer Science Department, Stanford University, Stanford, CA, USA, November 2002.]]Google ScholarGoogle Scholar
  21. M. Keller, V. Reich, and A. Herkovic. What is a Library Anymore, Anyway? First Monday, 8(5), May 2003. http://www.firstmonday.org/issues/issue8_5/keller/index.html.]]Google ScholarGoogle Scholar
  22. J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. OceanStore: An Architecture for Global-Scale Persistent Storage. In 9th Intl. Conf. on Architectural Support for Programming Languages and Operating Systems, pages 190--201, Cambridge, MA, USA, November 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. D. Malkhi and M. Reiter. Byzantine Quorum Systems. J. Distributed Computing, 11(4):203--213, October 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. P. Maniatis, M. Roussopoulos, TJ~Giuli, D. S. H. Rosenthal, M. Baker, and Y. Muliadi. Preserving Peer Replicas By Rate-Limited Sampled Voting. Technical Report cs.CR/0303026, Stanford Univ., March 2003. Extended version of this SOSP 2003 paper.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Michalakis, D-M. Chiu, and D. S. H. Rosenthal. Long Term Data Resilience Using Opinion Polls. In 22nd IEEE Intl. Performance Computing and Communications Conference, Phoenix, AZ, USA, April 2003.]]Google ScholarGoogle Scholar
  26. D. Mogge. Seven Years of Tracking Electronic Publishing: The ARL Directory of Electronic Journals, Newsletters and Academic Discussion Lists. Library Hi Tech, 17(1):17--25, 1999.]]Google ScholarGoogle Scholar
  27. D. Patterson, G. Gibson, and R. Katz. A Case for Redundant Arrays of Inexpensive Disks (RAID). In ACM SIGMOD, pages 109--116, Chicago, IL, USA, June 1988.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Reiter. Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. In 2nd ACM Conf. on Computer and Communications Security, pages 68--80, Fairfax, VA, USA, November 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. S. H. Rosenthal. A Digital Preservation Network Appliance Based on OpenBSD. In BSDcon, San Mateo, CA, USA, September 2003. To appear.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. D. S. H. Rosenthal and V. Reich. Permanent Web Publishing. In USENIX Annual Technical Conf., Freenix Track, pages 129--140, San Diego, CA, USA, June 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. D. S. H. Rosenthal, M. Roussopoulos, P. Maniatis, and M. Baker. Economic Measures to Resist Attacks on a Peer-to-Peer Network. In Workshop on Economics of Peer-to-Peer Systems, Berkeley, CA, USA, June 2003.]]Google ScholarGoogle Scholar
  32. A. Rowstron and P. Druschel. Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility. In 18th ACM Symp. on Operating Systems Principles, pages 188--201, Chateau Lake Louise, Banff, Alberta, Canada, October 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in Your Spare Time. In 11th USENIX Security Symp., pages 149--167, San Francisco, CA, USA, August 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. US Govt. Web Design and Usability Guidelines. http://usability.gov/guidelines/softhard.html.]]Google ScholarGoogle Scholar
  35. W. Venema. Murphy's Law and Computer Security. In 6th USENIX Security Symp., San Jose, CA, USA, July 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. M. Waldman and D. Mazieres. Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements. In 8th ACM Conf. on Computer and Communications Security, pages 126--135, Philadelphia, PA, USA, November 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In 18th Annual Computer Security Applications Conf., Las Vegas, Nevada, USA, December 2002.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. N. Wingfield. EBay's Figurine Scandal: Auction Site Merchant Disappears With The Goods. Wall Street J., Feb 22nd, 2002.]]Google ScholarGoogle Scholar

Index Terms

  1. Preserving peer replicas by rate-limited sampled voting

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
            October 2003
            338 pages
            ISBN:1581137575
            DOI:10.1145/945445
            • cover image ACM SIGOPS Operating Systems Review
              ACM SIGOPS Operating Systems Review  Volume 37, Issue 5
              SOSP '03
              December 2003
              329 pages
              ISSN:0163-5980
              DOI:10.1145/1165389
              Issue’s Table of Contents

            Copyright © 2003 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 19 October 2003

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            SOSP '03 Paper Acceptance Rate22of128submissions,17%Overall Acceptance Rate131of716submissions,18%

            Upcoming Conference

            SOSP '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader