preserving peer replicas by rate-limited sampled voting

28
Preserving Peer Replicas by Rate-Limited Sampled Voting Petros Maniatis Mema Roussopoulos TJ Giuli David S. H. Rosenthal Mary Baker Yanto Muliadi Stanford University

Upload: dai

Post on 14-Jan-2016

27 views

Category:

Documents


1 download

DESCRIPTION

Preserving Peer Replicas by Rate-Limited Sampled Voting. Petros Maniatis Mema Roussopoulos TJ Giuli David S. H. Rosenthal Mary Baker Yanto Muliadi Stanford University. INTRODUCTION (I). Paper addresses issue of maintaining access to important online documents: - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Preserving Peer Replicas by Rate-Limited Sampled Voting

Preserving Peer Replicas by Rate-Limited Sampled Voting

Petros Maniatis Mema RoussopoulosTJ Giuli David S. H. RosenthalMary Baker Yanto Muliadi

Stanford University

Page 2: Preserving Peer Replicas by Rate-Limited Sampled Voting

INTRODUCTION (I)

• Paper addresses issue of maintaining access to important online documents:– Web-published academic journals

• Must at the same time– Ensure long-term access– Guarantee authenticity of document copies

Page 3: Preserving Peer Replicas by Rate-Limited Sampled Voting

INTRODUCTION (II)

• Their solution is LOCKSS:Lot Of Copies Keep Stuff Safe

• A digital preservation system• Having many copies ensures the long-term

survival of the documents– Same as for hard copies

• Peer-to-peer opinion polls guarantee the authenticity of the documents

Page 4: Preserving Peer Replicas by Rate-Limited Sampled Voting

Digital Preservation Systems

• Must resist random failures and deliberate digital attacks for a long time

• Have unusual requirements:– Lack of central control– Must avoid long-term secrets like encryption

keys• Can make some operations very time consuming

without sacrificing usability

Page 5: Preserving Peer Replicas by Rate-Limited Sampled Voting

DESIGN REQUIREMENTS

• Digital preservation systems:– Must be very cheap to build and maintain

• No high-performance hardware (RAID)– Need not to operate quickly

• Should prevent rather than expedite changes– Must properly operate for decades without

central control

Page 6: Preserving Peer Replicas by Rate-Limited Sampled Voting

DESIGN PRINCIPLES (I)

• Cheap storage is unreliable:– Write-once media are a least as unreliable as

disks• No long-term secrets:

– Too hard to preserve; too hard to recover from leak

• Use inertia:– Prevent change, do not make it too easy

Page 7: Preserving Peer Replicas by Rate-Limited Sampled Voting

DESIGN PRINCIPLES (II)

• Avoid third party reputation:– Too vulnerable to slander or subversion

(eBay problem)• Intrusion detection is intrinsic:

– Not done by extrinsic system• Assume a strong adversary:

– Attackers will be able to use very large numbers of hosts

Page 8: Preserving Peer Replicas by Rate-Limited Sampled Voting

KEY IDEAS

• LOCKSS is about preserving– Very conservative design

• LOCKSS is also about detecting tampering– Can deal with powerful adversaries

Page 9: Preserving Peer Replicas by Rate-Limited Sampled Voting

EXISTING LOCKKS SYSTEM

• Makes it appear to library patrons that pages remain available at their original URL even when they are gone– Just like a regular library

• Peer-to-peer system

Page 10: Preserving Peer Replicas by Rate-Limited Sampled Voting

EXISTING LOCKKS SYSTEM

• Libraries run persistent web caches that – Collect documents by crawling journal

websites– Distribute by acting as limited proxy cache

for the library’s patrons– Preserve by cooperating with other caches to

detect and repair damages

Page 11: Preserving Peer Replicas by Rate-Limited Sampled Voting

Opinion Polls

• Let sample of peers vote on the hash of a specified part of the contents

• Provide peers with confidence in content authenticity and integrity

X’ X’ X’ X”

Page 12: Preserving Peer Replicas by Rate-Limited Sampled Voting

Why?

• On-line journals– Do not sign the materials they publish– Do not provide manifest enumerating the files

forming a paper, issue or volume• Crawling is unreliable• NO completely reliable storage medium exists

– All media can be stolen or destroyed• Better to put our trust in number of replicas

Page 13: Preserving Peer Replicas by Rate-Limited Sampled Voting

Organization (I)

• Peers vote on large archival units (AU)– Year run of a journal

• Each peer will hold a different set of Aus– No universal library

• A peer that loses a poll has a bad AU– Will call a series of increasingly specific

partial polls to locate the damage

Page 14: Preserving Peer Replicas by Rate-Limited Sampled Voting

Organization (II)

• Once damage is detected, peers provide site having a damaged copy with a good copy provided that the site has participated in a previous poll– Prevents free-loading

• Peers only supply materials to peers that can prove they own these materials– Prevents theft

Page 15: Preserving Peer Replicas by Rate-Limited Sampled Voting

Organization (II)

• System is inexpensive – One PC with three 180GB disk can preserve

210 years of the largest journal(J. of Biological Chemistry)

Page 16: Preserving Peer Replicas by Rate-Limited Sampled Voting

THE NEW PROTOCOL

• Assumes no common-mode failure• Several kind of peers

– Malign peers– Loyal Peers

can be either• Damaged (has bad AU)• Healthy (has correct AU)

Page 17: Preserving Peer Replicas by Rate-Limited Sampled Voting

NEW OPINION POLL PROTOCOL

• Objective is to ensure that loyal peers have a high probability to be in a healthy state

• A LOKSS peer– calls a poll much more frequently than any

anticipated rate of random damage– invites into its poll a random subset of peers

Page 18: Preserving Peer Replicas by Rate-Limited Sampled Voting

Poll Outcomes

• Landslide win: votes overwhelmingly agree with peer’s version of AU– Do nothing

• Landslide loss: votes overwhelmingly disagree with peer’s version of AU– Repair peer’s version of AU (by updating it)

• Inconclusive poll: – Require human intervention

Page 19: Preserving Peer Replicas by Rate-Limited Sampled Voting

Roles for participating peers

• Poll initiator• Poll participants:

– Need not find out the result of polls– Inner circle participants are selected by the

poll initiator from its Reference List• Only their votes count

– Outer circle participants are nominated by inner circle participants and selected by poll initiator • Could be invited into further inner circles

Page 20: Preserving Peer Replicas by Rate-Limited Sampled Voting

Exchanges

• Encrypted via symmetric session keys

Page 21: Preserving Peer Replicas by Rate-Limited Sampled Voting

Poll Initiation and Poll Effort Proof

• Initiator sends to each inner circle peer a Poll message containing a fresh public key

• Inner circle peers reply with Poll Challenge• For each Poll Challenge it has received, initiator

produces some computational effort that is provable via a pool effort proof and sends it in a Poll Proof message

• Nominate and Vote messages follow

Page 22: Preserving Peer Replicas by Rate-Limited Sampled Voting

Objectives

• Prevent adversary from gaining a foothold in a poll’s initiator reference list

• Make it expensive for adversary to waste another peer’s resources

• Make it likely that the adversary ‘s attack will be detected on time

Page 23: Preserving Peer Replicas by Rate-Limited Sampled Voting

Mechanisms Used

• Poll effort proof• Mechanism to modify reference list

– Reference list churning• Obfuscation of protocol state

– Almost everything is encrypted

Page 24: Preserving Peer Replicas by Rate-Limited Sampled Voting

Types of Attacks (I)

• Main objective is getting a foothold in a reference list– Must first take over peers that used to be loyal– Can later nominate other malign peers– Lines of defense are

• Loyal peers only change their reference list after a poll they call

• Reference lists change (churning)

Page 25: Preserving Peer Replicas by Rate-Limited Sampled Voting

Types of Attacks (II)

• Session Hijacking:– Malign peer responds to initiator’s Poll

message with spoofed Poll Challenge– If loyal invitee also replies, initiator will receive

two Poll Challenges and discard both– Otherwise malign peer will be able to vote

Page 26: Preserving Peer Replicas by Rate-Limited Sampled Voting

Types of Attacks (III)

• Stealth Modification Attack:– Malign peers behave exactly as loyal peers until

they have an overwhelming majority in a poll– Can then damage loyal peers– Fortunately for us, damaged loyal peers still

behave as loyal peers• Facilitates their detection and repair

Page 27: Preserving Peer Replicas by Rate-Limited Sampled Voting

SIMULATION RESULTS

• Absent an attack, substantial random damages at peers result in low rates of false alarms– Worst case is a false alarm every 44 days

• With up to 1/3 of the peers subverted, the stealth adversary fails.

Page 28: Preserving Peer Replicas by Rate-Limited Sampled Voting

CONCLUSIONS

• Can use– massive replication– rate limitation– inherent intrusion detection– costly operations

to build an archival system capable of resisting attacks by powerful adversaries over decades