Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
On Fully Decentralized Resource Discovery in Grid Environments
GRID '01 Proceedings of the Second International Workshop on Grid Computing
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Incrementally improving lookup latency in distributed hash table systems
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
HPDC '03 Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
The impact of DHT routing geometry on resilience and proximity
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
P-Grid: a self-organizing structured P2P system
ACM SIGMOD Record
MAAN: A Multi-Attribute Addressable Network for Grid Information Services
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
Limited reputation sharing in P2P systems
EC '04 Proceedings of the 5th ACM conference on Electronic commerce
Efficient, Self-Contained Handling of Identity in Peer-to-Peer Systems
IEEE Transactions on Knowledge and Data Engineering
On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A Novel Methodology for Constructing Secure Multipath Overlays
IEEE Internet Computing
The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables
P2P '06 Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing
Peer-to-Peer resource discovery in Grids: Models and systems
Future Generation Computer Systems
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Peer-to-Peer Discovery of Computational Resources for Grid Applications
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Exploiting KAD: possible uses and misuses
ACM SIGCOMM Computer Communication Review
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Modeling Heterogeneous User Churn and Local Resilience of Unstructured P2P Networks
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
TRIBLER: a social-based peer-to-peer system: Research Articles
Concurrency and Computation: Practice & Experience - Recent Advances in Peer-to-Peer Systems and Security (P2P 2006)
Squid: Enabling search in DHT-based systems
Journal of Parallel and Distributed Computing
S/Kademlia: A practicable approach towards secure key-based routing
ICPADS '07 Proceedings of the 13th International Conference on Parallel and Distributed Systems - Volume 02
Secure Forwarding in DHTs - Is Redundancy the Key to Robustness?
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Tempering Kademlia with a Robust Identity Based System
P2P '08 Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Long term study of peer behavior in the KAD DHT
IEEE/ACM Transactions on Networking (TON)
Echo: A peer-to-peer clustering framework for improving communication in DHTs
Journal of Parallel and Distributed Computing
eSciGrid: A P2P-based e-science Grid for scalable and efficient data sharing
Future Generation Computer Systems
Scalable DHT- and ontology-based information service for large-scale grids
Future Generation Computer Systems
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Enabling Dynamic Querying over Distributed Hash Tables
Journal of Parallel and Distributed Computing
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Hybrid Computing-Where HPC meets grid and Cloud Computing
Future Generation Computer Systems
Sophia: Local Trust for Securing Routing in DHTs
CCGRID '11 Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
DHT routing using social links
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
The organic grid: self-organizing computation on a peer-to-peer network
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
Free-riding and whitewashing in peer-to-peer systems
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Today, many distributed applications are typically deployed at a large scale, including Grid, web search engines and content distribution networks, and it is expected for their scale to grow more in terms of number of machines, locations and administrative domains. This poses many scalability issues related to the scale of the environment they run in. To explicitly address these issues, many distributed systems and everyday services use peer-to-peer (P2P) overlays to allow other parts of the system to benefit from the fault-tolerance and scalability of P2P technology. In particular, Distributed Hash Tables (DHTs), which implement a simple put-and-get interface to a dictionary-like data structure, have been extensively used to overcome the current limitations associated with the centralized and hierarchical components of distributed systems, including data management, resource discovery, job scheduling etc. However, DHTs exhibit a number of security problems in large-scale systems, where a large number of users are unknown to administrators (e.g., desktop grids). This makes the detection of malicious behavior an extremely complex task. As a result, attackers can disrupt the system in very dangerous ways, leading ultimately to the failure of the routing service, which is catastrophic for any DHT. To address this issue, we introduce Sophia, a new security technique which combines iterative routing with local trust to implement a secure lookup service with almost zero overhead. The key aspect to incur zero overhead is the use of local trust. In Sophia, each user identifies which routing entries are cooperative based on the success and failure of his own lookups, so no trust information is shared. Our simulation results demonstrate that Sophia does better than existing state-of-the-art solutions for secure routing in DHTs, both in stable and high dynamic environments, and even for collusive threat models.