Authentication-free fault-tolerant peer-to-peer service provisioning
نویسندگان
چکیده
The correct functioning of a peer-to-peer network relies on cooperative behavior of peers as service providers. Current approaches to detection and deterrence of non-cooperative behavior, such as reputation systems, rely on (1) global sharing of observations about service provisioning and (2) global authentication. These two factors severely impair the practical applicability. We propose a novel forward feedback protocol that is completely local and authentication-free and where peers locally and independently learn to avoid non-cooperative peers and routing failures. We evaluate our system in a variety of failure scenarios. The convergence rates and failure resilience are close to those of a fully centralized reputation system. High churn is tolerated without significant drop in performance. For increased fault tolerance the system takes advantage of the service replicas existing in the network. The proposed protocol is lightweight and can readily be integrated into any architecture where service requests are recursively routed, which includes all modern structured overlays.
منابع مشابه
Byzantine fault tolerant public key authentication in peer-to-peer systems
We describe Byzantine Fault Tolerant Authentication, a mechanism for public key authentication in peer-to-peer systems. Authentication is done without trusted third parties, tolerates Byzantine faults and is eventually correct if more than a threshold of the peers are honest. This paper addresses the design, correctness, and fault tolerance of authentication over insecure asynchronous networks....
متن کاملByzantine Fault Tolerant Authentication
A Byzantine fault tolerant public key infrastructure is presented. It aims to fulfill the authentication requirements of large distributed systems consisting of semi-trusted parties. The distributed trust model does not demand the existence of predefined trusted parties and provides authentication if more than a threshold of the participants are honest. A voting based protocol implements distri...
متن کاملServer Selection Schemes Considering Node Status For a Fault-Tolerant Streaming Service on a Peer-to-Peer Network
Peer-to-Peer (P2P) networks are attracting considerable research interest because of their scalability and high performance relative to cost. One of the important services on a P2P network is the streaming service. However, because each node in the P2P network is autonomous, it is difficult to provide a stable streaming service on the network. Therefore, for a stable streaming service on the P2...
متن کاملNode selection for a fault-tolerant streaming service on a peer-to-peer network
Peer-to-Peer (P2P) networks are attracting considerable research interest because of their scalability and high performance relative to cost. One of the important services on a P2P network is the streaming service. However, because each node in the P2P network is autonomous, it is difficult to provide a stable streaming service on the network. Therefore, for a stable streaming service on the P2...
متن کاملImproving Email Trustworthiness through Peer-to-peer Sender Authentication
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense against these attacks. The existing proposals for sender authentication either require infrastructural support or break compatibility with existing email infrastructure. We propose, implement, and evaluate Peer-toPeer Sen...
متن کامل