Location of Repository

Preserving Peer Replicas By Rate-Limited Sampled Voting in LOCKSS

By Yanto Muliadi, Mary Baker, David S. H. Rosenthal, Petros Maniatis, Mema Roussopoulos and T.J. Giuli

Abstract

The LOCKSS project has developed and deployed in a world-wide test a peer-to-peer system for preserving access to journals and other archival information published on the Web. It consists of a large number of independent, low-cost, persistent web caches that cooperate to detect and repair damage to their content by voting in "opinion polls." Based on this experience, we present a design for and simulations of a novel protocol for voting in systems of this kind. It incorporates rate limitation and intrusion detection to ensure that even some very powerful adversaries attacking over many years have only a small probability of causing irrecoverable damage before being detected.

Topics: CF Repositories, BA Archiving, CD Migration, BG Storage, AA General Resources
Year: 2003
DOI identifier: 10.1145/945445.945451
OAI identifier: oai:eprints.erpanet.org:74
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://eprints.erpanet.org/74/ (external link)
  • Suggested articles

    Citations

    1. (2000). [3] Association of Research Libraries. doi
    2. (1988). A Case for Redundant Arrays of Inexpensive Disks (RAID). doi
    3. (2003). A Digital Preservation Network Appliance Based on OpenBSD.
    4. (1998). Byzantine Quorum Systems. doi
    5. (1996). Compliance Defects in Public-Key Cryptography.
    6. (2002). EBay’s Figurine Scandal: Auction Site Merchant Disappears With The Goods. Wall
    7. (2003). Economic Measures to Resist Attacks on a Peer-to-Peer Network. In doi
    8. (2003). Electronic Storage Media.
    9. (2000). Freenet: A Distributed Anonymous Information Storage and Retrieval System. doi
    10. (2002). How to 0wn the Internet in Your Spare Time.
    11. (2001). Inferring Internet Denial-of-Service Activity.
    12. (2003). Long Term Data Resilience Using Opinion Polls. doi
    13. (2001). Mazi` eres. Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements. doi
    14. (1996). Murphy’s Law and Computer Security.
    15. (2002). Narses: A Scalable, Flow-Based Network Simulator.
    16. (1976). New Directions in Cryptography. doi
    17. (2000). OceanStore: An Architecture for Global-Scale Persistent Storage. doi
    18. (2003). On Memory-Bound Functions for Fighting Spam. doi
    19. (1999). Oznur Ozkasap, Zhen Xiao, Mihai Budiu, and Yaron Minsky. Bimodal Multicast. doi
    20. (2000). Permanent Web Publishing. doi
    21. (2003). Perspective: Decrypting The Secret to Strong Security.
    22. (1999). Practical Byzantine Fault Tolerance. doi
    23. (2003). Preserving Peer Replicas By Rate-Limited Sampled Voting. doi
    24. (1992). Pricing via Processing. In doi
    25. (1994). Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. doi
    26. (2001). Storage Management and Caching in PAST, A Large-scale, Persistent Peer-to-peer Storage Utility. doi
    27. (2001). Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements. doi
    28. (1996). The Eternity Service.
    29. (2000). The Free Haven Project: Distributed Anonymous Storage Service. doi
    30. (2002). The Sybil Attack. doi
    31. (2002). Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. doi
    32. (2001). Using Client Puzzles to Protect TLS.
    33. (2003). What is a Library Anymore, doi
    34. (2001). Wide-area Cooperative Storage with CFS. doi
    35. (2002). Wingfield. EBay’s Figurine Scandal: Auction Site Merchant Disappears With The Goods. Wall

    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.