Withdraw
Loading…
Folklore System: Providing Both Scale and Security through a Single Core Probabilistic Protocol
Morales, Ramses V.; Gupta, Indranil
Loading…
Permalink
https://hdl.handle.net/2142/10963
Description
- Title
- Folklore System: Providing Both Scale and Security through a Single Core Probabilistic Protocol
- Author(s)
- Morales, Ramses V.
- Gupta, Indranil
- Issue Date
- 2005-02
- Keyword(s)
- distributed systems
- computer security
- Abstract
- Distributed systems are typically designed for scale and performance first, which often makes it difficult to add security later without affecting the original properties. This paper proposes the design of the Folklore persistent distributed file system, which adopts an alternative design methodology. Folklore's design relies on a single core protocol for providing both probabilistic scalability and untraceability, the latter being a special notion of probabilistic security. The core protocol is a biologically inspired model of endemic replication that migrates replicas of files among all hosts in a continuous and proactive manner. The emergent behavior is chaotic, meaning that the exact number and location of all replicas of any file is changing all the time. This makes it difficult for an attacker to target any file. Yet, the protocol is scalable -- it consumes constant per-host bandwidth, and the number of replicas per file stays close to a small self-stabilizing value. The simplicity of the core protocol allows augmentation with mechanisms that allow data integrity, availability, and updatability. These mechanisms ensure that Folklore is also resilient to massive-scale attacks. We describe the internals of the Folklore system, present attack analysis, and give experimental results from a prototype that shows high resilience to severe attacks.
- Type of Resource
- text
- Permalink
- http://hdl.handle.net/2142/10963
- Copyright and License Information
- You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Owning Collections
Manage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…