Files in this item



application/pdfFolklore System ... Probabilistic Protocol.pdf (293kB)
(no description provided)PDF


Title:Folklore System: Providing Both Scale and Security through a Single Core Probabilistic Protocol
Author(s):Morales, Ramses V.; Gupta, Indranil
Subject(s):distributed systems
computer security
Abstract:Distributed systems are typically designed for scale and performance first, which often makes it difficult to add security later without affecting the original properties. This paper proposes the design of the Folklore persistent distributed file system, which adopts an alternative design methodology. Folklore's design relies on a single core protocol for providing both probabilistic scalability and untraceability, the latter being a special notion of probabilistic security. The core protocol is a biologically inspired model of endemic replication that migrates replicas of files among all hosts in a continuous and proactive manner. The emergent behavior is chaotic, meaning that the exact number and location of all replicas of any file is changing all the time. This makes it difficult for an attacker to target any file. Yet, the protocol is scalable -- it consumes constant per-host bandwidth, and the number of replicas per file stays close to a small self-stabilizing value. The simplicity of the core protocol allows augmentation with mechanisms that allow data integrity, availability, and updatability. These mechanisms ensure that Folklore is also resilient to massive-scale attacks. We describe the internals of the Folklore system, present attack analysis, and give experimental results from a prototype that shows high resilience to severe attacks.
Issue Date:2005-02
Genre:Technical Report
Other Identifier(s):UIUCDCS-R-2005-2517
Rights Information:You are granted permission for the non-commercial reproduction, distribution, display, and performance of this technical report in any format, BUT this permission is only for a period of 45 (forty-five) days from the most recent time that you verified that this technical report is still available from the University of Illinois at Urbana-Champaign Computer Science Department under terms that include this permission. All other rights are reserved by the author(s).
Date Available in IDEALS:2009-04-17

This item appears in the following Collection(s)

Item Statistics