Robust Mixing for Structured Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München.

Slides:



Advertisements
Similar presentations
Stefan Schmid & Christian Scheideler Dept. of Computer Science
Advertisements

Technische Universität Yimei Liao Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei.
Technische Universität Chemnitz Kurt Tutschku Vertretung - Professur Rechner- netze und verteilte Systeme Chord - A Distributed Hash Table Yimei Liao.
Chord: A scalable peer-to- peer lookup service for Internet applications Ion Stoica, Robert Morris, David Karger, M. Frans Kaashock, Hari Balakrishnan.
Commensal Cuckoo: Secure Group Partitioning for Large-Scale Services Siddhartha Sen and Mike Freedman Princeton University.
Massively Distributed Database Systems Distributed Hash Spring 2014 Ki-Joune Li Pusan National University.
A Distributed and Oblivious Heap Christian Scheideler and Stefan Schmid Dept. of Computer Science University of Paderborn.
1 Accessing nearby copies of replicated objects Greg Plaxton, Rajmohan Rajaraman, Andrea Richa SPAA 1997.
Common approach 1. Define space: assign random ID (160-bit) to each node and key 2. Define a metric topology in this space,  that is, the space of keys.
1 One Torus to Rule Them All: Multi-dimensional Queries in P2P Systems Prasanna Ganesan Beverly Yang Hector Garcia-Molina Stanford University.
A DoS-Resilient Information System for Dynamic Data Management by Baumgart, M. and Scheideler, C. and Schmid, S. In SPAA 2009 Mahdi Asadpour
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Peer-to-Peer.
A Note on Finding the Nearest Neighbor in Growth-Restricted Metrics Kirsten Hildrum John Kubiatowicz Sean Ma Satish Rao.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Viceroy: A scalable and dynamic emulation of the Butterfly Presented in CS294-4 by Sailesh Krishnamurthy Sep 22, 2003.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
Localized Self- healing using Expanders Gopal Pandurangan Nanyang Technological University, Singapore Amitabh Trehan Technion - Israel Institute of Technology,
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications 吳俊興 國立高雄大學 資訊工程學系 Spring 2006 EEF582 – Internet Applications and Services 網路應用與服務.
1 Koorde: A Simple Degree Optimal DHT Frans Kaashoek, David Karger MIT Brought to you by the IRIS project.
A DoS-Resilient Information System for Dynamic Data Management Stefan Schmid & Christian Scheideler Dept. of Computer Science University of Paderborn Matthias.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Towards Scalable and Robust Distributed Systems Christian Scheideler Institut für Informatik Technische Universität München.
Developing Analytical Framework to Measure Robustness of Peer-to-Peer Networks Niloy Ganguly.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
Towards Scalable and Robust Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München Baruch Awerbuch Dept. of Computer.
Content Overlays (Nick Feamster). 2 Content Overlays Distributed content storage and retrieval Two primary approaches: –Structured overlay –Unstructured.
Network Aware Resource Allocation in Distributed Clouds.
Peer-to-Peer Networks
Using the Small-World Model to Improve Freenet Performance Hui Zhang Ashish Goel Ramesh Govindan USC.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Hot Topics in Peer-to-Peer Computing (HOT-P2P 2004) Volendam 08 October 2004 Non-uniform deterministic routing on F-Chord(  ) Gennaro Cordasco, Luisa.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Peer-to-Peer Name Service (P2PNS) Ingmar Baumgart Institute of Telematics, Universität Karlsruhe IETF 70, Vancouver.
Presentation 1 By: Hitesh Chheda 2/2/2010. Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT Laboratory for Computer Science.
1 Permutation routing in n-cube. 2 n-cube 1-cube2-cube3-cube 4-cube.
Many random walks are faster than one Noga AlonTel Aviv University Chen AvinBen Gurion University Michal KouckyCzech Academy of Sciences Gady KozmaWeizmann.
Dynamic Networks for Peer-to-Peer Systems Pierre Fraigniaud CNRS LRI, Univ. Paris Sud Joint work with Philippe Gauron.
Chord Advanced issues. Analysis Theorem. Search takes O (log N) time (Note that in general, 2 m may be much larger than N) Proof. After log N forwarding.
Idit Keidar, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Lecture 2: Distributed Hash.
Dynamic Networks for Peer-to-Peer Systems Pierre Fraigniaud CNRS Lab. de Recherche en Informatique (LRI) Univ. Paris-Sud, Orsay Joint work with Philippe.
BATON A Balanced Tree Structure for Peer-to-Peer Networks H. V. Jagadish, Beng Chin Ooi, Quang Hieu Vu.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
A Denial-of-Service Resistant DHT Christian Scheideler Technische Universität München Joint work with Baruch Awerbuch, JHU.
Peer-to-Peer Networks 03 CAN (Content Addressable Network) Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Two Peer-to-Peer Networking Approaches Ken Calvert Net Seminar, 23 October 2001 Note: Many slides “borrowed” from S. Ratnasamy’s Qualifying Exam talk.
Towards a Scalable and Robust DHT Baruch Awerbuch Johns Hopkins University Christian Scheideler Technical University of Munich.
A Sybil-Proof Distributed Hash Table Chris Lesniewski-LaasM. Frans Kaashoek MIT 28 April 2010 NSDI
Peer-to-Peer Data Structures Christian Scheideler Dept. of Computer Science Johns Hopkins University.
1 Plaxton Routing. 2 History Greg Plaxton, Rajmohan Rajaraman, Andrea Richa. Accessing nearby copies of replicated objects, SPAA 1997 Used in several.
IPTPS 2005 Mirek Korzeniowski: Page 1 International Graduate School of Dynamic Intelligent Systems HEINZ NIXDORF INSTITUT University of Paderborn Algorithms.
1 Roie Melamed, Technion AT&T Labs Araneola: A Scalable Reliable Multicast System for Dynamic Wide Area Environments Roie Melamed, Idit Keidar Technion.
Robust Random Number Generation for Peer-to-Peer Systems Baruch Awerbuch Johns Hopkins University Christian Scheideler Technical University of Munich.
Peer-to-Peer Networks 14 Security Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Self-stabilizing Overlay Networks Sukumar Ghosh University of Iowa Work in progress. Jointly with Andrew Berns and Sriram Pemmaraju (Talk at Michigan Technological.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Peer-to-Peer Networks 07 Degree Optimal Networks
Christian Scheideler Dept. of Computer Science
(slides by Nick Feamster)
Peer-to-Peer Networks 07 Degree Optimal Networks
Know thy Neighbor’s Neighbor Better Routing for Skip Graphs and Small Worlds Moni Naor Udi Wieder.
Accessing nearby copies of replicated objects
Chord Advanced issues.
Chord Advanced issues.
Chord Advanced issues.
Permutation routing in n-cube
Locality In Distributed Graph Algorithms
Presentation transcript:

Robust Mixing for Structured Overlay Networks Christian Scheideler Institut für Informatik Technische Universität München

Motivation Peer-to-peer systems have attracted a lot of attention in recent years Many scientific peer-to-peer systems use overlay networks based on virtual space

Motivation V: set of peers, U: virtual space Each v 2 V mapped to region R(v) ½ U Family F of functions f:U ! U {v,w} edge, [F(R(v)) Å R(w)] [ [F(R(w)) Å R(v)] = ;

Example Let U=[0,1). Region selection: [Karger et al. 97] - nodes v 2 V ! random points x v 2 U - R(v) = [x v, succ(x v )) (regions form partition of U) Family F of functions: [Naor & Wieder 03] - f 0 : x ! x/2 - f 1 : x ! (x+1)/2 01 R 01 f0f0 f1f1

Scalability and Robustness Scalability: Network has (poly-)logarithmic diameter Peers have (poly-)logarithmic degree Robustness: Network can handle large fraction of adversarial peers (i.e. honest peers form single connected component) ! join-leave attacks

Join-Leave Model n honest peers  n adversarial peers,  <1 Operations: Join(v): peer v joins the system Leave(v): peer v leaves the system Goal: maintain scalability and robustness for any sequence of polynomially many adversarial rejoin (leave+join) requests

More specific goal n honest peers,  n adversarial peers U=[0,1), region selection via Karger et al. ( R(v) = [x v, succ(x v )) ) For any interval I ½ [0,1) of size (c log n)/n: Balancing condition:  (log n) peers in I Majority condition: honest peers in majority

How to satisfy conditions? Chord: uses cryptographic hash function to map peers to points in [0,1) randomly distributes honest peers does not randomly distribute adversarial peers

How to satisfy conditions? CAN: map peers to random points in [0,1)

How to satisfy conditions? Group spreading [AS04]: Map peers to random points in [0,1) Limit lifetime of peers Too expensive!

How to satisfy conditions? Rule that works: k-cuckoo rule evict k/n-region n honest  n adversarial   < 1-1/k Rejoin: leave and join via k-cuckoo rule

Analysis of k-cuckoo rule k-region: region of size k/n starting at integer multiple of k/n R: fixed set of c log n consec. k-regions New node: not yet replaced after joining  >0: small constant Lemma: R has at most c log n new nodes. Lemma: Sum of ages of k-regions in R in (1 §  ) (c log n)n/k, w.h.p.

Analyis of k-cuckoo rule R: fixed set of c log n consecutive k-regions T=(  /  )log 3 n  >0: small constant Lemma: In any time interval of size T, (1§  )kT honest nodes and (1§  )  kT adv. nodes evicted, w.h.p. Lemma: R has (1§  )(c log n)k old honest and <(1+  )(c log n)  k old adv. nodes, w.h.p.

Analysis of k-cuckoo rule # honest nodes in R: >(1-  )(c log n)k # adversarial nodes in R: <(1+  )(c log n)  k + (c log n) Theorem: When using the k-cuckoo rule with  <1-1/k, the balancing and majority conditions are satisfied for poly many adversarial rejoin requests, w.h.p.

Limitation of k-cuckoo rule Only works for any sequence of rejoin requests of adversarial peers. Does not work for any sequence of rejoin requests. Example: adversary orders all peers in a region of size O(log n / n) to leave

k-flip&evict rule Join: as before (k-cuckoo rule) Leave: choose random k-region among c log n neighboring k-regions, flip it with random k region n honest  n adversarial flip

k-flip&evict rule Leave: why flip neighboring k-region??? Any k-region: O(log n)-region may lose too many peers O(log n)-region k-region

k-flip&evict rule Leave: why flip neighboring k-region??? k-region of leaving peer: k-regions in O(log n)-region may become too young Age distribution: O(log n) attempts to replace k-region with k-region of age O(n/log n) # O(log n)-regions age

k-flip&evict rule Leave: why flip neighboring k-region??? Focus on region R of c log n k-regions At most c log n new nodes in R <(1+  )c log n nodes left k-regions before they joined R, w.h.p. <(1+  )c log n nodes left k-regions after they joined R, w.h.p. Total age of k-regions > (1-  )(c log n)(n/k)

Analysis of k-flip&evict rule # honest nodes in R: >(1-  )(c log n)k – (1+  )(c log n)2 # adversarial nodes in R: <(1+  )(c log n)  k + (c log n) Theorem: When using the k-flip&evict rule with  <1-3/k, the balancing and majority conditions are satisfied for poly many rejoin requests, w.h.p.

Conclusion Light-weight perturbation rules against join-leave attacks possible Recent paper at SPAA 06 Problems in real world: DoS-attacks, random number generation RNG: to appear at OPODIS 06 DoS: ???

Questions?