Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing

In a P2P-based Massively Multiuser Virtual Environment (MMVE) where nodes cannot be trusted, replicating data on multiple nodes is a possibility to increase the reliability to obtain correct data. Current structured P2P networks mostly place replicas in such a way that queries for the replicas travel along similar paths. A malicious node in the common part of all paths can nullify the security gain of replicated data. We therefore propose to combine radix-based prefix routing with a symmetric replication scheme to gain disjoint paths to each of the replicas.

[1]  Jim Davies,et al.  Replication strategies for reliable decentralised storage , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[4]  Miguel Castro,et al.  Defending against eclipse attacks on overlay networks , 2004, EW 11.

[5]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[6]  Aleksandar Kuzmanovic,et al.  Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.

[7]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[8]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[9]  Douglas M. Blough,et al.  The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).

[10]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[11]  Seif Haridi,et al.  Symmetric Replication for Structured Peer-to-Peer Systems , 2005, DBISP2P.

[12]  Sebastian Schuster,et al.  Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing , 2009 .

[13]  Antonio F. Gómez-Skarmeta,et al.  A novel methodology for constructing secure multipath overlays , 2005, IEEE Internet Computing.

[14]  Atul Singh,et al.  Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.