Secure P2P Data Storage and Maintenance

P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings; yet they do not address the security and cooperation issues raised by self-organization. P2P systems also introduce new needs regarding data availability due to the dynamicity of the infrastructure, which are unaddressed so far. This paper first discusses the approaches for tackling these problems. A solution is then introduced that relies on self-organizing security mechanisms in conjunction with a data rejuvenation scheme using erasure codes.

[1]  Brian Neil Levine,et al.  A Survey of Solutions to the Sybil Attack , 2006 .

[2]  Yves Roudier,et al.  Reputation and audits for self-organizing storage , 2008, SOSOC '08.

[3]  Alejandro P. Buchmann,et al.  Maintaining replicas in unstructured P2P systems , 2008, CoNEXT '08.

[4]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[5]  J. Kubiatowicz,et al.  Long-Term Data Maintenance in Wide-Area Storage Systems : A Quantitative Approach , 2005 .

[6]  D. S. Jones,et al.  Differential Equations and Mathematical Biology , 1983 .

[7]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[8]  Roger Dingledine,et al.  The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .

[9]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[10]  Muriel Medard,et al.  How good is random linear coding based distributed networked storage , 2005 .

[11]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[12]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[13]  Ernst W. Biersack,et al.  Hierarchical Codes: How to Make Erasure Codes Attractive for Peer-to-Peer Storage Systems , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[14]  Ben Y. Zhao,et al.  Maintenance-Free Global Data Storage , 2001, IEEE Internet Comput..

[15]  Josep Domingo-Ferrer,et al.  Efficient Remote Data Possession Checking in Critical Information Infrastructures , 2008, IEEE Transactions on Knowledge and Data Engineering.

[16]  Pietro Michiardi,et al.  Analysis of user-driven peer selection in peer-to-peer backup and storage systems , 2008, Valuetools 2008.

[17]  Scott Shenker,et al.  Minimizing churn in distributed systems , 2006, SIGCOMM.

[18]  Stefan Savage,et al.  Total Recall: System Support for Automated Availability Management , 2004, NSDI.

[19]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[20]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[21]  Melek Önen,et al.  A Security Protocol for Self-Organizing Data Storage , 2008, SEC.

[22]  Emin Gün Sirer,et al.  KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .