The taste of Pesto

The Pesto distributed storage platform is geared towards a computing model where private machines play a pivotal r ˆ ole. We argue that no centralized solutions are acceptable in its design and that it supports allocation of separate tasks to separate system components found in its target environment. Hence, Pesto separates trust from responsibility, storage from access control policy, and replication from consistency control. Pesto is designed around a few clean-cut abstractions, that make the above separations possible and efficient to implement. This report gives an overview of the main tasks typically supported by a distributed storage system, how Pesto supports these, how Pesto separates these from each other and what benefits such separation of concerns provides.

[1]  Martín Abadi,et al.  Authentication in distributed systems: theory and practice , 1991, SOSP '91.

[2]  Peter G. Neumann,et al.  Computer-related risks , 1994 .

[3]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[4]  Paul F. Syverson,et al.  Onion routing , 1999, CACM.

[5]  Tage Stabell-Kulø,et al.  Offline Delegation , 1999, USENIX Security Symposium.

[6]  Mahadev Satyanarayanan,et al.  Disconnected Operation in the Coda File System , 1999, Mobidata.

[7]  David K. Gifford,et al.  Weighted voting for replicated data , 1979, SOSP '79.

[8]  Carl M. Ellison,et al.  SPKI Requirements , 1999, RFC.

[9]  Ross J. Anderson,et al.  The XenoService { A Distributed Defeat for Distributed Denial of Service , 2000 .

[10]  Hector Garcia-Molina,et al.  Consistency in a partitioned network: a survey , 1985, CSUR.

[11]  Dorota M. Huizinga,et al.  Experience with Connected and Disconnected Operation of Portable Notebook Computers in Distributed Systems , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[12]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[13]  Roger M. Needham,et al.  Denial of service: an example , 1994, CACM.

[14]  Andrew S. Tanenbaum,et al.  Globe: a wide area distributed system , 1999, IEEE Concurr..

[15]  Tage Stabell-Kulø,et al.  The Open-End Argument for Private Computing , 1999, HUC.

[16]  Nancy G. Leveson,et al.  Safeware: System Safety and Computers , 1995 .

[17]  Butler W. Lampson,et al.  SPKI Certificate Theory , 1999, RFC.

[18]  R. Anderson The Eternity Service , 1996 .

[19]  Nathaniel S. Borenstein,et al.  MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies , 1992, RFC.