Picking a Partner: A Fair Blockchain Based Scoring Protocol for Autonomous Systems

We tackle the problem of enabling Autonomous Systems to evaluate network providers on the basis of their adherence to Service Level Agreements (SLAs) regarding interconnection agreements. In current Internet practices, choices of interconnection partners are driven by factors such as word of mouth, personal relationships, brand recognition and market intelligence, and not by proofs of previous performance. Given that Internet eXchange Points provide increasingly more peering choices, rudimentary schemes for picking interconnection partners are not adequate anymore. Although the current interconnection ecosystem is shrouded in confidentiality, our key observation is that recently-emerged blockchain technology and advances in cryptography enable a privacy-preserving decentralized solution based on actual performance measurements. We propose the concept of SLA score to evaluate network providers and introduce a privacy-preserving protocol that allows networks to compute and verify SLA scores.

[1]  Henning Pagnia,et al.  On the Impossibility of Fair Exchange without a Trusted Third Party , 1999 .

[2]  Patrick Th. Eugster,et al.  Secure data types: a simple abstraction for confidentiality-preserving data analytics , 2017, SoCC.

[3]  Peyman Faratin,et al.  The Growing Complexity of Internet Interconnection , 2008 .

[4]  Katerina J. Argyraki,et al.  Verifiable network-performance measurements , 2010, CoNEXT.

[5]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[6]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[7]  Panos Trimintzios,et al.  Resilience of the Internet Interconnection Ecosystem , 2011, WEIS.

[8]  Nick Feamster,et al.  Helping users shop for ISPs with internet nutrition labels , 2011, HomeNets '11.

[9]  T. V. Lakshman,et al.  The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet , 2016, HotNets.

[10]  Dan Boneh,et al.  Bulletproofs: Short Proofs for Confidential Transactions and More , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[11]  Manuel Blum,et al.  Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.

[12]  Bruce M. Kapron,et al.  On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes , 2016, IACR Cryptol. ePrint Arch..

[13]  Scott Shenker,et al.  Route Bazaar: Automatic Interdomain Contract Negotiation , 2015, HotOS.

[14]  David Clark,et al.  Tussle in cyberspace: defining tomorrow's internet , 2002, SIGCOMM 2002.

[15]  Nick Feamster,et al.  MINT: a Market for INternet Transit , 2008, CoNEXT '08.

[16]  Marco Chiesa,et al.  SIXPACK: Securing Internet eXchange Points Against Curious onlooKers , 2017, CoNEXT.

[17]  George N. Rouskas,et al.  ChoiceNet: toward an economy plane for the internet , 2014, CCRV.