Securing Ad Hoc Storage through

The trend towards self-organization of systems like peer-to-peer or ad hoc networks generates increasing needs for designing distributed storage schemes that should themselves be self-organized and cooperative. Unfortunately, in such systems, the data stored are exposed to new disruption attacks either because of the selfishness of participating nodes with respect to their resources or even because self-organization that leaves such systems much more subject to maliciousness. This setting, combined with the high churnout of nodes and with the high chances of network partition, particularly in mobile ad hoc systems, makes it quite uneasy to ensure the long-term availability of data stored in such fashion. This paper discusses a verification framework based on the probabilistic assessment of small cryptographic verifications in order to assess storage and to prevent data destruction. A protocol for determining the availability of data stored in an ad hoc fashion is detailed. The design of a reputation system based on this protocol and inciting nodes to cooperate towards storage is then discussed.

[1]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[2]  Ellen W. Zegura,et al.  Capacity Enhancement using Throwboxes in DTNs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[3]  Jean-Jacques Quisquater,et al.  Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers , 2003, IICIS.

[4]  Chris Schmandt,et al.  Location-Aware Information Delivery with ComMotion , 2000, HUC.

[5]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[6]  A. Harter,et al.  Teleporting - Making Applications Mobile , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  Paul Syverson,et al.  Onion Routing for Anonymous and Private Internet Connections , 1999 .

[9]  Michel Banâtre,et al.  Collaborative backup for dependable mobile applications , 2004, MPAC '04.

[10]  Pietro Michiardi,et al.  A Game Theoretic Model of a Protocol for Data Possession Verification , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[11]  Marcel Waldvogel,et al.  Establishing trust in distributed storage providers , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[12]  Mario Gerla,et al.  Ad-hoc Storage Overlay System (ASOS): A Delay-Tolerant Approach in MANETs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[13]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.