Monitoring Security and Dependability in Mobile P2P Systems

Ensuring the dependability and security of mobile P2P systems is an intricate task due to the autonomous and decentralised nature of such systems. In this paper, we present a framework that provides increased support for security and dependability properties by monitoring the compliance of the operation of mobile P2P applications with them at runtime. The framework performs monitoring driven by policies specified for the individual peers in a P2P application and decouples the monitoring process from the operation of the application, to increase its resilience and avoid adverse effects on its performance.

[1]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[2]  Yee Wei Law,et al.  A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks , 2003, PWC.

[3]  Ling Liu,et al.  PeerCQ: a decentralized and self-configuring peer-to-peer information monitoring system , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[4]  Marcelo d'Amorim,et al.  Event-based runtime verification of java programs , 2005, WODA '05.

[5]  Marco Pistore,et al.  Assumption-Based Composition and Monitoring of Web Services , 2007, Test and Analysis of Web Services.

[6]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[7]  David S. Rosenblum,et al.  Achieving scalability and expressiveness in an Internet-scale event notification service , 2000, PODC '00.

[8]  Kian-Lee Tan,et al.  Securing your data in agent-based P2P systems , 2003, Eighth International Conference on Database Systems for Advanced Applications, 2003. (DASFAA 2003). Proceedings..

[9]  Gerald Kunzmann,et al.  A scalable algorithm to monitor chord-based P2P systems at runtime , 2006, IPDPS.

[10]  George Spanoudakis,et al.  Non-Intrusive Monitoring of Service-Based Systems , 2006, Int. J. Cooperative Inf. Syst..

[11]  Alan O. Freier,et al.  The SSL Protocol Version 3.0 , 1996 .

[12]  Murray Shanahan,et al.  The Event Calculus Explained , 1999, Artificial Intelligence Today.

[13]  Jeong Hyun Yi,et al.  Admission control in Peer-to-Peer: design and performance evaluation , 2003, SASN '03.

[14]  Koushik Sen,et al.  Rule-Based Runtime Verification , 2004, VMCAI.

[15]  Oliver Spatscheck,et al.  Accurate, scalable in-network identification of p2p traffic using application signatures , 2004, WWW '04.

[16]  Carlo Ghezzi,et al.  Run-Time Monitoring in Service-Oriented Architectures , 2007, Test and Analysis of Web Services.

[17]  George Spanoudakis,et al.  Monitoring WS-Agreement s: An Event Calculus-Based Approach , 2007, Test and Analysis of Web Services.

[18]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[19]  Grigore Rosu,et al.  Mop: an efficient and generic runtime verification framework , 2007, OOPSLA.

[20]  Mark Brörkens,et al.  JASSDA TRACE ASSERTIONS ∗ Runtime Checking the Dynamic of Java Programs , 2002 .

[21]  Mark Brörkens,et al.  Dynamic Event Generation for Runtime Checking using the JDI , 2002, Electron. Notes Theor. Comput. Sci..

[22]  Mahesh Viswanathan,et al.  Java-MaC: a Run-time Assurance Tool for Java Programs , 2001, RV@CAV.

[23]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[24]  Grigore Rosu,et al.  An Overview of the Runtime Verification Tool Java PathExplorer , 2004, Formal Methods Syst. Des..