The Eternity Service

نویسنده

  • Ross J. Anderson
چکیده

The Internet was designed to provide a communications channel that is as resistant to denial of service attacks as human ingenuity can make it. In this note, we propose the construction of a storage medium with similar properties. The basic idea is to use redundancy and scattering techniques to replicate data across a large set of machines (such as the Internet), and add anonymity mechanisms to drive up the cost of selective service denial attacks. The detailed design of this service is an interesting scientific problem, and is not merely academic: the service may be vital in safeguarding individual rights against new threats posed by the spread of electronic publishing. 1 The Gutenberg Inheritance In medieval times, knowledge was guarded for the power it gave. The Bible was controlled by the church: as well as being encoded in Latin, bibles were often kept chained up. Secular knowledge was also guarded jealously, with medieval craft guilds using oaths of secrecy to restrict competition. Even when information leaked, it usually did not spread far enough to have a significant effect. For example, Wycliffe translated the Bible into English in 1380–1, but the Lollard movement he started was suppressed along with the Peasants’ Revolt. But the development of moveable type printing by Johannes Gensfleisch zur Laden zum Gutenberg during the latter half of the fifteenth century changed the game completely. When Tyndale translated the New Testament in 1524–5, the means were now available to spread the word so quickly that the princes and bishops could not suppress it. They had him executed, but too late; by then some 50,000 copies had been printed. These books were one of the sparks that led to the Reformation. Just as publication of the Bible challenged the abuses that had accreted over centuries of religious monopoly, so the spread of technical know-how destroyed the guilds. Reformation and a growing competitive artisan class led to the scientific and industrial revolutions, which have given us a better standard of living than even princes and bishops enjoyed in earlier centuries. Conversely, the societies that managed to control information to some extent became uncompetitive; and with the collapse of the Soviet empire, democratic liberal capitalism seems finally to have won the argument. But what has this got to do with a cryptology conference? Quite simply, the advance of electronic publishing has placed at risk our inheritance from Gutenberg. Just as advancing technology in the fifteenth century made it very much harder to control information, so the advances of the late twentieth are making it very much easier. This was made clear by recent court action involving the ‘Church of Scientology’, one of whose former adherents had published some material which the organisation would prefer to have kept secret. This apparently included some of the organisation’s ‘scripture’ that is only made available to members who have advanced to a certain level in the organisation. Since Gutenberg, the publication of such a trade secret would have been irreversible and its former owners would have had to cope as best they could. However, the publication was in electronic form, so the scientologists got court orders in an action for copyright infringement and raided the primary site in the USA in August 1995. They then went to Amsterdam where they raided an Internet service provider in September, and filed for siezure of all its assets on the grounds that their copyright information had appeared on a subscriber’s home page. Their next move was to raid an anonymous remailer in Finland to find out the identity of one of its users. The saga continues. The parallel with earlier religious history is instructive. The Bible came into the public domain because once it had been printed and distributed, the sheer number of dispersed copies made it impossible for the bishops and judges and princes to gather them up for burning. However, now that publishing has come to mean placing a copies of an electronic document on a few servers worldwide, the owners of these servers can be coerced into removing it. It is irrelevant whether the coercion comes from wealthy litigants exploiting the legal process, or from political rulers conspiring to control the flow of ideas. The net effect is the erosion of our inheritance from Gutenberg: printing is ‘disinvented’ and electronics document can be ‘de-published’. This should concern everyone who values the benefits that have flowed from half a millenium of printing, publication and progress. So how can we protect the Gutenberg Inheritance? Put into the language of computer science, is there any way in which we can assure the availability of data when the threat model includes not just Murphy’s ferrite beetles, the NSA and the Russian air force, but Her Majesty’s judges? 2 Preventing Service Denial This problem is merely an extreme case of a more general one, namely how we can assure the availability of computerised services. This problem is one of the traditional goals of computer security, the others being to assure the confidentiality and integrity of the information being processed. Yet there is a strange mismatch between research and reality. The great majority of respectable computer security papers are on confidentiality, and almost all the rest on integrity; there are almost none of any weight on availability. But availability is the most important of the three computer security goals. Outside the military, intelligence and diplomatic communities, almost nothing is spent on confidentiality; and the typical information systems department in civil government or industry might spend 2% of its budget on integrity, in the form of audit trails and internal auditors. However 20-40% of the budget will be spent on availability, in the form of offsite data backup and spare processing capacity. There are many kinds of record that we may need to protect from accidental or deliberate destruction. Preventing the powerful from rewriting history or simply suppressing embarrassing facts is just one of our goals. Illegal immigrants might wish to destroy government records of births and deaths; real estate owners might attack pollution registries; clinicians may try to cover up malpractice by shredding medical casenotes [Ald95]; fraudsters may ‘accidentally’ destroy accounting information; and at a more mundane level, many computer security systems become vulnerable if audit trails or certificate revocation lists can be destroyed. There is also the problem of how to ensure the longevity of digital documents. Computer media rapidly become obsolete, and the survival of many important public records has come under threat when the media on which they were recorded could no longer be read, or the software needed to interpret them could no longer be run [Rot95]. For all these reasons, we believe that there is a need for a file store with a very high degree of persistence in the face of all kinds of errors, accidents and denial of service attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Strong Eternity Service

Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how to create a unique fully distributed name-space allowing both computer-efficient and humanacceptable access. We also present a way how to retrieve information from such data storage. We adapt the notion of the mix-netw...

متن کامل

A Comparative Interpretation of Verses 105-108 in Surah Hood from the Perspective of “al-Mizan” and “al-Forqan” Commentaries about the Khulud (Eternity) of the People of the Heaven and the Hell

The Quran includes numerous verses that refer to the eternity of the people of the Heaven and the Hell. It speaks of a group of blissful people who reside in the Heaven forever and enjoy its blessings and another group of miserable people who are doomed be punished. There is disagreement among commentators and theologians over what eternity is and whether there is a difference between the etern...

متن کامل

Using eternity variables to specify and prove a serializable database interface

Eternity variables are introduced to specify and verify serializability of transactions of a distributed database. Eternity variables are a new kind of auxiliary variables. They do not occur in the implementation but are used in specification and verification. Elsewhere it has been proved that eternity variables in combination with history variables are semantically complete for proving refinem...

متن کامل

From Temporality to Eternity: Three Philosophical Approaches

This article studies the problem of eternal life from a philosophical perspective. It focuses on the approaches of Bergson, Husserl, and Heidegger from contemporary philosophy, and shows that using these three philosophical approaches can better explain certain aspects of revealed theology, such as resurrection of flesh, eternity in a transcendent dimension, and eternal life as the angels in he...

متن کامل

Reflection: Music and Eternity (rev. 5/26/13)

Music is often considered one of the most temporal—if not the most temporal—of the arts. Music unfolds in time and can only be experienced sequentially. Musical notation is an attempt to fix or capture that temporality, to render it graphically visual and reproducible. Yet, although we can take in a page of music at a single glance, we still need to hear or perform the piece in real time. Moreo...

متن کامل

From here to eternity: The perils of policy analysis

Eng, M.A. and E.H. Hamilton. 2000. From here to eternity: the perils of policy analysis. In Proceedings, From science to management and back: a science forum for southern interior ecosystems of British Columbia. C. Hollstedt, K. Sutherland, and T. Innes (editors). Southern Interior Forest Extension and Research Partnership, Kamloops, B.C., pp. 55–8. From here to eternity: The perils of policy a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996