Enforcement of Communal Policies for Peer-to-Peer Systems

نویسندگان

  • Mihail Ionescu
  • Naftaly Minsky
  • Thu D. Nguyen
چکیده

Peer-to-peer (P2P) computing, where peers in a community interact directly with each other rather than through intermediary servers, is emerging as a powerful paradigm for collaboration over the Internet. However, this paradigm poses a difficult challenge: how to ensure the harmonious, safe, and secure operation of these communities, particularly if they are large and geographically distributed, such that the collaborating principals may not even know or trust each other. Generally, members of such a community must conform to an application specific communal policy (or protocol), if the community is to operate smoothly and securely. Typically, the purpose of such a policy is either (a) to provide for effective coordination between members of the community, and/or (b) to ensure the security of community members, and of the information they share with each other. The question we address in this paper is, how can such a communal policy be established reliably and in a scalable manner? That is, how can one ensure—in a manner consistent with the decentralized nature of the P2P model—that all members of a given P2P community comply with its communal policy? While some communities can rely on voluntary compliance with their stated policy, we believe that many policies required for future P2P applications will not lend themselves to voluntary compliance alone. Such policies, we maintain, need to be enforced to be reliable. We illustrate the nature of such policies by means of an example of a community that operates like Gnutella, but which is established to exchange more sensitive and critical information than music files. Then, we propose to employ the intrinsically distributed control mechanism called Law-Governed Interaction (LGI) for the scalable enforcement of communal P2P policies. To demonstrate the efficacy of the proposed approach, we show how our example policy can be formulated and enforced under LGI. Finally, we modify an existing open-source Gnutella client to work with LGI and show that the use of LGI incurs little overhead.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enforcement of Communal Policies for P2P Systems

We consider the question of how to establish and enforce communal policies for peer-to-peer (P2P) communities. Generally, members of each P2P community must conform to an application specific communal policy if the community is to operate smoothly and securely. An open question, however, is how can such communal policies be established reliably and in a scalable manner? While some communities c...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

Cooperative Policy Control for Peer-to-Peer Data Distribution

Many network applications (such as swarming downloads, peer-to-peer video streaming and file sharing) are made possible by using large groups of peers to distribute and process data. Securing data in such a system requires not just data originators, but also those “distributors,” to enforce access control, verify integrity, or make other content-specific security decisions for the replicated or...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

Semantic Legal Policies for Data Exchange and Protection across Super-Peer Domains in the Cloud

In semantic policy infrastructure, a Trusted Legal Domain (TLD), designated as a Super-Peer Domain (SPD), is a legal cage model used to circumscribe the legal virtual boundary of data disclosure and usage in the cloud. Semantic legal policies in compliance with the law are enforced at the super-peer within an SPD to enable Law-as-a-Service (LaaS) for cloud service providers. In addition, cloud ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004