skip to main content
10.1145/945445.945458acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Samsara: honor among thieves in peer-to-peer storage

Published: 19 October 2003 Publication History

Abstract

Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement mechanism. Prior solutions to this problem require centralized infrastructure, constraints on data placement, or ongoing administrative costs. All of these run counter to the design philosophy of peer-to-peer systems.Samsara enforces fairness in peer-to-peer storage systems without requiring trusted third parties, symmetric storage relationships, monetary payment, or certified identities. Each peer that requests storage of another must agree to hold a claim in return---a placeholder that accounts for available space. After an exchange, each partner checks the other to ensure faithfulness. Samsara punishes unresponsive nodes probabilistically. Because objects are replicated, nodes with transient failures are unlikely to suffer data loss, unlike those that are dishonest or chronically unavailable. Claim storage overhead can be reduced when necessary by forwarding among chains of nodes, and eliminated when cycles are created. Forwarding chains increase the risk of exposure to failure, but such risk is modest under reasonable assumptions of utilization and simultaneous, persistent failure.

References

[1]
E. Adar and B. A. Huberman. Free riding on Gnutella. First Monday, 5(10), October 2000.
[2]
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pages 1--14, Boston, MA, December 2002.
[3]
G. Banga, P. Druschel, and J. C. Mogul. Resource containers: A new facility for resource management in server systems. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, pages 45--58, New Orleans, LA, February 1999.
[4]
M. Blaze, J. Ioannidis, and A. Keromytis. Offline micropayments without trusted hardware. In Proceedings of the Fifth Annual Conference on Financial Cryptography, pages 21--40, Cayman Islands, BWI, February 2001.
[5]
W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs. In Proceedings of the International Conference on Measurement and Modeling of Computer Systems, pages 34--43, Santa Clara, CA, June 2000.
[6]
B. F. Cooper and H. Garcia-Molina. Peer-to-peer resource trading in a reliable distributed system. In Proceedings of the First International Workshop on Peer-to-Peer Systems, pages 319--327, Cambridge, MA, March 2002.
[7]
L. P. Cox, C. D. Murray, and B. D. Noble. Pastiche: Making backup cheap and easy. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, pages 285--298, Boston, MA, December 2002.
[8]
F. Dabek, M. F. Kaashoek, D. Karger, R. Morris, and I. Stoica. Wide-area cooperative storage with CFS. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, pages 202--215, Banff, Canada, October 2001.
[9]
W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644--54, November 1976.
[10]
J. R. Douceur. The Sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems, pages 251--260, Cambridge, MA, March 2002.
[11]
J. R. Douceur and W. J. Bolosky. Progress-based regulation of low-importance processes. In Proceedings of the 17th ACM Symposium on Operating Systems Principles, pages 247--260, Kiawah Island Resort, SC, December 1999.
[12]
P. Ferguson and H. Berkowitz. Network renumbering overview: Why would i want it and what is it anyway? Internet RFC 2071, January 1997.
[13]
Y. Fu, J. Chase, B. Chun, S. Schwab, and A. Vahdat. SHARP: An architecture for secure resource peering. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, October 2003.
[14]
P. Golle, K. Leyton-Brown, and I. Mironov. Incentives for sharing in peer-to-peer networks. In Proceedings of the Third ACM Conference on Electronic Commerce, pages 264--267, Tampa, FL, October 2001.
[15]
G. Hardin. The tragedy of the commons. Science, 162:1243--1248, 1968.
[16]
J. Ioannidis, S. Ioannidis, A. D. Keromytis, and V. Prevelakis. Fileteller: Paying and getting paid for file storage. In Proceedings of the Sixth Annual Conference on Financial Cryptography, pages 282--299, Bermuda, March 2002.
[17]
A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium, pages 151--165, San Diego, CA, February 1999.
[18]
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard. A cooperative Internet backup scheme. In Proceedings of the USENIX Annual Technical Conference, pages 29--42, San Antonio, TX, June 2003.
[19]
S. Low, F. Paganini, J. Wang, S. Adlakha, and J. Doyle. Dynamics of TCP/RED and a scalable control. In Proceedings of IEEE/INFOCOM'02, New York, NY, June 2002.
[20]
C. Lumb, J. Schindler, and G. R. Ganger. Freeblock scheduling outside of disk firmware. In Proceedings of the USENIX Conference on File and Storage Technologies, pages 117--129, Monterey, CA, January 2002.
[21]
T.-W. J. Ngan, D. S. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In Proceedings of the Second International Workshop on Peer-to-Peer Systems, Berkeley, CA, February 2003.
[22]
A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms, pages 329--350, Heidelberg, Germany, November 2001.
[23]
A. Rowstron and P. Druschel. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles, pages 188--201, Banff, Canada, October 2001.
[24]
S. Saroiu, G. P. Krishna, and S. D. Gribble. A measurement study of peer-to-peer file sharing systems. In Proceedings of the SPIE Conference on Multimedia Computing and Networking, pages 156--170, San Jose, CA, January 2002.
[25]
M. Satyanarayanan. RPC2 User Guide and Reference Manual. School of Computer Science, Carnegie Mellon University, October 1991.
[26]
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the ACM SIGCOMM 2001 Conference, pages 149--160, San Diego, CA, August 2001.
[27]
T. Ylonen. SSH---Secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37--42, San Jose, CA, July 1996.

Cited By

View all
  • (2021)Notice of Violation of IEEE Publication Principles: FLEXCRYPT: Kernel Support for Heterogeneous Full Drive Encryption2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA)10.1109/ICECA52323.2021.9676063(732-739)Online publication date: 2-Dec-2021
  • (2017)Analysing Selfishness Flooding with SEINE2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2017.51(603-614)Online publication date: Jun-2017
  • (2017)Developing IntegrityCatalog, a software system for managing integrity‐related metadata in digital repositoriesSoftware: Practice and Experience10.1002/spe.251548:1(45-64)Online publication date: 10-Aug-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles
October 2003
338 pages
ISBN:1581137575
DOI:10.1145/945445
  • cover image ACM SIGOPS Operating Systems Review
    ACM SIGOPS Operating Systems Review  Volume 37, Issue 5
    SOSP '03
    December 2003
    329 pages
    ISSN:0163-5980
    DOI:10.1145/1165389
    Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 October 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distributed accounting
  2. peer-to-peer storage systems

Qualifiers

  • Article

Conference

SOSP03
Sponsor:
SOSP03: ACM Symposium on Operating Systems Principles
October 19 - 22, 2003
NY, Bolton Landing, USA

Acceptance Rates

SOSP '03 Paper Acceptance Rate 22 of 128 submissions, 17%;
Overall Acceptance Rate 174 of 961 submissions, 18%

Upcoming Conference

SOSP '25
ACM SIGOPS 31st Symposium on Operating Systems Principles
October 13 - 16, 2025
Seoul , Republic of Korea

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Notice of Violation of IEEE Publication Principles: FLEXCRYPT: Kernel Support for Heterogeneous Full Drive Encryption2021 5th International Conference on Electronics, Communication and Aerospace Technology (ICECA)10.1109/ICECA52323.2021.9676063(732-739)Online publication date: 2-Dec-2021
  • (2017)Analysing Selfishness Flooding with SEINE2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)10.1109/DSN.2017.51(603-614)Online publication date: Jun-2017
  • (2017)Developing IntegrityCatalog, a software system for managing integrity‐related metadata in digital repositoriesSoftware: Practice and Experience10.1002/spe.251548:1(45-64)Online publication date: 10-Aug-2017
  • (2016)A performance study of incentive schemes in peer-to-peer file-sharing systemsThe Journal of Supercomputing10.1007/s11227-016-1648-472:3(1152-1178)Online publication date: 1-Mar-2016
  • (2016)Flexible replica placement for optimized P2P backup on heterogeneous, unreliable machinesConcurrency and Computation: Practice & Experience10.1002/cpe.349128:7(2166-2186)Online publication date: 1-May-2016
  • (2014)Communities, Random Walks, and Social Sybil DefenseInternet Mathematics10.1080/15427951.2013.86568510:3-4(360-420)Online publication date: 15-Sep-2014
  • (2014)On the interplay between data redundancy and retrieval times in P2P storage systemsComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.bjp.2013.12.00559(1-16)Online publication date: 1-Feb-2014
  • (2013)MayghProceedings of the 8th ACM European Conference on Computer Systems10.1145/2465351.2465379(281-294)Online publication date: 15-Apr-2013
  • (2013)SoKProceedings of the 2013 IEEE Symposium on Security and Privacy10.1109/SP.2013.33(382-396)Online publication date: 19-May-2013
  • (2012)DCastProceedings of the 2012 ACM conference on Computer and communications security10.1145/2382196.2382256(567-580)Online publication date: 16-Oct-2012
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media