Skip to main content

Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage

  • Conference paper
Financial Cryptography and Data Security (FC 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10322))

Included in the following conference series:

Abstract

As distributed storage systems grow in popularity, there is now a demand for a reliable incentive and payment system to guarantee and reward the pristine storage of documents. However, many existing proof-of-retrieval and micropayment protocols are not secure in a censorship resistance setting, in which powerful adversaries may infiltrate a system or coerce the original publisher to remove content. Additionally, most existing censorship resistance systems lack a rigorous game-theoretic analysis. We propose Lavinia, an audit and payment protocol for censorship-resistant storage. Lavinia incentivizes document availability by providing micropayments to participating servers in exchange for honestly storing and serving content. Our protocol enables the implementation of a digital printing press as described in Anderson’s Eternity Service: allowing the publisher, as opposed to public interest or an appointed editorial board, to decide whether a document is worth storing, and for how long. In addition to proving the security of our protocol, we provide an in-depth game-theoretic analysis and show that self-interested participants of our system will faithfully implement the desired behaviour and continue to store documents until their expiration date.

An extended version of this paper is available as a technical report [6].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Although many DHTs are vulnerable to Eclipse [7] or Sybil attacks [12], we note that securing DHT join and lookup protocols is an active area of research [4, 7, 24] and is outside the scope of this paper.

  2. 2.

    https://bitcoin.org/.

  3. 3.

    We consider the impact of malicious servers in the next section.

  4. 4.

    http://www.mkomo.com/cost-per-gigabyte-update.

  5. 5.

    https://blog.cloudflare.com/the-relative-cost-of-bandwidth-around-the-world/.

  6. 6.

    Note that we assume the presence of a secure routing protocol, in which there are protections against servers reporting incorrect routing information [7].

References

  1. BitTorrent. http://www.bittorrent.com/

  2. Anderson, R.: The eternity service. In: Pragocrypt 1996, pp. 242–252 (1996)

    Google Scholar 

  3. Anthony, S.: GitHub Battles “Largest DDoS” in Site’s History, Targeted at Anti-Censorship Tools. Ars Technica, 30 March 2015. http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/. Accessed June 2016

  4. Awerbuch, B., Scheideler, C.: Towards a scalable and robust DHT. In: Proceedings of the Eighteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA 2006, pp. 318–327. ACM, New York (2006)

    Google Scholar 

  5. Ben Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from Bitcoin. In: 2014 IEEE Symposium on Security and Privacy (SP), pp. 459–474, May 2014

    Google Scholar 

  6. Bocovich, C., Doucette, J.A., Goldberg, I.: Lavinia: Censorship-Resistant Publishing with Incentives (2017). http://cacr.uwaterloo.ca/techreports/2015/cacr2015-06.pdf

  7. Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev. 36(SI), 299–314 (2002)

    Article  Google Scholar 

  8. Clarke, I., Sandberg, O., Toseland, M., Verendel, V.: Private Communication Through a Network of Trusted Connections: The Dark Freenet (2010). https://freenetproject.org/papers/freenet-0.7.5-paper.pdf

  9. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W.: Freenet: a distributed anonymous information storage and retrieval system. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 46–66. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_4

    Chapter  Google Scholar 

  10. Dai, X., Chaudhary, K., Grundy, J.: Comparing and contrasting micro-payment models for content sharing in P2P networks. In: Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, pp. 347–354. IEEE (2007)

    Google Scholar 

  11. Dingledine, R., Freedman, M.J., Molnar, D.: The free haven project: distributed anonymous storage service. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 67–95. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-44702-4_5

    Chapter  Google Scholar 

  12. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_24

    Chapter  Google Scholar 

  13. Eisenstein, E.L.: The Printing Press as an Agent of Change, vol. 1. Cambridge University Press, Cambridge (1980)

    Book  Google Scholar 

  14. Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_28

    Chapter  Google Scholar 

  15. Gramaglia, M., Urueña, M., Martinez-Yelmo, I.: Off-line incentive mechanism for long-term P2P backup storage. Comput. Commun. 35(12), 1516–1526 (2012)

    Article  Google Scholar 

  16. Hern, A.: Missing: Hard Drive Containing Bitcoins Worth ÂŁ4m in Newport Landfill Site. The Guardian (2013)

    Google Scholar 

  17. Massey, W.A., Parker, G.A., Whitt, W.: Estimating the parameters of a nonhomogeneous poisson process with linear rate. Telecommun. Syst. 5(2), 361–388 (1996)

    Article  Google Scholar 

  18. Maymounkov, P., Mazières, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45748-8_5

    Chapter  MATH  Google Scholar 

  19. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). http://bitcoin.org/bitcoin.pdf. Accessed June 2016

  20. Oualha, N., Roudier, Y.: Securing P2P storage with a self-organizing payment scheme. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM/SETOP 2010. LNCS, vol. 6514, pp. 155–169. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19348-4_12

    Chapter  Google Scholar 

  21. Rowstron, A., Druschel, P.: Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol. 2218, pp. 329–350. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45518-3_18

    Chapter  Google Scholar 

  22. Seuken, S., Charles, D., Chickering, M., Puri, S.: Market design & analysis for a P2P backup system. In: Proceedings of the 11th ACM Conference on Electronic Commerce, pp. 97–108. ACM (2010)

    Google Scholar 

  23. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  MATH  Google Scholar 

  24. Singh, A., Ngan, T.-W., Druschel, P., Wallach, D.: Eclipse attacks on overlay networks: threats and defenses. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006, pp. 1–12, April 2006

    Google Scholar 

  25. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2001, pp. 149–160. ACM, New York (2001)

    Google Scholar 

  26. Stubblefield, A., Wallach, D.S.: Dagster: censorship-resistant publishing without replication. Technical report TR01-380, Houston, TX, USA (2001)

    Google Scholar 

  27. Thompson, D.R., Lev, O., Leyton-Brown, K., Rosenschein, J.: Empirical analysis of plurality election equilibria. In: Proceedings of the 2013 International Conference on Autonomous Agents and Multi-Agent Systems, pp. 391–398 (2013)

    Google Scholar 

  28. Urban, J.M., Quilter, L.: Efficient process or chilling effects—takedown notices under section 512 of the digital millennium copyright act. Santa Clara Comput. High Tech. L J. 22, 621 (2005)

    Google Scholar 

  29. Vasserman, E.Y., Heorhiadi, V., Hopper, N., Kim, Y.: One-way indexing for plausible deniability in censorship resistant storage. In: 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX (2012)

    Google Scholar 

  30. Waldman, M., Mazieres, D.: Tangler: a censorship-resistant publishing system based on document entanglements. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 126–135. ACM (2001)

    Google Scholar 

  31. Winter, P., Lindskog, S.: How the great firewall of China is blocking tor. In: Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet (2012)

    Google Scholar 

Download references

Acknowledgements

We thank the anonymous reviewers for helping us to improve this work. We thank NSERC for grant STPGP-463324.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cecylia Bocovich .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Cite this paper

Bocovich, C., Doucette, J.A., Goldberg, I. (2017). Lavinia: An Audit-Payment Protocol for Censorship-Resistant Storage. In: Kiayias, A. (eds) Financial Cryptography and Data Security. FC 2017. Lecture Notes in Computer Science(), vol 10322. Springer, Cham. https://doi.org/10.1007/978-3-319-70972-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-70972-7_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-70971-0

  • Online ISBN: 978-3-319-70972-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics