Abstract
Data management services, such as Amazon S3 and SimpleDB, become increasingly popular for businesses to “outsource” data management functionalities. However, to benefit from such services, subscribing businesses and data management service providers must trust each other for their data and operations. One cornerstone for establishing such mutual trust is accountability support, which enables misbehavior detections so that a service provider and consumer can independently validate data integrity and agreed performance metrics. Currently, the lack of accountability support limits the expansion of data management services. The paper proposes a new service model for building accountable data management services where service providers and consumers can use witnesses to audit their behaviors. As such accountability support comes at the cost of overall data service performance, the paper particularly tackles the challenge on how to balance data service performance and accountability.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cohen, B.: Incentives build robustness in bittorrent. In: IPTPS (2003)
Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative Internet backup scheme. In: Proc. USENIX Annual Technical Conference (2003)
Feigenbaum, J., Sami, R., Shenker, S.: Mechanism design for policy routing. In: PODC, pp. 11–20 (2004)
Li, J., Krohn, M., Mazieres, D., Shasha, D.: Secure Untrusted Data Repository (SUNDR). In: OSDI (2004)
Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Transactions on Storage, article 11 3(3), 1–33 (2007)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)
W3C: SOAP message transmission mechanism, 25 January 2005, W3C Recommendation (2005), http://www.w3.org/TR/soap12-mtom/
Oracle Inc.: Anatomy of an XML Database:Oracle Berkeley DB XML (white paper) (2006), http://www.oracle.com/database/berkeley-db/xml/index.html
Stein, C.A., Howard, J.H., Seltzer, M.I.: Unifying file system protection. In: Proc. 2001 USENIX Annual Technical Conf. (June 2001)
Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. on Computer Systems 20(4), 398–461 (2002)
Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: A Secure and Convenient Cryptographic File System. In: Proc. 2003 USENIX Annual Technical Conference (2003)
Amazon Inc.: Amazon simpleDB (2008), http://www.amazon.com/b/ref=sc_fe_l_2?node=342335011&no=3440661
Amazon Inc.: Amazon simple storage service (Amazon S3) (2008), http://www.amazon.com/gp/browse.html?node=16427261
DeCandia, G., Hastorun, D., Jampani, M., et al.: Dynamo: Amazon’s Highly Available Key-value Store. In: SOSP (2007)
Kallahalla, M., Riedely, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: FAST (2003)
Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: BAR fault tolerance for cooperative services. In: SOSP (2005)
Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R.: Web service level agreement (WSLA) language specification, http://www.research.ibm.com/wsla/WSLASpecV1-20030128.pdf
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: WWW (2003)
Fan, X., Weber, W.-D., Barroso, L.A.: Power provisioning for a warehouse-sized computer. In: ISCA (2007)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Crypto 1987 (1987)
O’Hara, E.A.: Trustworthiness and contract. In: Zak, P.J. (ed.) Moral Markets: The critical role of values in the economy, pp. 173–203. Princeton University Press, Princeton (2008)
Krishna, P.R., Karlapalem, K., Chiu, D.K.W.: An EREC framework for e-contract modeling, enactment and monitoring. Data Knowl. Eng. 51(1), 31–58 (2004)
Chan, J., Rogers, G., Agahari, D., Moreland, D., Zic, J.: Enterprise collaborative contexts and their provisioning for secure managed extranets. In: WETICE, pp. 313–318 (2006)
Fähndrich, M., Aiken, M., Hawblitzel, C., Hodson, O., Hunt, G.C., Larus, J.R., Levi, S.: Language Support for Fast and Reliable Message-based Communication in Singularity OS. In: EuroSys 2006, Leuven, Belgium, pp. 177–190 (2006)
Mandl, K.D., Kohane, I.S.: Tectonic shifts in the health information economy. The New England Journal of Medicine 358(16), 1732–1737 (2008)
Mandl, K.D., Szolovits, P., Kohane, I.S.: Public standards and patients’ control: how to keep electronic medical records accessible but private. BMJ 322, 283–287 (2001)
Lohr, S.: Google and Microsoft look to change health care, August 14. New York Times (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, C., Nepal, S., Chen, S., Zic, J. (2008). Cooperative Data Management Services Based on Accountable Contract. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems: OTM 2008. OTM 2008. Lecture Notes in Computer Science, vol 5331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88871-0_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-88871-0_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88870-3
Online ISBN: 978-3-540-88871-0
eBook Packages: Computer ScienceComputer Science (R0)