Skip to main content
Log in

Stealth modification versus nuisance attacks in the LOCKSS peer-to-peer digital preservation system

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

The LOCKSS system is a world-wide peer-to-peer system for the preservation of academic journals and other archival information published on the Web. The system is deployed at over 200 libraries around the world and currently preserving titles of publishers representing more than 2000 academic titles. It consists of a large number of independent, low-cost, persistent Web caches that cooperate to detect and repair damage to their content by voting in “opinion polls.” Based on our experience working with the LOCKSS system, in this paper, we identify and characterize a fundamental tradeoff in the system’s ability to defend against adversaries with competing goals. In particular, the techniques used to defend against adversaries attempting stealth modification of content being preserved in the system are at odds with those used to identify nuisance adversaries simply trying to disrupt system procedures. We show that with a simple change to the design of the system’s preservation protocol we are able to create moderately strong defense against both of these competing adversaries simultaneously.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Notes

  1. As part of our work, we have performed an extensive analysis of the DS size parameter and how its interaction with other system parameters (such as number of peers and number of AUs), affects system performance. We refer the interested reader to the analysis described here [18].

References

  1. sourceforge.net (2009) Project: LOCKSS. http://sourceforge.net/projects/lockss/

  2. Arzoomanian G (2009) The heath lowry affair. http://users.ids.net/~gregan/pac.html

  3. Baker M, Keeton K, Martin S (2005) Why traditional storage systems don’t help us save stuff forever. In: Proceedings of the 1st IEEE workshop on hot topics in system dependability (HotDep), Japan

  4. Bungale PP, Goodell G, Roussopoulos M (2005) Conservation vs. consensus in peer-to-peer preservation systems. In: Proceedings of the 4th international workshop on peer-to-peer systems (IPTPS), Ithaca

  5. Burkard T (2002) Herodotus: a peer-to-peer web archival system. Master’s thesis, MIT

  6. Cooper BF, Garcia-Molina H (2005) Peer-to-peer data preservation through storage auctions. IEEE Trans Parallel Distrib Syst 16:246–257

    Article  Google Scholar 

  7. Cox LP, Noble BD (2003) Samsara: honor among thieves in peer-to-peer storage. In: Proceedings of the nineteenth ACM symposium on operating systems principles, Bolton Landing, pp 120–132

  8. Douceur J (2002) The Sybil attack. In: 1st intl. workshop on peer-to-peer systems

  9. Giuli TJ, Baker M (2002) Narses: a scalable, flow-based network simulator. Technical report, Computer Science Department, Stanford University, Stanford, CA, USA. arXiv:cs.PF/0211024

  10. Giuli TJ, Maniatis P, Baker M, Rosenthal DSH, Roussopoulos M (2005) Attrition defenses for a peer-to-peer digital preservation system. In: Proceedings of the USENIX annual technical conference, Anaheim

  11. HiveCache, Inc. (2009) Distributed disk-based backups. http://www.hivecache.com/

  12. Keller M, Reich V, Herkovic A (2003) What is a library anymore, anyway? First Monday 8(5). http://www.firstmonday.org/issues/issue8_5/keller/index.html

  13. Khatchatrian M (1997) Genocide scholar “Banished for Life” from Ottoman archives. http://www.cilicia.com/armo10e4.html

  14. Lippard J, Jacobsen J (1995) Scientology v. the internet: free speech & copyright infringement on the information super-highway. Skeptic 3(3):35–41. http://www.skeptic.com/03.3.jl-jj-scientology.html

    Google Scholar 

  15. Maniatis P, Roussopoulos M, Giuli TJ, Rosenthal DSH, Baker M, Muliadi Y (2003) Preserving peer replicas by rate-limited sampled voting. In: SOSP

  16. Maniatis P, Roussopoulos M, Giuli TJ, Rosenthal DSH, Baker M, Muliadi Y (2005) LOCKSS: a peer-to-peer digital preservation system. ACM Trans Comp Syst 23(1):2–50

    Article  Google Scholar 

  17. Mogge D (1999) Seven years of tracking electronic publishing: the ARL directory of electronic journals, newsletters and academic discussion lists. Library Hi Tech 17(1):17–25

    Article  Google Scholar 

  18. Parno B, Roussopoulos M (2004) Predicting adversary infiltration in the lockss system. Technical report TR-28-04, Harvard University

  19. Rosenthal DSH, Reich V (2000) Permanent web publishing. In: Proceedings of the USENIX annual technical conference, freenix track, San Diego, pp 129–140

  20. Tenopir C (2004) Online scholarly journals: how many? Libr J 2(2). http://www.libraryjournal.com/index.asp?layout=articlePrint&articleID=CA374956

  21. Wallach D (2002) A survey of peer-to-peer security issues. In: intl. symp. on software security

Download references

Acknowledgements

The work presented here has benefited greatly from discussions with Mary Baker, T.J. Giuli, Geoffrey Goodell, Rachel Greenstadt, Petros Maniatis, Bryan Parno, David S. H. Rosenthal, and Margo Seltzer. We thank them for their invaluable feedback. This research has been supported by the National Science Foundation (Grant No. 0446522).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mema Roussopoulos.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Roussopoulos, M., Bungale, P. Stealth modification versus nuisance attacks in the LOCKSS peer-to-peer digital preservation system. Peer-to-Peer Netw. Appl. 3, 265–276 (2010). https://doi.org/10.1007/s12083-009-0055-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-009-0055-5

Keywords

Navigation