skip to main content
article

Trust and accountability issues in scalable invalidation-based web cache consistency

Published: 01 October 2005 Publication History

Abstract

Web cache consistency is a popular problem in literature. There are a number of web cache consistency schemes, of which the invalidation-based approach is known to be most promising for improving the freshness of cached content. Yu et al. [27] proposed a scalable architecture for invalidation-based web cache consistency but it does not address the issue of trust and accountability for propagation of invalidations across several administrative domains. To address that issue, this article proposes an architecture called FIAT. In designing FIAT, we are concerned with trust and accountability issues that are likely to be encountered in designing a global event notification service. Since invalidation-based web cache consistency is a relatively well-studied problem, the discussion becomes easier if we use web cache consistency as the running theme of this paper.

References

[1]
Akamai Inc. URL: http://www.akamai.com.]]
[2]
M. Arlitt and T. Jin. Workload characterization of the 1998 world cup web site. Technical Report HPL-1999-35R1, Hewlett-Packard Laboratories, Palo Alto, CA, September 1999.]]
[3]
B. Brewington and G. Cybenko. Keeping up with the changing web. IEEE Computer, 33(5):52--58, May 2000.]]
[4]
V. Cate. Alex - a global filesystem. In Proceedings of the 1992 USENIX File System Workshop, May 1992.]]
[5]
E. Cohen, B. Krishnamurthy, and J. Rexford. Improving end-to-end performance of the world wide web using server volumes and proxy filters. In Proceedings of the SIGCOMM, 1998.]]
[6]
P. Deolasee, A. Katkar, A. Panchbudhe, K. Ramamritham, and P. Shenoy. Adaptive push-pull of dynamic web data: Better resiliency, scalability and coherency. In Proceedings of the Tenth World Wide Web Conference (WWW-10), May 2001.]]
[7]
Officials: Web security work needed, November 2001. dailynews.yahoo.com/htx/ap/20011115/tc/internet_security_1.html.]]
[8]
Exodus communications. http://www.exodus.com.]]
[9]
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC 1514. Hypertext transfer protocol -- HTTP/1.1, June 1999. Network Working Group, Internet Engineering Task Force.]]
[10]
V. Gupta. Scalable Distribution of Data Across Autonomous Systems. PhD Thesis, Department of Computer Science, University of Illinois, Urbana-Champaign, August 2001.]]
[11]
Inktomi Corp. http://www.inktomi.com.]]
[12]
B. Krishnamurthy and C. Wills. Study of piggyback cache validation for proxy caches in the world wide web. In Proceedings of the 1997 Usenix Symposium on Internet Technologies and Systems, 1997.]]
[13]
B. Krishnamurthy and C. Wills. Piggyback server invalidation for proxy cache coherency. In Proceedings of the 10th World Wide Web conference, 1998.]]
[14]
D. Li, P. Cao, and M. Dahlin. WCIP: Web cache invalidation protocol internet draft, March 2001. Work in progress. http://www.ietf.org/internet-drafts/draft-danli-wrec-wcip-01.txt.]]
[15]
C. Liu and P. Cao. Maintaining strong cache consistency in the World Wide Web. In Proceedings of the International Conference on Distributed Computing Systems, pages 12--21, 1997.]]
[16]
The Netcraft Web server survey. URL: http://www.netcraft.com/Survey.]]
[17]
OpenSSL: The Open Source toolkit for SSL/TLS, 2001. URL: http://www.openssl.org.]]
[18]
K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets. In Proceedings of the SIGCOMM, August 2001.]]
[19]
R. Rivest. RFC 1321: The MD5 Message-Digest Algorithm, April 1992. Network Working Group, Internet Engineering Task Force (IETF).]]
[20]
P. Rzewski, J. Bai, and N. Robertson. Cross-network accounting for http, November 2000. Work in progress, available from http://www.ietf.org/internet-drafts/draft-rzewski-cnacct-00.txt.]]
[21]
P. Rzewski, B. Cain, and N. Robertson. Origin/access content peering for http, November 2000. Work in progress, available from www.ietf.org/internet-drafts/draft-rzewski-oacp-00.txt.]]
[22]
B. Schneier. Distributed denial of service attacks, February 2000. http://www.counterpane.com/crypto-gram-0002.html.]]
[23]
B. Schneier. Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons Inc., 2000.]]
[24]
Secure hash standard, 1995. http://www.itl.nist.gov/fipspubs/fip 180-1.htm.]]
[25]
J. Yin, L. Alvisi, M. Dahlin, and C. Lin. Using leases to support server-driven consistency in large-scale systems. In Proceedings of the 18th International Conference on Distributed Computing Systems, May 1998.]]
[26]
H. Yu, L. Breslau, and S. Shenker. A scalable web cache consistency architecture. In Proceedings of the SIGCOMM, pages 163--174, Aug/Sept 1999.]]
[27]
H. Yu, L. Breslau, and S. Shenker. A scalable web cache consistency architecture. Technical Report 99-708, Dept. of Computer Science, University of Southern California, June 1999.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review  Volume 39, Issue 4
October 2005
93 pages
ISSN:0163-5980
DOI:10.1145/1088446
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2005
Published in SIGOPS Volume 39, Issue 4

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media