skip to main content
10.1145/1529282.1529552acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Prestige-based peer sampling service: interdisciplinary approach to secure gossip

Published: 08 March 2009 Publication History

Abstract

The Peer Sampling Service (PSS) has been proposed as a method to initiate and maintain the set of connections between nodes in unstructured peer to peer (P2P) networks. The PSS usually relies on gossip-style communication where participants exchange their links in a randomized way. However, the PSS network organization can be easily modified by malicious nodes running a "hub attack", in which they achieve a leading structural position. From this prestigious status, the malicious nodes can severely affect the overlay and achieve several application dependent advantages. We present a novel method to overcome this attack and provide results from simulation experiments that validate our claim. This method is inspired by a simple technique used to detect social leaders in firm's organizations that is based on the social (structural) "prestige" of actors.

References

[1]
E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer. Brahms: Byzantine resilient random membership sampling. In PODC, June 2008.
[2]
R. Burt. Structural Holes: The Social Structure of Competition. Harvard University Press, 1992.
[3]
P. Costa, V. Gramoli, M. Jelasity, G. P. Jesi, E. Le Merrer, A. Montresor, and L. Querzoni. Exploring the Interdisciplinary Connections of Gossip-based Systems. Operating System Review, 41(5): 51--60, October 2007.
[4]
W. de Nooy, A. Mrvar, and V. Batagelj. Exploratory Social Network Analysis with Pajek. Cambridge, 2005.
[5]
N. Drost, E. Ogston, R. V. van Nieuwpoort, and H. E. Bal. Arrg: real-world gossiping. In HPDC, pages 147--158, New York, NY, USA, 2007. ACM.
[6]
M. Jelasity, S. Voulgaris, R. Guerraoui, A.-M. Kermarrec, and M. van Steen. Gossip-based peer sampling. ACM Trans. Comput. Syst., 25(3): 8, 2007.
[7]
G. P. Jesi, D. Gavidia, C. Gamage, and M. van Steen. A Secure Peer Sampling Service. UBLCS 2006--17, University of Bologna, Dept. of Computer Science, May 2006.
[8]
G. P. Jesi, D. Hales, and M. van Steen. Identifying Malicious Peers Before it's Too Late: A Decentralized Secure Peer Sampling Service. In IEEE SASO, Boston, MA (USA), 2007.
[9]
J. Liang, N. Naoumov, and K. Ross. The Index Poisoning Attack in P2P File Sharing Systems. In INFOCOM 2006.
[10]
S. J. Nielson, S. Crosby, and D. S. Wallach. A Taxonomy of Rational Attacks. In IPTPS, LNCS. Springer, 2005.
[11]
J. A. Patel, I. Gupta, and N. Contractor. JetStream: Achieving predictable gossip dissemination by leveraging social network principles. In NCA, Cambridge, MA, USA, 2006.
[12]
T. Rowley, D. Bherens, and D. Krackhardt. Redundant Governance Structures: an Analysis of Structural and Relational Embeddedness in the Steel and Semiconductor Industries. Strategic Management Journal, 21, 2002.
[13]
A. Rowstron and P. Druschel. Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Middleware, Nov. 2001.
[14]
M. Sherr, B. T. Loo, and M. Blaze. Veracity: A fully decentralized service for securing network coordinate systems. In 7th International Workshop on Peer-to-Peer Systems (IPTPS 2008), February 2008.
[15]
S. Voulgaris, D. Gavidia, and M. van Steen. CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays. J. Network Syst. Manage., 13(2), 2005.
[16]
S. Wassermann and K. Faust. Social Network Analysis. Cambridge University Press, 1994.

Cited By

View all
  • (2020)Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service2020 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC50000.2020.9219606(1-6)Online publication date: Jul-2020
  • (2020)Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster ScenariosIEEE Access10.1109/ACCESS.2020.30271508(178651-178669)Online publication date: 2020
  • (2010)Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems2010 Proceedings of 19th International Conference on Computer Communications and Networks10.1109/ICCCN.2010.5560092(1-8)Online publication date: Aug-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
March 2009
2347 pages
ISBN:9781605581668
DOI:10.1145/1529282
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SNA
  2. gossip
  3. peer sampling
  4. security

Qualifiers

  • Research-article

Conference

SAC09
Sponsor:
SAC09: The 2009 ACM Symposium on Applied Computing
March 8, 2009 - March 12, 2008
Hawaii, Honolulu

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service2020 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC50000.2020.9219606(1-6)Online publication date: Jul-2020
  • (2020)Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster ScenariosIEEE Access10.1109/ACCESS.2020.30271508(178651-178669)Online publication date: 2020
  • (2010)Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems2010 Proceedings of 19th International Conference on Computer Communications and Networks10.1109/ICCCN.2010.5560092(1-8)Online publication date: Aug-2010
  • (2010)Secure Data Aggregation through Proactive Defense2010 Proceedings of 19th International Conference on Computer Communications and Networks10.1109/ICCCN.2010.5560026(1-6)Online publication date: Aug-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media