Skip to main content

PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks

  • Conference paper
Information Security and Assurance (ISA 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 76))

Included in the following conference series:

Abstract

Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of a larger chain of accountability. PeerReview [1] is designed as a practical system that provides accountability for distributed systems. A key assumption in PeerReview is that a message sent from one correct node to another will be eventually received. In the real world, however, message loss is commonplace and unavoidable due to the dynamics and uncertainties of the current Internet, and it prevents a message from always reaching its destination. Beginning with this point, we have comprehensively analyzed the behavior of PeerReview with the assumption that, eventually, a message will probably be lost. We have shown that PeerReview would be unable to maintain its completeness and accuracy under such a circumstance. We present six possible errors and the causes from which they originate. We re-evaluated PeerReview with two newly defined metrics, Node Accountability and System Accountability, which are employed to assess the degree of system accountability. Simulation results show that message loss decreases the performance of PeerReview in terms of both metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Haeberlen, A., Kouznetsov, P., Druschel, P.: PeerReview: Practical accountability for distributed systems. In: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pp. 175–188. ACM, New York (2007)

    Chapter  Google Scholar 

  2. Yumerefendi, A.R., Chase, J.S.: The role of accountability in dependable distributed systems. In: Proceedings of HotDep (2005)

    Google Scholar 

  3. Andersen, D., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Holding the Internet accountable. In: ACM HotNets-VI (2007)

    Google Scholar 

  4. Andersen, D.G., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable internet protocol (AIP). In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 339–350. ACM, New York (2008)

    Chapter  Google Scholar 

  5. Mirkovic, J., Reiher, P.: Building accountability into the future Internet. In: 4th Workshop on Secure Network Protocols, NPSec 2008, pp. 45–51 (2008)

    Google Scholar 

  6. http://peerreview.mpi-sws.org

  7. Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 382–401 (1982)

    Article  MATH  Google Scholar 

  8. Paxson, V.: End-to-end Internet packet dynamics. SIGCOMM Comput. Commun. Rev. 27, 139–152 (1997)

    Article  Google Scholar 

  9. Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 398–461 (2002)

    Article  Google Scholar 

  10. Backes, M., Druschel, P., Haeberlen, A., Unruh, D.: CSAR: A practical and provable technique to make randomized systems accountable. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS 2009), San Diego, CA (February 2009)

    Google Scholar 

  11. Keller, E., Lee, R., Rexford, J.: Accountability in hosted virtual networks. In: Proc. ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA) (August 2009)

    Google Scholar 

  12. Liu, W., Aggarwal, S., Duan, Z.: Incorporating accountability into internet email. In: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 875–882 (2009)

    Google Scholar 

  13. Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S., Epfl, L.: Loss and delay accountability for the Internet. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 194–205 (2007)

    Google Scholar 

  14. Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Transactions on Storage 3 (2007)

    Google Scholar 

  15. Yumerefendi, A.R., Chase, J.S.: Trust but verify: accountability for network services. In: Proceedings of the 11th workshop on ACM SIGOPS European workshop, p. 37. ACM, Leuven (2004)

    Chapter  Google Scholar 

  16. Re-ECN: Adding Accountability for Causing Congestion to TCP/IP, Bob Briscoe (BT & UCL), Arnaud Jacquet, Toby Moncaster and Alan Smith (BT), IETF Internet-Draft <draft-briscoe-tsvwg-re-ecn-tcp-07.txt> (March 2009)

    Google Scholar 

  17. Re-ECN: The Motivation for Adding Accountability for Causing Congestion to TCP/IP, Bob Briscoe (BT & UCL), Arnaud Jacquet, Toby Moncaster and Alan Smith (BT), IETF Internet-Draft <draft-briscoe-tsvwg-re-ecn-tcp-motivation-00.txt> (March 2009)

    Google Scholar 

  18. Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation 56, 167–186 (2004)

    Article  Google Scholar 

  19. Breu, R., Innerhofer-Oberperfler, F., Yautsiukhin, A.: Quantitative assessment of enterprise security system. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 921–928 (2008)

    Google Scholar 

  20. Sallhammar, K., Helvik, B., Knapskog, S.: A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 61–68 (2006)

    Google Scholar 

  21. Department of Defense. Trusted Computer System Evaluation Criteria. Technical Report 5200.28-STD, Department of Defense (1985)

    Google Scholar 

  22. Xiao, Y.: Flow-Net Methodology for Accountability in Wireless Networks. IEEE Network 23(5), 30–37 (2009)

    Article  Google Scholar 

  23. Xiao, Y.: Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks. IEEE Communication Magazine 46(4), 116–126 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiao, Z., Xiao, Y. (2010). PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13365-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13364-0

  • Online ISBN: 978-3-642-13365-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics