Abstract
Accountability implies that any entity should be held responsible for its own specific action or behavior so that the entity is part of a larger chain of accountability. PeerReview [1] is designed as a practical system that provides accountability for distributed systems. A key assumption in PeerReview is that a message sent from one correct node to another will be eventually received. In the real world, however, message loss is commonplace and unavoidable due to the dynamics and uncertainties of the current Internet, and it prevents a message from always reaching its destination. Beginning with this point, we have comprehensively analyzed the behavior of PeerReview with the assumption that, eventually, a message will probably be lost. We have shown that PeerReview would be unable to maintain its completeness and accuracy under such a circumstance. We present six possible errors and the causes from which they originate. We re-evaluated PeerReview with two newly defined metrics, Node Accountability and System Accountability, which are employed to assess the degree of system accountability. Simulation results show that message loss decreases the performance of PeerReview in terms of both metrics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Haeberlen, A., Kouznetsov, P., Druschel, P.: PeerReview: Practical accountability for distributed systems. In: Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles, pp. 175–188. ACM, New York (2007)
Yumerefendi, A.R., Chase, J.S.: The role of accountability in dependable distributed systems. In: Proceedings of HotDep (2005)
Andersen, D., Balakrishnan, H., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Holding the Internet accountable. In: ACM HotNets-VI (2007)
Andersen, D.G., Feamster, N., Koponen, T., Moon, D., Shenker, S.: Accountable internet protocol (AIP). In: Proceedings of the ACM SIGCOMM 2008 conference on Data communication, pp. 339–350. ACM, New York (2008)
Mirkovic, J., Reiher, P.: Building accountability into the future Internet. In: 4th Workshop on Secure Network Protocols, NPSec 2008, pp. 45–51 (2008)
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 382–401 (1982)
Paxson, V.: End-to-end Internet packet dynamics. SIGCOMM Comput. Commun. Rev. 27, 139–152 (1997)
Castro, M., Liskov, B.: Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 398–461 (2002)
Backes, M., Druschel, P., Haeberlen, A., Unruh, D.: CSAR: A practical and provable technique to make randomized systems accountable. In: Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS 2009), San Diego, CA (February 2009)
Keller, E., Lee, R., Rexford, J.: Accountability in hosted virtual networks. In: Proc. ACM SIGCOMM Workshop on Virtualized Infrastructure Systems and Architectures (VISA) (August 2009)
Liu, W., Aggarwal, S., Duan, Z.: Incorporating accountability into internet email. In: Proceedings of the 2009 ACM symposium on Applied Computing, pp. 875–882 (2009)
Argyraki, K., Maniatis, P., Irzak, O., Ashish, S., Shenker, S., Epfl, L.: Loss and delay accountability for the Internet. In: IEEE International Conference on Network Protocols, ICNP 2007, pp. 194–205 (2007)
Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Transactions on Storage 3 (2007)
Yumerefendi, A.R., Chase, J.S.: Trust but verify: accountability for network services. In: Proceedings of the 11th workshop on ACM SIGOPS European workshop, p. 37. ACM, Leuven (2004)
Re-ECN: Adding Accountability for Causing Congestion to TCP/IP, Bob Briscoe (BT & UCL), Arnaud Jacquet, Toby Moncaster and Alan Smith (BT), IETF Internet-Draft <draft-briscoe-tsvwg-re-ecn-tcp-07.txt> (March 2009)
Re-ECN: The Motivation for Adding Accountability for Causing Congestion to TCP/IP, Bob Briscoe (BT & UCL), Arnaud Jacquet, Toby Moncaster and Alan Smith (BT), IETF Internet-Draft <draft-briscoe-tsvwg-re-ecn-tcp-motivation-00.txt> (March 2009)
Madan, B.B., Goseva-Popstojanova, K., Vaidyanathan, K., Trivedi, K.S.: A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation 56, 167–186 (2004)
Breu, R., Innerhofer-Oberperfler, F., Yautsiukhin, A.: Quantitative assessment of enterprise security system. In: Third International Conference on Availability, Reliability and Security, ARES 2008, pp. 921–928 (2008)
Sallhammar, K., Helvik, B., Knapskog, S.: A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 61–68 (2006)
Department of Defense. Trusted Computer System Evaluation Criteria. Technical Report 5200.28-STD, Department of Defense (1985)
Xiao, Y.: Flow-Net Methodology for Accountability in Wireless Networks. IEEE Network 23(5), 30–37 (2009)
Xiao, Y.: Accountability for Wireless LANs, Ad Hoc Networks, and Wireless Mesh Networks. IEEE Communication Magazine 46(4), 116–126 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xiao, Z., Xiao, Y. (2010). PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks. In: Bandyopadhyay, S.K., Adi, W., Kim, Th., Xiao, Y. (eds) Information Security and Assurance. ISA 2010. Communications in Computer and Information Science, vol 76. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13365-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-13365-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13364-0
Online ISBN: 978-3-642-13365-7
eBook Packages: Computer ScienceComputer Science (R0)