Peer-to-Peer Networking and Applications

, Volume 6, Issue 1, pp 46–60 | Cite as

iDispatcher: A unified platform for secure planet-scale information dissemination

  • Md Sazzadur RahmanEmail author
  • Guanhua Yan
  • Harsha V. Madhyastha
  • Michalis Faloutsos
  • Stephan Eidenbenz
  • Mike Fisk


Traditional software and security patch update delivery mechanisms rely on a client/server approach where clients pull updates from servers regularly. This approach, however, suffers a high window of vulnerability (WOV) for clients and the risk of a single point of failure. Overlay-based information dissemination schemes overcome these problems, but often incur high infrastructure cost to set up and maintain individual information dissemination networks. Against this backdrop, we propose iDispatcher, a planet-scale, flexible and secure information dissemination platform. iDispatcher uses a hybrid approach with both push- and pull-based information dissemination to reduce the WOV period and achieve high distribution coverage. iDispatcher also uses a peer-to-peer based architecture to achieve higher scalability. We develop a self-contained key management mechanism for iDispatcher. Our prototype for iDispatcher is deployed on more than 500 PlanetLab nodes distributed around the world. Experimental results show that iDispatcher can have small dissemination latency for time-critical applications, is highly tunable to optimize the tradeoff between bandwidth and latency, and works resiliently against different attacks such as flooding attacks.


Information dissemination Peer-to-peer Software update 


  1. 1.
    Gkantsidis C, Karagiannis T, VojnoviC M (2006) Planet scale software updates. In: SIGCOMM ’06: proceedings of the 2006 conference on applications, technologies, architectures, and protocols for computer communications. ACM, New York, NY, USA, pp 423–434CrossRefGoogle Scholar
  2. 2.
    Li J, Reiher P, Popek G (2004) Resilient self-organizing overlay networks for security update delivery. IEEE J Sel Area Comm 1:189–202zbMATHCrossRefGoogle Scholar
  3. 3.
    Fast code dissemination in Twitter data center. Accessed Feb 2011
  4. 4.
  5. 5.
    Deshpande M, Xing B, Lazardis I, Hore B, Venkatasubramanian N, Mehrotra S (2006) Crew: a gossip-based flash-dissemination system. In: Proceedings of the 26th IEEE international conference on distributed computing systems, ICDCS ’06. IEEE Computer Society, Washington, DC, USA, pp 45CrossRefGoogle Scholar
  6. 6.
    Wu C-J, Li C-Y, Yang K-H, Ho J-M, Chen M-S (2009) Time-critical data dissemination in cooperative peer-to-peer systems. In: Proceedings of the 28th IEEE conference on Global telecommunications, GLOBECOM’09. IEEE Press, Piscataway, NJ, USA, pp 2942–2947Google Scholar
  7. 7.
    Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Zhang L, Barham P (2005) Vigilante: end-to-end containment of internet worms. In: Proceedings of the symposium on Systems and Operating Systems Principles (SOSP), pp 133–147Google Scholar
  8. 8.
    Adams J (2010) Operations at Twitter: scaling beyond 100 million users. LISA.
  9. 9.
    Fast code dissemination in Facebook data center. Accessed Feb 2011
  10. 10.
    Delaet T, Joosen W, Vanbrabant B (2010) A survey of system configuration tools. In: Proceedings of the 24th international conference on large installation system administration, LISA’10. USENIX Association, Berkeley, CA, USA, pp 1–8Google Scholar
  11. 11.
    iDispatcher: implementation and source codes.∼rahmanm/iDispatcher/. Accessed June 2011
  12. 12.
    PlanetLab. An open platform for developing, deploying, and accessing planetary-scale services. Accessed Feb 2011
  13. 13.
    Red Hat network. Accessed Feb 2011
  14. 14.
    Mac OS X. Updating your software. Accessed Feb 2011
  15. 15.
    Torrent Fedora project. Accessed Feb 2011
  16. 16.
    Serenyi D, Witten B (2008) Rapidupdate: peer-assisted distribution of security content. In: IPTPS 2008, the 7th international workshop on peer-to-peer systems, pp 423–434Google Scholar
  17. 17.
    Vojnovic M, Ganesh AJ (2008) On the race of worms, alerts, and patches. IEEE/ACM Trans Netw 16:1066–1079CrossRefGoogle Scholar
  18. 18.
    Xie L, Song H, Zhu S (2008) On the effectiveness of internal patching against file-sharing worms. In: Proceedings of the 6th international conference on applied cryptography and network security, ACNS’08. Springer-Verlag, Berlin, Heidelberg, pp 1–20Google Scholar
  19. 19.
    Johansen HD, Johansen D, van Renesse R (2007) Firepatch: secure and time-critical dissemination of software patches. In: SEC, pp 373–384Google Scholar
  20. 20.
    Capistrano. Accessed Feb 2011
  21. 21.
    Distributed hash table (dht). Accessed Dec 2011
  22. 22.
    Samuel J, Mathewson N, Cappos J, Dingledine R (2010) Survivable key compromise in software update systems. In: Proceedings of the 17th ACM conference on computer and communications security, CCS ’10. ACM, New York, NY, USA, pp 61–72CrossRefGoogle Scholar
  23. 23.
    Levine BN, Shields C, Margolin NB (2006) A survey of solutions to the Sybil attack. Tech Rep 2006-052, University of Massachusetts AmherstGoogle Scholar
  24. 24.
    Maymounkov P, Mazières D (2002) Kademlia: a peer-to-peer information system based on the xor metric. In: IPTPS ’01: revised papers from the first international workshop on peer-to-peer systems. Springer-Verlag, London, UK, pp 53–65Google Scholar
  25. 25.
    PGM Reliable Transport Protocol Specification (2001) RFC 3208 (Experimental)2001Google Scholar
  26. 26.
    Openssl library. Accessed Feb 2011

Copyright information

© Springer Science + Business Media, LLC 2012

Authors and Affiliations

  • Md Sazzadur Rahman
    • 1
    Email author
  • Guanhua Yan
    • 2
  • Harsha V. Madhyastha
    • 1
  • Michalis Faloutsos
    • 1
  • Stephan Eidenbenz
    • 2
  • Mike Fisk
    • 3
  1. 1.Department of Computer ScienceUniversity of CaliforniaRiversideUSA
  2. 2.Los Alamos National LaboratoryLos AlamosUSA
  3. 3.Advanced Computing SolutionsLos Alamos National LaboratoryLos AlamosUSA

Personalised recommendations