Cooperative Data Management Services Based on Accountable Contract

  • Chen Wang
  • Surya Nepal
  • Shiping Chen
  • John Zic
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5331)


Data management services, such as Amazon S3 and SimpleDB, become increasingly popular for businesses to “outsource” data management functionalities. However, to benefit from such services, subscribing businesses and data management service providers must trust each other for their data and operations. One cornerstone for establishing such mutual trust is accountability support, which enables misbehavior detections so that a service provider and consumer can independently validate data integrity and agreed performance metrics. Currently, the lack of accountability support limits the expansion of data management services. The paper proposes a new service model for building accountable data management services where service providers and consumers can use witnesses to audit their behaviors. As such accountability support comes at the cost of overall data service performance, the paper particularly tackles the challenge on how to balance data service performance and accountability.


Bloom Filter Contract Schema Cooperative Service Hash Tree USENIX Annual Technical 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cohen, B.: Incentives build robustness in bittorrent. In: IPTPS (2003)Google Scholar
  2. 2.
    Lillibridge, M., Elnikety, S., Birrell, A., Burrows, M., Isard, M.: A cooperative Internet backup scheme. In: Proc. USENIX Annual Technical Conference (2003)Google Scholar
  3. 3.
    Feigenbaum, J., Sami, R., Shenker, S.: Mechanism design for policy routing. In: PODC, pp. 11–20 (2004)Google Scholar
  4. 4.
    Li, J., Krohn, M., Mazieres, D., Shasha, D.: Secure Untrusted Data Repository (SUNDR). In: OSDI (2004)Google Scholar
  5. 5.
    Yumerefendi, A.R., Chase, J.S.: Strong accountability for network storage. ACM Transactions on Storage, article 11 3(3), 1–33 (2007)Google Scholar
  6. 6.
    Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)CrossRefzbMATHGoogle Scholar
  7. 7.
    W3C: SOAP message transmission mechanism, 25 January 2005, W3C Recommendation (2005),
  8. 8.
    Oracle Inc.: Anatomy of an XML Database:Oracle Berkeley DB XML (white paper) (2006),
  9. 9.
    Stein, C.A., Howard, J.H., Seltzer, M.I.: Unifying file system protection. In: Proc. 2001 USENIX Annual Technical Conf. (June 2001)Google Scholar
  10. 10.
    Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. ACM Trans. on Computer Systems 20(4), 398–461 (2002)CrossRefGoogle Scholar
  11. 11.
    Wright, C.P., Martino, M.C., Zadok, E.: NCryptfs: A Secure and Convenient Cryptographic File System. In: Proc. 2003 USENIX Annual Technical Conference (2003)Google Scholar
  12. 12.
  13. 13.
    Amazon Inc.: Amazon simple storage service (Amazon S3) (2008),
  14. 14.
    DeCandia, G., Hastorun, D., Jampani, M., et al.: Dynamo: Amazon’s Highly Available Key-value Store. In: SOSP (2007)Google Scholar
  15. 15.
    Kallahalla, M., Riedely, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: FAST (2003)Google Scholar
  16. 16.
    Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: BAR fault tolerance for cooperative services. In: SOSP (2005)Google Scholar
  17. 17.
    Ludwig, H., Keller, A., Dan, A., King, R.P., Franck, R.: Web service level agreement (WSLA) language specification,
  18. 18.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: WWW (2003)Google Scholar
  19. 19.
    Fan, X., Weber, W.-D., Barroso, L.A.: Power provisioning for a warehouse-sized computer. In: ISCA (2007)Google Scholar
  20. 20.
    Merkle, R.C.: A digital signature based on a conventional encryption function. In: Crypto 1987 (1987)Google Scholar
  21. 21.
    O’Hara, E.A.: Trustworthiness and contract. In: Zak, P.J. (ed.) Moral Markets: The critical role of values in the economy, pp. 173–203. Princeton University Press, Princeton (2008)Google Scholar
  22. 22.
    Krishna, P.R., Karlapalem, K., Chiu, D.K.W.: An EREC framework for e-contract modeling, enactment and monitoring. Data Knowl. Eng. 51(1), 31–58 (2004)CrossRefGoogle Scholar
  23. 23.
    Chan, J., Rogers, G., Agahari, D., Moreland, D., Zic, J.: Enterprise collaborative contexts and their provisioning for secure managed extranets. In: WETICE, pp. 313–318 (2006)Google Scholar
  24. 24.
    Fähndrich, M., Aiken, M., Hawblitzel, C., Hodson, O., Hunt, G.C., Larus, J.R., Levi, S.: Language Support for Fast and Reliable Message-based Communication in Singularity OS. In: EuroSys 2006, Leuven, Belgium, pp. 177–190 (2006)Google Scholar
  25. 25.
    Mandl, K.D., Kohane, I.S.: Tectonic shifts in the health information economy. The New England Journal of Medicine 358(16), 1732–1737 (2008)CrossRefGoogle Scholar
  26. 26.
    Mandl, K.D., Szolovits, P., Kohane, I.S.: Public standards and patients’ control: how to keep electronic medical records accessible but private. BMJ 322, 283–287 (2001)CrossRefGoogle Scholar
  27. 27.
    Lohr, S.: Google and Microsoft look to change health care, August 14. New York Times (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Chen Wang
    • 1
  • Surya Nepal
    • 1
  • Shiping Chen
    • 1
  • John Zic
    • 1
  1. 1.CSIRO ICT CenterAustralia

Personalised recommendations