460 likes | 478 Views
Explore a distributed e-record storage system based on Peer-to-Peer technology that adapts to trust levels for long-term preservation of electronic documents. This system ensures survivability, integrity, and confidentiality of data, leveraging cheap and abundant resources within enterprises to overcome dynamic challenges.
E N D
A DistributedService, Adaptive to Trust Assessment, based on Peer-to-Peer E-RecordsReplication and Storage Lorenzo Tomasi Marco Casassa Mont
Table of Contents • Trusted Services and PAST Service • Objectives • Research Problem • Scenario and Use Cases • Service Architecture • Related work • Future steps • Conclusions
A Service for long-term preservation of e-records • Long-term preservation of electronic documents involves • renewal of information • migration of data through technology • survivability • long-term access control • integrity • privacy • confidentiality • authenticity • ………………
Objectives • Develop a service for long-term storage of e-records that can be used by PAST Service as a physical storage layer element • The service should be able to : • store,delete and retrieve a document • preserve a document for a long period • guarantee documents’ survivability, integrity and confidentiality
Objectives Long-term storage of e-records in a medium-large enterprise
Traditional solutions SAN for example … Focus on rapid and frequent access to data Dedicated, expensive solutions
Cheap resources • Cheap and abundant resources within the enterprise : • are geographically distributed (survivability) • their storage capacity and CPU time are not fully in use
Environment description • Environment is dynamic (in the long term period) • PCs change • users change • users’ profiles change • Environment is : • collaborative • unreliable / not trusted • not malicious
Research area Using cheap and abundant resources within a medium-large enterprise is an opportunity and a challenge Opportunity : take advantage of cheap resources Challenge : cope with a dynamic and unreliable environment Objectives : long-term storage, survivability, integrity and confidentiality of e-records
Research Variables none Trust full centralized Control centralized distributed Resources distributed
Related Work Trust Control traditional FarSite Resources OceanStore Frangipani
Related work • OceanStore • global scale • Farsite • long-term storage is not an issue • Frangipani • trusted environment • central administrator
Our research area Resources ---------- distributed Trust : unreliable but not malicious environment
Our research area • Control : • not centralized ( take advantage of distributed resources ) • not fully distributed ( likely anarchic, need for one trusted access point for PAST )
Trusted Not trusted Our model enterprise
Trusted Not trusted Scenario PAST Service PAST requests for storage, deletion and retrieval of e-records are accepted from the trusted, centralized controller
Use cases • join and leave • PAST ( client ) initiative • peers’ initiative • Focus on mechanisms
Basic mechanisms • Communication ( identity ) • Delegation • Integrity management ( signature ) • Confidentiality ( encryption ) • Survivability (documents’ replication )
Is this sufficient ? • Is replication sufficient for the goal of long-term storage ? • Reliability ??? Peers are not reliable !!! • That means peers may : • not be available • lose data (or data may get corrupted) • not be able to complete tasks
Monitoring • Motivation : peers’ unreliability • Objectives : • deal with this unreliability • observe peers’ behaviour • control copies’ status (survivability) • gather information that can trigger actions
If we could learn … • If we could learn about peers’ behaviour and reliability : • we could have better management of storage and delegation • the whole system could be more efficient
What kind of information we collect ? Information needed can be collected through monitoring activities and other ordinary interactions with peers, and it can be about : • peers’ availability • copies’ correctness • peers’ ability to complete tasks with success • peers’ communication times
What do we learn ? • For example : • about peers’ availability and uptime • which peers are more reliable for completing tasks • which peers are more reliable for long-term storage • …
Rating system • It’s desirable that the controller can use a rating (sub)system that gives information about peers’ behaviour and reliability in order to do better choices • This (sub)system should use a “Trust and Reliability Function” that implements some kind of Trust Metrics
An Adaptive system • With a rating system, the controller can “follow” the environment’s changes, adopting : • dynamic criteria (for example, “delegation of tasks to reliable peers” is dynamic because it means delegating or revoking tasks, according to changes in peers’ reliability) • multiple policies (by knowing peers’ behaviour and according to how much dynamic the environment is, the controller can change its policies)
Architecture principles • Peers should be a cut-down version of the centralized controller • Architecture should be modular
High level architecture • Information base : basic information module and rating information module • Monitoring module • Rating module • Engines for testing, storage, deletion, and retrieval • Registration module • keys and identities manager • Communication manager
Architecture “Intelligent” components Engines (store, delete, retrieve, etc …) Communication Manager
Information base Architecture Policy-based and “planning” components May influence May update Engines Interaction with peers (via communication manager) Monitoring
Monitoring module architecture List of tasks Tasks manager From/to engines requests Generator Delegation manager From/to information base Scheduler
Rating module architecture Rating information db Trust function Information on peers’ behaviour queries “events” generator notifications
Security solutions • Identity certificates (central controller acts as a CA, but there is not a fully deployed PKI) • Secure communications (SSL like) • Delegation based on a SPKI model
Work done • System architecture design • Mid-term HP Labs report, accepted by VIII IEEE Workshop FTDCS ’01 • Skeleton prototype implemented
Trusted Not trusted Trusted Trusted Not trusted Not trusted Future work : inter-enterprise
Conclusions • Trust and Trust Assessment are an important issue for P2P applications, and in general for new trust services • Our approach : • guarantees long-term survivability, confidentiality and integrity of e-records • is modular • is adaptive to trust and reliability assessment