460 likes | 470 Views
This study focuses on a distributed service for long-term e-records preservation, addressing integrity, privacy, survivability, and trust issues using adaptive monitoring and trust metrics. The system aims to utilize cheap and abundant resources within an enterprise. The architecture allows for a centralized controller to manage tasks such as storage, deletion, and retrieval of e-records. An adaptive rating system based on trust metrics is proposed to deal with peer unreliability.
E N D
A DistributedService, Adaptive to Trust Assessment, based on Peer-to-Peer E-RecordsReplication and Storage Lorenzo Tomasi Marco Casassa Mont
Table of Contents • Trusted Services and PAST Service • Objectives • Research Problem • Scenario and Use Cases • Service Architecture • Related work • Future steps • Conclusions
A Service for long-term preservation of e-records • Long-term preservation of electronic documents involves • renewal of information • migration of data through technology • survivability • long-term access control • integrity • privacy • confidentiality • authenticity • ………………
Objectives • Develop a service for long-term storage of e-records that can be used by PAST Service as a physical storage layer element • The service should be able to : • store,delete and retrieve a document • preserve a document for a long period • guarantee documents’ survivability, integrity and confidentiality
Objectives Long-term storage of e-records in a medium-large enterprise
Traditional solutions SAN for example … Focus on rapid and frequent access to data Dedicated, expensive solutions
Cheap resources • Cheap and abundant resources within the enterprise : • are geographically distributed (survivability) • their storage capacity and CPU time are not fully in use
Environment description • Environment is dynamic (in the long term period) • PCs change • users change • users’ profiles change • Environment is : • collaborative • unreliable / not trusted • not malicious
Research area Using cheap and abundant resources within a medium-large enterprise is an opportunity and a challenge Opportunity : take advantage of cheap resources Challenge : cope with a dynamic and unreliable environment Objectives : long-term storage, survivability, integrity and confidentiality of e-records
Research Variables none Trust full centralized Control centralized distributed Resources distributed
Related Work Trust Control traditional FarSite Resources OceanStore Frangipani
Related work • OceanStore • global scale • Farsite • long-term storage is not an issue • Frangipani • trusted environment • central administrator
Our research area Resources ---------- distributed Trust : unreliable but not malicious environment
Our research area • Control : • not centralized ( take advantage of distributed resources ) • not fully distributed ( likely anarchic, need for one trusted access point for PAST )
Trusted Not trusted Our model enterprise
Trusted Not trusted Scenario PAST Service PAST requests for storage, deletion and retrieval of e-records are accepted from the trusted, centralized controller
Use cases • join and leave • PAST ( client ) initiative • peers’ initiative • Focus on mechanisms
Basic mechanisms • Communication ( identity ) • Delegation • Integrity management ( signature ) • Confidentiality ( encryption ) • Survivability (documents’ replication )
Is this sufficient ? • Is replication sufficient for the goal of long-term storage ? • Reliability ??? Peers are not reliable !!! • That means peers may : • not be available • lose data (or data may get corrupted) • not be able to complete tasks
Monitoring • Motivation : peers’ unreliability • Objectives : • deal with this unreliability • observe peers’ behaviour • control copies’ status (survivability) • gather information that can trigger actions
If we could learn … • If we could learn about peers’ behaviour and reliability : • we could have better management of storage and delegation • the whole system could be more efficient
What kind of information we collect ? Information needed can be collected through monitoring activities and other ordinary interactions with peers, and it can be about : • peers’ availability • copies’ correctness • peers’ ability to complete tasks with success • peers’ communication times
What do we learn ? • For example : • about peers’ availability and uptime • which peers are more reliable for completing tasks • which peers are more reliable for long-term storage • …
Rating system • It’s desirable that the controller can use a rating (sub)system that gives information about peers’ behaviour and reliability in order to do better choices • This (sub)system should use a “Trust and Reliability Function” that implements some kind of Trust Metrics
An Adaptive system • With a rating system, the controller can “follow” the environment’s changes, adopting : • dynamic criteria (for example, “delegation of tasks to reliable peers” is dynamic because it means delegating or revoking tasks, according to changes in peers’ reliability) • multiple policies (by knowing peers’ behaviour and according to how much dynamic the environment is, the controller can change its policies)
Architecture principles • Peers should be a cut-down version of the centralized controller • Architecture should be modular
High level architecture • Information base : basic information module and rating information module • Monitoring module • Rating module • Engines for testing, storage, deletion, and retrieval • Registration module • keys and identities manager • Communication manager
Architecture “Intelligent” components Engines (store, delete, retrieve, etc …) Communication Manager
Information base Architecture Policy-based and “planning” components May influence May update Engines Interaction with peers (via communication manager) Monitoring
Monitoring module architecture List of tasks Tasks manager From/to engines requests Generator Delegation manager From/to information base Scheduler
Rating module architecture Rating information db Trust function Information on peers’ behaviour queries “events” generator notifications
Security solutions • Identity certificates (central controller acts as a CA, but there is not a fully deployed PKI) • Secure communications (SSL like) • Delegation based on a SPKI model
Work done • System architecture design • Mid-term HP Labs report, accepted by VIII IEEE Workshop FTDCS ’01 • Skeleton prototype implemented
Trusted Not trusted Trusted Trusted Not trusted Not trusted Future work : inter-enterprise
Conclusions • Trust and Trust Assessment are an important issue for P2P applications, and in general for new trust services • Our approach : • guarantees long-term survivability, confidentiality and integrity of e-records • is modular • is adaptive to trust and reliability assessment