PIC: practical Internet coordinates for distance estimation
read more
Citations
Review: A survey on security issues in service delivery models of cloud computing
A survey and comparison of peer-to-peer overlay network schemes
Vivaldi: a decentralized network coordinate system
Restful web services vs. "big"' web services: making the right architectural decision
Toward Secure and Dependable Storage Services in Cloud Computing
References
A simplex method for function minimization
Chord: A scalable peer-to-peer lookup service for internet applications
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
A scalable content-addressable network
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
Related Papers (5)
Frequently Asked Questions (12)
Q2. What is the way to determine the accuracy of a structured overlay?
Structured overlays conform to a specific graph structure that allows them to route in O(log N) hops while maintaining at most O(log N) routing state where N is the number of nodes in the overlay.
Q3. How does the joining node use the random strategy?
A joining node starts by using PIC with the random strategy to generate a rough estimate of its coordinates from a set of random overlay nodes.
Q4. What is the effect of landmarks on the system?
These landmarks can limit the scalability of the system if they become communication bottlenecks and the system’s accuracy is very sensitive to their placement.
Q5. How much can PIC reduce the number of distance probes used in the full probing?
The results show that PIC can reduce the number of distance probes used in the full probing by almost an order of magnitude, while the filtered probing reduces it by almost a factor of two.
Q6. How many minutes can an attacker take to compute fake coordinates?
the authors give the attacker 10 minutes to compute fake coordinates and distances that maximize the error in the coordinates of the joining node.
Q7. What is the promising technique for proximity-aware routing?
It selects routing state entries for each node from among the closest nodes in the underlying topology that satisfy constraints required for overlay routing.
Q8. How many malicious nodes were obtained using the attacker model?
The lines labelled colluding attackers were obtained using the attacker model described above when 10% and 20% of the nodes in the system are malicious.
Q9. What is the difference between the two types of overlays?
each overlay hop has an expected delay equal to the average delay between a pair of random overlay nodes, which stretches route delay by a factor equal to the number of overlay hops and increases the stress in the underlying network links.
Q10. What is the function that is used to minimize the error in the coordinates of a malicious?
The authors implement the error maximizing attack using simplex to minimize the following function:f(Ca, Da) ={+∞ if ∃d ∈ Da : d < dca, 1/dist(pcorrect, p(Ca, Da)) otherwiseHere, Ca is the set of attacker coordinates, Da is the set of attacker distances to the joining node, dca is the distance from the joining node to the closest attacker, pcorrect is the correct position of the joining node, and p(Ca, Da) is the position of the joining node computed with the current values of Ca and Da (and the coordinates and distances of the correct landmarks that are all known to the attacker).
Q11. What is the way to replace the oracle?
PIC can replace the oracle by one of several algorithms that have been proposed to find the closest node to a particular node in a network, for example, [15, 2].
Q12. How many network hops can be used to find the closest nodes?
It is also interesting to note that the authors can improve the accuracy of the algorithms to find close nodes, and reduce their associated cost, by multicasting discovery messages in a range of one or two network hops.