Membership Protocols for the iTrust Network

Authors

  • Yung Ting Chuang Department of Electrical and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93106 USA
  • Peter M. Melliar Smith Department of Electrical and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93106 USA
  • Louise E Moser Department of Electrical and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93106 USA
  • Isai Michel Lombera Department of Electrical and Computer Engineering University of California, Santa Barbara Santa Barbara, CA 93106 USA

DOI:

https://doi.org/10.14738/tnc.32.1166

Keywords:

Membership protocol, Membership churn, Information publication, search and retrieval, Peer-to-peer network

Abstract

The iTrust system is a decentralized and distributed system for information publication, search and retrieval over the Internet, which is designed to make it difficult to censor or filter information.  In this paper, we present four membership protocols for the iTrust network, namely, the non-adaptive, retry, adaptive and combined adaptive membership protocols.  We compare the performance of these membership protocols, with respect to four performance metrics, namely, membership accuracy, match probability, response time and message cost, for various parameter values when the membership churn is high and when the membership is stable.

References

. Badger, C.M., L.E. Moser, P.M. Melliar-Smith, I. Michel Lombera, Y.T. Chuang, Declustering the iTrust search and retrieval network to increase trustworthiness. Proceedings of the 8th International Conference on Web Information Systems and Technologies, Porto, Portugal, April 2012: p. 312-322.

. Chandra, T.D., V. Hadzilacos, S. Toueg, B. Charron-Bost, On the impossibility of group membership. Proceedings of the 15th ACM Symposium on Principles of Distributed Computing, Philadelphia PA, May 1996: p. 322-330.

. Chockler, G.V., I. Keidar, R. Vitenberg, Group communication specifications: A comprehensive study. ACM Computing Surveys, 2001. 33(4): p. 427-469.

. Chuang, Y.T., P.M. Melliar-Smith, L.E. Moser, I. Michel Lombera, Discovering joining nodes and detecting leaving nodes in the iTrust membership protocol. Proceedings of the 2013 IAENG International Conference on Computer Science, Hong Kong, China, March 2013: p. 189-194.

. Chuang,Y.T., I. Michel Lombera, L.E. Moser, P.M. Melliar-Smith, Trustworthy distributed search and retrieval over the Internet. Proceedings of the International Conference on Internet Computing, Las Vegas, NV, July 2011: p. 169-175.

. Clarke, I., O. Sandberg, B. Wiley, T. Hong, Freenet: A distributed anonymous information storage and retrieval system. Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2001: p. 46-66.

. Cuenca-Acuna, F.M., C.Peery, R.P. Martin, T.D. Nguyen, PlanetP: Using gossiping to build content addressable peer-to-peer information sharing communities. Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing, Seattle, WA, June 2003: p. 236-246.

. Freedman, M.J. and R. Morris, Tarzan: A peer-to-peer anonymizing network layer. Proceedings of the 9th ACM Conference on Computer and Communications Security, Scottsdale, AZ, November 2014: p. 193-206.

. Ganesh, A., A.M. Kermarrec, L. Massoulie, Peer-to-peer membership management for gossip-based protocols. IEEE Transactions on Computers, February 2003. 52(2) : p. 139-149.

. Gnutella, http://en.wikipedia.org/wiki/Gnutella (2000).

. Gramoli, V., A.M. Kermarrec, E. Le Merrer, Distributed churn measurement in arbitrary networks. Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, Toronto, Canada, August 2008: p. 431.

. Leng, C., W.W. Terpstra, B. Kemme, W. Stannat, A.P. Buchmann, Maintaining replicas in unstructured P2P systems. Proceedings of the ACM Conference on Emerging Networking Experiments and Technologies, Madrid, Spain, December 2008: p. 19.

. Liu, H., X. Liu, W. Song, W. Wen, An age-based membership protocol against strong churn in unstructured P2P networks. Proceedings of the 2011 International Conference on Network Computing and Information Security, vol. 2, Guilin, China, May 2011: p. 195-200.

. Lv, Q., P. Cao, E. Cohen, R. Li, S. Shenker, Search and replication in unstructured peer-to-peer networks. Proceedings of the 16th International Conference on Supercomputing, Baltimore, MD, June 2002: p. 84-95.

. Melliar-Smith, P.M., L.E. Moser, I. Michel Lombera, Y.T. Chuang, iTrust: Trustworthy information publication, search and retrieval. Proceedings of the 13th International Conference on Distributed Computing and Networking, LNCS 7129, Hong Kong, China, January 2012: p. 351-366.

. Michel Lombera, I., Y.T. Chuang, P.M. Melliar-Smith, L.E. Moser, Trustworthy distribution and retrieval of information over HTTP and the Internet. Proceedings of the 3rd International Conference on the Evolving Internet, Luxembourg City, Luxembourg, June 2011: p. 7-13.

. Mischke, J., and B. Stiller, A methodology for the design of distributed search in P2P middleware, IEEE Network, 2004. 18 (1): p. 30-37.

. Peng, P., L.E. Moser, P.M. Melliar-Smith, Y.T. Chuang, I. Michel Lombera, A distributed ranking algorithm for the iTrust information search and retrieval system. Proceedings of the 9th International Conference on Web Information Systems and Technologies, Aachen, Germany, May 2013: p. 199-208.

. Pruteanu, A., V. Iyer, S. Dulman, ChurnDetect: A gossip-based churn estimator for large-scale dynamic networks. Proceedings of the Euro-Par 2011 Conference, LNCS 7155, Bordeaux, France, August 2011: p. 289-301.

. Reiter, M.K.. and A.V. Rubin, Crowds: Anonymity for Web transactions. ACM Transactions on Information and System Security, November 1998. 2 (1): p. 66-92.

. Richardson, S. and I.J. Cox, Estimating global statistics for unstructured P2P search in the presence of adversarial peers. Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval, Gold Coast, Queensland, Australia, July 2014: p. 203-212.

. Schiper, A. and S. Toueg, From set membership to group membership: A separation of concerns. IEEE Transactions on Dependable and Secure Computing, 2006. 3(1): p. 2-12.

. Terpstra, W.W., J. Kangasharju, C. Leng, A.P. Buchmann, Bubblestorm: Resilient, probabilistic, and exhaustive peer-to-peer search. Proceedings of the ACM Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, Kyoto, Japan, August 2007: p. 49-60.

. Voulgaris, S., D. Gavidia, M. Van Steen, CYCLON: Inexpensive membership management for unstructured P2P overlays. Journal of Network and Systems Management, June 2005. 13(2): p. 197-217.

. Zage, D., C. Livadas, E.M. Schooler, A network-aware distributed membership protocol for collaborative defense. Proceedings of the International Conference on Computational Science and Engineering, vol. 4, 2009: p. 1123-1130.

Downloads

Published

2015-05-02

How to Cite

Chuang, Y. T., Smith, P. M. M., Moser, L. E., & Lombera, I. M. (2015). Membership Protocols for the iTrust Network. Discoveries in Agriculture and Food Sciences, 3(2), 133. https://doi.org/10.14738/tnc.32.1166