Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables

被引:9
作者
Harvesf, Cyrus [1 ]
Blough, Douglas M. [2 ]
机构
[1] Microsoft Corp, Redmond, WA 98052 USA
[2] Georgia Inst Technol, KACB, Dept Elect & Comp Engn, Atlanta, GA 30332 USA
基金
美国国家科学基金会;
关键词
Distributed systems; peer-to-peer networks; distributed hash tables; routing; replica placement; robustness; OVERLAY;
D O I
10.1109/TDSC.2009.49
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed hash tables (DHTs) share storage and routing responsibility among all nodes in a peer-to-peer network. These networks have bounded path length unlike unstructured networks. Unfortunately, nodes can deny access to keys or misroute lookups. We address both of these problems through replica placement. We characterize tree-based routing DHTs and define MAXDISJOINT, a replica placement that creates route diversity for these DHTs. We prove that this placement creates disjoint routes and find the replication degree necessary to produce a desired number of disjoint routes. Using simulations of Pastry (a tree-based routing DHT), we evaluate the impact of MAXDISJOINT on routing robustness compared to other placements when nodes are compromised at random or in a contiguous run. Furthermore, we consider another route diversity mechanism that we call neighbor set routing and show that, when used with our replica placement, it can successfully route messages to a correct replica even with a quarter of the nodes in the system compromised at random. Finally, we demonstrate a family of replica query strategies that can trade off response time and system load. We present a hybrid query strategy that keeps response time low without producing too high a load.
引用
收藏
页码:419 / 433
页数:15
相关论文
共 33 条
[1]  
Aikat J., 2003, P 3 ACM SIGCOMM C IN, P279, DOI DOI 10.1145/948205.948241
[2]  
[Anonymous], P ACM SIGCOMM AUG
[3]  
[Anonymous], 2001, ACCOUNTABILITY FOR HUMAN RIGHTS ATROCITIES IN INTERNATIONAL LAW: BEYOND THE NUREMBERG LEGACY
[4]  
[Anonymous], ACM WORKSH SEC AD HO
[5]   A novel methodology for constructing secure multipath overlays [J].
Artigas, MS ;
López, PG ;
Skarmeta, AFG .
IEEE INTERNET COMPUTING, 2005, 9 (06) :50-57
[6]  
Castro M., 2003, Operating Systems Review, V37, P298, DOI 10.1145/1165389.945474
[7]   Secure routing for structured peer-to-peer overlay networks [J].
Castro, M ;
Druschel, P ;
Ganesh, A ;
Rowstron, A ;
Wallach, DS .
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2002, :299-314
[8]  
Castro M., 1999, P OP SYST DES IMPL O
[9]  
Chen Y, 2002, LECT NOTES COMPUT SC, V2429, P306
[10]  
DABEK F, 2001, SOSP 01, P202