skip to main content
10.1145/2435349.2435372acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
poster

Persea: a sybil-resistant social DHT

Published:18 February 2013Publication History

ABSTRACT

P2P systems are inherently vulnerable to Sybil attacks, in which an attacker can have a large number of identities and use them to control a substantial fraction of the system. We propose Persea, a novel P2P system that is more robust against Sybil attacks than prior approaches. Persea derives its Sybil resistance by assigning IDs through a bootstrap tree, the graph of how nodes have joined the system through invitations. More specifically, a node joins Persea when it gets an invitation from an existing node in the system. The inviting node assigns a node ID to the joining node and gives it a chunk of node IDs for further distribution. For each chunk of ID space, the attacker needs to socially engineer a connection to another node already in the system. This hierarchical distribution of node IDs confines a large attacker botnet to a considerably smaller region of the ID space than in a normal P2P system. Persea uses a replication mechanism in which each (key,value) pair is stored in nodes that are evenly spaced over the network. Thus, even if a given region is occupied by attackers, the desired (key,value) pair can be retrieved from other regions. We compare our results with Kad, Whanau, and X-Vine and show that Persea is a better solution against Sybil attacks.

References

  1. T. Cholez, I. Chrisment, and O. Festor. Evaluation of Sybil attacks protection schemes in KAD. In AIMS: Scalability of Networks and Services, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. R. Douceur. The Sybil attack. In IPTPS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. J. Kang, E. Chan-Tin, N. J. Hopper, and Y. Kim. Why Kad lookup fails. In P2P, 2009.Google ScholarGoogle Scholar
  4. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Predicting positive and negative links in online social networks. In WWW, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. In CHI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Lesniewski-Laas. A Sybil-proof one-hop DHT. In Workshop on Social Network Systems, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A Sybil-proof distributed hash table. In NSDI, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Maymounkov and D. Mazieres. Kademlia: A peer-to-peer information sytem based on the XOR metric. In IPTPS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Mittal, M. Caesar, and N. Borisov. X-Vine: Secure and pseudonymous routing in DHTs using social networks. In NDSS, 2012.Google ScholarGoogle Scholar
  10. A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In ISWC, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An analysis of social network-based Sybil defenses. In ACM SIGCOMM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against Sybil attacks. In IEEE S&P, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Persea: a sybil-resistant social DHT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacy
      February 2013
      400 pages
      ISBN:9781450318907
      DOI:10.1145/2435349
      • General Chairs:
      • Elisa Bertino,
      • Ravi Sandhu,
      • Program Chair:
      • Lujo Bauer,
      • Publications Chair:
      • Jaehong Park

      Copyright © 2013 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 February 2013

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      CODASPY '13 Paper Acceptance Rate24of107submissions,22%Overall Acceptance Rate149of789submissions,19%

      Upcoming Conference

      CODASPY '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader