Monday, July 9, 2007

Using Randomized Techniques to Build Scalable Intrusion-Tolerant Overlay Networks.

By R. Renesse
In this paper, Fireflies, a scalable protocol for supporting intrusion-tolerant overlay network is proposed.

First, this paper pointed that DHT is not secure and efficient although it is popular.
Firefly has a complete view of its live peers and it has four randomization techniques.
(1) a broadcast channel based on gossip
(2)a limit membership views for gossip
(3)a membership protocol
(4)an adaptive failure detection protocol

In conclusion, fireflies can tolerate Byzantine memebers and used as an intrusion-tolerant DHT supporting data sharing??

limitation:
The detail of fireflies protocol is not discussed.
Overhead of communication and verification need to be considered. How to decrease that overhead?

No comments: