post a secure resilient cooperative messaging system
play

POST: A Secure, Resilient, Cooperative Messaging System A. Mislove, - PowerPoint PPT Presentation

POST: A Secure, Resilient, Cooperative Messaging System A. Mislove, A. Post, C. Reis, P. Willmann, P. Druschel, D. S. Wallach Rice University X. Bonnaire, P. Sens, J.-M. Busca, L. Arantes-Bezerra University of Paris 6 (LIP6) HotOS 2003 1


  1. POST: A Secure, Resilient, Cooperative Messaging System A. Mislove, A. Post, C. Reis, P. Willmann, P. Druschel, D. S. Wallach Rice University X. Bonnaire, P. Sens, J.-M. Busca, L. Arantes-Bezerra University of Paris 6 (LIP6) HotOS 2003 1

  2. Motivation  Provide a generic, serverless platform for user-driven collaborative applications (email, IM, calendars, etc.)  Show that a wide range collaborative services can be supported by one serverless platform securely, with high availability  Demonstrate that p2p paradigm is mature enough to support secure, resilient, “mission-critical” applications 2

  3. POST Architecture  Provides three basic services to applications:  Secure single-copy message storage  User metadata based on single-writer logs  Event notification  These basic services are sufficient to support a variety of collaborative applications 3

  4. Sample Application: ePOST  Email service based on POST  Email is a well-understood, demanding application  Availability of realistic workloads  Interoperates seamlessly with existing email protocols and clients (IMAP, SMTP, Outlook, etc…)  Participating organizations remain autonomous  Local storage controlled by local participants by scoped insertion  Provides better spam prevention  Crypto-based message authentication and privacy  Sender overhead is proportional to the number of recipients  Receivers pull messages 4

  5. Experimental Setup  Implemented ePOST prototype  Performs well  Realistic ePOST storage requirements?  Examined email usage by ~250 members of Rice CS department  Conservative assumptions:  No deletion  Local insertion  Full replication with 10 replicas  All messages are unique 5

  6. ePOST Storage Requirements 6

  7. Status and Conclusions  Ongoing work:  We plan to begin using prototype as primary email system this summer  Answer open questions  Appropriate level of replication  Measures to ensure failure independence  Administrative cost  Also working on IM and calendar applications on POST  Related effort: p2p incentives for fair sharing of resources 7

  8. Single-copy Message Storage  Achieved using convergent encryption  Allows multiple copies of encrypted data to be coalesed X data key MD5 DES {X} H(X) 8

  9. User-specific Metadata  Based on the Ivy file system DATA n location: H(DATA n ) HEAD 1 DATA n-1 location: H(DATA n-1 ) HEAD 2 well-known location … … HEAD n DATA 1 location: H(DATA 1 ) 9

  10. User Notification  Suppose A and B want to send to C C A B 10

  11. User Notification  Suppose A and B want to send to C C A B 10

  12. User Notification  Suppose A and B want to send to C C A B 10

  13. User Notification  Suppose A and B want to send to C C A B 10

  14. User Notification  Suppose A and B want to send to C C A B 10

  15. User Notification  Suppose A and B want to send to C C A B 10

  16. User Notification  Suppose A and B want to send to C C A B 10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend