94
Censorship Resistant Peer-to-Peer Content Addressable Networks the idea of A. Fiat and J. Saia Pascal Minnerup Ferienakademie im Sarntal 2008 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2008

Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Censorship Resistant Peer-to-Peer ContentAddressable Networksthe idea of A. Fiat and J. Saia

Pascal Minnerup

Ferienakademie im Sarntal 2008FAU Erlangen-Nürnberg, TU München, Uni Stuttgart

September 2008

Page 2: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 2 / 64

Page 3: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 3 / 64

Page 4: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Security ThreatsWhy Peer-to-Peer networks are being attacked

Why are Peer-to-Peer networks being attacked?

Legal attacks (because of copyright violation)

Napster file sharing system

Totalitarian regimes hide dissident informationReputationRandom Faults

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 4 / 64

Page 5: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Security ThreatsWhy Peer-to-Peer networks are being attacked

Why are Peer-to-Peer networks being attacked?Legal attacks (because of copyright violation)

Napster file sharing system

Totalitarian regimes hide dissident informationReputationRandom Faults

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 4 / 64

Page 6: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Security ThreatsWhy Peer-to-Peer networks are being attacked

Why are Peer-to-Peer networks being attacked?Legal attacks (because of copyright violation)

Napster file sharing system

Totalitarian regimes hide dissident informationReputationRandom Faults

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 4 / 64

Page 7: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Security ThreatsWhy Peer-to-Peer networks are being attacked

Why are Peer-to-Peer networks being attacked?Legal attacks (because of copyright violation)

Napster file sharing system

Totalitarian regimes hide dissident information

ReputationRandom Faults

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 4 / 64

Page 8: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Security ThreatsWhy Peer-to-Peer networks are being attacked

Why are Peer-to-Peer networks being attacked?Legal attacks (because of copyright violation)

Napster file sharing system

Totalitarian regimes hide dissident informationReputation

Random Faults

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 4 / 64

Page 9: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Security ThreatsWhy Peer-to-Peer networks are being attacked

Why are Peer-to-Peer networks being attacked?Legal attacks (because of copyright violation)

Napster file sharing system

Totalitarian regimes hide dissident informationReputationRandom Faults

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 4 / 64

Page 10: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Types of Attack

Who attacks?

RandomEnemy

How does he attack?

Disabling some PeersSending wrong messages

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 5 / 64

Page 11: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Types of Attack

Who attacks?RandomEnemy

How does he attack?

Disabling some PeersSending wrong messages

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 5 / 64

Page 12: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Types of Attack

Who attacks?RandomEnemy

How does he attack?Disabling some PeersSending wrong messages

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 5 / 64

Page 13: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 6 / 64

Page 14: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Byzantine Generals

Model problem for peer-to-peer networksRefers to generals of the eastern roman empireSome generals wanted to become emporer themselves andtherefore did not obey their ordersThree generals siege a townIf they want to win, at least two generals have to do the same: waitor attackThey have to agree what to doOne general deserted to the enemy town

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 7 / 64

Page 15: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Byzantine Faults3 Gererals

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 8 / 64

Page 16: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Byzantine Faults3 Gererals

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 9 / 64

Page 17: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Byzantine Faults4 Gererals

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 10 / 64

Page 18: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Byzantine Faults4 Gererals

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 11 / 64

Page 19: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Network of Amos Fiat and Jared Saia

Amos Fiat and Jared Saia presented a new kind of network

Censorship resistant: Robust against some possible attacksaiming to reduce the data availabilityContent addressable:

Uses distributed hashtablesSearch can be performed using the hashcode of the data item

Resistant against deletion of peersModification also resistant against sending wrong messages(spam resistance)

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 12 / 64

Page 20: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Network of Amos Fiat and Jared Saia

Amos Fiat and Jared Saia presented a new kind of networkCensorship resistant: Robust against some possible attacksaiming to reduce the data availability

Content addressable:Uses distributed hashtablesSearch can be performed using the hashcode of the data item

Resistant against deletion of peersModification also resistant against sending wrong messages(spam resistance)

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 12 / 64

Page 21: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Network of Amos Fiat and Jared Saia

Amos Fiat and Jared Saia presented a new kind of networkCensorship resistant: Robust against some possible attacksaiming to reduce the data availabilityContent addressable:

Uses distributed hashtablesSearch can be performed using the hashcode of the data item

Resistant against deletion of peersModification also resistant against sending wrong messages(spam resistance)

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 12 / 64

Page 22: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Network of Amos Fiat and Jared Saia

Amos Fiat and Jared Saia presented a new kind of networkCensorship resistant: Robust against some possible attacksaiming to reduce the data availabilityContent addressable:

Uses distributed hashtablesSearch can be performed using the hashcode of the data item

Resistant against deletion of peersModification also resistant against sending wrong messages(spam resistance)

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 12 / 64

Page 23: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Butterfly Network

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 13 / 64

Page 24: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 14 / 64

Page 25: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Creation of the network

Each peer choosesC top supernodes, C bottom supernodes and C log n middlesupernodesFor each supernode it is part of:D nodes in the neighboring supernodes to which it connectsT top supernodes where searches are started later

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 15 / 64

Page 26: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Supernodes - Connection

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 16 / 64

Page 27: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Properties

Half of the participating peers can be deleted without changing thefollowing properties:

Theorem (3.1.)For all ε > 0, there exist constants k1(ε), k2(ε), k3(ε) which depend onlyon ε such that

Every node requires k1 (ε) log n memorySearch for a data item takes no more than k2 (ε) log n timeSearch for a data item requires no more than k3 (ε) log2 nmessagesAll but εn nodes can reach all but εn data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 17 / 64

Page 28: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Properties

Half of the participating peers can be deleted without changing thefollowing properties:

Theorem (3.1.)For all ε > 0, there exist constants k1(ε), k2(ε), k3(ε) which depend onlyon ε such that

Every node requires k1 (ε) log n memorySearch for a data item takes no more than k2 (ε) log n timeSearch for a data item requires no more than k3 (ε) log2 nmessagesAll but εn nodes can reach all but εn data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 17 / 64

Page 29: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Properties

Half of the participating peers can be deleted without changing thefollowing properties:

Theorem (3.1.)For all ε > 0, there exist constants k1(ε), k2(ε), k3(ε) which depend onlyon ε such that

Every node requires k1 (ε) log n memory

Search for a data item takes no more than k2 (ε) log n timeSearch for a data item requires no more than k3 (ε) log2 nmessagesAll but εn nodes can reach all but εn data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 17 / 64

Page 30: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Properties

Half of the participating peers can be deleted without changing thefollowing properties:

Theorem (3.1.)For all ε > 0, there exist constants k1(ε), k2(ε), k3(ε) which depend onlyon ε such that

Every node requires k1 (ε) log n memorySearch for a data item takes no more than k2 (ε) log n time

Search for a data item requires no more than k3 (ε) log2 nmessagesAll but εn nodes can reach all but εn data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 17 / 64

Page 31: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Properties

Half of the participating peers can be deleted without changing thefollowing properties:

Theorem (3.1.)For all ε > 0, there exist constants k1(ε), k2(ε), k3(ε) which depend onlyon ε such that

Every node requires k1 (ε) log n memorySearch for a data item takes no more than k2 (ε) log n timeSearch for a data item requires no more than k3 (ε) log2 nmessages

All but εn nodes can reach all but εn data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 17 / 64

Page 32: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Properties

Half of the participating peers can be deleted without changing thefollowing properties:

Theorem (3.1.)For all ε > 0, there exist constants k1(ε), k2(ε), k3(ε) which depend onlyon ε such that

Every node requires k1 (ε) log n memorySearch for a data item takes no more than k2 (ε) log n timeSearch for a data item requires no more than k3 (ε) log2 nmessagesAll but εn nodes can reach all but εn data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 17 / 64

Page 33: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Creation of the network

Each data item is hashed to B bottom supernodes

Network can be created in a fully distributed fashionRequires n2 messagesEach peer

chooses its supernodes randomlyInforms all other peers which supernodes it belongs toConnects to nodes of neighboring supernodes

Finally delete supernodes with too few or too many nodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 18 / 64

Page 34: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Creation of the network

Each data item is hashed to B bottom supernodesNetwork can be created in a fully distributed fashionRequires n2 messages

Each peerchooses its supernodes randomlyInforms all other peers which supernodes it belongs toConnects to nodes of neighboring supernodes

Finally delete supernodes with too few or too many nodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 18 / 64

Page 35: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Creation of the network

Each data item is hashed to B bottom supernodesNetwork can be created in a fully distributed fashionRequires n2 messagesEach peer

chooses its supernodes randomlyInforms all other peers which supernodes it belongs toConnects to nodes of neighboring supernodes

Finally delete supernodes with too few or too many nodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 18 / 64

Page 36: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Creation of the network

Each data item is hashed to B bottom supernodesNetwork can be created in a fully distributed fashionRequires n2 messagesEach peer

chooses its supernodes randomlyInforms all other peers which supernodes it belongs toConnects to nodes of neighboring supernodes

Finally delete supernodes with too few or too many nodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 18 / 64

Page 37: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Size of the networkButterfly graph

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 19 / 64

Page 38: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Size of the networkSize of a supernode

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 20 / 64

Page 39: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Size of the network

n nodes and data items(log n − log log n) depth (nodes per column)

nlog n width (nodes per row)

(log n) nodes per super node

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 21 / 64

Page 40: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 22 / 64

Page 41: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Launching a searchExample

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 23 / 64

Page 42: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Launching a searchDescription

Starts in all T top supernodes the peer has connected toEach peer in each such supernode is informedEach peer passes the message to all connected peers in the nextsupernode down the butterfly pathThe peers in the bottom supernode return the data item up thesame pathIf not successful, the procedure is repeated for all bottomsupernodes containing the data item

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 24 / 64

Page 43: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Launching a searchPassing the message

Each row shows the nodes of one supernode on the path of theprevious page

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 25 / 64

Page 44: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 26 / 64

Page 45: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof overview

Steps of the Proof:

1 Show that most supernodes are good2 Show that most paths are good3 Show that a search using only good paths works4 Show that most peers can reach nearly all data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 27 / 64

Page 46: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof overview

Steps of the Proof:1 Show that most supernodes are good

2 Show that most paths are good3 Show that a search using only good paths works4 Show that most peers can reach nearly all data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 27 / 64

Page 47: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof overview

Steps of the Proof:1 Show that most supernodes are good2 Show that most paths are good

3 Show that a search using only good paths works4 Show that most peers can reach nearly all data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 27 / 64

Page 48: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof overview

Steps of the Proof:1 Show that most supernodes are good2 Show that most paths are good3 Show that a search using only good paths works

4 Show that most peers can reach nearly all data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 27 / 64

Page 49: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof overview

Steps of the Proof:1 Show that most supernodes are good2 Show that most paths are good3 Show that a search using only good paths works4 Show that most peers can reach nearly all data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 27 / 64

Page 50: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

ProofShow that most supernodes are good

Show that most supernodes are goodA supernode is considered good, if it still contains Θ (log n) livenodesIf you remove half nodes in each supernode this is still the caseThe formal proof has to show that a deletion of peers leads to amediocre deletion of nodes equally in all supernodes, but not to abig deletion in a large group of supernodesAdditionally no supernode may contain too many child nodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 28 / 64

Page 51: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

ProofShow that most paths are good

Show that most paths are goodOnly few supernodes are ’bad’ supernodesThe formal proof has to show that most paths do not use thesesupernodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 29 / 64

Page 52: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

ProofShow that a search using only good paths works

Show that a search using only good paths worksProof uses the expander properties

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 30 / 64

Page 53: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

ProofShow that most peers can reach nearly all data items

Show that most peers can reach nearly all data itemsOnly missing aspect: Show that most peers are connected to theworking paths

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 31 / 64

Page 54: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof overview - Repetition

Steps of the Proof:1 Show that most supernodes are good2 Show that most paths are good3 Show that a search using only good paths works4 Show that most peers can reach nearly all data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 32 / 64

Page 55: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 33 / 64

Page 56: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Necessary Modifications

Spamming in this context means to send wrong messages

Instead of a constant number connections each node connects toall nodes in the neighboring supernodeEach node passes the message it receives by the majority ofother nodesThe fraction of adversarial controlled nodes must be strictly lessthan 50%

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 34 / 64

Page 57: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Necessary Modifications

Spamming in this context means to send wrong messagesInstead of a constant number connections each node connects toall nodes in the neighboring supernode

Each node passes the message it receives by the majority ofother nodesThe fraction of adversarial controlled nodes must be strictly lessthan 50%

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 34 / 64

Page 58: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Necessary Modifications

Spamming in this context means to send wrong messagesInstead of a constant number connections each node connects toall nodes in the neighboring supernodeEach node passes the message it receives by the majority ofother nodes

The fraction of adversarial controlled nodes must be strictly lessthan 50%

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 34 / 64

Page 59: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Necessary Modifications

Spamming in this context means to send wrong messagesInstead of a constant number connections each node connects toall nodes in the neighboring supernodeEach node passes the message it receives by the majority ofother nodesThe fraction of adversarial controlled nodes must be strictly lessthan 50%

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 34 / 64

Page 60: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Spam Resistant Content Addressable NetworkExample

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 35 / 64

Page 61: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Overview

1 IntroductionReasons and types of attacksByzantine Generals

2 Network of Amos Fiat and Jared SaiaProperties of the NetworkLaunching a search

3 ProofProof overview

4 Final ThoughtsSpam Resistant Content Addressable NetworkAlternatives and open problems

5 Appendix

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 36 / 64

Page 62: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Alternatives

The presented network works without encryptionAlternatives to this approach would be:

Access controlEncryption and signatures

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 37 / 64

Page 63: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Open problems of the paper

A. Fiat and J. Saia finished their paper with some open problems:Is there a mechanism for dynamically maintaining our networkwhen large numbers of nodes are deleted or added to thenetwork?

According to his own words Mayur Datar solved this problem.His approach is a multi butterfly network

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 38 / 64

Page 64: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Open problems of the paper

A. Fiat and J. Saia finished their paper with some open problems:Is there a mechanism for dynamically maintaining our networkwhen large numbers of nodes are deleted or added to thenetwork?

According to his own words Mayur Datar solved this problem.His approach is a multi butterfly network

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 38 / 64

Page 65: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

1st problemSecond question

Is it possible to reduce the number of messages that are sent in asearch for a data item from O(log2 n) to O(log n)?

Mayur Datar solved this problem, too (according to his own words)Additionally each peer in his network only requires O(1) instead ofO(log n) memoryThe data availability degrades with the number of adversarialdeletions. In the CRN some data items might be not available evenif there is no enemy action

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 39 / 64

Page 66: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

1st problemSecond question

Is it possible to reduce the number of messages that are sent in asearch for a data item from O(log2 n) to O(log n)?

Mayur Datar solved this problem, too (according to his own words)Additionally each peer in his network only requires O(1) instead ofO(log n) memoryThe data availability degrades with the number of adversarialdeletions. In the CRN some data items might be not available evenif there is no enemy action

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 39 / 64

Page 67: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

2nd problem

2. Can one improve on the construction for the spam resistantcontent addressable network?

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 40 / 64

Page 68: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

3rd problem

Can one deal efficiently with more general Byzantine faults? Forexample, the adversary could use nodes under his control to floodthe network with irrelevant searches, this is not dealt with by eitherof our solutions.

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 41 / 64

Page 69: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

The Economics of Censorship Resistance

Alternative to CRN: The Economics of Censorship ResistanceData items are stored randomly in the CRNIt perhaps makes more sense if everybody stores the informationhe is interested inGeorge Danezis and Ross Anderson present such a solution in"The Economics of Censorship Resistance"

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 42 / 64

Page 70: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Conclusion

You can delete half of the nodes and the network will still work

With little modifications the network also achieves spamresistance

Outlook

Are there any real networks using this model?How can spam resistant networks be made more efficient?

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 43 / 64

Page 71: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Conclusion

You can delete half of the nodes and the network will still workWith little modifications the network also achieves spamresistance

Outlook

Are there any real networks using this model?How can spam resistant networks be made more efficient?

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 43 / 64

Page 72: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Conclusion

You can delete half of the nodes and the network will still workWith little modifications the network also achieves spamresistance

OutlookAre there any real networks using this model?

How can spam resistant networks be made more efficient?

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 43 / 64

Page 73: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Conclusion

You can delete half of the nodes and the network will still workWith little modifications the network also achieves spamresistance

OutlookAre there any real networks using this model?How can spam resistant networks be made more efficient?

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 43 / 64

Page 74: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Appendix

AppendixIn the Appendix the single Lemmas are being explained

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 44 / 64

Page 75: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Explanation of the parameters

Most of the following lemmas make use of the same parameters. Thenames of the parameters are:

l: The left side of the bipartite graphr: The right side of the bipartite graphl’: Subgroup of the left sider’: Subgroup of the right sided: Degree of the nodes. (Number of nodes it is connected to)n: Number of nodes in the whole graph and number of data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 45 / 64

Page 76: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Explanation of the parameters - continuation

Greek letters are used as factors which are multiplied with other values

λ: Only used in Lemma 4.2.α: Lower bound of allowed nodes per supernode. It is a factor ofthe average amount of nodes per supernode.β: Upper bound of allowed nodes per supernode.γ: Part of bottom supernodes that can be reached by a topsupernodeδ: Factor indicating wrong working supernodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 46 / 64

Page 77: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.1Preparing Lemma 4.2.

Lemma 4.1.Let l,r,l’,d and n be any positive values where l ′ ≤ r andd ≥ r

r ′l ′(l ′ln( le

l ′)

+ r ′ln( re

r ′

)+ 2ln n

)Let G bei a random bipartite multigraph with left side L and rightside R where |L| = l and |R| = r and each node in L has edges tod random neigbours in R. Then with probability at least 1− 1

n2 , anysubset of L of size l’ shares an edge with any subset of R of size r’.

Relevance of Lemma 4.1General Lemma for bipartite graphsLater used to show facts about the allocation of peersOnly one connection guaranteed

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 47 / 64

Page 78: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.2.Preparing Lemma 4.4.

Lemma 4.2.Let l,r,l’,r’,d,λ and n be any positive values wherel ′ ≤ l , r ′ ≤ r ,0 < λ < 1 andd ≥ 2r

r ′l ′(1−λ)2

(l ′ ln

( lel ′)

+ r ′ ln( re

r ′

)+ 2 ln n

)Let G be a random bipartite multigraph with left side L and rightside R where ILl = l and IRI = r and each node in L has edges to drandom neighbors in R. Then with probability at least 1− 1

n2 , forany set L’ ⊂ L where |L′| = l ′, there is no set R’ ⊂ R, where|R′| = r ′ such that all nodes in R’ share less than λl’d/r edges withL’.

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 48 / 64

Page 79: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.2.Relevance of Lemma 4.2.

Relevance of Lemma 4.2.Modifies Lemma 4.1. for the use in this proofNot only one connection, but a certain amount depending onparameters is guaranteedLater used in order to show that there are enough nodes in asupernode

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 49 / 64

Page 80: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.3.Preparing Lemma 4.5 and 4.7.

Lemma 4.3.Let l, r, r’, d, β′ and n be any positive values where l ′ ≤ l ,β′ > 1and d ≥ 4r

r ′l(β′−1)2

(r ′ ln

( rer ′

)+ 2 ln n

)Let G be a random bipartite multigraph with left side L and rightside R where |L| = l and |R| = r and each node in L has edges tod random neighbors in R. Then with probability at least 1− 1

n2 ,there is no set R′ ⊂ R,where |R′| = r ′ such that all nodes in R’have degree greater than β′ld/r .

Relevance of Lemma 4.3.Prepares Lemma 4.5. and 4.7.Used in order to show that there are not too many nodes in asupernode

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 50 / 64

Page 81: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.4.(α, β)-good supernodes

Lemma 4.4.Let α, δ′, n be values where α < 1/2 and δ′ > 0 and let k(δ′, α) bea value that depends only on α, δ′ and assume n is sufficientlylarge. Let each node participate in k(δ′, α)In n random middlesupernodes. Then removing any set of n/2 nodes still leaves allbut δ’n/ In n middle supernodes with at least αk(δ′, α) In n livenodes.

Relevance of Lemma 4.4.Most of the middle supernodes have enough living nodes in themIf they do not have too many nodes they are also (α, β)-goodΘ( n

ln n

)bad supernodes << n middle supernodes in total

(α, β)-good means that there are not too many and not too fewnodes in the supernode

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 51 / 64

Page 82: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof of Lemma 4.4.

Prior considerationsEach peer is connected to k(δ′, α)In n middle supernodesThis connection could be pictured as a bipartite graph with thepeers on the left side and the supernodes on the right side.In Lemma 4.2. we showed that under certain conditions there isno subgroup of the right side with less than λl ′d

r edgesThis subgroup would be the group with too few living nodes⇒We just have to find the right values for the parametersl,r,l’,r’,d,λ and n

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 52 / 64

Page 83: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Proof of Lemma 4.4.Calculation

The right values are:l = n, l ′ = n

2 , r = n, r ′ = δ′nln n , λ = 2α and d = k (δ′, α) ln n

Insertion in Lemma 4.2.:d ≥ 2r

r ′l ′(1−λ)2

(l ′ ln

( lel ′)

+ r ′ ln( re

r ′

)+ 2 ln n

)d ≥ 2n

δ′nln n

n2 (1−2α)2

(n2 ln

(nen2

)+ δ′n

ln n ln(

neδ′nln n

)+ 2 ln n

)d ≥ 4ln n

δ′n(1−2α)2

(n2 ln 2e + δ′n

ln n ln(e ln n

δ′

)+ 2 ln n

)d ≥ ln n

[2 ln 2e

δ′(1−2α)2 + 4δ′(1−2α)2

(δ′+δ′ln ln n+δ′ln δ′

ln n + 2 ln nn

)]d ≥ ln n

[2 ln 2e

δ′(1−2α)2 + o(1)]

⇒ k (δ′, α) ≥ 2 ln 2eδ′(1−2α)2 + o(1)

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 53 / 64

Page 84: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.5.Most middle Supernodes do not have too many nodes

Lemma 4.5.Let β, δ′,n,k be values such that β > 1, δ′ > 0 and assume n issuffciently large. Let each node participate in k ln n of the middlesupernodes, chosen uniformly at random. Then all but δ′n/ln nmiddle supernodes have less than βk ln n participating nodes withprobability at least 1− 1

n2 .

Relevance of Lemma 4.5.Most middle supernodes do not have too many nodesTogether with Lemma 4.4. we know that most middle supernodesare (α, β)-good

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 54 / 64

Page 85: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.6.Top and bottom supernodes have enough live nodes

Lemma 4.6.Let α, δ′,n be values such that α < 1

2 , δ′ > 0 and let k(δ′, α) be avalue that depends only on δ′ and α and assume n is sufficientlylarge. Let each node participate in k(δ′, α) top (bottom)supernodes. Then removing any set of n

2 nodes still leaves all butδ′nln n top (bottom) supernodes with at least αk(δ′, α) ln n live nodes.

Relevance of Lemma 4.6.Most top and bottom supernodes have enough live nodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 55 / 64

Page 86: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.7.

Lemma 4.7.Let β, δ′,n,k be values such that β > 1, δ′ > 0 and n is sufficientlylarge. Let each node participate in k of the top (bottom)supernodes (chosen uniformly at random). Then all but δ′n

ln n top(bottom) supernodes consist of less than βk ln n nodes withprobability at least 1− 1

n2 .

Relevance of Lemma 4.7.Most top and bottom supernodes do not consist of too manynodesTogether with Lemma 4.6. we know that Most top and bottomsupernodes are (α, β)-goodTogether with Lemma 4.4 and 4.5 we know that most of allsupernodes are (α, β)-good

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 56 / 64

Page 87: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Corollary 4.1.

Corollary 4.1.Let β, δ′,n, k be values such that β > 1, δ′ > 0 and n is sufficientlylarge. Let each data item be stored in k of the bottom supernodes(chosen uniformly at random). Then all but δ′n

ln n bottomsupernodes have less than βk ln n data items stored on them withprobability at least 1− 1

n2 .

Relevance of Corollary 4.1.Most of the bottom supernodes do not have too many data itemsstored on themEquates to Lemma 4.7.

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 57 / 64

Page 88: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Corollary 4.2.

Corollary 4.2.Let δ′ > 0, α < 1

2 , β > 1. Let k(δ′, α), be a value depending only onδ′ and assume n is sufficiently large. Let each node appear ink(δ′, α) top supernodes, k(δ′, α) bottom supernodes and k(δ′, α) Inn middle supernodes. Then all but δ′n of the supernodes are(αk (δ′, α) , βk (δ′, α))-good with probability 1 - O( 1

n2 ).Relevance of Corollary 4.2.

Puts the previous Lemmas togetherMost supernodes are (α, β)-goodPrepares Theorem 4.1.

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 58 / 64

Page 89: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Theorem 4.1

Definition 4.4.A top supernode is called (γ, α, β)-expansive if there exist γn

log n(α, β)-good paths that start at this supernode.

Theorem 4.1.Let δ > 0, α < 1

2 ,0 < γ < 1, β > 1. Let k(δ, α, γ) be a valuedepending only on δ, α, γ and assume n is sufficiently large. Leteach node participate in k(δ, α, γ) top supernodes, k(δ, α, γ)bottom supernodes and k(δ, α, γ) In n middle supernodes. Thenall but δn

ln n top supernodes are(γ, αk (δ, α, γ) , βk (δ, α, γ))-expansive with probability 1 - O( 1

n2 ).

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 59 / 64

Page 90: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Theorem 4.1.Most Peers can reach most of the data items

Relevance of Theorem 4.1.Most top supernodes can use nearly n

log n paths

There are nlog n bottom supernodes

Most top supernodes can reach most bottom supernodesThe bottom supernodes contain the data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 60 / 64

Page 91: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.8.

Lemma 4.8.Let δ > 0, ε > 0 and n be suffciently large. Then exists a constantk(δ, ε) depending only on ε and δ such that if each node connectsto k(δ, ε) random top supernodes then with high probability, anysubset of the top supernodes of size (1−δ)n

ln n can be reached by atleast (1− ε)n nodes.

Relevance of Lemma 4.8.Most peers can reach at least one (γ, α, β)-expansive topsupernodeMost peers can reach most bottom supernodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 61 / 64

Page 92: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.9.

Lemma 4.9.Let γ,n, ε be any positive values such that ε > O, γ > O. Thereexists a k(ε, γ) which depends only on ε, γ such that if each bottomsupernode holds k(ε, γ)ln n random data items, then any subset ofbottom supernodes of size γn

ln n holds (1− ε)n unique data items.

Relevance of Lemma 4.9.Most of the data items are mapped to some bottom supernodeswhich can be reached by the top supernodesTogether with the previous Lemmas, we know that most peers canreach most data items using only (α, β)-good supernodes

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 62 / 64

Page 93: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.10.Connection between (α, β)-good supernodes

Lemma 4.10.Let α, β, α′,n be any positive values where α′ < α,α > 0 and let Cbe the number of supernodes to which each node connects. Let Xand Y be two supernodes that are both (αC, βC)-good. Let eachnode in X have edges to k(α, β, α′) random nodes in Y wherek(α, β, α′) is a value depending only on α, β and α′. Then withprobability at least 1− 1

n2 , any set of α′C ln n nodes in X has atleast α′C ln n live neighbors in Y.

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 63 / 64

Page 94: Censorship Resistant Peer-to-Peer Content Addressable Networks€¦ · Napster file sharing system Totalitarian regimes hide dissident information Reputation Random Faults P. Minnerup

Lemma 4.10.

Relevance of Lemma 4.10.A path consisting only of (α, β)-good supernodes grantsconnection between both ends with high propabilityTogether with the previous Lemmas we can now say that most ofthe peers can reach most of the data items even after half of thenodes have been deleted

The proof is finished:The network is robust against the deletion of half of the peersMost peers can still reach most data items

P. Minnerup (Ferienakademie Sarntal 2008) Sept. 2008 64 / 64