Advertisement

Fern: An Updatable Authenticated Dictionary Suitable for Distributed Caching

  • E. Freudenthal
  • D. Herrera
  • S. Gutstein
  • R. Spring
  • L. Longpré
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1)

Abstract

Fern is an updatable cryptographically authenticated dictionary developed to propagate identification and authorization information within distributed systems. Fern incrementally distributes components of its dictionary as required to satisfy client requests and thus is suitable for deployments where clients are likely to require only a small fraction of a dictionary’s contents and connectivity may be limited.

When dictionary components must be obtained remotely, the latency of lookup and validation operations is dominated by communication time. This latency can be reduced with locality-sensitive caching of dictionary components. Fern dictionary’s components are suitable for caching and distribution via autonomic scalable locality-aware Content Distribution Networks (CDNs) and therefore can provide these properties without requiring the provisioning of a dedicated distribution infrastructure. Competitive approaches require either the sequential transfer of two-to-three times more vertices or the replacement of a greater number of already distributed vertices when updates occur.

Keywords

binary trie authenticated dictionary distributed systems content distribution network Merkle tree 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anagnostopoulos, A., Goodrich, M., et al.: Persistent authenticated dictionaries and their applications. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, pp. 373–393. Springer, Heidelberg (2001)Google Scholar
  2. 2.
    Freudenthal, E., Herrera, D., et al.: Fern: An updatable authenticated dictionary suitable for distributed caching. Technical Report 06-45, Computer Science Department, University of Texas at El Paso (2006)Google Scholar
  3. 3.
    Fu, K., Kaashoek, M.F., Mazieres, D.: Fast and secure distributed read-only file system. Computer Systems 20(1), 1–24 (2002)zbMATHGoogle Scholar
  4. 4.
    Goodrich, M., Shin, M., Tamassia, R., Winsboro, W.: Authenticated dictionaries for fresh attribute credentials. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 332–347. Springer, Heidelberg (2003)Google Scholar
  5. 5.
    Martel, C., Nuckolls, G., et al.: A general model for authenticated data structures. Technical Report CSE-2001, Stubblebine Labs (2001)Google Scholar
  6. 6.
    Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)Google Scholar
  7. 7.
    Merkle, R. C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  8. 8.
    Planetlab: An open platform for developing, deploying, and accessing planetary-scale services, http://planet-lab.org
  9. 9.
    Tamassia, R., Triandopoulos, N.: Efficient content authentication over distributed hash tables. Technical report, Brown University (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • E. Freudenthal
    • 1
  • D. Herrera
    • 1
  • S. Gutstein
    • 1
  • R. Spring
    • 1
  • L. Longpré
    • 1
  1. 1.University of Texas at El PasoEl PasoUSA

Personalised recommendations