Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3623565.3623708acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Open access

Mnemosyne: Distributed Application Logging over Named Data Networking

Published: 08 October 2023 Publication History

Abstract

Logging is a critical function to enable auditing and enhance security of distributed applications. This paper describes the design of Mnemosyne, a distributed logger running over Named Data Networking(NDN), to meet this need for NDN-based distributed applications. Mnemosyne assures the immutability of logged events by interlocking all event records in a DAG-based ledger. Mnemosyne provides a high logging throughput and system resiliency against network component failures. We implemented Mnemosyne and evaluated its design through an emulated deployment setting.

References

[1]
Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, and Pramod Viswanath. 2019. Prism: Deconstructing the Blockchain to Approach Physical Limits. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). Association for Computing Machinery, New York, NY, USA, 585--602.
[2]
Elasticsearch B.V. . 2023. The ELK Stack: From the Creators of Elasticsearch | Elastic. Online at https://www.elastic.co/what-is/elk-stack.
[3]
Stuart Haber and W. Scott Stornetta. 1991. How to time-stamp a digital document. Journal of Cryptology 3, 2 (1991), 99--111.
[4]
Butler Lampson. 2015. Perspectives on Protection and Security. In SOSP History Day 2015 (Monterey, California) (SOSP '15). Association for Computing Machinery, New York, NY, USA, Article 4, 21 pages.
[5]
Colin LeMahieu. 2018. Nano: A Feeless Distributed Cryptocurrency Network. https://content.nano.org/whitepaper/Nano_Whitepaper_en.pdf
[6]
Yixin Li, Bin Cao, Mugen Peng, Long Zhang, Lei Zhang, Daquan Feng, and Jihong Yu. 2020. Direct acyclic graph-based ledger for Internet of Things: Performance and security analysis. IEEE/ACM Transactions on Networking 28, 4 (2020), 1643--1656.
[7]
Siqi Liu, Varun Patil, Tianyuan Yu, Alexander Afanasyev, Frank Alex Feltus, Susmit Shannigrahi, and Lixia Zhang. 2021. Designing Hydra with Centralized versus Decentralized Control: A Comparative Study. In Proceedings of the Interdisciplinary Workshop on (de) Centralization in the Internet (Virtual Event, Germany) (IWCI'21). Association for Computing Machinery, New York, NY, USA, 4--10.
[8]
LogRhythm, Inc. 2023. SIEM Platform & Security Operations Center Services | LogRhythm. Online at https://logrhythm.com.
[9]
Ralph C. Merkle. 1988. A Digital Signature Based on a Conventional Encryption Function. In Advances in Cryptology --- CRYPTO '87, Carl Pomerance (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 369--378.
[10]
Philipp Moll, Varun Patil, Nishant Sabharwal, and Lixia Zhang. 2021. A Brief Introduction to State Vector Sync. Technical Report NDN-0073, Revision 2. Named Data Networking. 1--4 pages.
[11]
Philipp Moll, Varun Patil, Lan Wang, and Lixia Zhang. 2022. SoK: The Evolution of Distributed Dataset Synchronization Solutions in NDN. In Proceedings of the 9th ACM Conference on Information-Centric Networking (Osaka, Japan) (ICN '22). Association for Computing Machinery, New York, NY, USA, 33--44.
[12]
Satoshi Nakamoto. 2009. Bitcoin: A peer-to-peer electronic cash system. http://www.bitcoin.org/bitcoin.pdf
[13]
Varun Patil, Hemil Desai, and Lixia Zhang. 2022. Kua: A Distributed Object Store over Named Data Networking. In Proceedings of the 9th ACM Conference on Information-Centric Networking (Osaka, Japan) (ICN '22). Association for Computing Machinery, New York, NY, USA, 56--66.
[14]
QOS.ch Sarl. 2023. Logback Project. Online at https://logback.qos.ch.
[15]
Yonatan Sompolinsky, Shai Wyborski, and Aviv Zohar. 2021. PHANTOM GHOSTDAG: A Scalable Generalization of Nakamoto Consensus: September 2, 2021. In Proceedings of the 3rd ACM Conference on Advances in Financial Technologies (Arlington, Virginia) (AFT '21). Association for Computing Machinery, New York, NY, USA, 57--70.
[16]
Splunk Inc. 2023. Splunk | The Key to Enterprise Resilence. Online at https://www.splunk.com.
[17]
Neil Spring, Ratul Mahajan, and David Wetherall. 2002. Measuring ISP topologies with Rocketfuel. ACM SIGCOMM Computer Communication Review 32, 4 (2002), 133--145.
[18]
Sumo Logic. 2023. Sumo Logic: Cloud Log Management, Monitoring, SIEM Tools. Online at https://www.sumologic.com.
[19]
The Apache Software Foundation. 1999. Log4j - Apache Log4j 2. Online at https://logging.apache.org/log4j/2.x/.
[20]
The ndn-hydra authors. 2021. ndn-hydra. https://ndn-hydra.readthedocs.io/ accessed: 2021-07-23.
[21]
The NDN Team. 2022. Mini-NDN: A Mininet based NDN emulator. https://github.com/named-data/mini-ndn accessed: 2022-11-01.
[22]
Qin Wang, Jiangshan Yu, Shiping Chen, and Yang Xiang. 2023. SoK: DAG-Based Blockchain Systems. ACM Comput. Surv. 55, 12, Article 261 (mar 2023), 38 pages.
[23]
Tianyuan Yu, Hongcheng Xie, Siqi Liu, Xinyu Ma, Varun Patil, Xiaohua Jia, and Lixia Zhang. 2023. CLedger: A Secure Distributed Certificate Ledger via Named Data. In ICC 2023 - IEEE International Conference on Communications. Institute of Electrical and Electronics Engineers, Piscataway, NJ, USA.
[24]
Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, kc claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014. Named Data Networking. ACM SIGCOMM Computer Communication Review (CCR) 44, 3 (July 2014), 66--73.
[25]
Zhiyi Zhang, Vishrant Vasavada, Randy King, and Lixia Zhang. 2019. Proof of authentication for private distributed ledger. In Proceedings of the NDSS Workshop on Decentralised IoT Systems and Security (DISS). Internet Society, Reston, VA, USA, 6 pages.
[26]
Zhiyi Zhang, Yingdi Yu, Haitao Zhang, Eric Newberry, Spyridon Mastorakis, Yanbiao Li, Alexander Afanasyev, and Lixia Zhang. 2018. An Overview of Security Support in Named Data Networking. IEEE Communications Magazine 56, 11 (November 2018), 62--68.

Index Terms

  1. Mnemosyne: Distributed Application Logging over Named Data Networking

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ACM ICN '23: Proceedings of the 10th ACM Conference on Information-Centric Networking
      October 2023
      138 pages
      ISBN:9798400704031
      DOI:10.1145/3623565
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 October 2023

      Check for updates

      Author Tags

      1. distributed logging
      2. named data networking
      3. distributed ledger

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      ACM ICN '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 133 of 482 submissions, 28%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 202
        Total Downloads
      • Downloads (Last 12 months)166
      • Downloads (Last 6 weeks)33
      Reflects downloads up to 19 Nov 2024

      Other Metrics

      Citations

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media