2013
DOI: 10.1007/978-3-642-45269-7_5
|View full text |Cite
|
Sign up to set email alerts
|

On the Power of the Adversary to Solve the Node Sampling Problem

Abstract: Abstract. We study the problem of achieving uniform and fresh peer sampling in large scale dynamic systems under adversarial behaviors. Briefly, uniform and fresh peer sampling guarantees that any node in the system is equally likely to appear as a sample at any non malicious node in the system and that infinitely often any node has a non-null probability to appear as a sample of honest nodes. This sample is built locally out of a stream of node identifiers received at each node. An important issue that seriou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

4
2

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…The authors have proposed estimators of the frequency moments F k of a stream, which are important statistical tools that allow to quantify specificities of a data stream. Subsequently, a lot of attention has been devoted to the strongly related notion of the entropy [15] of a stream [16,17,18], and all notions based on entropy as the quantification of the amount of randomness of a stream (e.g, [17,19,20,21]). The construction of synopses or sketches of the data stream have been proposed for different applications (e.g, [22,23,24,25]).…”
Section: Introductionmentioning
confidence: 99%
“…The authors have proposed estimators of the frequency moments F k of a stream, which are important statistical tools that allow to quantify specificities of a data stream. Subsequently, a lot of attention has been devoted to the strongly related notion of the entropy [15] of a stream [16,17,18], and all notions based on entropy as the quantification of the amount of randomness of a stream (e.g, [17,19,20,21]). The construction of synopses or sketches of the data stream have been proposed for different applications (e.g, [22,23,24,25]).…”
Section: Introductionmentioning
confidence: 99%
“…However, accuracy of this computation with respect to the stream in its entirety fully depends on the volume of data items that has been sampled and their order in the stream. Furthermore, an adversary may easily take advantage of the sampling policy to hide its attacks among data items that are not sampled, or in a way that prevents its "malicious" data items from being correlated [1]. In contrast, the streaming approach consists in scanning each piece of data of the input stream on the fly, and in locally keeping only compact synopses or sketches that contain the most important information about these data.…”
Section: Introductionmentioning
confidence: 99%
“…Most of the research done so far with this approach has focused on computing functions or statistics measures with error ε using poly(1/ε, log n) bits of space where n is the domain size of the data items. These include the computation of the number of different data items in a given stream [8], [9], [10], the frequency moments [11], the most frequent data items [11], [12], the entropy of the stream [13], [14], [15], or the information divergence over streams [16].…”
Section: Introductionmentioning
confidence: 99%