7th International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

A Contract-extended Push-Pull-Clone Model

Download214 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2011.247184,
        author={Hien Thi Thu Truong and Claudia-Lavinia Ignat and Mohamed-Rafik Bouguelia and Pascal Molli},
        title={A Contract-extended Push-Pull-Clone Model},
        proceedings={7th International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2012},
        month={4},
        keywords={collaborative editing contract-based model push-pull-clone model peer-to-peer computing trust log auditing},
        doi={10.4108/icst.collaboratecom.2011.247184}
    }
    
  • Hien Thi Thu Truong
    Claudia-Lavinia Ignat
    Mohamed-Rafik Bouguelia
    Pascal Molli
    Year: 2012
    A Contract-extended Push-Pull-Clone Model
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2011.247184
Hien Thi Thu Truong1,*, Claudia-Lavinia Ignat1, Mohamed-Rafik Bouguelia2, Pascal Molli3
  • 1: INRIA Nancy-Grand Est, France
  • 2: Nancy University, France
  • 3: Nantes University, France
*Contact email: hien.truong@inria.fr

Abstract

In the push-pull-clone collaborative editing model widely used in distributed version control systems users replicate shared data, modify it and redistribute modified versions of this data without the need of a central authority. However, in this model no usage restriction mechanism is proposed to control what users can do with the data after it has been released to them. In this paper we extended the push-pull-clone model with contracts that express usage restrictions and that are checked a posteriori by users when they receive the modified data. We propose a merging algorithm that deals not only with modifications on data but also with contracts. A log-auditing protocol is used to detect users who do not respect contracts and to adjust user trust levels. Our proposed contract-based model has been implemented and evaluated by using PeerSim simulator.