preview

Information Retrieval And Its Effects On The Server

Decent Essays

Data is distributed to minimize the response time and request drop rates across all over the servers. A request for a particular data from the server (vendor or set of mirrors) is sent by client and server responds back with the data that client requested. In this case server comes to know what data is requested or needed by the client. Generally mirrors are the third party sites that may or may not be trustworthy. If in case if a client wants to update a security patch for its system and the mirror that was chosen for the update is not trustworthy, then in this case it’s a threat to the system as its vulnerability is exposed to third party. Private Information Retrieval (PIR) is basically a protocol that allows client to retrieve the …show more content…

With manifest provided by server, client can determine which block to retrieve from mirrors and to validate their correctness. Vendor removes the malicious mirror reported by the client. It also polls and removes the unresponsive mirror. Mirror: It basically uses ‘rsync’ to obtain files for a release from vendor. Mirror stores all of the software update to be released in a contiguous memory. It uses manifest for the validation of each block. Once the mirror is ready to serve the blocks to the clients, then it notifies the server for its readiness. Client: The first thing client will do is will request vendor for manifest and list of mirrors. With the help of manifest, client will be able to determine which block of the release it will need to retrieve in order to receive updates. The client has the value N that represents the number of mirrors that it would have to interact in order to keep its privacy. To retrieve a single block for an instance, it generates cryptographically suitable N-1 and it derives the ‘Nth’ string by XORing the other N-1 random string together to get the desired updates. As the mirror receives random bit string, it won’t be able to identify which updates client is looking for to retrieve. In order to protect against those who can monitor traffic, client can securely communicate with the mirror using encrypted tunnel. The release provided by a vendor

Get Access