Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lim, JongBeom | - |
dc.contributor.author | Yu, HeonChang | - |
dc.contributor.author | Gil, Joon-Min | - |
dc.date.accessioned | 2021-09-03T09:09:00Z | - |
dc.date.available | 2021-09-03T09:09:00Z | - |
dc.date.created | 2021-06-16 | - |
dc.date.issued | 2017-03 | - |
dc.identifier.issn | 2073-8994 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/84339 | - |
dc.description.abstract | Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one-to-one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail-stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | MDPI | - |
dc.subject | TRUST | - |
dc.title | Detecting Sybil Attacks in Cloud Computing Environments Based on Fail-Stop Signature | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Yu, HeonChang | - |
dc.identifier.doi | 10.3390/sym9030035 | - |
dc.identifier.scopusid | 2-s2.0-85014484555 | - |
dc.identifier.wosid | 000398708000008 | - |
dc.identifier.bibliographicCitation | SYMMETRY-BASEL, v.9, no.3 | - |
dc.relation.isPartOf | SYMMETRY-BASEL | - |
dc.citation.title | SYMMETRY-BASEL | - |
dc.citation.volume | 9 | - |
dc.citation.number | 3 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Science & Technology - Other Topics | - |
dc.relation.journalWebOfScienceCategory | Multidisciplinary Sciences | - |
dc.subject.keywordPlus | TRUST | - |
dc.subject.keywordAuthor | sybil attack | - |
dc.subject.keywordAuthor | cloud computing | - |
dc.subject.keywordAuthor | fail-stop signature | - |
dc.subject.keywordAuthor | unstructured algorithm | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.