Malicious Node Identification in Coded Distributed Storage Systems under Pollution Attacks

نویسندگان

چکیده

In coding-based distributed storage systems (DSSs), a set of nodes (SNs) hold coded fragments data unit that collectively allow one to recover the original information. It is well known modification (a.k.a. pollution attack) Achilles’ heel such coding systems; indeed, intentional single fragment has potential prevent reconstruction information because error propagation induced by decoding algorithm. The challenge we take in this work devise an algorithm identify polluted within encoding and characterize its performance. To end, provide following contributions: (i) We MIND (Malicious node IdeNtification DSS), general with respect mechanism chosen for DSS, it able cope heterogeneous allocation SNs, effective successfully identifying low-redundancy scenario; (ii) formally prove both termination correctness; (iii) derive accurate analytical characterization performance (hit probability complexity); (iv) develop C++ prototype implements validate predictions model. Finally, show applicability our work, define robustness metrics SNs apply results select allocations yielding collusion as highest actual attackers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Regenerating Codes for Distributed Storage Systems

Distributed storage systems are mainly justified due to their ability to store data reliably over some unreliable nodes such that the system can have long term durability. Recently, regenerating codes are proposed to make a balance between the repair bandwidth and the storage capacity per node. This is achieved through using the notion of network coding approach. In this paper, a new variation ...

متن کامل

Distributed detection of mobile malicious node attacks in wireless sensor networks

In wireless sensor networks, sensor nodes are usually fixed to their locations after deployment. However, an attacker who compromises a subset of the nodes does not need to abide by the same limitation. If the attacker moves his compromised nodes to multiple locations in the network, such as by employing simple robotic platforms or moving the nodes by hand, he can evade schemes that attempt to ...

متن کامل

Optimistic Erasure-Coded Distributed Storage

We study erasure-coded atomic register implementations in an asynchronous crash-recovery model. Erasure coding provides a cheap and space-efficient way to tolerate failures in a distributed system. This paper presents ORCAS, Optimistic eRasure-Coded Atomic Storage, which consists of two separate implementations, ORCAS-A and ORCAS-B. In terms of storage space used, ORCAS-A is more efficient in s...

متن کامل

Coded Caching with Distributed Storage

Content delivery networks store information distributed across multiple servers, so as to balance the load and avoid unrecoverable losses in case of node or disk failures. Coded caching has been shown to be a useful technique which can reduce peak traffic rates by pre-fetching popular content at the end users and encoding transmissions so that different users can extract different information f...

متن کامل

Recovering from Malicious Attacks in Workflow Systems

Workflow management systems (WFMS) coordinate execution of logically related multiple tasks in an organization. Such coordination is achieved through dependencies that are specified between the tasks of a workflow. Often times preventive measures are not enough and a workflow may be subjected to malicious attacks. Traditional workflow recovery mechanisms do not address how to recover from malic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM transactions on modeling and performance evaluation of computing systems

سال: 2021

ISSN: ['2376-3647', '2376-3639']

DOI: https://doi.org/10.1145/3491062