Practical Intrusion-tolerance in the Cloud

نویسندگان

  • Rüdiger Kapitza
  • Tobias Distler
  • Hans P. Reiser
چکیده

Byzantine fault tolerant (BFT) replication is commonly associated with the overhead of 3f +1 replicas to handle f faults. We believe this large resource demand is one of the key reasons why BFT replication is not commonly applied. We present Spare, an approach that harnesses virtualization support as typically found in cloud-computing environments to reduce the resource demand of BFT replication. This is achieved by restricting replication and request execution to only f +1 nodes in the fault-free case, while rapidly activating up to f replicas using virtualization in case of replicas being faulty or slow. To maxize system availability, we keep spare replicas that are periodically updated in a suspended state. In the fault-free case, these passive replicas assist a resource-efficient proactive recovery.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

A Review of Intrusion Detection Defense Solutions Based on Software Defined Network

Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...

متن کامل

Intrusion Tolerance: Enhancement of Safety in Cloud Computing

Cloud computing is a recent computing model; provides consistent access to wide area distributed resources facing many problems as its usage increases. Enormous loss to both cloud clients as well as cloud service providers happen even with small intrusions. The protection and defense of cloud infrastructure against malicious attacks can be solved by designing ‘intrusion tolerance’. We prove the...

متن کامل

Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

Service integration and supply on-demand coming from cloud computing can significantly improve the utilization of computing resources and reduce power consumption of per service, and effectively avoid the error of computing resources. However, cloud computing is still facing the problem of intrusion tolerance of the cloud computing platform and sensitive data of new enterprise data center. In o...

متن کامل

Improving the palbimm scheduling algorithm for fault tolerance in cloud computing

Cloud computing is the latest technology that involves distributed computation over the Internet. It meets the needs of users through sharing resources and using virtual technology. The workflow user applications refer to a set of tasks to be processed within the cloud environment. Scheduling algorithms have a lot to do with the efficiency of cloud computing environments through selection of su...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009