The Architecture of a Secure Group Communication System Based on Intrusion Tolerance

نویسندگان

  • Miguel Correia
  • Paulo Veríssimo
  • Nuno Ferreira Neves
چکیده

This paper presents the architecture of a secure group communication system with the fortress model of trust, where the participants of the group equally trust one another. We consider that only a small part of the system, a component called the Trusted Timely Computing Base, has to be entirely trusted. All other components can be corrupted. The overall system will tolerate a certain number of faults of its components and remain behaving correctly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Worm-IT - A wormhole-based intrusion-tolerant group communication system

This paper 1 presents Worm-IT, a new intrusion-tolerant group communication system with a membership service and a view-synchronous atomic multicast primitive. The system is intrusion-tolerant in the sense that it behaves correctly even if some nodes are corrupted and become malicious. It is based on a novel approach that enhances the environment with a special secure distributed component used...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Intrusion Tolerance Approaches in ITUA 1

The purpose of the Intrusion Tolerance by Unpredictable Adaptation (ITUA) project is to develop a middleware based intrusion tolerance solution that would help applications survive certain kinds of attacks. This paper presents an overview and the key aspects of the ITUA project. We will describe the kind of attacks we are considering, how unpredictability can be used for intrusion tolerance, th...

متن کامل

Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance

Nowadays, critical infrastructures are highly integrated with state-of-the-art information and communication technologies to enhance their efficiency. Due to farreaching societal and economic impacts caused by failure or malfunction of critical infrastructures, cyber security and self-healing capability are among their salient features. A new security paradigm referred to as intrusion tolerance...

متن کامل

Highly Available Smart Grid Control Centers through Intrusion Tolerance

Societies’ norms of operation relies on the proper and secure functioning of several critical infrastructures, particularly modern power grid which is also known as smart grid. Smart grid is interwoven with the information and communication technology infrastructure, and thus it is exposed to cyber security threats. Intrusion tolerance proves a promising security approach against malicious atta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001