2017
DOI: 10.3390/sym9030035
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Sybil Attacks in Cloud Computing  Environments Based on Fail‐Stop Signature

Abstract: Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 34 publications
(28 reference statements)
0
3
0
2
Order By: Relevance
“…Essa Seção aborda os trabalhos relacionados que apresentam mecanismos de defesa contra ataques em redes P2P. O trabalho de [Lim et al 2017] tem por objetivo detectar e remover nós Sybil em ambientes Cloud. Para isso,é utilizada assinatura fail-stop.…”
Section: Trabalhos Relacionadosunclassified
See 1 more Smart Citation
“…Essa Seção aborda os trabalhos relacionados que apresentam mecanismos de defesa contra ataques em redes P2P. O trabalho de [Lim et al 2017] tem por objetivo detectar e remover nós Sybil em ambientes Cloud. Para isso,é utilizada assinatura fail-stop.…”
Section: Trabalhos Relacionadosunclassified
“…Em sequência, o nó vizinho envia suas informações ao requisitante que as verifica da mesma forma. Adicionalmente, uma terceira entidade confiávelé usada para fornecer os parâmetros públicos das chaves usadas pelos nós [Lim et al 2017]. Contudo, não há autenticidade dos nós, apenas das mensagens.…”
Section: Trabalhos Relacionadosunclassified
“…The trusted cloud computing and examined a vast number of usual Acts and regulations essential for compliance by the cloud service providers also discussed. Lim et al (2017) [22] described discovering the unstructured Sybil attack in the cloud with the use of unstructured Sybil attack detection algorithm in cloud computing environments. One-to-one communication primitives used rather than broadcast primitives and, therefore, the message complexity can decrease.…”
Section: A Survey Of Cloud and Data Securitymentioning
confidence: 99%
“…Traditionally, these needs have been addressed by using high-performance computing (HPC) hardware on physical server machines [1][2][3]. Cloud computing providers offer virtual machines (VMs) as computing resources to cloud users with user-specified configurations [4,5] and VMs can be dynamically provisioned on a pay as you go basis for many applications [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%