2011 International Conference on High Performance Computing &Amp; Simulation 2011
DOI: 10.1109/hpcsim.2011.5999855
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating a peer-to-peer storage system in presence of malicious peers

Abstract: We present a peer-to-peer based storage system and evaluate its resistance in the presence of malicious peers. To do so, we resort to simulation of the actual code borrowed from the production system. Our analysis allows to identify the main threats, prioritise them and propose directions for mitigating the attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
1
1

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…Finally, we would like to generalise our present results by extending its application domain to more complex protocols with branching and looping structures, as well as complex data types manipulations as in protocols for secure storage distributed through peer-to-peer communication [13], secured routing protocols [17], etc.…”
Section: Discussionmentioning
confidence: 92%
See 2 more Smart Citations
“…Finally, we would like to generalise our present results by extending its application domain to more complex protocols with branching and looping structures, as well as complex data types manipulations as in protocols for secure storage distributed through peer-to-peer communication [13], secured routing protocols [17], etc.…”
Section: Discussionmentioning
confidence: 92%
“…If σ has not been found False, and if σ is in the stack (meaning that its SCC is still being constructed), the σ and σ will be in the same SCC: we reflect this by updating σ .low accordingly. We also update σ .valid by removing formulas whose starting points occur after σ ; as we show below, these formulas cannot be used as evidence for the success of the SCC containing σ and σ (lines [8][9][10][11][12][13][14]. Once the subgoal processing is completed, loop ltl checks to see whether a new SCC component has been detected; if no, it removes it from the stack (lines [18][19][20][21][22][23] and finally backtracks to the parent call (line 25).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…As explained already, it is very hard to have a clear picture of who is using snakes because it is freely available and very few users actually ask for support. Fortunately, there are works we known well about [6,7,12,14,15,21,29,30] and that illustrate typical use cases for snakes as listed below.…”
Section: Use Casesmentioning
confidence: 99%
“…In the security domain, we will consider more complex protocols with branching and looping structures, as well as complex data types manipulations. In particular, we will consider protocols for secure storage distributed through peer-to-peer communication [33], [34] because it is currently modeled using ABCD and generates large state spaces.…”
Section: B Future Workmentioning
confidence: 99%