2020
DOI: 10.1049/iet-ifs.2018.5279
|View full text |Cite
|
Sign up to set email alerts
|

Protecting scientific workflows in clouds with an intrusion tolerant system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 37 publications
(44 reference statements)
0
2
0
Order By: Relevance
“…Ahmed et al [27] designed a Byzantine fault-tolerant system combining OpenStack and software-defined networks by taking advantage of the virtualization characteristics of cloud computing and using multiple short-period replicas to meet the Byzantine fault-tolerant conditions. Wang et al [28,29] proposed an intrusion tolerance system for cloud scientific workflow based on mimicry defense, which deployed redundant executors according to the number of common-mode vulnerabilities between operating systems without affecting the efficiency of scientific workflow and made a lag decision on the running results of the executors.…”
Section: Related Workmentioning
confidence: 99%
“…Ahmed et al [27] designed a Byzantine fault-tolerant system combining OpenStack and software-defined networks by taking advantage of the virtualization characteristics of cloud computing and using multiple short-period replicas to meet the Byzantine fault-tolerant conditions. Wang et al [28,29] proposed an intrusion tolerance system for cloud scientific workflow based on mimicry defense, which deployed redundant executors according to the number of common-mode vulnerabilities between operating systems without affecting the efficiency of scientific workflow and made a lag decision on the running results of the executors.…”
Section: Related Workmentioning
confidence: 99%
“…No prior information is needed in this model, which is a big difference between mimic defense and the reactive defense, such as intrusion detection system [8]. Besides, the running service units can be replaced periodically or at the moment when MDP detect a fault output result, thus to further enhance the security.…”
Section: Serverless Computing and Mimic Defensementioning
confidence: 99%