How to Securely Replicate Services * ( Preliminary
نویسندگان
چکیده
A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by n servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter k, at least k servers are correct and fewer than k servers are corrupt. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k < n 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server.Instead, the clientisrequired only to possessat most two public keys for the service. "This work was supported by the DefenseAdvanced Research ProjectsAgency (DoD) under DARPA/NASA subcontractNAG2-593 administeredby the NASA Ames ResearchCenter,by grantsfrom GTE, IBM, and Siemens,Inc., and by a NationalScienceFoundation Graduate Fellowship.Any opinions,conclusionsor recommendations expressed inthisdocument _rethoseofthe authorsand do not necessarily reflecthe views,polities ordecisionsofthe National ScienceFoundation or the Department ofDefense.
منابع مشابه
How to Securely Replicate
We present a method for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. We also address the Issue of maintaining a causal order among client requests. We illustrate a security breach resulting from an intruder’s ability to effect a violation of causahty in th...
متن کاملDelegating Secure Logging in Pervasive Computing Systems
Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this ...
متن کاملA Load Service Structure with An Reputation System in Ad-hoc Networks
It is important how wireless hosts find other hosts securely and efficiently for load service purposes because hosts in an ad-hoc network moves dynamically. In this paper, I design a method for load services in computer networks with a new reputation system to check available host reputation. I use databases for directory agents to save information provided by load-server agents and build proto...
متن کاملLegion: Enriching Internet Services with Peer-to-Peer Interactions
Many web applications are built around direct interactions among users, from collaborative applications and social networks to multiuser games. Despite being user-centric, these applications are usually supported by services running on servers that mediate all interactions among clients. When users are in close vicinity of each other, relying on a centralized infrastructure for mediating user i...
متن کاملInternet Draft Document: draft-ietf-geopriv-reqs-02.txt
Location-based services, navigation applications, emergency services, management of equipment in the field, and other locationdependent services need geographic location information about a Target (such as a user, resource or other entity). There is a need to securely gather and transfer location information for location services, while at the same time protecting the privacy of the individuals...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1994