Distributed Voting for Security and Fault Tolerance

Distributed Voting for Security and Fault Tolerance PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Faults present risk to the success to an aerospace mission, so they will continually be a concern of the fault tolerance community. In this report, we take up the issue of security in conjunction with fault tolerance. This motivated us to devise new approaches to distributed voting. Within a LAN (and some cases a WAN) we replace the almost ubiquitous 2-phase commit protocol with one that is light-weight and improves both performance and security without losing any of the traditional fault coverage. Accompanying this algorithin is one that we propose for resolving correct-but-possibly-not-identical votes within a WAN. Both of these algorithms are used to uniquely enhance the integrity of distributed information systems-- protecting them from faults and hostile attacks.

Distributed Voting for Security and Fault Tolerance

Distributed Voting for Security and Fault Tolerance PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Faults present risk to the success to an aerospace mission, so they will continually be a concern of the fault tolerance community. In this report, we take up the issue of security in conjunction with fault tolerance. This motivated us to devise new approaches to distributed voting. Within a LAN (and some cases a WAN) we replace the almost ubiquitous 2-phase commit protocol with one that is light-weight and improves both performance and security without losing any of the traditional fault coverage. Accompanying this algorithin is one that we propose for resolving correct-but-possibly-not-identical votes within a WAN. Both of these algorithms are used to uniquely enhance the integrity of distributed information systems-- protecting them from faults and hostile attacks.

Distributed Voting for Security and Fault Tolerance

Distributed Voting for Security and Fault Tolerance PDF Author: Kevin A. Kwiat
Publisher:
ISBN: 9781423529866
Category : Aerospace engineering
Languages : en
Pages : 108

Get Book Here

Book Description
Faults present risk to the success to an aerospace mission, so they will continually be a concern of the fault tolerance community. In this report, we take up the issue of security in conjunction with fault tolerance. This motivated us to devise new approaches to distributed voting. Within a LAN (and some cases a WAN) we replace the almost ubiquitous 2-phase commit protocol with one that is light-weight and improves both performance and security without losing any of the traditional fault coverage. Accompanying this algorithin is one that we propose for resolving correct-but-possibly-not-identical votes within a WAN. Both of these algorithms are used to uniquely enhance the integrity of distributed information systems-- protecting them from faults and hostile attacks.

Fault-tolerance Implemented by Voting Protocols in Distributed Systems

Fault-tolerance Implemented by Voting Protocols in Distributed Systems PDF Author: Per Gunningberg
Publisher:
ISBN:
Category : Computer network protocols
Languages : en
Pages : 138

Get Book Here

Book Description


Fault Tolerance in Distributed Systems using Dynamic Vote Management

Fault Tolerance in Distributed Systems using Dynamic Vote Management PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
There are several fault tolerant protocols for managing replicated files in the event of network partitioning due to site or communication link failures. Previously there has been no software simulation of the voting protocols apart from just stochastic modeling. In this paper, we simulate and analyze the throughput of message transfer during the communication. We use various network topologies to compare the parameters such as throughput, no of packets received and sent during voting process .We have analyzed the effects of various packet properties. The analysis provides evidence for the conjecture that the grouping scheme is the optimal algorithm in the context of the voting protocols. We also compare the proposed genetic approach for voting assignment with random algorithm proposed by Akhil Kumar. This comparison shows that genetic voting assignment gives better availability than random algorithm.

Advanced Computing and Systems for Security

Advanced Computing and Systems for Security PDF Author: Rituparna Chaki
Publisher: Springer
ISBN: 8132226534
Category : Technology & Engineering
Languages : en
Pages : 324

Get Book Here

Book Description
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.

Fault Tolerance in Distributed Systems

Fault Tolerance in Distributed Systems PDF Author: Pankaj Jalote
Publisher: Prentice Hall
ISBN:
Category : Computers
Languages : en
Pages : 456

Get Book Here

Book Description
Fault tolerance is an approach by which reliability of a computer system can be increased beyond what can be achieved by traditional methods. Comprehensive and self-contained, this book explores the information available on software supported fault tolerance techniques, with a focus on fault tolerance in distributed systems.

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021)

14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) PDF Author: Juan José Gude Prego
Publisher: Springer Nature
ISBN: 3030878724
Category : Technology & Engineering
Languages : en
Pages : 431

Get Book Here

Book Description
This book of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2021 and ICEUTE 2021, all conferences held in the beautiful and historic city of Bilbao (Spain), in September 2021. The aim of the 14th CISIS 20121 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behavior by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2021 International Program Committee selected 23 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In this relevant edition, a special emphasis was put on the organization of special sessions. One special session is organized related to relevant topics as follows: building trust in ecosystems and ecosystem components. In the case of 12th ICEUTE 2021, the International Program Committee selected 17 papers, which are published in these conference proceedings. One special session is organized related to relevant topics as follows: sustainable personal goals: engaging students in their learning process. The selection of papers is extremely rigorous in order to maintain the high quality of the conference, and we would like to thank the members of the program committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS and ICEUTE conferences would not exist without their help.

Security and Fault Tolerance in Internet of Things

Security and Fault Tolerance in Internet of Things PDF Author: Rajat Subhra Chakraborty
Publisher: Springer
ISBN: 3030028070
Category : Technology & Engineering
Languages : en
Pages : 214

Get Book Here

Book Description
This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.

Stabilization, Safety, and Security of Distributed Systems

Stabilization, Safety, and Security of Distributed Systems PDF Author: Toshimitsu Masuzawa
Publisher: Springer
ISBN: 3540766278
Category : Computers
Languages : en
Pages : 421

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007, held in Paris, France, November 14-16, 2007. The 27 regular papers presented together with the extended abstracts of three invited lectures were carefully reviewed and selected from 64 submissions. The papers address all aspects of self-stabilization, safety and security, recovery oriented systems and programming.

Consistent Distributed Storage

Consistent Distributed Storage PDF Author: Vincent Gramoli
Publisher: Morgan & Claypool Publishers
ISBN: 1636390633
Category : Computers
Languages : en
Pages : 194

Get Book Here

Book Description
This is a presentation of several approaches for employing shared memory abstraction in distributed systems, a powerful tool for simplifying the design and implementation of software systems for networked platforms. These approaches enable system designers to work with abstract readable and writable objects without the need to deal with the complexity and dynamism of the underlying platform. The key property of shared memory implementations is the consistency guarantee that it provides under concurrent access to the shared objects. The most intuitive memory consistency model is atomicity because of its equivalence with a memory system where accesses occur serially, one at a time. Emulations of shared atomic memory in distributed systems is an active area of research and development. The problem proves to be challenging, and especially so in distributed message passing settings with unreliable components, as is often the case in networked systems. Several examples are provided for implementing shared memory services with the help of replication on top of message-passing distributed platforms subject to a variety of perturbations in the computing medium.