The Community for Technology Leaders
Green Image
Issue No. 04 - April (2009 vol. 20)
ISSN: 1045-9219
pp: 512-527
Mudhakar Srivatsa , IBM T.J. Watson Research Center, Hawthorne
Ling Liu , Georgia Institute of Technology, Atlanta
Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide area network file systems, exemplified by CFS, Farsite and OceanStore. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to maintain file confidentiality and integrity from malicious nodes. Unfortunately, cryptographic techniques cannot protect a file holder from a Denial-of-Service (DoS) or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein an adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents LocationGuard − a location hiding technique for securing overlay file storage systems from targeted file attacks. LocationGuard has three essential components: (i) location key, (ii) routing guard, a secure algorithm that protects accesses to a file in the overlay network given its location key, and (iii) a set of location inference guards. Our experimental results quantify the overhead of employing LocationGuard and demonstrate its effectiveness against DoS attacks, host compromise attacks and various location inference attacks.
Network Protocols, Distributed Systems, Security and Privacy Protection

M. Srivatsa and L. Liu, "Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach," in IEEE Transactions on Parallel & Distributed Systems, vol. 20, no. , pp. 512-527, 2008.
89 ms
(Ver 3.3 (11022016))