Detecting Sybil attacks in cloud computing environments based on fail-stop signature

Jong Beom Lim, Heonchang Yu, Joon Min Gil

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one-to-one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail-stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus.

Original languageEnglish
Article number35
JournalSymmetry
Volume9
Issue number3
DOIs
Publication statusPublished - 2017

Fingerprint

Cloud computing
Cloud Computing
attack
Signature
Attack
signatures
Vertex of a graph
forging
ring structures
Message Complexity
messages
Forging
Joining
Signature Scheme
Dynamical systems
communication
Broadcast
Dynamic Systems
Communication
Ring

Keywords

  • Cloud computing
  • Fail-stop signature
  • Sybil attack
  • Unstructured algorithm

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Chemistry (miscellaneous)
  • Mathematics(all)
  • Physics and Astronomy (miscellaneous)

Cite this

Detecting Sybil attacks in cloud computing environments based on fail-stop signature. / Lim, Jong Beom; Yu, Heonchang; Gil, Joon Min.

In: Symmetry, Vol. 9, No. 3, 35, 2017.

Research output: Contribution to journalArticle

@article{995f53f3ba9a4379919b6ad21e8bdf96,
title = "Detecting Sybil attacks in cloud computing environments based on fail-stop signature",
abstract = "Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one-to-one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail-stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus.",
keywords = "Cloud computing, Fail-stop signature, Sybil attack, Unstructured algorithm",
author = "Lim, {Jong Beom} and Heonchang Yu and Gil, {Joon Min}",
year = "2017",
doi = "10.3390/sym9030035",
language = "English",
volume = "9",
journal = "Symmetry",
issn = "2073-8994",
publisher = "Multidisciplinary Digital Publishing Institute (MDPI)",
number = "3",

}

TY - JOUR

T1 - Detecting Sybil attacks in cloud computing environments based on fail-stop signature

AU - Lim, Jong Beom

AU - Yu, Heonchang

AU - Gil, Joon Min

PY - 2017

Y1 - 2017

N2 - Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one-to-one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail-stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus.

AB - Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one-to-one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail-stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus.

KW - Cloud computing

KW - Fail-stop signature

KW - Sybil attack

KW - Unstructured algorithm

UR - http://www.scopus.com/inward/record.url?scp=85014484555&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85014484555&partnerID=8YFLogxK

U2 - 10.3390/sym9030035

DO - 10.3390/sym9030035

M3 - Article

AN - SCOPUS:85014484555

VL - 9

JO - Symmetry

JF - Symmetry

SN - 2073-8994

IS - 3

M1 - 35

ER -