distributed services
Recently Published Documents


TOTAL DOCUMENTS

177
(FIVE YEARS 27)

H-INDEX

11
(FIVE YEARS 1)

Author(s):  
Haowei Chen ◽  
Shuiguang Deng ◽  
Hong ze Zhu ◽  
Hailiang Zhao ◽  
Rong Jiang ◽  
...  

2021 ◽  
Vol 9 (2) ◽  
pp. 252-267
Author(s):  
Saifudin Usman ◽  
Idris Winarno ◽  
Amang Sudarsono

Nowadays, DDoS attacks are often aimed at cloud computing environments, as more people use virtualization servers. With so many Nodes and distributed services, it will be challenging to rely solely on conventional networks to control and monitor intrusions. We design and deploy DDoS attack defense systems in virtualization environments based on Software-defined Networking (SDN) by combining signature-based Network Intrusion Detection Systems (NIDS) and sampled flow (sFlow). These techniques are practically tested and evaluated on the Proxmox production Virtualization Environment testbed, adding High Availability capabilities to the Controller. The evaluation results show that it promptly detects several types of DDoS attacks and mitigates their negative impact on network performance. Moreover, it also shows good results on Quality of Service (QoS) parameters such as average packet loss about 0 %, average latency about 0.8 ms, and average bitrate about 860 Mbit/s.


2021 ◽  
Vol 5 (OOPSLA) ◽  
pp. 1-31
Author(s):  
Nouraldin Jaber ◽  
Christopher Wagner ◽  
Swen Jacobs ◽  
Milind Kulkarni ◽  
Roopsha Samanta

The last decade has sparked several valiant efforts in deductive verification of distributed agreement protocols such as consensus and leader election. Oddly, there have been far fewer verification efforts that go beyond the core protocols and target applications that are built on top of agreement protocols. This is unfortunate, as agreement-based distributed services such as data stores, locks, and ledgers are ubiquitous and potentially permit modular, scalable verification approaches that mimic their modular design. We address this need for verification of distributed agreement-based systems through our novel modeling and verification framework, QuickSilver, that is not only modular, but also fully automated. The key enabling feature of QuickSilver is our encoding of abstractions of verified agreement protocols that facilitates modular, decidable, and scalable automated verification. We demonstrate the potential of QuickSilver by modeling and efficiently verifying a series of tricky case studies, adapted from real-world applications, such as a data store, a lock service, a surveillance system, a pathfinding algorithm for mobile robots, and more.


2021 ◽  
Author(s):  
hideyat zerga ◽  
Asma AMRAOUI ◽  
badr BENMAMMAR

Abstract In the fight against the COVID-19 epidemic that is currently a major global public health issue, social distancing has been imposed to prevent the massive transmission, thus doctors in hospitals have turned to telemedicine in order to be able to monitor their patient notably those suffering from chronic diseases. To do so, patients need to share their physiological data with doctors. In order to share this data safely, prevent malicious users from tampering with it and protect the privacy of patients, access control becomes a fundamental requirement. In order to set up a real-time (Internet of Thing) IoT enabled healthcare system (HS) scenario like telemedicine, Fog computing (FC) seems to be the best solution comparing to Cloud computing since it provides low latency, highly mobile and geo-distributed services and temporary storage. In this paper, the focus is on access control in the telemedicine systems. Our proposal is based, on one hand, the concept of Fog computing to ensure the distributed aspect needed in the monitoring of patient health remotely; and on the other hand Blockchain (BC) smart contracts, in order to provide a dynamic, optimized and self-adjusted access control.


Author(s):  
Arshad A. Hussein ◽  
Adel AL-zebari ◽  
Naaman Omar ◽  
Karwan Jameel Merceedi ◽  
Abdulraheem Jamil Ahmed ◽  
...  

The use of technology has grown dramatically, and computer systems are now interconnected via various communication mediums. The use of distributed systems (DS) in our daily activities has only gotten better with data distributions. This is due to the fact that distributed systems allow nodes to arrange and share their resources across linked systems or devices, allowing humans to be integrated with geographically spread computer capacity. Due to multiple system failures at multiple failure points, distributed systems may result in a lack of service availability. to avoid multiple system failures at multiple failure points by using fault tolerance (FT) techniques in distributed systems to ensure replication, high redundancy, and high availability of distributed services. In this paper shows ease fault tolerance systems, its requirements, and explain about distributed system. Also, discuss distributed system architecture; furthermore, explain used techniques of fault tolerance, in additional that review some recent literature on fault tolerance in distributed systems and finally, discuss and compare the fault tolerance literature.


2021 ◽  
pp. 1349-1363
Author(s):  
Reem A. Qader ◽  
Naji M. Sahib

Global services with an agent or a multi-agent system are a promising and new research area. However, several measures have been proposed to demonstrate the benefits of agent technology by supporting distributed services and applying smart agent technology in web dynamics. This paper is designed to build a Semantic Web on the World Wide Web (WWW) to enhance the productivity of managing electronic library applications, which poses a problem to researchers and students, represnted by the process of exchanging books from e-libraries, where the process is slow or the library needs large system data.


IEEE Micro ◽  
2021 ◽  
Vol 41 (2) ◽  
pp. 43-49
Author(s):  
Michael Galles ◽  
Francis Matus
Keyword(s):  

Author(s):  
Byoungcheon Lee

Transport Layer Security (TLS) is a cryptographic protocol that provides communications security between two peers and it is widely used in many applications. To reduce the latency in TLS handshake session resumption using pre-shared key (PSK) had been used. But current methods in PSK mode handshake uses a fixed session key multiple times for the lifetime of session ticket. Reuse of fixed session key should be very careful in the point of communications security. It is vulnerable to replay attacks and there is a possibility of tracking users. Paired token (PT) is a new secondary credential scheme that provides pre-shared key in stateless way in client-server environment. Server issues paired token (public token and secret token) to authenticated client. Public token represents signed identity of client and secret token is a kind of shared secret between client and server. Once client is equipped with PT, it can be used for many symmetric key based cryptographic applications such as authentication, authorization, key establishment, etc. It was also shown that it can be used for one-time authenticated key establishment using the time-based one-time password (TOTP) approach. In this paper we apply the PT and TOTP approach to TLS to achieve stateless one-time authenticated session resumption. Server executes full handshake of TLS 1.3 and issues PT to authenticated client. Then client and server can execute one-time authenticated session resumption using PT in stateless way in server side. In every runs of session resumption distinct session keys are established that the same PT can be used safely for longer lifetime. If anonymous PT is used with renewal issuing, user privacy, untraceability and forward security can be achieved easily. It will provide a huge performance gain in large-scale distributed services.


2021 ◽  
pp. 176-185
Author(s):  
Marie Delavergne ◽  
Ronan-Alexandre Cherrueau ◽  
Adrien Lebre

AbstractEdge computing is becoming more and more present, with sites geo-distributed around the globe. Applications on these infrastructures must be able to manage the latency and disconnections inherent to their distribution. One way to deal with these concerns could be to deploy one entire instance of the application per site and use a service mesh to manage the collaboration between the geo-distributed instances. More precisely, we propose to reify the location of application instances in REST requests and allow redirections between these requests thanks to a dedicated language and a service mesh allowing three types of collaborations. This paper focuses on the replication of a resource between multiple instances. Though it is still a work in progress, we demonstrated the relevance of our approach in the OpenStack ecosystem.


Sign in / Sign up

Export Citation Format

Share Document