BackupIT: An Intrusion-Tolerant Cooperative Backup System

被引:0
|
作者
Loest, Sergio [1 ]
Madruga, Marcelo [1 ]
Maziero, Carlos [1 ]
Lung, Lau [2 ]
机构
[1] Pontif Catholic Univ Parana, Grad Program Comp Sci, Sao Paulo, Brazil
[2] Univ Fed Santa Catarina, Grad Program Comp Sci, BR-88040900 Florianopolis, SC, Brazil
关键词
D O I
10.1109/ICIS.2009.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should provide. At the same time, corporate computers offer spare disk space and unused networking resources. In this paper, we propose an intrusion-tolerant cooperative backup system that provides a reliable collaborative backup resource by leveraging these independent, distributed resources. This system makes efficient use of network and storage resources through compression, encryption, and efficient verification processes. It also implements a protocol to tolerate Byzantine behaviors, when nodes arbitrarily deviate from their specifications. Experiments performed to evaluate the proposal showed its viability.
引用
收藏
页码:724 / +
页数:2
相关论文
共 50 条
  • [1] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [2] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [3] A Comparison of Intrusion-Tolerant System Architectures
    Nguyen, Quyen L.
    Sood, Arun
    [J]. IEEE SECURITY & PRIVACY, 2011, 9 (04) : 24 - 31
  • [4] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    [J]. 2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [5] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    [J]. 2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624
  • [6] Adaptation policies for web server intrusion-tolerant system
    Im, EG
    In, HP
    Choi, DS
    Song, YH
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (08) : 3462 - 3465
  • [7] A Network Intrusion-Tolerant System Based on Adaptive Algorithm
    Zhao, Hui
    Zheng, Shanhong
    Li, Wanlong
    Zhang, LiJuan
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
  • [8] Intrusion-Tolerant Autonomous Driving
    Volp, Marcus
    Esteves-Verissimo, Paulo
    [J]. 2018 IEEE 21ST INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2018), 2018, : 130 - 133
  • [9] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03) : 481 - 484
  • [10] Experiences with building an intrusion-tolerant group communication system
    Ramasamy, HariGovind V.
    Pandey, Prashant
    Cukier, Michel
    Sanders, William H.
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2008, 38 (06): : 639 - 666