Back to Search Start Over

Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach

Authors :
Mudhakar Srivatsa
Ling Liu
Source :
IEEE Transactions on Parallel and Distributed Systems. 20:512-527
Publication Year :
2009
Publisher :
Institute of Electrical and Electronics Engineers (IEEE), 2009.

Abstract

Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide area network file systems, exemplified by CFS, Farsite and OceanStore. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to maintain file confidentiality and integrity from malicious nodes. Unfortunately, cryptographic techniques cannot protect a file holder from a Denial-of-Service (DoS) or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein an adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents LocationGuard - a location hiding technique for securing overlay file storage systems from targeted file attacks. LocationGuard has three essential components: (i) location key, (ii) routing guard, a secure algorithm that protects accesses to a file in the overlay network given its location key, and (iii) a set of location inference guards. Our experimental results quantify the overhead of employing LocationGuard and demonstrate its effectiveness against DoS attacks, host compromise attacks and various location inference attacks.

Details

ISSN :
10459219
Volume :
20
Database :
OpenAIRE
Journal :
IEEE Transactions on Parallel and Distributed Systems
Accession number :
edsair.doi...........0183763b66d2bcbc3c15d59db7daf810
Full Text :
https://doi.org/10.1109/tpds.2008.125