Skip to main content
Log in

Intrusion-Tolerant Server Architecture for Survivable Services

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Survivable systems are increasingly needed in a wide range of applications. As a step toward realizing survivable systems, this paper presents architecture of intrusion-tolerant servers. It is to deliver intended services transparently to the clients even when a computing node fails due to failures, intrusions, and other threats. In order to deliver only secure results to the client, we need an algorithm to decide agreement on results from replicated servers. For this purpose, a secure and practical decentralized voting algorithm for the architecture is proposed in the paper. Through the experiments on a test-bed, especially, for web services, the approach turned out very effective in terms of extra cost and considered to be able to cope with both confidentiality and integrity attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. M. Castro and B. Liskov. Practical byzantine fault tolerance. In Proc. of the 3rd Symposium on Operating System Design and Implementation, Feb. 1999.

  2. B. Hardekopf, K. Kwiat, and S. Upadhyaya. A decentralized voting algorithm for increasing dependability in distributed systems. Joint Meeting of the 5th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2001) and the 7th International Conference on Information Systems Analysis and Synthesis (ISAS 2001), Orlando, FL, July 22–25, 2001.

  3. M. Hiltunen, et al. Building survivable services using redundancy and adaptation. IEEE Trans. on Computers, 52(2), 2003.

  4. L. Lamport, et al. The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3), 1982.

  5. B.J. Min, et al. Secure system architecture based on dynamic resource reallocation. In Proc. of the 4th Int’l Workshop on Information Security Applications, LNCS Published by Springer, pp. 199–212, 2003.

  6. M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228–234, 1980.

    Article  Google Scholar 

  7. B. Randell. Dependability–-unifying concept. Computer Security, Dependability & Assurance: From Needs to Solutions, ISBN 0-7695-0337-3/99, 1998.

  8. J. Reynolds, et al. The design and implementation of an intrusion tolerant system. In Proc. of Int’l Conference on Dependable Systems and Networks, Washington D.C., pp. 258–290, June 2002.

  9. F. Wang, et al. SITAR: A scalable intrusion-tolerant architecture for distributed services. In Proc. of 2001 IEEE Workshop on Information Assurance and Security US Military Academy, West Point, NY, pp.38–45, June 2001.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Byoung Min Joon.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Joon, B.M. Intrusion-Tolerant Server Architecture for Survivable Services. J Supercomput 33, 93–102 (2005). https://doi.org/10.1007/s11227-005-0223-1

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-005-0223-1

Keywords

Navigation