Intrusion masking for distributed atomic operations

Meng Yu, Peng Liu, Wanyu Zang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Distributed database transactions are treated as atomic operations. This paper considers intrusion masking atomic operations among replica groups. The paper proposes two Byzantine fault tolerant two-phase commit protocols (BFT-2PC) to tolerate both malicious coordinator and malicious participants. When the total number of malicious replicas is no more than a specific threshold the protocols can mask attacks. Even if the number of faulty replicas is more than the threshold our protocols are still survivable in some cases. We analyzed the expected survivability and efficiency of our protocols. The analytic results demollstrate that our protocols are practical.

Original languageEnglish (US)
Title of host publicationSecurity and Privacy in the age of Uncertainty - IFIP TC11 18th International Conference on Information Security, SEC 2003
PublisherSpringer New York LLC
Pages229-240
Number of pages12
ISBN (Print)9781475764895
DOIs
StatePublished - Jan 1 2003
EventIFIP TC11 18th International Conference on Information Security, SEC 2003 - Athens, Greece
Duration: May 26 2003May 28 2003

Publication series

NameIFIP Advances in Information and Communication Technology
Volume122
ISSN (Print)1868-4238

Other

OtherIFIP TC11 18th International Conference on Information Security, SEC 2003
CountryGreece
CityAthens
Period5/26/035/28/03

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint Dive into the research topics of 'Intrusion masking for distributed atomic operations'. Together they form a unique fingerprint.

  • Cite this

    Yu, M., Liu, P., & Zang, W. (2003). Intrusion masking for distributed atomic operations. In Security and Privacy in the age of Uncertainty - IFIP TC11 18th International Conference on Information Security, SEC 2003 (pp. 229-240). (IFIP Advances in Information and Communication Technology; Vol. 122). Springer New York LLC. https://doi.org/10.1007/978-0-387-35691-4