Next Article in Journal
Faithworthy Collaborative Spectrum Sensing Based on Credibility and Evidence Theory for Cognitive Radio Networks
Next Article in Special Issue
Enhanced Joint and Separable Reversible Data Hiding in Encrypted Images with High Payload
Previous Article in Journal
Game Algorithm for Resource Allocation Based on Intelligent Gradient in HetNet
Previous Article in Special Issue
Data-Filtering System to Avoid Total Data Distortion in IoT Networking
Article Menu
Issue 3 (March) cover image

Export Article

Open AccessArticle
Symmetry 2017, 9(3), 35; doi:10.3390/sym9030035

Detecting Sybil Attacks in Cloud Computing  Environments Based on Fail‐Stop Signature

1
Department of Game & Multimedia Engineering, Korea Polytechnic University, Siheung‐si, Gyeonggi‐do 15073, Korea
2
Department of Computer Science & Engineering, Korea University, Seoul 02841, Korea
3
School of Information Technology Engineering, Catholic University of Daegu, Gyeongsan‐si, Gyeongsangbuk‐do 38430, Korea
*
Author to whom correspondence should be addressed.
Academic Editor: Laurence T. Yang
Received: 2 January 2017 / Accepted: 28 February 2017 / Published: 2 March 2017
(This article belongs to the Special Issue Symmetry in Secure Cyber World)
View Full-Text   |   Download PDF [1373 KB, uploaded 3 March 2017]   |  

Abstract

Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non‐trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re‐constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one‐to‐one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail‐stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus. View Full-Text
Keywords: sybil attack; cloud computing; fail‐stop signature; unstructured algorithm sybil attack; cloud computing; fail‐stop signature; unstructured algorithm
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Lim, J.; Yu, H.; Gil, J. Detecting Sybil Attacks in Cloud Computing  Environments Based on Fail‐Stop Signature. Symmetry 2017, 9, 35.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Symmetry EISSN 2073-8994 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top