首页> 外文OA文献 >How to securely replicate services (preliminary version)
【2h】

How to securely replicate services (preliminary version)

机译:如何安全地复制服务(普通版)

摘要

A method is presented for constructing replicated services that retain their availability and integrity despite several servers and clients being corrupted by an intruder, in addition to others failing benignly. More precisely, a service is replicated by 'n' servers in such a way that a correct client will accept a correct server's response if, for some prespecified parameter, k, at least k servers are correct and fewer than k servers are correct. The issue of maintaining causality among client requests is also addressed. A security breach resulting from an intruder's ability to effect a violation of causality in the sequence of requests processed by the service is illustrated. An approach to counter this problem is proposed that requires that fewer than k servers are corrupt and, to ensure liveness, that k is less than or = n - 2t, where t is the assumed maximum total number of both corruptions and benign failures suffered by servers in any system run. An important and novel feature of these schemes is that the client need not be able to identify or authenticate even a single server. Instead, the client is required only to possess at most two public keys for the service.
机译:提出了一种用于构造复制服务的方法,该方法即使有几台服务器和客户端被入侵者破坏,也无法破坏复制服务器的可用性和完整性,而其他服务器和客户端则会良性地失败。更准确地说,服务由“ n”台服务器复制,这样,如果对于某些预先指定的参数,k至少k台服务器正确且少于k台服务器正确,则正确的客户端将接受正确的服务器响应。还解决了在客户请求之间保持因果关系的问题。说明了由于入侵者在服务处理的请求序列中违反因果关系的能力而导致的安全漏洞。提出了一种解决此问题的方法,该方法要求损坏的服务器少于k个,并且为了确保生命周期,k小于或等于n-2t,其中t是假定的最大损坏总数和良性故障的总数。任何系统中的服务器都在运行。这些方案的一个重要且新颖的特征是,客户端甚至不需要识别或认证单个服务器。取而代之的是,客户端仅需要拥有最多两个用于该服务的公共密钥。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号