Please use this identifier to cite or link to this item: https://hdl.handle.net/10316/102685
DC FieldValueLanguage
dc.contributor.authorAraújo, Filipe-
dc.contributor.authorBoychenko, Serhiy-
dc.contributor.authorBarbosa, Raul-
dc.contributor.authorCasimiro, António-
dc.date.accessioned2022-10-06T09:20:22Z-
dc.date.available2022-10-06T09:20:22Z-
dc.date.issued2014-
dc.identifier.issn1867-4828pt
dc.identifier.issn1869-0238pt
dc.identifier.urihttps://hdl.handle.net/10316/102685-
dc.description.abstractExecution of critical services traditionally requires multiple distinct replicas, supported by independent networks and hardware. To operate properly, these services often depend on the correctness of a fraction of replicas, usually over 2/3 or 1/2. Defying the ideal situation, economical reasons may tempt users to replicate critical services onto a single multi-tenant cloud infrastructure. Since this may expose users to correlated failures, we assess the risks for two kinds of majorities: a conventional one, related to the number of replicas, regardless of the machines where they run; and a second one, related to the physical machines where the replicas run. This latter case may exist in multi-tenant virtualized environments only. To assess these risks, under crash and Byzantine failures of virtual and physical machines, we resort to theoretical and experimental evaluation. Contrary to what one might expect, we conclude that it is not always favorable to distribute replicas evenly over a fixed number of physical machines. On the contrary, we found cases where they should be as unbalanced as possible. We systematically identify the best defense for each kind of failure and majority to preserve. We then review the most common real-life attacks on clouds and discuss the a priori placement of service replicas that minimizes the effects of these attacks.pt
dc.language.isoengpt
dc.relationFCT/COMPETE/FEDER - project EXPL/EEI-ESS/2542/2013pt
dc.relationFCT/COMPETE/FEDER - project DECAF, An Exploratory Study of Distributed Cloud Application Failurespt
dc.relationFCT/COMPETE/FEDER - project CMU-PT/RNQ/0015/2009, TRONE, Trustworthy and Resilient Operations in a Network Environment.pt
dc.rightsopenAccesspt
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt
dc.subjectCloud computingpt
dc.subjectFault-Tolerancept
dc.subjectDependabilitypt
dc.subjectVirtualizationpt
dc.titleReplica placement to mitigate attacks on cloudspt
dc.typearticle-
degois.publication.firstPage7pt
degois.publication.issue1pt
degois.publication.titleJournal of Internet Services and Applicationspt
dc.peerreviewedyespt
dc.identifier.doi10.1186/s13174-014-0007-zpt
degois.publication.volume5pt
dc.date.embargo2014-01-01*
uc.date.periodoEmbargo0pt
item.grantfulltextopen-
item.cerifentitytypePublications-
item.languageiso639-1en-
item.openairetypearticle-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextCom Texto completo-
crisitem.author.researchunitCISUC - Centre for Informatics and Systems of the University of Coimbra-
crisitem.author.parentresearchunitFaculty of Sciences and Technology-
crisitem.author.orcid0000-0002-1663-1937-
crisitem.author.orcid0000-0002-6990-1232-
crisitem.author.orcid0000-0002-2916-7571-
Appears in Collections:I&D CISUC - Artigos em Revistas Internacionais
Show simple item record

SCOPUSTM   
Citations

2
checked on May 13, 2024

WEB OF SCIENCETM
Citations

2
checked on May 2, 2024

Page view(s)

32
checked on May 7, 2024

Download(s)

18
checked on May 7, 2024

Google ScholarTM

Check

Altmetric

Altmetric


This item is licensed under a Creative Commons License Creative Commons