Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach


Serverless distributed computing has received significant attention from both the industry and the research community. Among the most popular applications are the wide area network file systems, exemplified by CFS, Farsite and OceanStore. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use cryptographic techniques to maintain file confidentiality and integrity from malicious nodes. Unfortunately, cryptographic techniques cannot protect a file holder from a Denial-of-Service (DoS) or a host compromise attack. Hence, most of these distributed file systems are vulnerable to targeted file attacks, wherein an adversary attempts to attack a small (chosen) set of files by attacking the nodes that host them. This paper presents LocationGuard - a location hiding technique for securing overlay file storage systems from targeted file attacks. LocationGuard has three essential components: (i) location key, (ii) routing guard, a secure algorithm that protects accesses to a file in the overlay network given its location key, and (iii) a set of location inference guards. Our experimental results quantify the overhead of employing LocationGuard and demonstrate its effectiveness against DoS attacks, host compromise attacks and various location inference attacks.

DOI: 10.1109/TPDS.2008.125

Extracted Key Phrases

16 Figures and Tables

Cite this paper

@article{Srivatsa2009MitigatingDA, title={Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach}, author={Mudhakar Srivatsa and Ling Liu}, journal={IEEE Transactions on Parallel and Distributed Systems}, year={2009}, volume={20}, pages={512-527} }