Thursday 28th of March 2024
 

Implementation and Analysis of EFRS Technique for Intrusion Tolerance in Distributed Systems



This paper includes designing and implementing a system that uses encryption-fragmentationreplication- scattering for the purpose of developing secure and dependable data storage within a distributed system. The system will consist of one central node which is assumed to be trusted and multiple storage nodes. Data is collected at the central node, which is then encrypted followed by fragmentation. Data fragments then undergo a hash function to give unique hash value of each fragment. These fragments are then replicated and scattered over the network. Thus, the system continues to provide service even in case of failure of some storage nodes.

Keywords: Intrusion, intrusion tolerance, encryption, fragmentation, replication, scattering

Download Full-Text

IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »