skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Defense strategies for cloud computing multi-site server infrastructures

Abstract

We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, and also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-formmore » and composite utility functions.« less

Authors:
ORCiD logo [1];  [2];  [3]
  1. ORNL
  2. Hang Seng Management College, Hon Kong
  3. Texas A&M University, Kingsville, TX, USA
Publication Date:
Research Org.:
Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR) (SC-21)
OSTI Identifier:
1399413
DOE Contract Number:  
AC05-00OR22725
Resource Type:
Conference
Resource Relation:
Conference: International Conference on Distributed Computing and Networking (ICDCN) - Varanasi, , India - 1/4/2018 5:00:00 AM-1/7/2018 5:00:00 AM
Country of Publication:
United States
Language:
English

Citation Formats

Rao, Nageswara S., Ma, Chris Y. T., and He, Fei. Defense strategies for cloud computing multi-site server infrastructures. United States: N. p., 2018. Web. doi:10.1145/3154273.3154344.
Rao, Nageswara S., Ma, Chris Y. T., & He, Fei. Defense strategies for cloud computing multi-site server infrastructures. United States. doi:10.1145/3154273.3154344.
Rao, Nageswara S., Ma, Chris Y. T., and He, Fei. Mon . "Defense strategies for cloud computing multi-site server infrastructures". United States. doi:10.1145/3154273.3154344. https://www.osti.gov/servlets/purl/1399413.
@article{osti_1399413,
title = {Defense strategies for cloud computing multi-site server infrastructures},
author = {Rao, Nageswara S. and Ma, Chris Y. T. and He, Fei},
abstractNote = {We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, and also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.},
doi = {10.1145/3154273.3154344},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {1}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: