DocumentCode :
1837977
Title :
Analysis of binary voting algorithms for use in fault-tolerant and secure computing
Author :
Kwiat, Kevin ; Taylor, Alan ; Zwicker, William ; Hill, Daniel ; Wetzonis, Sean ; Ren, Shangping
Author_Institution :
Cyber Sci. Branch, Air Force Res. Lab., Rome, NY, USA
fYear :
2010
fDate :
Nov. 30 2010-Dec. 2 2010
Firstpage :
269
Lastpage :
273
Abstract :
We examine three binary voting algorithms used with computer replication for fault tolerance and separately observe the resultant reliability and security. We offer insights to answer the question: Can a voting algorithm provide a system with both security and reliability? We show that while random dictator (i.e., randomly choosing one of the replicas) provides good security and majority rule yields good fault tolerance neither is effective in both. We present the random troika (a subset of 3 replicas) as an effective combination of fault-tolerant and secure computing.
Keywords :
distributed processing; fault tolerant computing; security of data; social aspects of automation; binary voting algorithm; computer replication; fault tolerant computing; random troika; reliability algorithm; secure computing; Clustering algorithms; Computers; Fault tolerance; Fault tolerant systems; Probability; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Engineering and Systems (ICCES), 2010 International Conference on
Conference_Location :
Cairo
Print_ISBN :
978-1-4244-7040-2
Type :
conf
DOI :
10.1109/ICCES.2010.5674867
Filename :
5674867
Link To Document :
بازگشت