Detecting Sybil attacks in cloud computing environments based on fail-stop signature

Jong Beom Lim, Heon Chang Yu, Joon Min Gil

Research output: Contribution to journalArticlepeer-review

10 Citations (Scopus)


Due to the loosely coupled property of cloud computing environments, no node has complete knowledge of the system. For this reason, detecting a Sybil attack in cloud computing environments is a non-trivial task. In such a dynamic system, the use of algorithms based on tree or ring structures for collecting the global state of the system has unfortunate downsides, that is, the structure should be re-constructed in the presence of node joining and leaving. In this paper, we propose an unstructured Sybil attack detection algorithm in cloud computing environments. Our proposed algorithm uses one-to-one communication primitives rather than broadcast primitives and, therefore, the message complexity can be reduced. In our algorithmic design, attacker nodes forging multiple identities are effectively detected by normal nodes with the fail-stop signature scheme. We show that, regardless of the number of attacker nodes, our Sybil attack detection algorithm is able to reach consensus.

Original languageEnglish
Article number35
Issue number3
Publication statusPublished - 2017

Bibliographical note

Funding Information:
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2014R1A1A2055463 and NRF-2015R1D1A1A01061373).

Publisher Copyright:
© 2017 by the authors.


  • Cloud computing
  • Fail-stop signature
  • Sybil attack
  • Unstructured algorithm

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Chemistry (miscellaneous)
  • General Mathematics
  • Physics and Astronomy (miscellaneous)


Dive into the research topics of 'Detecting Sybil attacks in cloud computing environments based on fail-stop signature'. Together they form a unique fingerprint.

Cite this