Questions tagged [distributed-computing]

31 questions
2
votes
1 answer

Is the Ethereum blockchain truly a tamper-proof way to deploy distributed applications?

The Ethereum website says that it provides a "cryptographically secure, decentralized, tamper-proof network" on which applications written in the Solidity contract language could be deployed. (https://www.ethereum.org) Is Ethereum really a way to…
1
vote
1 answer

Does it increase the security if we split data to n pieces and encrypt each one with different key and different algorithm?

For example: a 10 MB file will be sliced to 10 pieces (each 1 MB) and then dispersed between network nodes. Each node will encrypt it with its own key and different algorithm (AES, TwoFish, Blowfish, DES, 3DES, ... ). (without using Rabin's ida or…
Ali
  • 2,694
  • 1
  • 14
  • 23
1
vote
4 answers

Is there any defense against Brute-Force done on a local encrypted file?

Let me start off by saying I don't know very much about encryption, hashing, cracking, etc. I'm just a typical computer enthusiasts, programmer and researcher with many questions. So, I've discovered that there's a thing called "Distributed…
1
vote
2 answers

How is distributed computing security ensured?

I browsed some articles found on the web but none of them seems to have the answer to my question (or maybe I didn't see it). I've heard that it is possible to give one's CPU unused power to research laboratories to help developing science while…
Antoine Pinsard
  • 4,597
  • 4
  • 15
  • 27
1
vote
2 answers

How to select a random node when nodes are untrusted in a distributed network?

Assume in a distributed network, where the nodes are not trusted and are identified by their public keys, we intend to select one of them in a random process. In such a situation, all of the nodes have the same chances to be elected. Since the…
Questioner
  • 1,277
  • 2
  • 10
  • 14
1
vote
1 answer

Blockchain + shared unused bandwidth as the proxy front = ddos mitigated?

Pentesting the new webapp that we have developed before having an external source have a go at it and give us a risk assessment. Now we have come to the portion right at the end; DDOS. For the most part guides outlining best practices have been…
Nilo
  • 13
  • 2
1
vote
0 answers

What is the reason why I am not able to able to use Maltego unless I disable port 135 (RPC) inbound on my Windows computer?

I originally attempted to use Maltego before making any configuration changes to my firewall; however, I was being blocked because I had port 135 disabled which is what Windows uses for RPC. After disabling the inbound rule, I was able to connect.…
1
vote
0 answers

How to secure unique identification of physical resources in a distributed system?

I'm attempting to build a mechanism to prevent frauds and provide traceability of physical resources in a distributed system. The idea is straightforward: the resource travels hop-by-hop on a network and each hop is held by a different actor which…
1
vote
1 answer

How to prove that something happened before some time in a distributed way?

To prove that something happened after some time in a distributed way, just refer to something publicly know just before. Is that right? (Though I wonder how to make the time granularity smaller.) What about to prove that something happened before…
Schezuk
  • 131
  • 4
1
vote
1 answer

Is there a secure method of distributing keys to network-booted diskless nodes?

I have a bit of an 'initial trust' issue. We are using CoreOS to run Kubernetes, and secure both the etcd API and the Kubernetes API servers using client certificates. We are using iPXE to boot everything except the etcd servers. The issue I am…
1
vote
1 answer

Any benefit to proof-of-work to avoid database lookups?

I thought I was being clever - overly engineering a (just for my learning) mobile app that is scaled out using only distributed technologies (AWS Lambda, S3, and Dynamo DB in this case). I want to allow apps to register themselves in the database,…
Jason Kleban
  • 207
  • 1
  • 7
0
votes
1 answer

Secure distributed storing and querying of [medical] data?

Comparing ways of distributing and securely storing and querying structured and schemaless data. Currently I am using MongoDB, but am looking into (Postgres|MySQL)&CryptDB, Cassandra and others. What do I need to keep in mind, for securely storing…
0
votes
2 answers

Secure Authentication of Technical User to a Network-Appliance-HSM

Let's assume we have an internal environment consisting of some distributed systems, one central system and an internal PKI. The central system is serving a cluster of HSMs that shall be accessable by network in a securely controlled way. On the…
0
votes
1 answer

Methods to Prove Data Authenticity from Potentially Compromised Sources?

I've been thinking about this problem for some time and I wanted to ask if there are any known methods, or research papers, about how to prove "authenticity" or correctness of data originating from a potentially compromised source (remote server,…
0
votes
1 answer

Somebody trying to ssh attack via hosting services on me. What is the best response?

I am having a lot of failed ssh authentication requests for the past two days, from various service providers. It seems somebody is intent on breaking into my computer. I am using Ubuntu on a Dell laptop, I need to have sshd running for work…