{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T09:45:57Z","timestamp":1720086357485},"reference-count":53,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering & System Safety"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1016\/j.ress.2020.106969","type":"journal-article","created":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T08:47:26Z","timestamp":1588841246000},"page":"106969","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Optimal early warning defense of N-version programming service against co-resident attacks in cloud system"],"prefix":"10.1016","volume":"201","author":[{"given":"Gregory","family":"Levitin","sequence":"first","affiliation":[]},{"given":"Liudong","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Yanping","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ress.2020.106969_bib0001","first-page":"313","article-title":"Performance analysis of media cloud-based multimedia systems with retrying fault-tolerance technique","volume":"8","author":"Wang","year":"2014","journal-title":"IEEE Syst J Special Issue Recent Adv Cloud-based Multimedia Syst"},{"issue":"2","key":"10.1016\/j.ress.2020.106969_bib0002","doi-asserted-by":"crossref","first-page":"1491","DOI":"10.1109\/TSE.1985.231893","article-title":"The N-version approach to fault-tolerant software","volume":"11","author":"Avizienis","year":"1985","journal-title":"IEEE Trans Softw Eng"},{"key":"10.1016\/j.ress.2020.106969_bib0003","first-page":"56","article-title":"Diversity through N-version programming: current state, challenges and recommendations","volume":"2","author":"Khoury","year":"2012","journal-title":"I.J. Inform Tech Comp Sci"},{"issue":"3","key":"10.1016\/j.ress.2020.106969_bib0004","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MSP.2018.2701161","article-title":"Making multivariant programming practical and inexpensive","volume":"16","author":"Franz","year":"2018","journal-title":"IEEE Secur Privacy"},{"issue":"4","key":"10.1016\/j.ress.2020.106969_bib0005","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"Armbrust","year":"2009","journal-title":"Commun ACM"},{"issue":"1","key":"10.1016\/j.ress.2020.106969_bib0006","first-page":"204","article-title":"Improvising reliability through N-version programming in cloud environment","volume":"3","author":"Pramila","year":"2015","journal-title":"Int J Adv Tech Eng Sci"},{"key":"10.1016\/j.ress.2020.106969_bib0007","first-page":"189","article-title":"Optimal fault tolerant service provisioning for cloud application","author":"Liu","year":"2017","journal-title":"Macau"},{"key":"10.1016\/j.ress.2020.106969_bib0008","doi-asserted-by":"crossref","unstructured":"F.Khomh, \"On improving the dependability of cloud applications with fault-tolerance,\" Proc WICSA, Article No. 2, pp. 1\u20133, https:\/\/doi.org\/10.1145\/2578128.2578228, April 2014.","DOI":"10.1145\/2578128.2578228"},{"key":"10.1016\/j.ress.2020.106969_bib0009","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1109\/QRS-C.2016.56","article-title":"Economics of Resilient Cloud Services","author":"Wagner","year":"2016","journal-title":"Proc 2016 IEEE Int Conf Softw Qual Reliab Secur Compan (QRS-C)"},{"key":"10.1016\/j.ress.2020.106969_bib0010","doi-asserted-by":"crossref","unstructured":"D. R.White, \"Cloud Computing and SBSE,\" In: RuheG., ZhangY. (eds) Search Based Software Engineering. SSBSE 2013. Lecture Notes in Computer Science, vol 8084. Springer, Berlin, Heidelberg, 2013.","DOI":"10.1007\/978-3-642-39742-4_3"},{"issue":"2","key":"10.1016\/j.ress.2020.106969_bib0011","doi-asserted-by":"crossref","first-page":"202","DOI":"10.14419\/jacst.v3i2.3588","article-title":"Securing the cloud: threats, attacks and mitigation techniques","volume":"3","author":"Alani","year":"2014","journal-title":"J Adv Comp Sci Tech"},{"key":"10.1016\/j.ress.2020.106969_bib0012","doi-asserted-by":"crossref","unstructured":"T.Ristenpart, E.Tromer, H.Shacham, and S.Savage, \"Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,\u201d Proceedings of the 16th ACM conference on Computer and communications security, pp. 199-212, 2009.","DOI":"10.1145\/1653662.1653687"},{"issue":"5","key":"10.1016\/j.ress.2020.106969_bib0013","first-page":"3019","article-title":"An extensive survey on co-resident attack in dynamic cloud computing environment","volume":"11","author":"Nalinipriya","year":"2016","journal-title":"Int J Appl Eng Res"},{"key":"10.1016\/j.ress.2020.106969_bib0014","article-title":"Defending against co-resident attacks in cloud computing, PhD thesis","author":"Han","year":"2015","journal-title":"Univ Melbourne"},{"key":"10.1016\/j.ress.2020.106969_bib0015","doi-asserted-by":"crossref","unstructured":"G.Lodi, et\u00a0al, \"Defending financial infrastructures through early warning systems: the intelligence cloud approach,\" Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, Article No. 18, Oak Ridge, Tennessee, USA\u2014 April 13 - 15, 2009.","DOI":"10.1145\/1558607.1558628"},{"key":"10.1016\/j.ress.2020.106969_bib0016","first-page":"29","article-title":"Early warning systems for cyber defence","author":"Kalutarage","year":"2015","journal-title":"Int Workshop Open Probl Netw Secur"},{"key":"10.1016\/j.ress.2020.106969_bib0017","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.ress.2015.05.003","article-title":"Reliability and effectiveness of early warning systems for natural hazards: Concept and application to debris flow warning","volume":"142","author":"S\u00e4ttele","year":"2015","journal-title":"Reliab Eng Syst Safety"},{"key":"10.1016\/j.ress.2020.106969_bib0018","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.soildyn.2016.10.015","article-title":"Reliability assessment on earthquake early warning: A case study from Taiwan","volume":"92","author":"Xu","year":"2017","journal-title":"Soil Dyn Earthquake Eng"},{"issue":"2","key":"10.1016\/j.ress.2020.106969_bib0019","doi-asserted-by":"crossref","first-page":"pp.630","DOI":"10.1016\/j.future.2017.04.002","article-title":"Hybrid scheduling algorithm in early warning systems","volume":"79","author":"Visheratin","year":"2018","journal-title":"Future Gen Comp Syst"},{"key":"10.1016\/j.ress.2020.106969_bib0020","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1016\/j.procs.2014.05.153","article-title":"Hybrid scheduling algorithm in early warning systems","volume":"29","author":"Nasonov","year":"2014","journal-title":"Procedia Comp Sci"},{"key":"10.1016\/j.ress.2020.106969_bib0021","unstructured":"X.Wang and X.Hu, \"The reliability analysis on public crisis early-warning system,\" Proc. of 7th International Conference on Service Systems and Service Management, Tokyo, pp. 1-6, 2010."},{"key":"10.1016\/j.ress.2020.106969_bib0022","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/j.ress.2017.08.021","article-title":"Defending a cyber system with early warning mechanism","volume":"169","author":"Chen","year":"2018","journal-title":"Reliab Eng Syst Safety"},{"key":"10.1016\/j.ress.2020.106969_bib0023","doi-asserted-by":"crossref","unstructured":"Y.Zhang and M. K.Reiter, \u201cD\u00fcppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud,\u201d Proc. of ACM SIGSAC Conf. Comput. Commun. Secur., pp. 827\u2013838, 2013.","DOI":"10.1145\/2508859.2516741"},{"key":"10.1016\/j.ress.2020.106969_bib0024","article-title":"STEALTHMEM: System level protection against cache-based side channel attacks in the cloud","author":"Kim","year":"2012","journal-title":"Proc 21st USENIX Secur Symp"},{"key":"10.1016\/j.ress.2020.106969_bib0025","first-page":"687","article-title":"Scheduler-based defenses against cross-VM side-channels","author":"Varadarajan","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"10.1016\/j.ress.2020.106969_bib0026","doi-asserted-by":"crossref","unstructured":"Y.Zhang, A.Juels, A.Oprea, and M. K.Reiter, \"HomeAlone: Co-residency detection in the cloud via side-channel analysis,\" Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Washington, DC, USA, pp. 313-328, 2011.","DOI":"10.1109\/SP.2011.31"},{"issue":"2","key":"10.1016\/j.ress.2020.106969_bib0027","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/s10207-013-0210-0","article-title":"On detecting co-resident cloud instances using network flow watermarking techniques","volume":"13","author":"Bates","year":"2014","journal-title":"Int J Inform Secur"},{"key":"10.1016\/j.ress.2020.106969_bib0028","series-title":"Information and Communications Security (Lecture Notes in Computer Science)","first-page":"113","article-title":"Detecting malicious co-resident virtual machines indulging in load-based attacks","author":"Sundareswaran","year":"2013"},{"key":"10.1016\/j.ress.2020.106969_bib0029","first-page":"186","article-title":"An approach with two-stage mode to detect cache-based side channel attacks","author":"Yu","year":"2013","journal-title":"Proc Int Conf Inf Netw"},{"key":"10.1016\/j.ress.2020.106969_bib0030","series-title":"Proceedings of the 24th USENIX Conference on Security Symposium","first-page":"913","article-title":"A placement vulnerability study in multi-tenant public clouds","author":"Varadarajan","year":"2015"},{"key":"10.1016\/j.ress.2020.106969_bib0031","unstructured":"Z.Xu, H.Wang and Z.Wu, \"A measurement study on co-residence threat inside the cloud,\" Proceedings of the 24th USENIX Security Symposium, Washington, D.C. August 12\u201314, 2015."},{"key":"10.1016\/j.ress.2020.106969_bib0032","doi-asserted-by":"crossref","unstructured":"H. S.Bedi and S.Shiva, \"Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms,\" Proc. of the International Conference on Advances in Computing, Communications and Informatics, pp. 463-469, ACMNew York, NY, USA, 2012.","DOI":"10.1145\/2345396.2345473"},{"issue":"3","key":"10.1016\/j.ress.2020.106969_bib0033","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1109\/TIFS.2015.2505680","article-title":"A game theoretical approach to defend against co-resident attacks in cloud computing: preventing co-residence using semi-supervised learning","volume":"11","author":"Han","year":"2015","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"10.1016\/j.ress.2020.106969_bib0034","first-page":"1","article-title":"Malicious co-residency on the cloud: Attacks and defense","author":"Atya","year":"2017","journal-title":"IEEE INFOCOM 2017 - IEEE Conf Comp Commun"},{"key":"10.1016\/j.ress.2020.106969_bib0035","first-page":"9","article-title":"Colocation-resistant clouds","author":"Azar","year":"2014","journal-title":"Proc 6th ACM Workshop Cloud Comput Secur"},{"issue":"1","key":"10.1016\/j.ress.2020.106969_bib0036","first-page":"95","article-title":"Using virtual machine allocation policies to defend against co-resident attacks in cloud computing","volume":"14","author":"Han","year":"2017","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"10.1016\/j.ress.2020.106969_bib0037","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.ress.2011.12.015","article-title":"Data survivability vs. security in information systems","volume":"100","author":"Levitin","year":"2012","journal-title":"Reliab Eng Syst Safety"},{"issue":"16","key":"10.1016\/j.ress.2020.106969_bib0038","article-title":"Privacy preserving using data partitioning technique for secure cloud storage","volume":"116","author":"Shinde","year":"2015","journal-title":"Int J Comp Appl (0975 \u2013 8887)"},{"key":"10.1016\/j.ress.2020.106969_bib0039","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.future.2016.12.025","article-title":"Optimal data partitioning in cloud computing system with random server assignment","volume":"70","author":"Levitin","year":"2017","journal-title":"Future Gen Comp Syst"},{"key":"10.1016\/j.ress.2020.106969_bib0040","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.ress.2017.06.006","article-title":"Balancing theft and corruption threats by data partition in cloud system with independent server protection","volume":"167","author":"Xing","year":"2017","journal-title":"Reliab Eng Syst Safety"},{"issue":"4","key":"10.1016\/j.ress.2020.106969_bib0041","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1111\/risa.13219","article-title":"Security of separated data in cloud systems with competing attack detection and data theft processes","volume":"39","author":"Levitin","year":"2019","journal-title":"Risk Anal"},{"key":"10.1016\/j.ress.2020.106969_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2018.09.014","article-title":"Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks","volume":"192","author":"Luo","year":"2019","journal-title":"Reliab Eng Syst Safety"},{"issue":"2","key":"10.1016\/j.ress.2020.106969_bib0043","doi-asserted-by":"crossref","first-page":"676","DOI":"10.1016\/j.ejor.2017.11.064","article-title":"Co-residence based data vulnerability vs. security in cloud computing system with random server assignment","volume":"267","author":"Levitin","year":"2018","journal-title":"European J Operat Res"},{"key":"10.1016\/j.ress.2020.106969_bib0044","doi-asserted-by":"crossref","unstructured":"L.Xing, G.Levitin, and Y.Xiang, \u201cDefending N-version programming service components against co-resident attacks in IoT cloud systems,\u201d IEEE Trans Serv Comput, in press, doi: 10.1109\/TSC.2019.2904958.","DOI":"10.1109\/TSC.2019.2904958"},{"key":"10.1016\/j.ress.2020.106969_bib0045","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2019.106666","article-title":"Optimization of time constrained N-version programming service components with competing task execution and version corruption processes","volume":"193","author":"Levitin","year":"2020","journal-title":"Reliab Eng Syst Safety"},{"issue":"14","key":"10.1016\/j.ress.2020.106969_bib0046","doi-asserted-by":"crossref","first-page":"2534","DOI":"10.1080\/02664763.2016.1257590","article-title":"Modeling and predicting extreme cyber attack rates via marked point processes","volume":"44","author":"Peng","year":"2017","journal-title":"J Appl Stat"},{"issue":"8","key":"10.1016\/j.ress.2020.106969_bib0047","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.1109\/TIFS.2015.2422261","article-title":"Predicting cyber attack rates with extreme values","volume":"10","author":"Zhan","year":"2015","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"10.1016\/j.ress.2020.106969_bib0048","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/ICDMW.2017.92","article-title":"Data mining in long-term honeypot data","author":"Fraunholz","year":"2017","journal-title":"IEEE Int Conf Data Mining Workshops (ICDMW)"},{"issue":"11","key":"10.1016\/j.ress.2020.106969_bib0049","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1109\/TIFS.2013.2279800","article-title":"Characterizing honeypot-captured cyber attacks: Statistical framework and case study","volume":"8","author":"Zhan","year":"2013","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"10.1016\/j.ress.2020.106969_bib0050","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.ress.2016.01.002","article-title":"Defending a single object against an attacker trying to detect a subset of false targets","volume":"149","author":"Peng","year":"2016","journal-title":"Reliab Eng Syst Safety"},{"key":"10.1016\/j.ress.2020.106969_bib0051","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.ress.2012.11.015","article-title":"Is it wise to leave some false targets unprotected","volume":"112","author":"Levitin","year":"2013","journal-title":"Reliab Eng Syst Safety"},{"key":"10.1016\/j.ress.2020.106969_bib0052","series-title":"ISBN: 978-1-119-50763-5","article-title":"Modeling and analysis of dynamic and dependent behaviors","author":"Xing","year":"2019"},{"issue":"18","key":"10.1016\/j.ress.2020.106969_bib0053","doi-asserted-by":"crossref","first-page":"5681","DOI":"10.1016\/j.apm.2015.01.036","article-title":"Service reliability modeling of distributed computing systems with virus epidemics","volume":"39","author":"Li","year":"2015","journal-title":"Appl Math Model"}],"container-title":["Reliability Engineering & System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832019311949?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832019311949?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T12:21:30Z","timestamp":1690633290000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832019311949"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":53,"alternative-id":["S0951832019311949"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2020.106969","relation":{},"ISSN":["0951-8320"],"issn-type":[{"value":"0951-8320","type":"print"}],"subject":[],"published":{"date-parts":[[2020,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Optimal early warning defense of N-version programming service against co-resident attacks in cloud system","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2020.106969","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106969"}}