scispace - formally typeset
Journal ArticleDOI

Practical byzantine fault tolerance and proactive recovery

Reads0
Chats0
TLDR
A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.
Abstract
Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement real services: it performs well, it is safe in asynchronous environments such as the Internet, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability. BFT has been implemented as a generic program library with a simple interface. We used the library to implement the first Byzantine-fault-tolerant NFS file system, BFS. The BFT library and BFS perform well because the library incorporates several important optimizations, the most important of which is the use of symmetric cryptography to authenticate messages. The performance results show that BFS performs 2p faster to 24p slower than production implementations of the NFS protocol that are not replicated. This supports our claim that the BFT library can be used to build practical systems that tolerate Byzantine faults.

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

Verifiable computation using multiple provers.

TL;DR: This paper presents a new MIP for delegating computation that extends insights from a powerful IP protocol, and presents Clover, a built system for verifiable computation, based on the protocol.
Posted ContentDOI

SoK: Oracles from the Ground Truth to Market Manipulation

TL;DR: In this paper, the design alternatives for oracles, showcase attacks, and discuss attack mitigation strategies are discussed, and a SoK is presented to evaluate the security of oracles in blockchain-based smart contracts.
Proceedings ArticleDOI

Independent faults in the cloud

TL;DR: This paper categorizes four different failure independence levels that could be obtained from the cloud, and reports on the experiments to identifying the most appropriate BFT protocol for each level.
Proceedings ArticleDOI

Optimistically Terminating Consensus: All Asynchronous Consensus Protocols in One Framework

TL;DR: This paper shows an OTC-based framework which can reconstruct all major asynchronous consensus algorithms, even in Byzantine settings, with no overhead in latency or the required number of processes.

Ensuring Data Integrity in Cloud Computing

TL;DR: A new data encoding scheme called layered interleaving is proposed, designed for time-sensitive packet recovery in the presence of bursty loss, which is highly efficient in recovering the singleton losses almost immediately and from bursty data losses.
References
More filters
Book ChapterDOI

Time, clocks, and the ordering of events in a distributed system

TL;DR: In this paper, the concept of one event happening before another in a distributed system is examined, and a distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events.
Journal ArticleDOI

Time, clocks, and the ordering of events in a distributed system

TL;DR: In this article, the concept of one event happening before another in a distributed system is examined, and a distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events.
Journal ArticleDOI

The Byzantine Generals Problem

TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Journal ArticleDOI

Impossibility of distributed consensus with one faulty process

TL;DR: In this paper, it is shown that every protocol for this problem has the possibility of nontermination, even with only one faulty process.
Related Papers (5)