scispace - formally typeset
Journal ArticleDOI

Practical byzantine fault tolerance and proactive recovery

Reads0
Chats0
TLDR
A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.
Abstract
Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement real services: it performs well, it is safe in asynchronous environments such as the Internet, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability. BFT has been implemented as a generic program library with a simple interface. We used the library to implement the first Byzantine-fault-tolerant NFS file system, BFS. The BFT library and BFS perform well because the library incorporates several important optimizations, the most important of which is the use of symmetric cryptography to authenticate messages. The performance results show that BFS performs 2p faster to 24p slower than production implementations of the NFS protocol that are not replicated. This supports our claim that the BFT library can be used to build practical systems that tolerate Byzantine faults.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

DQ: Two approaches to measure the degree of decentralization of blockchain

TL;DR: This paper outlines the meaning of each decentralization quotient and explains how those indices can be applied in respect of the user protection and the criteria for determining whether decentralized are not well established and do not reflect the real world well.
Journal ArticleDOI

Accountability for Service Compliance: A Survey

TL;DR: The authors discuss the concept and desirable properties of accountability, clarify the requirements and differences that distinguish accountability to other related approaches, and systematically summarize and evaluate various approaches of accountability.
Journal ArticleDOI

A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution

TL;DR: In this paper, an asynchronous protocol that provides resource-efficient execution by combining failure masking with imperfect failure detection and checkpointing has been proposed for Byzantine-fault-tolerant replication that is particularly well suited for services in which request processing is resource-intensive.
Proceedings ArticleDOI

Virtual infrastructure for collision-prone wireless networks

TL;DR: A new protocol for emulating virtual infrastructure in collision-prone wireless networks is presented, designed specifically for ad hoc deployments, and introduces only constant overhead per virtual round emulated.
References
More filters
Book ChapterDOI

Time, clocks, and the ordering of events in a distributed system

TL;DR: In this paper, the concept of one event happening before another in a distributed system is examined, and a distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events.
Journal ArticleDOI

Time, clocks, and the ordering of events in a distributed system

TL;DR: In this article, the concept of one event happening before another in a distributed system is examined, and a distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events.
Journal ArticleDOI

The Byzantine Generals Problem

TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Journal ArticleDOI

Impossibility of distributed consensus with one faulty process

TL;DR: In this paper, it is shown that every protocol for this problem has the possibility of nontermination, even with only one faulty process.
Related Papers (5)