scispace - formally typeset
Journal ArticleDOI

Practical byzantine fault tolerance and proactive recovery

Reads0
Chats0
TLDR
A new replication algorithm, BFT, is described that can be used to build highly available systems that tolerate Byzantine faults and is used to implement the first Byzantine-fault-tolerant NFS file system, BFS.
Abstract
Our growing reliance on online services accessible on the Internet demands highly available systems that provide correct service without interruptions. Software bugs, operator mistakes, and malicious attacks are a major cause of service interruptions and they can cause arbitrary behavior, that is, Byzantine faults. This article describes a new replication algorithm, BFT, that can be used to build highly available systems that tolerate Byzantine faults. BFT can be used in practice to implement real services: it performs well, it is safe in asynchronous environments such as the Internet, it incorporates mechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. The recovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of the system provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability. BFT has been implemented as a generic program library with a simple interface. We used the library to implement the first Byzantine-fault-tolerant NFS file system, BFS. The BFT library and BFS perform well because the library incorporates several important optimizations, the most important of which is the use of symmetric cryptography to authenticate messages. The performance results show that BFS performs 2p faster to 24p slower than production implementations of the NFS protocol that are not replicated. This supports our claim that the BFT library can be used to build practical systems that tolerate Byzantine faults.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Distributed Key Generation for the Internet

TL;DR: This work proposes a practical system model for distributed key generation (DKG) and defines an efficient verifiable secret sharing scheme in it, and designs a DKG protocol for public-key cryptography.
Proceedings ArticleDOI

Reputation-Based Byzantine Fault-Tolerance for Consortium Blockchain

TL;DR: Reputation-based Byzantine Fault Tolerance (RBFT) algorithm that incorporates a reputation model to evaluate the operations of each node in the consensus process and an innovative reputation-based primary change scheme that reduces the security risk of the primary.
Journal ArticleDOI

Smart Contract-Based Blockchain-Envisioned Authentication Scheme for Smart Farming

TL;DR: A new smart contract-based blockchain-envisioned authenticated key agreement mechanism in a smart farming environment that offers superior security and more functionality features as compared to existing competing authentication protocols is designed.
Posted Content

Breaking the O(n^2) Bit Barrier: Scalable Byzantine agreement with an Adaptive Adversary

TL;DR: In this paper, the authors present an algorithm for Byzantine agreement with high probability against an adaptive adversary, which can take over processors at any time during the protocol, up to the point of taking over arbitrarily close to a 1/3 fraction.
Journal ArticleDOI

Analysis of operating system diversity for intrusion tolerance

TL;DR: Analysis of operating system's vulnerability data from the NIST National Vulnerability Database shows that by selecting appropriate OSs, one can preclude (or reduce substantially) common vulnerabilities from occurring in the replicas of the intrusion‐tolerant system.
References
More filters
Book ChapterDOI

Time, clocks, and the ordering of events in a distributed system

TL;DR: In this paper, the concept of one event happening before another in a distributed system is examined, and a distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events.
Journal ArticleDOI

Time, clocks, and the ordering of events in a distributed system

TL;DR: In this article, the concept of one event happening before another in a distributed system is examined, and a distributed algorithm is given for synchronizing a system of logical clocks which can be used to totally order the events.
Journal ArticleDOI

The Byzantine Generals Problem

TL;DR: The Albanian Generals Problem as mentioned in this paper is a generalization of Dijkstra's dining philosophers problem, where two generals have to come to a common agreement on whether to attack or retreat, but can communicate only by sending messengers who might never arrive.
Book ChapterDOI

The Byzantine generals problem

TL;DR: In this article, a group of generals of the Byzantine army camped with their troops around an enemy city are shown to agree upon a common battle plan using only oral messages, if and only if more than two-thirds of the generals are loyal; so a single traitor can confound two loyal generals.
Journal ArticleDOI

Impossibility of distributed consensus with one faulty process

TL;DR: In this paper, it is shown that every protocol for this problem has the possibility of nontermination, even with only one faulty process.
Related Papers (5)