ACM Transactions on Information and System Security, November 2001

Slides:



Advertisements
Similar presentations
Global States.
Advertisements

Impossibility of Distributed Consensus with One Faulty Process
CS 542: Topics in Distributed Systems Diganta Goswami.
CS425 /CSE424/ECE428 – Distributed Systems – Fall 2011 Material derived from slides by I. Gupta, M. Harandi, J. Hou, S. Mitra, K. Nahrstedt, N. Vaidya.
DISTRIBUTED SYSTEMS II FAULT-TOLERANT BROADCAST Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Teaser - Introduction to Distributed Computing
Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both.
1 The Case for Byzantine Fault Detection. 2 Challenge: Byzantine faults Distributed systems are subject to a variety of failures and attacks Hacker break-in.
An evaluation of ring-based algorithms for the Eventually Perfect failure detector class Joachim Wieland Mikel Larrea Alberto Lafuente The University of.
Failure detector The story goes back to the FLP’85 impossibility result about consensus in presence of crash failures. If crash can be detected, then consensus.
DISTRIBUTED SYSTEMS II FAULT-TOLERANT AGREEMENT Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Failure Detectors CS 717 Ashish Motivala Dec 6 th 2001.
UPV / EHU Efficient Eventual Leader Election in Crash-Recovery Systems Mikel Larrea, Cristian Martín, Iratxe Soraluze University of the Basque Country,
Byzantine Generals Problem: Solution using signed messages.
Failure Detectors. Can we do anything in asynchronous systems? Reliable broadcast –Process j sends a message m to all processes in the system –Requirement:
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
UPV - EHU An Evaluation of Communication-Optimal P Algorithms Mikel Larrea Iratxe Soraluze Roberto Cortiñas Alberto Lafuente Department of Computer Architecture.
CS 582 / CMPE 481 Distributed Systems Fault Tolerance.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 3 – Distributed Systems.
Asynchronous Consensus (Some Slides borrowed from ppt on Web.(by Ken Birman) )
SRG PeerReview: Practical Accountability for Distributed Systems Andreas Heaberlen, Petr Kouznetsov, and Peter Druschel SOSP’07.
1 Secure Failure Detection in TrustedPals Felix Freiling University of Mannheim San Sebastian Aachen Mannheim Joint Work with: Marjan Ghajar-Azadanlou.
1 Principles of Reliable Distributed Systems Lecture 5: Failure Models, Fault-Tolerant Broadcasts and State-Machine Replication Spring 2005 Dr. Idit Keidar.
Oct 1999SRDS 991 On Diffusing Updates in a Byzantine Environment Dahlia Malkhi Yishay Mansour Michael K. Reiter.
Distributed Systems Fall 2009 Replication Fall 20095DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
Distributed Algorithms: Agreement Protocols. Problems of Agreement l A set of processes need to agree on a value (decision), after one or more processes.
Composition Model and its code. bound:=bound+1.
The Architecture of the Starfish System: Mapping the Survivability Space Kim Kihlstrom Chris Phillips Chris Ritchey Ben LaBarbera Westmont College Priya.
The Starfish System: Intrusion Detection and Intrusion Tolerance for Middleware Systems Kim Potter Kihlstrom Westmont College Santa Barbara, CA, USA Priya.
TOTEM: A FAULT-TOLERANT MULTICAST GROUP COMMUNICATION SYSTEM L. E. Moser, P. M. Melliar Smith, D. A. Agarwal, B. K. Budhia C. A. Lingley-Papadopoulos University.
Total Order Broadcast and Multicast Algorithms: Taxonomy and Survey (Paper by X. Défago, A. Schiper, and P. Urbán) ACM computing Surveys, Vol. 36,No 4,
Review for Exam 2. Topics included Deadlock detection Resource and communication deadlock Graph algorithms: Routing, spanning tree, MST, leader election.
DISTRIBUTED SYSTEMS II FAULT-TOLERANT AGREEMENT Prof Philippas Tsigas Distributed Computing and Systems Research Group.
ACM 511 Introduction to Computer Networks. Computer Networks.
Coordination and Agreement. Topics Distributed Mutual Exclusion Leader Election.
Byzantine fault-tolerance COMP 413 Fall Overview Models –Synchronous vs. asynchronous systems –Byzantine failure model Secure storage with self-certifying.
Agenda Fail Stop Processors –Problem Definition –Implementation with reliable stable storage –Implementation without reliable stable storage Failure Detection.
November NC state university Group Communication Specifications Gregory V Chockler, Idit Keidar, Roman Vitenberg Presented by – Jyothish S Varma.
Totally Ordered Broadcast in the face of Network Partitions [Keidar and Dolev,2000] INF5360 Student Presentation 4/3-08 Miran Damjanovic
The Totem Single-Ring Ordering and Membership Protocol Y. Amir, L. E. Moser, P. M Melliar-Smith, D. A. Agarwal, P. Ciarfella.
Exercises for Chapter 15: COORDINATION AND AGREEMENT From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 3, © Addison-Wesley.
PeerReview: Practical Accountability for Distributed Systems SOSP 07.
Revisiting failure detectors Some of you asked questions about implementing consensus using S - how does it differ from reaching consensus using P. Here.
Lecture 10: Coordination and Agreement (Chap 12) Haibin Zhu, PhD. Assistant Professor Department of Computer Science Nipissing University © 2002.
Introduction to Active Directory
Failure Detectors n motivation n failure detector properties n failure detector classes u detector reduction u equivalence between classes n consensus.
CSE 486/586 CSE 486/586 Distributed Systems Leader Election Steve Ko Computer Sciences and Engineering University at Buffalo.
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Exercises for Chapter 11: COORDINATION AND AGREEMENT
Coordination and Agreement
CSE 486/586 Distributed Systems Failure Detectors
: An Introduction to Computer Networks
CSE 486/586 Distributed Systems Failure Detectors
CSE 486/586 Distributed Systems Failure Detectors
Computer Science 425 Distributed Systems CS 425 / ECE 428 Fall 2013
Outline Distributed Mutual Exclusion Distributed Deadlock Detection
Agreement Protocols CS60002: Distributed Systems
Parallel and Distributed Algorithms
Security in Network Communications
Active replication for fault tolerance
EEC 688/788 Secure and Dependable Computing
CSE 486/586 Distributed Systems Leader Election
Distributed Transactions
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
Corona Robust Low Atomicity Peer-To-Peer Systems
CSE 486/586 Distributed Systems Failure Detectors
Design.
CSE 486/586 Distributed Systems Leader Election
Blockchains Lecture 2.
Presentation transcript:

The SecureRing Group Communication System By Kihlstrom, Moser, and Melliar-Smith ACM Transactions on Information and System Security, November 2001 Presented by Jessica Lunney

Motivation Reliable group communication to create a survivable, distributed system High throughput Reasonable latency Avoid the high overhead of protocols that excessively use digital signatures

Features of a SecureRing Remains correct and reliable despite Byzantine faulty behavior - survivability Allows one digital signature to cover multiple messages

System Model n processors Partially synchronous, distributed Every processor has unique id Completely connected network Processors multicast to everyone, including themselves Logical ring overlaid upon network Every processor has private key and access to public keys

Assumptions Network will not partition All processors (servers) operate deterministically A system of size n always contains: at least ceil((2n + 1)/3) correct processors up to floor((n-1)/3) faulty processors Faulty processors are unable to forge the signature of correct processors

Protocol Hierarchy

Message Delivery Protocol - Properties Non-duplicate Delivery: for any message m, every correct processor p delivers m at most once Authentication: for any message m that contains id of correct processor p, a correct processor q delivers m only if m was originated by p Uniqueness of Message ids: if correct processor p delivers m in configuration C, then no correct processor q delivers m’ in C having the same id as m but a different content

Message Delivery Protocols - Properties Reliable Delivery: if p and q are both correct processors in C, and there is no configuration change, if p originates m then q delivers m Total Order of Messages: if p and q are both correct processors in C that deliver m1 and m2, then p delivers m1 before m2 iff q delivers m1 before m2

Message Delivery Protocol – Block

Message Delivery Protocol - Token

Membership Protocol - Properties Uniqueness of Configuration ids: if a correct processor p installs C, then no correct processor q installs configuration C’ with the same id as C but different contents Self-inclusion: if correct processor p installs C, then p is in C Total order of Configuration: if p and q are both correct and install C1 and C2, then p installs C1 and then C2 iff q installs C1 and then C2

Membership Protocol - Properties Eventual inclusion: if p and q are both correct, there is a time after which p installs a configuration that includes q Eventual exclusion: if p is correct and q is Byzantine faulty, then there is a time after which p installs a configuration that excludes q, and p never subsequently installs a configuration that includes q Eventual inclusion + Eventual exclusion = Liveness

Membership Protocol - Block

Membership Protocol - States

Byzantine Fault Detector - Properties Eventual Strong Byzantine Completeness: there is a time after which every processor that has exhibited a detectable Byzantine fault is permanently suspected by every correct processor Eventual Strong Accuracy: there is a time after which every correct processor is never suspected by any correct processor => ‘Liveness’ of Membership Protocol

Byzantine Fault Detector - Block

Message Diffusion Protocol - Properties Self-receipt: if a correct processor D-multicasts a message m, then it eventually D-receives it Uniform receipt: if a correct processor D-receives a message m, then every correct processor eventually D-receives it

Message Diffusion Protocol Described during faulty operation by Membership and Fault Detection Protocols with complexity O(n2) Fault free operation could use different protocol to increase overall efficiency

Throughput – 300-bit key modulus

Throughput – 512-bit key modulus

Throughput – 768-bit key modulus

Latency – 200 byte messages

Membership Change Time