Byzantine-fault-tolerant distributed logging

Slides:



Advertisements
Similar presentations
Safe Open-Nested Transactions Jim Sukha MIT CSAIL Supercomputing Technologies Group Kunal Agrawal, I-Ting Angelina Lee, Bradley C. Kuszmaul, Charles E.
Advertisements

9 x9 81 4/12/2015 Know Your Facts!. 9 x2 18 4/12/2015 Know Your Facts!
NETWORK ALGORITHMS Presenter- Kurchi Subhra Hazra.
1 x0 0 4/15/2015 Know Your Facts!. 9 x1 9 4/15/2015 Know Your Facts!
1 x0 0 4/16/2015 Know Your Facts!. 1 x8 8 4/16/2015 Know Your Facts!
© 2005 Dorian C. Arnold Reliability in Tree-based Overlay Networks Dorian C. Arnold University of Wisconsin Paradyn/Condor Week March 14-18, 2005 Madison,
Uncoordinated Checkpointing The Global State Recording Algorithm.
3 x0 0 7/18/2015 Know Your Facts!. 4 x3 12 7/18/2015 Know Your Facts!
Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both.
G O O G L E F I L E S Y S T E M 陳 仕融 黃 振凱 林 佑恩 Z 1.
1 The Case for Byzantine Fault Detection. 2 Challenge: Byzantine faults Distributed systems are subject to a variety of failures and attacks Hacker break-in.
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems Byzantine Fault Tolerance Steve Ko Computer Sciences and Engineering University at Buffalo.
The SMART Way to Migrate Replicated Stateful Services Jacob R. Lorch, Atul Adya, Bill Bolosky, Ronnie Chaiken, John Douceur, Jon Howell Microsoft Research.
Serverless Network File Systems. Network File Systems Allow sharing among independent file systems in a transparent manner Mounting a remote directory.
ReVive: Cost-Effective Architectural Support for Rollback Recovery in Shared-Memory Multiprocessors Milos Prvulovic, Zheng Zhang, Josep Torrellas University.
1 Attested Append-Only Memory: Making Adversaries Stick to their Word Byung-Gon Chun (ICSI) October 15, 2007 Joint work with Petros Maniatis (Intel Research,
Lecture 6 – Google File System (GFS) CSE 490h – Introduction to Distributed Computing, Winter 2008 Except as otherwise noted, the content of this presentation.
Distributed Systems Fall 2009 Logical time, global states, and debugging.
SRG PeerReview: Practical Accountability for Distributed Systems Andreas Heaberlen, Petr Kouznetsov, and Peter Druschel SOSP’07.
Auction-based Model of BitTorrent Seminar in Distributed Computing 2010 ETH Zurich Yu Li.
Attested Append-only Memory: Making Adversaries Stick to their Word Distributed Storage Systems CS presented by: Hussam Abu-Libdeh.
1 Software Testing and Quality Assurance Lecture 34 – Software Quality Assurance.
© Chinese University, CSE Dept. Distributed Systems / Distributed Systems Topic 12: Recovery and Fault Tolerance Computer Science & Engineering.
© 2006 Andreas Haeberlen, MPI-SWS 1 The Case for Byzantine Fault Detection Andreas Haeberlen MPI-SWS / Rice University Petr Kouznetsov MPI-SWS Peter Druschel.
CS 603 Communication and Distributed Systems April 15, 2002.
Byzantine fault tolerance
Byzantine Fault Tolerance CS 425: Distributed Systems Fall Material drived from slides by I. Gupta and N.Vaidya.
Software Inspection A basic tool for defect removal A basic tool for defect removal Urgent need for QA and removal can be supported by inspection Urgent.
11 SYSTEM PERFORMANCE IN WINDOWS XP Chapter 12. Chapter 12: System Performance in Windows XP2 SYSTEM PERFORMANCE IN WINDOWS XP  Optimize Microsoft Windows.
EEC 688/788 Secure and Dependable Computing Lecture 14 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
4 x1 4 10/18/2015 Know Your Facts!. 5 x /18/2015 Know Your Facts!
3 x0 0 10/18/2015 Know Your Facts!. 11 x /18/2015 Know Your Facts!
CSE 486/586, Spring 2013 CSE 486/586 Distributed Systems Wrap-up Steve Ko Computer Sciences and Engineering University at Buffalo.
Byzantine fault-tolerance COMP 413 Fall Overview Models –Synchronous vs. asynchronous systems –Byzantine failure model Secure storage with self-certifying.
From Viewstamped Replication to BFT Barbara Liskov MIT CSAIL November 2007.
1 ZYZZYVA: SPECULATIVE BYZANTINE FAULT TOLERANCE R.Kotla, L. Alvisi, M. Dahlin, A. Clement and E. Wong U. T. Austin Best Paper Award at SOSP 2007.
Byzantine fault tolerance
A. Haeberlen Fault Tolerance and the Five-Second Rule 1 HotOS XV (May 18, 2015) Ang Chen Hanjun Xiao Andreas Haeberlen Linh Thi Xuan Phan Department of.
Distributed Systems Fall 2010 Logical time, global states, and debugging.
Applied cryptography Project 2. 2CSE539 Applied Cryptography A demo Chat server registration Please enter a login name : > Alice Please enter the.
Byzantine Fault Tolerance CS 425: Distributed Systems Fall 2012 Lecture 26 November 29, 2012 Presented By: Imranul Hoque 1.
CS603 Fault Tolerance - Communication April 17, 2002.
CSE 486/586 CSE 486/586 Distributed Systems Byzantine Fault Tolerance Steve Ko Computer Sciences and Engineering University at Buffalo.
Byzantine Fault Tolerance
PeerReview: Practical Accountability for Distributed Systems SOSP 07.
Systems Research Barbara Liskov October Replication Goal: provide reliability and availability by storing information at several nodes.
Google File System Robert Nishihara. What is GFS? Distributed filesystem for large-scale distributed applications.
CSE 486/586 Distributed Systems Byzantine Fault Tolerance
Faults and fault-tolerance
ASSIGNMENT NO.-2.
VOLT project: High-throughput distributed ledgers with end-to-end security and confidentiality for consortiums Srinath Setty, Jacob R. Lorch, Amar Phanishayee,
Byzantine Fault Tolerance
CSE 486/586 Distributed Systems Byzantine Fault Tolerance
Preparing for MUPL! Justin Harjanto
Stellar ستيلر لماذا تم تأسيس هذا المشروع؟ ما هي مشروع ستيلر؟
Faults and fault-tolerance
EEC 688/788 Secure and Dependable Computing
Wireless Sensor Network - course: Project to investigate requirements and applications using wireless sensor networks on a construction site Ykä Marjanen.
From Viewstamped Replication to BFT
Learn Your 2x Facts.
EEC 688/788 Secure and Dependable Computing
Abstraction.
The SMART Way to Migrate Replicated Stateful Services
Federated, Available, and Reliable Storage for an Incompletely Trusted Environment Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie.
Wireless Embedded Systems
CSE 486/586 Distributed Systems Byzantine Fault Tolerance
Presentation transcript:

Byzantine-fault-tolerant distributed logging CSE 552 preparation for reading

Background: PeerReview Goal: Detect Byzantine behavior in a distributed system

Background: PeerReview 4 B 1 2 3 5 D C

Background: Attested append-only memory 1 1 1 2 3 Jacob R. Lorch TrInc: Small Trusted Hardware for Large Distributed Systems

Background: Attested append-only memory Just the fact that there’s only one is good enough for me. 3 B A A2M can make PBFT safe and live with only 2f+1 nodes Assigning semantic meaning to message counters obviates full log transmission. When correctness of a prefix has been established, one can do log truncation. C 1 2 3 3 Jacob R. Lorch TrInc: Small Trusted Hardware for Large Distributed Systems