Affiliation:
1. UC Berkeley, Berkeley
2. Intel Research Berkeley, Berkeley
Abstract
Researchers have made great strides in improving the fault tolerance of both centralized and replicated systems against arbitrary (Byzantine) faults. However, there are hard limits to how much can be done with entirely untrusted components; for example, replicated state machines cannot tolerate more than a third of their replica population being Byzantine. In this paper, we investigate how minimal trusted abstractions can push through these hard limits in practical ways. We propose Attested Append-Only Memory (A2M), a trusted system facility that is small, easy to implement and easy to verify formally. A2M provides the programming abstraction of a trusted log, which leads to protocol designs immune to equivocation -- the ability of a faulty host to lie in different ways to different clients or servers -- which is a common source of Byzantine headaches. Using A2M, we improve upon the state of the art in Byzantine-fault tolerant replicated state machines, producing A2M-enabled protocols (variants of Castro and Liskov's PBFT) that remain correct (linearizable) and keep making progress (live) even when half the replicas are faulty, in contrast to the previous upper bound. We also present an A2M-enabled single-server shared storage protocol that guarantees linearizability despite server faults. We implement A2M and our protocols, evaluate them experimentally through micro- and macro-benchmarks, and argue that the improved fault tolerance is cost-effective for a broad range of uses, opening up new avenues for practical, more reliable services.
Publisher
Association for Computing Machinery (ACM)
Reference40 articles.
1. Amazon S3. http://aws.amazon.com/s3/. Amazon S3. http://aws.amazon.com/s3/.
2. Intel Active Management Technology (AMT). http://www.intel.com/technology/platform-technology/intel-amt/index.htm. Intel Active Management Technology (AMT). http://www.intel.com/technology/platform-technology/intel-amt/index.htm.
3. Java. http://java.sun.com/. Java. http://java.sun.com/.
4. SFSlite. http://www.okws.org/doku.php?id=sfslite. SFSlite. http://www.okws.org/doku.php?id=sfslite.
5. Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org/. Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org/.
Cited by
102 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Distributed Transaction Processing in Untrusted Environments;Companion of the 2024 International Conference on Management of Data;2024-06-09
2. OneShot: View-Adapting Streamlined BFT Protocols with Trusted Execution Environments;2024 IEEE International Parallel and Distributed Processing Symposium (IPDPS);2024-05-27
3. SoK: Public Blockchain Sharding;2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC);2024-05-27
4. SoK: DAG-based Consensus Protocols;2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC);2024-05-27
5. PrestigeBFT: Revolutionizing View Changes in BFT Consensus Algorithms with Reputation Mechanisms;2024 IEEE 40th International Conference on Data Engineering (ICDE);2024-05-13