Using microkernel based virtualization for Byzantine fault tolerance

Asanka Senevirathna, Bhathiya Wasala, Buddhika Ranaweera, D. Elkaduwe
{"title":"Using microkernel based virtualization for Byzantine fault tolerance","authors":"Asanka Senevirathna, Bhathiya Wasala, Buddhika Ranaweera, D. Elkaduwe","doi":"10.1109/ICIINFS.2011.6038037","DOIUrl":null,"url":null,"abstract":"A Byzantine fault is a failure that cannot be identified by observing the output of a component; the component produces a wrong result as opposed to not producing a result at all or producing a result that can be identified as wrong. Such faults may be caused by a number of causes including software bugs and malicious attacks. Tolerating such faults is essential for a critical system. Isolated replication and majority voting is a well established technique to tolerate Byzantine faults. Current implementations of such systems either uses replicated hardware or software virtualization — using virtual machine monitors — to get the illusion of hardware replication to tolerate Byzantine faults. In this paper, we investigate the possibility of using microkernel technology to achieve the isolated replication and discuss the features of a microkernel API suitable for such a deployment. The advantage of our approach is that it reduces the cost of additional hardware or avoid the complexity of virtualization required to mimic hardware replication. We used a single machine, running the L4 microkernel to provide the isolation required for the replicas. All replicas run in parallel and majority voting is performed to obtain the correct result in the presence of Byzantine faults. We selected the AES encryption algorithms for our case study and faults were deliberately injected to replicas to mimic Byzantine behavior. Our experiments show that it is feasible to use microkernels technology for this purpose.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 6th International Conference on Industrial and Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIINFS.2011.6038037","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

A Byzantine fault is a failure that cannot be identified by observing the output of a component; the component produces a wrong result as opposed to not producing a result at all or producing a result that can be identified as wrong. Such faults may be caused by a number of causes including software bugs and malicious attacks. Tolerating such faults is essential for a critical system. Isolated replication and majority voting is a well established technique to tolerate Byzantine faults. Current implementations of such systems either uses replicated hardware or software virtualization — using virtual machine monitors — to get the illusion of hardware replication to tolerate Byzantine faults. In this paper, we investigate the possibility of using microkernel technology to achieve the isolated replication and discuss the features of a microkernel API suitable for such a deployment. The advantage of our approach is that it reduces the cost of additional hardware or avoid the complexity of virtualization required to mimic hardware replication. We used a single machine, running the L4 microkernel to provide the isolation required for the replicas. All replicas run in parallel and majority voting is performed to obtain the correct result in the presence of Byzantine faults. We selected the AES encryption algorithms for our case study and faults were deliberately injected to replicas to mimic Byzantine behavior. Our experiments show that it is feasible to use microkernels technology for this purpose.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用基于微内核的虚拟化实现拜占庭式容错
拜占庭故障是一种无法通过观察组件的输出来识别的故障;组件产生一个错误的结果,而不是根本不产生结果或产生一个可以被识别为错误的结果。此类故障可能由多种原因引起,包括软件错误和恶意攻击。对于一个关键系统来说,容忍这样的故障是必不可少的。隔离复制和多数投票是一种成熟的技术,可以容忍拜占庭式错误。这类系统的当前实现要么使用复制硬件,要么使用软件虚拟化(使用虚拟机监视器),以获得硬件复制的假象,从而容忍拜占庭式故障。在本文中,我们研究了使用微内核技术实现隔离复制的可能性,并讨论了适合这种部署的微内核API的特性。我们的方法的优点是,它降低了额外硬件的成本,或者避免了模拟硬件复制所需的虚拟化的复杂性。我们使用一台机器,运行L4微内核以提供副本所需的隔离。所有副本并行运行,并执行多数投票以在存在拜占庭错误的情况下获得正确的结果。我们为案例研究选择了AES加密算法,并故意将错误注入副本以模仿拜占庭行为。我们的实验表明,使用微内核技术实现这一目的是可行的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Selective load control to provide primary frequency response in the wake of introducing new large thermal power plants to Sri Lanka A trust computing mechanism for cloud computing with multilevel thresholding Distributed beamforming techniques for dual-hop decode-and-forward MIMO relay networks Performance comparison of optical receivers using different filtering algorithms and modulation schemes A radial basis function neural network approach for multi-hour short term load-price forecasting with type of day parameter
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1