首页 > 最新文献

2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)最新文献

英文 中文
[Publisher's information] (发布者的信息)
Pub Date : 2018-10-01 DOI: 10.1109/srds.2018.00045
{"title":"[Publisher's information]","authors":"","doi":"10.1109/srds.2018.00045","DOIUrl":"https://doi.org/10.1109/srds.2018.00045","url":null,"abstract":"","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123383633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Definition of an Architecture for Dynamic and Automatic Checkpoints on Apache Spark Apache Spark上动态自动检查点体系结构的定义
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00041
Paulo Vinicius Cardoso, P. Barcelos
Towards a scenario where failures on large-scale systems are inevitable, fault tolerant mechanisms must be efficiently applied. Checkpoint is a widely used technique that consists in saving data states for a fast recovery in case of failure. On Apache Spark – framework that uses in-memory data abstraction –, checkpoint serves to store datasets in a reliable source, so it helps on recovery process of complex datasets. However, once checkpoints must be defined by developer via source code, it may be a hard challenge to choose proper checkpoint scenarios. Therefore, this work proposes an automatic mechanism for checkpoint on Spark, which consists in monitoring system behavior and taking automatic checkpoint process according to defined policies.
针对大规模系统故障不可避免的情况,必须有效地应用容错机制。检查点是一种广泛使用的技术,它保存数据状态,以便在发生故障时快速恢复。在Apache Spark(使用内存中数据抽象的框架)上,检查点用于将数据集存储在可靠的数据源中,因此它有助于复杂数据集的恢复过程。然而,一旦检查点必须由开发人员通过源代码定义,选择合适的检查点场景可能是一个困难的挑战。因此,本文提出了一种基于Spark的自动检查点机制,即监控系统行为,并根据定义的策略进行自动检查点处理。
{"title":"Definition of an Architecture for Dynamic and Automatic Checkpoints on Apache Spark","authors":"Paulo Vinicius Cardoso, P. Barcelos","doi":"10.1109/SRDS.2018.00041","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00041","url":null,"abstract":"Towards a scenario where failures on large-scale systems are inevitable, fault tolerant mechanisms must be efficiently applied. Checkpoint is a widely used technique that consists in saving data states for a fast recovery in case of failure. On Apache Spark – framework that uses in-memory data abstraction –, checkpoint serves to store datasets in a reliable source, so it helps on recovery process of complex datasets. However, once checkpoints must be defined by developer via source code, it may be a hard challenge to choose proper checkpoint scenarios. Therefore, this work proposes an automatic mechanism for checkpoint on Spark, which consists in monitoring system behavior and taking automatic checkpoint process according to defined policies.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Copyright notice] (版权)
Pub Date : 2018-10-01 DOI: 10.1109/srds.2018.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/srds.2018.00003","DOIUrl":"https://doi.org/10.1109/srds.2018.00003","url":null,"abstract":"","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MuSE: Multimodal Searchable Encryption for Cloud Applications MuSE:用于云应用的多模式可搜索加密
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00029
Bernardo Ferreira, J. Leitao, H. Domingos
In this paper we tackle the practical challenges of searching encrypted multimodal data (i.e., data containing multiple media formats simultaneously), stored in public cloud servers, with reduced information leakage. To this end we propose MuSE, a Multimodal Searchable Encryption scheme that, by combining only standard cryptographic primitives and symmetric-key block ciphers, allows cloud-backed applications to dynamically store, update, and search multimodal datasets with privacy and efficiency guarantees. As searching encrypted data requires a tradeoff between privacy and efficiency, we also propose a variant of MuSE that resorts to partially homomorphic encryption to further reduce information leakage, but at the cost of additional computational overhead. Both schemes are formally proven secure and experimentally evaluated regarding performance and search precision. Experiments with realistic datasets show that our contributions achieve interesting levels of efficiency and privacy, making MuSE particularly suitable for practical application scenarios.
在本文中,我们解决了搜索加密多模态数据(即同时包含多种媒体格式的数据)的实际挑战,存储在公共云服务器中,减少了信息泄漏。为此,我们提出了MuSE,这是一种多模态可搜索加密方案,通过仅结合标准加密原语和对称密钥分组密码,允许云支持的应用程序动态存储,更新和搜索多模态数据集,同时保证隐私和效率。由于搜索加密数据需要在隐私和效率之间进行权衡,我们还提出了MuSE的一种变体,该变体采用部分同态加密来进一步减少信息泄漏,但代价是额外的计算开销。这两种方案都被正式证明是安全的,并在性能和搜索精度方面进行了实验评估。对真实数据集的实验表明,我们的贡献达到了有趣的效率和隐私水平,使MuSE特别适合实际应用场景。
{"title":"MuSE: Multimodal Searchable Encryption for Cloud Applications","authors":"Bernardo Ferreira, J. Leitao, H. Domingos","doi":"10.1109/SRDS.2018.00029","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00029","url":null,"abstract":"In this paper we tackle the practical challenges of searching encrypted multimodal data (i.e., data containing multiple media formats simultaneously), stored in public cloud servers, with reduced information leakage. To this end we propose MuSE, a Multimodal Searchable Encryption scheme that, by combining only standard cryptographic primitives and symmetric-key block ciphers, allows cloud-backed applications to dynamically store, update, and search multimodal datasets with privacy and efficiency guarantees. As searching encrypted data requires a tradeoff between privacy and efficiency, we also propose a variant of MuSE that resorts to partially homomorphic encryption to further reduce information leakage, but at the cost of additional computational overhead. Both schemes are formally proven secure and experimentally evaluated regarding performance and search precision. Experiments with realistic datasets show that our contributions achieve interesting levels of efficiency and privacy, making MuSE particularly suitable for practical application scenarios.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms 硬件辅助内存保护机制的安全性、性能和能量权衡
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00024
Christian Göttel, Rafael Pires, Isabelly Rocha, Sébastien Vaucher, P. Felber, Marcelo Pasin, V. Schiavoni
The deployment of large-scale distributed systems, e.g., publish-subscribe platforms, that operate over sensitive data using the infrastructure of public cloud providers, is nowadays heavily hindered by the surging lack of trust toward the cloud operators. Although purely software-based solutions exist to protect the confidentiality of data and the processing itself, such as homomorphic encryption schemes, their performance is far from being practical under real-world workloads. The performance trade-offs of two novel hardware-assisted memory protection mechanisms, namely AMD SEV and Intel SGX - currently available on the market to tackle this problem, are ADD described in this practical experience. Specifically, we implement and evaluate a publish/subscribe use-case and evaluate the impact of the memory protection mechanisms and the resulting performance. This paper reports on the experience gained while building this system, in particular when having to cope with the technical limitations imposed by SEV and SGX. Several tradeoffs that provide valuable insights in terms of latency, throughput, processing time and energy requirements are exhibited by means of micro-and macro-benchmarks.
大规模分布式系统(例如,使用公共云提供商的基础设施在敏感数据上运行的发布-订阅平台)的部署目前受到对云运营商日益缺乏信任的严重阻碍。尽管存在纯粹基于软件的解决方案来保护数据和处理本身的机密性,例如同态加密方案,但在实际工作负载下,它们的性能远远不实用。两种新型硬件辅助内存保护机制的性能权衡,即AMD SEV和英特尔SGX -目前在市场上可用来解决这个问题,ADD在这个实践经验中描述。具体来说,我们将实现和评估一个发布/订阅用例,并评估内存保护机制的影响和由此产生的性能。本文报告了在构建该系统时获得的经验,特别是在必须应对SEV和SGX施加的技术限制时。通过微观和宏观基准测试展示了在延迟、吞吐量、处理时间和能源需求方面提供有价值见解的几种权衡。
{"title":"Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms","authors":"Christian Göttel, Rafael Pires, Isabelly Rocha, Sébastien Vaucher, P. Felber, Marcelo Pasin, V. Schiavoni","doi":"10.1109/SRDS.2018.00024","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00024","url":null,"abstract":"The deployment of large-scale distributed systems, e.g., publish-subscribe platforms, that operate over sensitive data using the infrastructure of public cloud providers, is nowadays heavily hindered by the surging lack of trust toward the cloud operators. Although purely software-based solutions exist to protect the confidentiality of data and the processing itself, such as homomorphic encryption schemes, their performance is far from being practical under real-world workloads. The performance trade-offs of two novel hardware-assisted memory protection mechanisms, namely AMD SEV and Intel SGX - currently available on the market to tackle this problem, are ADD described in this practical experience. Specifically, we implement and evaluate a publish/subscribe use-case and evaluate the impact of the memory protection mechanisms and the resulting performance. This paper reports on the experience gained while building this system, in particular when having to cope with the technical limitations imposed by SEV and SGX. Several tradeoffs that provide valuable insights in terms of latency, throughput, processing time and energy requirements are exhibited by means of micro-and macro-benchmarks.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Towards Real-Time-Aware Intrusion Tolerance 实现实时感知的入侵容忍
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00040
Christoph Lambert, M. Völp, Jérémie Decouchant, P. Veríssimo
Technologies such as Industry 4.0 or assisted/autonomous driving are relying on highly customized cyber-physical realtime systems. Those systems are designed to match functional safety regulations and requirements such as EN ISO 13849, EN IEC 62061 or ISO 26262. However, as systems – especially vehicles – are becoming more connected and autonomous, they become more likely to suffer from new attack vectors. New features may meet the corresponding safety requirements but they do not consider adversaries intruding through security holes with the purpose of bringing vehicles into unsafe states. As research goal, we want to bridge the gap between security and safety in cyber-physical real-time systems by investigating real-time-aware intrusion-tolerant architectures for automotive use-cases.
工业4.0或辅助/自动驾驶等技术依赖于高度定制的网络物理实时系统。这些系统的设计符合功能安全法规和要求,如EN ISO 13849, EN IEC 62061或ISO 26262。然而,随着系统(尤其是车辆)变得越来越互联和自动化,它们更有可能遭受新的攻击媒介。新功能可能会满足相应的安全要求,但它们不会考虑攻击者通过安全漏洞入侵,将车辆带入不安全状态。作为研究目标,我们希望通过研究汽车用例的实时感知入侵容忍架构,弥合网络物理实时系统中安全性与安全性之间的差距。
{"title":"Towards Real-Time-Aware Intrusion Tolerance","authors":"Christoph Lambert, M. Völp, Jérémie Decouchant, P. Veríssimo","doi":"10.1109/SRDS.2018.00040","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00040","url":null,"abstract":"Technologies such as Industry 4.0 or assisted/autonomous driving are relying on highly customized cyber-physical realtime systems. Those systems are designed to match functional safety regulations and requirements such as EN ISO 13849, EN IEC 62061 or ISO 26262. However, as systems – especially vehicles – are becoming more connected and autonomous, they become more likely to suffer from new attack vectors. New features may meet the corresponding safety requirements but they do not consider adversaries intruding through security holes with the purpose of bringing vehicles into unsafe states. As research goal, we want to bridge the gap between security and safety in cyber-physical real-time systems by investigating real-time-aware intrusion-tolerant architectures for automotive use-cases.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121898114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Héron: Taming Tail Latencies in Key-Value Stores Under Heterogeneous Workloads hsamron:在异构工作负载下控制键值存储的尾部延迟
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00030
Vikas Jaiman, Sonia Ben Mokhtar, Vivien Quéma, L. Chen, E. Rivière
Avoiding latency variability in distributed storage systems is challenging. Even in well-provisioned systems, factors such as the contention on shared resources or the unbalanced load between servers affect the latencies of requests and in particular the tail (95th and 99th percentile) of their distribution. One effective counter measure for reducing tail latency in key-value stores is to provide efficient replica selection algorithms. However, existing solutions are based on the assumption that all requests have almost the same execution time. This is not true for real workloads. This mismatch leads to increased latencies for requests with short execution time that get scheduled behind requests with large execution times. We propose Héron, a replica selection algorithm that supports workloads with heterogeneous request execution times. We evaluate Héron in a cluster of machines using a synthetic dataset inspired from the Facebook dataset as well as two real datasets from Flickr and WikiMedia. Our results show that Héron outperforms state-of-the-art algorithms by reducing both median and tail latency by up to 41%.
在分布式存储系统中避免延迟可变性是一项挑战。即使在配置良好的系统中,共享资源上的争用或服务器之间的负载不平衡等因素也会影响请求的延迟,尤其是请求分布的尾部(第95和99百分位)。减少键值存储尾部延迟的一个有效对策是提供高效的副本选择算法。但是,现有的解决方案是基于所有请求具有几乎相同的执行时间的假设。对于实际工作负载来说,情况并非如此。这种不匹配导致执行时间短的请求的延迟增加,这些请求被安排在执行时间长的请求之后。我们提出hsamron,一种副本选择算法,支持具有异构请求执行时间的工作负载。我们在一个机器集群中使用一个合成数据集来评估hsamron,该数据集来自Facebook数据集以及来自Flickr和WikiMedia的两个真实数据集。我们的研究结果表明,h比最先进的算法,减少中位数和尾部延迟高达41%。
{"title":"Héron: Taming Tail Latencies in Key-Value Stores Under Heterogeneous Workloads","authors":"Vikas Jaiman, Sonia Ben Mokhtar, Vivien Quéma, L. Chen, E. Rivière","doi":"10.1109/SRDS.2018.00030","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00030","url":null,"abstract":"Avoiding latency variability in distributed storage systems is challenging. Even in well-provisioned systems, factors such as the contention on shared resources or the unbalanced load between servers affect the latencies of requests and in particular the tail (95th and 99th percentile) of their distribution. One effective counter measure for reducing tail latency in key-value stores is to provide efficient replica selection algorithms. However, existing solutions are based on the assumption that all requests have almost the same execution time. This is not true for real workloads. This mismatch leads to increased latencies for requests with short execution time that get scheduled behind requests with large execution times. We propose Héron, a replica selection algorithm that supports workloads with heterogeneous request execution times. We evaluate Héron in a cluster of machines using a synthetic dataset inspired from the Facebook dataset as well as two real datasets from Flickr and WikiMedia. Our results show that Héron outperforms state-of-the-art algorithms by reducing both median and tail latency by up to 41%.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"90 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123490651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Policy-Based Adaptation of a Byzantine Fault Tolerant Distributed Graph Database 拜占庭容错分布式图数据库的策略自适应
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00017
Manuel Bravo, L. Rodrigues, Ray Neiheiser, Luciana Rech
Modern fault-tolerant distributed architectures can be configured to tolerate a wide-range of faults. For instance, Fireplug is a distributed BFT graph database, based on n-version programming, that can be configured to tolerate crash or Byzantine faults, uncorrelated faults in individual machines, correlated faults that affect all replicas running a given software version, or correlated faults that affect an entire datacenter. Interestingly, in such a system, fault handling heavily depends on the type of faults the system is configured to tolerate. To hardwire all possible behaviours in the fault-handling code is inflexible and may even be impractical. In this paper, we explore a different alternative that consists in specifying not only the system configuration, but also the fault-handling behaviour, and how the system adapts to changes in the workload, in a policy language, that is processed externally to the managed system. We show that, using this approach, a single simplified codebase of the managed system can be used effectively to address a wide range of dependability constraints.
现代容错分布式体系结构可以配置为容忍各种各样的错误。例如,Fireplug是一个基于n版本编程的分布式BFT图形数据库,它可以被配置为容忍崩溃或拜占庭故障、单个机器中的不相关故障、影响运行给定软件版本的所有副本的相关故障,或影响整个数据中心的相关故障。有趣的是,在这样的系统中,故障处理在很大程度上取决于系统被配置为可以容忍的故障类型。在故障处理代码中硬连接所有可能的行为是不灵活的,甚至可能不切实际。在本文中,我们探索了一种不同的替代方案,它不仅包括指定系统配置,还包括故障处理行为,以及系统如何适应工作负载的变化,用策略语言,从外部处理到管理系统。我们表明,使用这种方法,可以有效地使用被管理系统的单个简化代码库来处理广泛的可靠性约束。
{"title":"Policy-Based Adaptation of a Byzantine Fault Tolerant Distributed Graph Database","authors":"Manuel Bravo, L. Rodrigues, Ray Neiheiser, Luciana Rech","doi":"10.1109/SRDS.2018.00017","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00017","url":null,"abstract":"Modern fault-tolerant distributed architectures can be configured to tolerate a wide-range of faults. For instance, Fireplug is a distributed BFT graph database, based on n-version programming, that can be configured to tolerate crash or Byzantine faults, uncorrelated faults in individual machines, correlated faults that affect all replicas running a given software version, or correlated faults that affect an entire datacenter. Interestingly, in such a system, fault handling heavily depends on the type of faults the system is configured to tolerate. To hardwire all possible behaviours in the fault-handling code is inflexible and may even be impractical. In this paper, we explore a different alternative that consists in specifying not only the system configuration, but also the fault-handling behaviour, and how the system adapts to changes in the workload, in a policy language, that is processed externally to the managed system. We show that, using this approach, a single simplified codebase of the managed system can be used effectively to address a wide range of dependability constraints.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
RATCHETA: Memory-Bounded Hybrid Byzantine Consensus for Cooperative Embedded Systems 协作嵌入式系统的内存边界混合拜占庭共识
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00021
Wenbo Xu, R. Kapitza
Cooperative autonomous systems gain increasing popularity nowadays. Most of these systems demand for high fault-resilience, otherwise a single faulty node could render the whole system useless. This essentially calls for a Byzantine fault-tolerant consensus. However, in such algorithms typically only (n-1)/3 faulty nodes can be tolerated in a group of n nodes and the message complexity is high. Even worse, systems with only 3 nodes are too small to even tolerate a single Byzantine node. In this work we present a novel consensus algorithm, RATCHETA. On the one hand it increases the maximum tolerable faulty nodes to (n-1)/2 and lowers the message complexity. This is achieved by assuming a hybrid fault model, which features the use of a small trusted subsystem that hosts a pair of monotonic counters for message authentication to prevent equivocation. Moreover, it can ensure an upper bound of the memory usage and message size, which is not addressed by most other hybrid consensus algorithms. On the other hand RATCHETA is tailored for wireless embedded systems. It uses multicast to reduce the communication overhead, and it does not rely on any packet loss detection or retransmission mechanisms. We implemented RATCHETA with its trusted subsystem built on top of ARM TrustZone. Our experimental results show that RATCHETA can tolerate both Byzantine faults and a certain amount of omission faults. With 20% message omissions, a 10- node group needs less than 1 second on average to reach a consensus. If 4 nodes out of 10 become Byzantine, the consensus latency is only about 1-3.6 seconds even under rough network conditions.
协作式自治系统在当今越来越受欢迎。这些系统大多要求高的故障恢复能力,否则单个节点故障可能导致整个系统失效。这本质上需要拜占庭式容错共识。然而,在这种算法中,通常在一组n个节点中只能容忍(n-1)/3个故障节点,并且消息复杂性很高。更糟糕的是,只有3个节点的系统太小,甚至无法容忍单个拜占庭节点。在这项工作中,我们提出了一种新的共识算法RATCHETA。一方面,它将最大可容忍故障节点增加到(n-1)/2,降低了消息复杂度。这是通过假设一个混合故障模型来实现的,该模型的特点是使用一个小的可信子系统,该子系统承载一对用于消息身份验证的单调计数器,以防止混淆。此外,它可以确保内存使用和消息大小的上限,这是大多数其他混合共识算法无法解决的问题。另一方面,RATCHETA是专为无线嵌入式系统。它使用多播来减少通信开销,并且不依赖于任何丢包检测或重传机制。我们在ARM TrustZone之上实现了RATCHETA及其可信子系统。实验结果表明,RATCHETA可以容忍拜占庭错误和一定数量的遗漏错误。有20%的消息遗漏,一个10节点组平均需要不到1秒的时间来达成共识。如果10个节点中有4个节点变成拜占庭,即使在粗糙的网络条件下,共识延迟也只有大约1-3.6秒。
{"title":"RATCHETA: Memory-Bounded Hybrid Byzantine Consensus for Cooperative Embedded Systems","authors":"Wenbo Xu, R. Kapitza","doi":"10.1109/SRDS.2018.00021","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00021","url":null,"abstract":"Cooperative autonomous systems gain increasing popularity nowadays. Most of these systems demand for high fault-resilience, otherwise a single faulty node could render the whole system useless. This essentially calls for a Byzantine fault-tolerant consensus. However, in such algorithms typically only (n-1)/3 faulty nodes can be tolerated in a group of n nodes and the message complexity is high. Even worse, systems with only 3 nodes are too small to even tolerate a single Byzantine node. In this work we present a novel consensus algorithm, RATCHETA. On the one hand it increases the maximum tolerable faulty nodes to (n-1)/2 and lowers the message complexity. This is achieved by assuming a hybrid fault model, which features the use of a small trusted subsystem that hosts a pair of monotonic counters for message authentication to prevent equivocation. Moreover, it can ensure an upper bound of the memory usage and message size, which is not addressed by most other hybrid consensus algorithms. On the other hand RATCHETA is tailored for wireless embedded systems. It uses multicast to reduce the communication overhead, and it does not rely on any packet loss detection or retransmission mechanisms. We implemented RATCHETA with its trusted subsystem built on top of ARM TrustZone. Our experimental results show that RATCHETA can tolerate both Byzantine faults and a certain amount of omission faults. With 20% message omissions, a 10- node group needs less than 1 second on average to reach a consensus. If 4 nodes out of 10 become Byzantine, the consensus latency is only about 1-3.6 seconds even under rough network conditions.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131025472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems PubSub-SGX:利用可信执行环境保护隐私发布/订阅系统
Pub Date : 2018-10-01 DOI: 10.1109/SRDS.2018.00023
Sergei Arnautov, Andrey Brito, P. Felber, C. Fetzer, Franz Gregor, R. Krahn, W. Ożga, André Martin, V. Schiavoni, Fábio Silva, Marcus Tenorio, Nikolaus Thummel
This paper presents PUBSUB-SGX, a content-based publish-subscribe system that exploits trusted execution environments (TEEs), such as Intel SGX, to guarantee confidentiality and integrity of data as well as anonymity and privacy of publishers and subscribers. We describe the technical details of our Python implementation, as well as the required system support introduced to deploy our system in a container-based runtime. Our evaluation results show that our approach is sound, while at the same time highlighting the performance and scalability trade-offs. In particular, by supporting just-in-time compilation inside of TEEs, Python programs inside of TEEs are in general faster than when executed natively using standard CPython.
本文提出了一种基于内容的发布-订阅系统PUBSUB-SGX,该系统利用可信执行环境(tee),如Intel SGX,来保证数据的机密性和完整性以及发布者和订阅者的匿名性和隐私性。我们描述了Python实现的技术细节,以及在基于容器的运行时中部署系统所需的系统支持。我们的评估结果表明,我们的方法是合理的,同时突出了性能和可伸缩性的权衡。特别是,通过支持TEEs内部的即时编译,TEEs内部的Python程序通常比使用标准CPython本地执行时要快。
{"title":"PubSub-SGX: Exploiting Trusted Execution Environments for Privacy-Preserving Publish/Subscribe Systems","authors":"Sergei Arnautov, Andrey Brito, P. Felber, C. Fetzer, Franz Gregor, R. Krahn, W. Ożga, André Martin, V. Schiavoni, Fábio Silva, Marcus Tenorio, Nikolaus Thummel","doi":"10.1109/SRDS.2018.00023","DOIUrl":"https://doi.org/10.1109/SRDS.2018.00023","url":null,"abstract":"This paper presents PUBSUB-SGX, a content-based publish-subscribe system that exploits trusted execution environments (TEEs), such as Intel SGX, to guarantee confidentiality and integrity of data as well as anonymity and privacy of publishers and subscribers. We describe the technical details of our Python implementation, as well as the required system support introduced to deploy our system in a container-based runtime. Our evaluation results show that our approach is sound, while at the same time highlighting the performance and scalability trade-offs. In particular, by supporting just-in-time compilation inside of TEEs, Python programs inside of TEEs are in general faster than when executed natively using standard CPython.","PeriodicalId":219374,"journal":{"name":"2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)","volume":"92 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116299012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
2018 IEEE 37th Symposium on Reliable Distributed Systems (SRDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1