On diffusing updates in a Byzantine environment

We study how to efficiently diffuse updates to a large distributed system of data replicas, some of which may exhibit arbitrary (Byzantine) failures. We assume that strictly fewer than t replicas fail, and that each update is initially received by at least t correct replicas. The goal is to diffuse each update to all correct replicas while ensuring that correct replicas accept no updates generated spuriously by faulty replicas. To achieve reliable diffusion, each correct replica accepts an update only after receiving it from at least t others. We provide the first analysis of epidemic-style protocols for such environments. This analysis is fundamentally different from known analyses for the benign case due to our treatment of fully Byzantine failure-which, among other things, precludes the use of digital signatures for authenticating forwarded updates. We propose two epidemic-style diffusion algorithms and two measures that characterize the efficiency of diffusion algorithms in general. We characterize both of our algorithms according to these measures, and also prove lower bounds with regards to these measures that show that our algorithms are close to optimal.

[1]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1951 .

[2]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[3]  William Feller,et al.  An Introduction to Probability Theory and Its Applications , 1967 .

[4]  David K. Gifford,et al.  Weighted voting for replicated data , 1979, SOSP '79.

[5]  Roger M. Needham,et al.  Grapevine: an exercise in distributed computing , 1982, CACM.

[6]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[7]  Danny Dolev,et al.  Authenticated Algorithms for Byzantine Agreement , 1983, SIAM J. Comput..

[8]  Yogen K. Dalal,et al.  The clearinghouse: a decentralized agent for locating named objects in a distributed environment , 1983, TOIS.

[9]  Sam Toueg,et al.  Asynchronous consensus and broadcast protocols , 1985, JACM.

[10]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[11]  B. Pittel On spreading a rumor , 1987 .

[12]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[13]  Gustavus J. Simmons,et al.  A survey of information authentication , 1988, Proc. IEEE.

[14]  N. Fisher,et al.  Probability Inequalities for Sums of Bounded Random Variables , 1994 .

[15]  Gustavus J. Simmons,et al.  Contemporary Cryptology: The Science of Information Integrity , 1994 .

[16]  Kurt J. Lidl,et al.  Drinking from the Firehose: Multicast USENET News , 1994, USENIX Winter.

[17]  Michael K. Reiter,et al.  Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.

[18]  Umesh V. Vazirani,et al.  An Introduction to Computational Learning Theory , 1994 .

[19]  Louise E. Moser,et al.  Total Ordering Algorithms for Asynchronous Byzantine Systems , 1995, WDAG.

[20]  Flaviu Cristian,et al.  Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement , 1995, Inf. Comput..

[21]  Michael K. Reiter,et al.  A high-throughput secure reliable multicast protocol , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[22]  Michael K. Reiter,et al.  Probabilistic quorum systems , 1997, PODC '97.

[23]  Michael K. Reiter,et al.  Byzantine quorum systems , 1997, STOC '97.

[24]  Avishai Wool,et al.  Probabilistic Byzantine quorum systems , 1998, PODC '98.

[25]  Michael K. Reiter,et al.  Secure and scalable replication in Phalanx , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).

[26]  Louise E. Moser,et al.  The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.

[27]  Mark Hayden,et al.  Bimodal Multicast (revised) , 1999 .

[28]  Kenneth P. Birman,et al.  Bimodal multicast , 1999, TOCS.

[29]  Russ Bubley,et al.  Randomized algorithms , 1995, CSUR.