2P-BFT-Log: 2-Phase Single-Author Append-Only Log for Adversarial Environments

07/17/2023
by   Erick Lavoie, et al.
0

Replicated append-only logs sequentially order messages from the same author such that their ordering can be eventually recovered even with out-of-order and unreliable dissemination of individual messages. They are widely used for implementing replicated services in both clouds and peer-to-peer environments because they provide simple and efficient incremental reconciliation. However, existing designs of replicated append-only logs assume replicas faithfully maintain the sequential properties of logs and do not provide eventual consistency when malicious participants fork their logs by disseminating different messages to different replicas for the same index, which may result in partitioning of replicas according to which branch was first replicated. In this paper, we present 2P-BFT-Log, a two-phase replicated append-only log that provides eventual consistency in the presence of forks from malicious participants such that all correct replicas will eventually agree either on the most recent message of a valid log (first phase) or on the earliest point at which a fork occurred as well as on an irrefutable proof that it happened (second phase). We provide definitions, algorithms, and proofs of the key properties of the design, and explain one way to implement the design onto Git, an eventually consistent replicated database originally designed for distributed version control. Our design enables correct replicas to faithfully implement the happens-before relationship first introduced by Lamport that underpins most existing distributed algorithms, with eventual detection of forks from malicious participants to exclude the latter from further progress. This opens the door to adaptations of existing distributed algorithms to a cheaper detect and repair paradigm, rather than the more common and expensive systematic prevention of incorrect behaviour.

READ FULL TEXT

page 7

page 9

research
09/10/2023

Distributed Kafka Clusters: A Novel Approach to Global Message Ordering

In contemporary distributed systems, logs are produced at an astounding ...
research
07/30/2020

Implications of Dissemination Strategies on the Security of Distributed Ledgers

This paper describes a simulation study on security attacks over Distrib...
research
02/13/2020

Explainable Queries over Event Logs

Added value can be extracted from event logs generated by business proce...
research
08/17/2023

Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages

Developers write logging statements to generate logs that provide run-ti...
research
04/15/2020

Effective Removal of Operational Log Messages: an Application to Model Inference

Model inference aims to extract accurate models from the execution logs ...
research
05/08/2023

Behavioural Types for Local-First Software

Peer-to-peer systems are the most resilient form of distributed computin...
research
05/06/2021

Leader Election in Arbitrarily Connected Networks with Process Crashes and Weak Channel Reliability

A channel from a process p to a process q satisfies the ADD property if ...

Please sign up or login with your details

Forgot password? Click here to reset