skip to main content
10.1145/1141277.1141377acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

BTS: a Byzantine fault-tolerant tuple space

Published:23 April 2006Publication History

ABSTRACT

Generative coordination is one of the most prominent coordination models for implementing open systems due to its spatial and temporal decoupling. Recently, a coordination community effort have been trying to integrate security mechanisms to this model aiming to improve its robustness. In this context, this paper presents the BTS coordination model, which provides a Byzantine fault-tolerant tuple space. Byzantine faults are commonly used to represent both process crashes and intrusions. As far as we know. BTS is the first coordination model that supports this dependability level.

References

  1. H. Attiya and J. Welch. Distributed Computing: Fundamentals, Simulations and Advanced Topics. Wiley Series on Parallel and Distributed Computing. Wiley-Interscience, 2nd edition, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. E. Bakken and R. D. Schlichting. Supporting fault-tolerant parallel programming in Linda. IEEE Transactions on Parallel and Distributed Systems, 6(3):287--302, Mar. 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Busi, R. Gorrieri, R. Lucchi, and G. Zavattaro. SecSpaces: a data-driven coordination model for environments open to untrusted agents. In Electronic Notes in Theoretical Computer Science, volume 68, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  4. N. Busi, R. Gorrieri, and G. Zavattaro. On the expressiveness of Linda coordination primitives. Information and Computation, 156(1/2):90--121, Academic Press, 2000, 156(1--2):90--121, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Cabri, L. Leonardi, and F. Zambonelli. Mobile agents coordination models for Internet applications. IEEE Computer, 33(2):82--89, Feb. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Castro and B. Liskov. Practical Byzantine fault-tolerance and proactive recovery. ACM Transactions Computer Systems, 20(4):398--461, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Castro, R. Rodrigues, and B. Liskov. BASE: Using abstraction to improve fault tolerance. ACM Transactions Computer Systems, 21(3):236--269, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. De Nicola, G. L. Ferrari, and R. Pugliese. Klaim: A kernel language for agents interaction and mobility. IEEE Transactions on Software Engineering, 24(5):315--330, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Dwork, N. A. Lynch, and L. Stockmeyer. Consensus in the presence of partial synchrony. Journal of ACM, 35(2):288--322, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Fraga and D. Powell. A fault- and intrusion-tolerant file system. In Proceedings of the 3rd Int. Conference on Computer Security, pages 203--218, 1985.Google ScholarGoogle Scholar
  11. D. Gelernter. Generative communication in Linda. ACM Transactions on Programing Languages and Systems, 7(1):80--112, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. K. Gifford. Weighted voting for replicated data. In Proceedings of the 7th ACM Symposium on Operating Systems Principles, pages 150--162, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Herlihy. Wait-free synchronization. ACM Transactions on Programing Languages and Systems, 13(1):124--149, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Lamport. The part-time parliament. ACM Transactions Computer Systems, 16(2): 133--169, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Transactions on Programing Languages and Systems, 4(3):382--401, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Malkhi and M. K. Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203--213, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J.-P. Martin and L. Alvisi. Fast Byzantine consensus. In Dependable Systems and Networks, DSN 05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J.-P. Martin, L. Alvisi, and M. Dahlin. Small Byzantine quorum systems. In Dependable Systems and Networks, DSN 01, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. H. Minsky, Y. M. Minsky, and V. Ungureanu. Making tuple-spaces safe for heterogeneous distributed systems. In Proceedings of the 2000 ACM Symposium on Applied Computing, pages 218--226, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. F. B. Schneider. Implementing fault-tolerant service using the state machine aproach: A tutorial. ACM Computing Surveys, 22(4):299--319, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. J. Segall. Resilient distributed objects: Basic results and applications to shared spaces. In Proceedings of the 7th Symposium on Parallel and Distributed Processing - SPDP'95, pages 320--327, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Verssimo, N. F. Neves, and M. P. Correia. Intrusion-tolerant architectures: Concepts and design. In R. Lemos, C. Gacek, and A. Romanovsky, editors, Architecting Dependable Systems, volume 2677 of Lecture Notes in Computer Science. Springer-Verlag, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Vitek, C. Bryce, and M. Oriol. Coordination processes with Secure Spaces. Science of Computer Programming, 46(1-2):163--193, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Xu and B. Liskov. A design for a fault-tolerant, distributed implementation of Linda. In Proceedings of the 19th Symposium on Fault-Tolerant Computing - FTCS'89, pages 199--206, 1989.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. BTS: a Byzantine fault-tolerant tuple space

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
          April 2006
          1967 pages
          ISBN:1595931082
          DOI:10.1145/1141277

          Copyright © 2006 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 April 2006

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader