Hidden Problems of Asynchronous Proactive Recovery
نویسندگان
چکیده
A node-exhaustion-safe intrusion-tolerant distributed system is a system that assuredly does not suffer more than the assumed number of node failures. In a recent work, we showed that it is not possible to build any type of nodeexhaustion-safe distributed f intrusion-tolerant system under the asynchronous model. Some years ago, an intuition about this problem motivated the research around proactive recovery, which made possible the appearance of asynchronous systems that allegedly can tolerate any number of faults over the lifetime of the system. In this paper, each of these works is analyzed in detail and is explained why they fail to achieve their goal. Afterwards, we summarize the four problems that may affect systems employing proactive recovery.
منابع مشابه
1 Proactive Fault - Recovery in Distributed Systems
Supporting both real-time and fault-tolerance properties in systems is challenging because real-time systems require predictable end-to-end schedules and bounded temporal behavior in order to meet task deadlines. However, system failures, which are typically unanticipated events, can disrupt the predefined real-time schedule and result in missed task deadlines. Such disruptions to the real-time...
متن کاملReliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and Recoveries
This paper presents a formal model for asynchronous distributed systems with parties that exhibit Byzantine faults or that crash and subsequently recover. Motivated by practical considerations, it represents an intermediate step between crash-recovery models for distributed computing and proactive security methods for tolerating arbitrary faults. The model is computational and based on complexi...
متن کاملNew Causal Message Logging Protocol with Asynchronous Checkpointing for Distributed Systems
Causal message logging is an efficient approach for tolerating failures of processes in distributed systems because it has the advantages of both pessimistic and optimistic message logging approach. However, traditional causal message logging protocols prevent live processes from executing continuously their computation and require some synchronous logging to the stable storage during recovery....
متن کاملAsynchronous Proactive Cryptosystems Without Agreement
In this paper, we present efficient asynchronous protocols that allow to build proactive cryptosystems secure against a mobile fail-stop adversary. Such systems distribute the power of a public-key cryptosystem among a set of servers, so that the security and functionality of the overall system is preserved against an adversary that crashes and/or eavesdrops every server repeatedly and transien...
متن کاملProactive Byzantine Quorum Systems
Byzantine Quorum Systems is a replication technique used to ensure availability and consistency of replicates data even in presence of arbitrary faults. This paper presents a Byzantine Quorum Systems protocol that provides atomic semantics despite the existence of Byzantine clients and servers. Moreover, this protocol is integrated with a protocol for proactive recovery of servers. In that way,...
متن کامل