Skip to main content

Using Virtualization Technology for Fault-Tolerant Replication in LAN

  • Conference paper
New Results in Dependability and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 224))

  • 802 Accesses

Abstract

We present an architecture and an algorithm for Byzantine fault-tolerant state machine replication. Our algorithm explores the advantages of virtualization to reliably detect and tolerate faulty replicas, allowing the transformation of Byzantine faults into omission faults. Our approach reduces the total number of physical replicas from 3f+1 to 2f+1. Our approach is based on the concept of twin virtual machines, where there are two virtual machines in each physical host, each one acting as a failure detector of its twin.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lamport, L., Shosta, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)

    Article  MATH  Google Scholar 

  2. Schneider, F.B.: Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Comput. Surv. 22(4), 299–319 (1990)

    Article  Google Scholar 

  3. Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: Proc. of the 3rd OSDI, pp. 173–186. USENIX Association, Berkeley (1999)

    Google Scholar 

  4. Yin, J., Martin, J.P., Venkataramani, A., et al.: Separating agreement from execution for Byzantine fault tolerant services. SIGOPS Oper. Syst. Rev. 37, 253–267 (2003)

    Article  Google Scholar 

  5. Kotla, R., Clement, A., Wong, E., et al.: Zyzzyva: speculative Byzantine fault tolerance. Commun. ACM 51, 86–95 (2008)

    Article  Google Scholar 

  6. Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. J. ACM 43(2), 225–267 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  7. Doudou, A., Garbinato, B., Guerraoui, R., Schiper, A.: Muteness failure detectors: Specification and implementation. In: Hlavicka, J., Maehle, E., Pataricza, A. (eds.) EDDC 1999. LNCS, vol. 1667, pp. 71–87. Springer, Heidelberg (1999)

    Google Scholar 

  8. Kihlstrom, K.P., Moser, L.E., Melliar-Smith, P.M.: Byzantine fault detectors for solving consensus. The Computer Journal 46 (2003)

    Google Scholar 

  9. Jiang, X., Wang, X.: “Out-of-the-box” monitoring of VM-based high-interaction honeypots. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 198–218. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  10. Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proc. of the Network and Distributed Systems Security Symposium (2003)

    Google Scholar 

  11. Correia, M., Neves, N.F., Verissimo, P.: How to tolerate half less one Byzantine nodes in practical distributed systems. In: Proc. of the 23rd IEEE SRDS, pp. 174–183 (2004)

    Google Scholar 

  12. Chun, B.G., Maniatis, P., Shenker, S., et al.: Attested append-only memory: making adversaries stick to their word. In: Proc. of the 21st ACM SOSP, pp. 189–204 (2007)

    Google Scholar 

  13. Veronese, G.S., Correia, M., Bessani, A.N., et al.: Eficient Byzantine fault tolerance. IEEE Transactions on Computers 62(1), 16–30 (2013)

    Article  MathSciNet  Google Scholar 

  14. Wood, T., Singh, R., Venkataramani, A., et al.: ZZ and the art of practical BFT execution. In: Proceedings of the 6th ACM SIGOPS/EuroSys European Systems Conference, pp. 123–138 (2011)

    Google Scholar 

  15. Stumm, V., Lung, L.C., Correia, M., et al.: Intrusion tolerant services through virtualization: A shared memory approach. In: Proc. of the 24th IEEE AINA, pp. 768–774 (2010)

    Google Scholar 

  16. Mpoeleng, D., Ezhilchelvan, P., Speirs, N.: From crash tolerance to authenticated Byzantine tolerance: A structured approach, the cost and benefits. In: Proceedings of the IEEE/IFIP 33rd International Conference on Dependable Systems and Networks, pp. 227–236 (2003)

    Google Scholar 

  17. Inayat, Q., Ezhilchelvan, P.: A performance study on the signal-on-fail approach to imposing total order in the streets of byzantium. In: Proc. IEEE DSN, pp. 578–587 (2006)

    Google Scholar 

  18. Murray, D.G., Milos, G., Hand, S.: Improving Xen security through disaggregation. In: Proceedings of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 151–160 (2008)

    Google Scholar 

  19. Szefer, J., Keller, E., Lee, R.B., et al.: Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 401–412 (2011)

    Google Scholar 

  20. Wang, Z., Jiang, X.: HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proc. of the IEEE Security and Privacy Symposium, pp. 380–395 (2010)

    Google Scholar 

  21. Bessani, A., Daidone, A., Gashi, I., et al.: Enhancing fault / intrusion tolerance through design and configuration diversity. In: Proceedings of the 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems (2009)

    Google Scholar 

  22. Gashi, I., Popov, P.T., Strigini, L.: Fault tolerance via diversity for o#-the-shelf products: A study with SQL database servers. IEEE Transactions on Dependable and Secure Computing 4(4), 280–294 (2007)

    Article  Google Scholar 

  23. Castro, M., Liskov, B.: Authenticated Byzantine fault tolerance without public-key cryptography. Technical report, Cambridge, MA, USA (1999)

    Google Scholar 

  24. Wangham, M.S., Lung, L.C., Westphall, C.M., da Silva Fraga, J.: Integrating SSL to the JACOWEB security framework: Project and Implementation. In: IM 2001, pp. 779–792 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fernando Dettoni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Dettoni, F., Lung, L.C., Luiz, A.F. (2013). Using Virtualization Technology for Fault-Tolerant Replication in LAN. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) New Results in Dependability and Computer Systems. Advances in Intelligent Systems and Computing, vol 224. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00945-2_12

Download citation

Publish with us

Policies and ethics