skip to main content
10.1145/3284869.3284870acmotherconferencesArticle/Chapter ViewAbstractPublication PagesgoodtechsConference Proceedingsconference-collections
research-article

Transparent Protection of Aggregate Computations from Byzantine Behaviours via Blockchain

Published:28 November 2018Publication History

ABSTRACT

Aggregate Computing is a promising paradigm for coordinating large numbers of possibly situated devices, typical of scenarios related to the Internet of Things, smart cities, drone coordination, and mass urban events. Currently, little work has been devoted to study and improve security in aggregate programs, and existing works focus solely on application-level countermeasures. Those security systems work under the assumption that the underlying computational model is respected; however, so-called Byzantine behaviour violates such assumption. In this paper, we discuss how Byzantine behaviours can hinder an aggregate program, and exploit application-level protection for creating bigger disruption. We discuss how the blockchain technology can mitigate these attacks by enforcing behaviours consistent with the expected operational semantics, with no impact on the application logic.

References

  1. Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains. In 13th EuroSys Conference (EuroSys '18). ACM, Article 30, 15 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Pierre-Louis Aublin, Rachid Guerraoui, Nikola Knežević, Vivien Quéma, and Marko Vukolić. 2015. The Next 700 BFT Protocols. ACM Transactions on Computer Systems 32, 4 (Jan. 2015), 1--45. arXiv:1710.03346 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Giorgio Audrito, Ferruccio Damiani, Mirko Viroli, and Roberto Casadei. 2016. Run-Time Management of Computation Domains in Field Calculus, See {16}, 192--197.Google ScholarGoogle Scholar
  4. Jonathan Bachrach, Jacob Beal, and James McLurkin. 2010. Composable continuous-space programs for robotic swarms. Neural Computing and Applications 19, 6 (2010), 825--847. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Adam Back. 2002. Hashcash - A Denial of Service Counter-Measure. http://www.hashcash.org/hashcash.pdfGoogle ScholarGoogle Scholar
  6. Jacob Beal, Danilo Pianini, and Mirko Viroli. 2015. Aggregate Programming for the Internet of Things. IEEE Computer 48, 9 (2015), 22--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jacob Beal, Kyle Usbeck, Joseph Loyall, Mason Rowe, and James Metzler. 2016. Adaptive Task Reallocation for Airborne Sensor Sharing, See {16}, 168--173.Google ScholarGoogle Scholar
  8. Jacob Beal, Mirko Viroli, Danilo Pianini, and Ferruccio Damiani. 2017. Self-Adaptation to Device Distribution in the Internet of Things. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 12, 3, Article 12 (Sept. 2017), 29 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah. 2005. Gossip algorithms: design, analysis and applications. In IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3. IEEE, 1653--1664.Google ScholarGoogle Scholar
  10. Christian Cachin and Marko Vukolić. 2017. Blockchain Consensus Protocols in the Wild. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Andréa W. Richa (Ed.), Vol. 91. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, Article 1, 16 pages.Google ScholarGoogle Scholar
  11. Roberto Casadei, Alessandro Aldini, and Mirko Viroli. 2018. Towards Attack-Resistant Aggregate Computing Using Trust Mechanisms. Science of Computer Programming 167 (2018), 114--137.Google ScholarGoogle ScholarCross RefCross Ref
  12. Roberto Casadei, Giancarlo Fortino, Danilo Pianini, Wilma Russo, Claudio Savaglio, and Mirko Viroli. 2019. Modelling and Simulation of Opportunistic IoT Services with Aggregate Computing. Future Generation Computer Systems 91 (Feb. 2019), 252--262.Google ScholarGoogle Scholar
  13. Roberto Casadei, Danilo Pianini, and Mirko Viroli. 2016. Simulating Large-scale Aggregate MASs with Alchemist and Scala. In 2016 Federated Conference on Computer Science and Information Systems, FedCSIS 2016, Gdańsk, Poland, September 11-14, 2016. (ACSIS), Vol. 8. Polish Information Processing Society, 1495--1504.Google ScholarGoogle Scholar
  14. Jin-Hee Cho, Ananthram Swami, and Ray Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials 13, 4 (2011), 562--583.Google ScholarGoogle ScholarCross RefCross Ref
  15. John R. Douceur. 2002. The Sybil Attack. In 1st International Workshop on Peer-to-Peer Systems (IPTPS '01). Springer, 251--260. http://dl.acm.org/citation.cfm?id=687813 Revised Papers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sameh Elnikety, Peter R. Lewis, and Christian Müller-Schloer (Eds.). 2016. 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W 2016). IEEE.Google ScholarGoogle Scholar
  17. Leslie Lamport, Robert Shostak, and Marshall Pease. 1982. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems (TOPLAS) 4, 3 (July 1982), 382--401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Félix Gómez Mármol and Gregorio Martínez Pérez. 2009. Security threats scenarios in trust and reputation models for distributed systems. computers & security 28, 7 (2009), 545--556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. http://bitcoin.org/bitcoin.pdfGoogle ScholarGoogle Scholar
  20. Danilo Pianini, Jacob Beal, and Mirko Viroli. 2016. Improving Gossip Dynamics Through Overlapping Replicates. In Coordination Models and Languages (LNCS), Alberto Lluch Lafuente and José Proença (Eds.), Vol. 9686. Springer, 192--207.Google ScholarGoogle Scholar
  21. Danilo Pianini, Mirko Viroli, and Jacob Beal. 2015. Protelis: practical aggregate programming. In 30th Annual ACM Symposium on Applied Computing (SAC 2015). ACM Press, 1846--1853. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Fred B. Schneider. 1990. Implementing Fault-tolerant Services Using the State Machine Approach: A Tutorial. Comput. Surveys 22, 4 (Dec. 1990), 299--319. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Robert W. Shirey. 2007. Internet Security Glossary, Version 2. RFC 4949.Google ScholarGoogle Scholar
  24. Mirko Viroli, Giorgio Audrito, Ferruccio Damiani, Danilo Pianini, and Jacob Beal. 2016. A Higher-order Calculus of Computational Fields. CoRR abs/1610.08116 (2016), 39. http://arxiv.org/abs/1610.08116Google ScholarGoogle Scholar
  25. Mirko Viroli, Jacob Beal, Ferruccio Damiani, Giorgio Audrito, Roberto Casadei, and Danilo Pianini. 2018. From Field-Based Coordination to Aggregate Computing. In Coordination Models and Languages, Giovanna Di Marzo Serugendo and Michele Loreti (Eds.). LNCS, Vol. 10852. Springer, 252--279.Google ScholarGoogle Scholar
  26. Mirko Viroli, Roberto Casadei, and Danilo Pianini. 2016. On execution platforms for large-scale aggregate computing. In 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 1321--1326. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Marko Vukolić. 2016. The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication. In Open Problems in Network Security. LNCS, Vol. 9591. Springer, 112--125.Google ScholarGoogle Scholar
  28. Gavin Wood. 2014. Ethereum: a secure decentralised generalised transaction ledger. http://ethereum.github.io/yellowpaper/paper.pdfGoogle ScholarGoogle Scholar
  29. Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2017. An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends. In 2017 IEEE International Congress on Big Data. IEEE, 557--564.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Transparent Protection of Aggregate Computations from Byzantine Behaviours via Blockchain

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                Goodtechs '18: Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good
                November 2018
                316 pages
                ISBN:9781450365819
                DOI:10.1145/3284869

                Copyright © 2018 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 28 November 2018

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Research
                • Refereed limited

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader