Skip to main content

Encapsulating Failure Detection: From Crash to Byzantine Failures

  • Conference paper
  • First Online:
Reliable Software Technologies — Ada-Europe 2002 (Ada-Europe 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2361))

Included in the following conference series:

Abstract

Separating different aspects of a program, and encapsulating them inside well defined modules, is considered a good engineering discipline. This discipline is particularly desirable in the development of distributed agreement algorithms which are known to be difficult and error prone. For such algorithms, one aspect that is important to encapsulate is failure detection. In fact, a complete encapsulation was proven to be feasible in the context of distributed systems with process crash failures, by using black-box failure detectors. This paper discusses the feasibility of a similar encapsulation in the context of Byzantine (also called arbitrary or malicious) failures. We argue that, in the Byzantine context, it is just impossible to achieve the level of encapsulation of the original crash failure detector model. However, we also argue that there is some room for an intermediate approach where algorithms that solve agreement problems, such as consensus and atomic broadcast, can still benefit from grey-box failure detectors that partially encapsulate Byzantine failure detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. T. D. Chandra, V. Hadzilacos, and S. Toueg. The weakest failure detector for solving Consensus. Journal of the ACM, 43(4):685–722, July 1996.

    Google Scholar 

  2. T. D. Chandra and S. Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2):225–267, March 1996.

    Google Scholar 

  3. A. Doudou. Abstractions for Byzantine-Resilient State Machine Replication. PhD thesis, Swiss Federal Institute of Technology, Lausanne (EPFL), 2000.

    Google Scholar 

  4. A. Doudou, B. Garbinato, and R. Guerraoui. Abstractions for Byzantine Resilient State Machine Replication. In Symposium on Reliable Distributed Systems. IEEE, October, 2000.

    Google Scholar 

  5. C. Dwork, N. Lynch, and L. Stockmeyer. Consensus in the presence of partial synchrony. Journal of the ACM, 35(2):288–323, apr 1988.

    Google Scholar 

  6. M. Fischer, N. Lynch, and M. Paterson. Impossibility of Distributed Consensus with One Faulty Process. Journal of the ACM, 32:374–382, April 1985.

    Google Scholar 

  7. M. J. Fischer. The consensus problem in unreliable distributed systems (A brief survey). In Proceedings of the International Conference on Foundations of Computations Theory, pages 127–140, Borgholm, Sweden, 1983.

    Google Scholar 

  8. R. Guerraoui. Non-blocking atomic commit in asynchronous sytems with failure detectors. Distributed Computing, 15(1), January 2002.

    Google Scholar 

  9. R. Guerraoui and A. Schiper. The generic consensus service. IEEE Transactions on Software Engineering, 27(14):29–41, January 2001.

    Google Scholar 

  10. K. P. Kihlstrom, L. E. Moser, and P. M. Melliar-Smith. The secure protocols for securing group communication. In Proceedings of the 31st Hawaii International Conference on System Sciences, volume 3, pages 317–326. IEEE, January 1998.

    Google Scholar 

  11. K. P. Kihlstrom, Louise E. Moser, and P. M. Melliar-Smith. Solving consensus in a Byzantine environment using an unreliable fault detector. In Proceedings of the International Conference on Principles of Distributed Systems (OPODIS), pages 61–75, December 1997.

    Google Scholar 

  12. L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3):382–401, July 1982.

    Google Scholar 

  13. D. Malkhi and M. Reiter. Unreliable Intrusion Detection in Distributed Computations. In Proceedings 10th Computer Security Foundations Workshop (CSFW97), pages 116–124, June 1997.

    Google Scholar 

  14. L. E. Moser, P. M. Melliar-Smith, and D. A. Agrawala. Total ordering algorithms. In ACMCSC: ACM Annual Computer Science Conference, 1991.

    Google Scholar 

  15. M. K. Reiter. Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68–80, November 1994.

    Google Scholar 

  16. R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, February 1978.

    Google Scholar 

  17. S. Toueg. Randomized Byzantine Agreements. In Proceedings of the 3rd ACM Symposium on Principles of Distributed Computing, pages 163–178, August 1983.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doudou, A., Garbinato, B., Guerraoui, R. (2002). Encapsulating Failure Detection: From Crash to Byzantine Failures. In: Blieberger, J., Strohmeier, A. (eds) Reliable Software Technologies — Ada-Europe 2002. Ada-Europe 2002. Lecture Notes in Computer Science, vol 2361. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48046-3_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-48046-3_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43784-0

  • Online ISBN: 978-3-540-48046-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics