3
Most read
5
Most read
17
Most read
Practical Byzantine Fault
Tolerance
Academic Study presentation for Distributed systems
By Altanai Bisht
Dept of Computer Science , Seattle University ( 2021)
About
Practical Byzantine Fault Tolerance and Proactive Recovery - MIGUEL CASTRO Microsoft Research
And BARBARA LISKOV MIT Laboratory for Computer Science
ACM Transactions on Computer Systems, 20(4):398–461, Nov. 2002. Cited on 458, 460
Challenges in Distributed Systems
Distributed systems are subject to a variety of failures and attacks -Hacker break-in, Data corruption,
Software/hardware failure. But in Byzantine failure model: Faulty nodes may exhibit arbitrary
behavior - Malicious attacks
Consensus Protocol Goals
● Liveness
● Clients receive replies to requests
● Safety
● Replicated service is linearizable
i.e. it appears centralized w/ atomic ops
We need n > 3f nodes
● 2f+1 to act with confidence, f may never respond
Accountable Systems
● Actions are undeniable
● State is tamper evident
● Correctness can be certified
[Yumerefendi05] Example: Building trust in federated
systems
Academic Study presentation for Distributed systems by Altanai Bisht
Faults
Academic Study presentation for Distributed systems by Altanai Bisht
Prior approaches
Prior approaches to replication tolerate benign faults
- Alsberg and Day [1976], Gifford [1979], Viewstamped Replication Oki and Liskov [1988], Paxos
Lamport [1989], and Liskov et al. [1991]
Earlier techniques to tolerate Byzantine faults were inefficient and could misclassify replica as faulty.
- synchrony [Lamport 1984] rely on bounds on message delays and process speeds
Earlier proactive security algorithms assume that program is in read only memory and non
compromisable with authenticated channel persisting between replicas even after a compromise
- [Ostrovsky and Yung 1991; Herzberg et al. 1995, 1997; Canetti et al. 1997; Garay et al. 2000]
Academic Study presentation for Distributed systems by Altanai Bisht
Paxos
Source IEEE 2018 [5] Academic Study presentation for Distributed systems by Altanai Bisht
Guarantee safety, but not liveness
Byzantine Fault Tolerance
BFT is a state machine replication algorithm that is safe in asynchronous systems such as the
Internet
Used to build highly available systems and incorporates mechanisms to defend against
Byzantine-faulty clients
● Safety
○ Never returns bad replies even in the presence of denial-of-service attacks.
● Liveness
○ provided message delays are bounded eventually
● Recovers replicas proactively
○ provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability
Academic Study presentation for Distributed systems by Altanai Bisht
System Model Bound on Faults
f = |_(n−1)/3 _| is the bound on
number of faulty replicas
Strong cryptography
assume the attacker cannot forge
MAC
assume the cryptographic hash
function is collision resistant
Weak Synchrony (Only for Liveness)
assume that delay(t) has an
asymptotic upper bound
● Deterministic Asynchronous
distributed system
● No Impersonation : Public-key
signature using cryptographic hash
function to compute message digests
● Non Tamperung : uses message
authentication codes (MACs) to
authenticate all messages
Academic Study presentation for Distributed systems by Altanai Bisht
BFT algorithm
without proactive recovery
Overview : BFT
Primary-backup
- Primary picks ordering and sends assignment to
backups
- Backups check sequence
- request sequence numbers are dense, no
skipping
Quorum replication
- Order requests correctly despite failures
- Quorums : Reliable memory for protocol information
- Replicas write information to a quorum and they
collect quorum certificates
- Intersection
- Availability Academic Study presentation for Distributed systems by Altanai Bisht
BFT
Client waits for a weak certificate with
f +1 replies with valid MACs from
different replicas, and with the same
Timestamp t and result r, before
accepting the result.
Academic Study presentation for Distributed systems by Altanai Bisht
BFT Normal Case Op
When primary fails, backup replicas can trigger view changes to select a new primary
Low h and high H watermark for sequence number help in Garbage collection to prevents a faulty primary from exhausting the
space of sequence numbers
Client
Primary Replica 0
Replica 1
Replica 2
Replica 3
Atomically multicast requests to the replicas using three-phase protocol
(pre-prepare, prepare, and commit)
Academic Study presentation for Distributed systems by Altanai Bisht
Proactive recovery mechanism for
BFT ( BFT-PR)
Recovers replicas periodically even if there is no reason to
suspect that they are faulty.
Overview : BFT PR
Assumptions
● Secure Cryptography
● Read-Only Memory : memory storing public keys
survives failures, without being corrupted
● Watchdog timer , hands control to a recovery
monitor
Quorum certificate received by a non faulty replica
must be backed by a quorum
changing MAC keys during recoveries
● replicas and clients reject messages that are
authenticated with old keys or not part of
complete certificate
Refreshing session keys
Recovery and reboot
● Estimation Protocol for HM
● multicasts a recovery request
● Check and fetch state
Academic Study presentation for Distributed systems by Altanai Bisht
Limitations
1. Does not address the problem of fault-tolerant privacy: a
faulty replica may leak information to an attacker.
2. assumes static membership
3. assumes that a replica server’s memory acts as a stable,
persistent storage.
4. Strict upper bound on faulty processes ( only fewer than
1/3 of the replicas can fail ie strictly > ⅔ of the total
number of processors should be honest.)
5. High Communication overhead - increases exponentially
with every new node added
6. Susceptible to Sybill attack in p2p system [4]
1. Does not rely on client to order or synchronize
2. Better in energy efficiency than PoW ( proof of
Work) in Bitcoin where every node individually
verifies all the transactions
3. Detection of denial-of-service attacks
4. Garbage collection
Academic Study presentation for Distributed systems by Altanai Bisht
Advantages
Applications : 1. Byzantine-fault-tolerant NFS file
system using symmetric cryptography
to authenticate messages(
implemented in paper itself)
2. pBFT in distributed computing and
blockchain
a. pBFT + DPoS(Delegated
Proof-of-Stake)
b. pBFT in combination with PoW
consensus
Academic Study presentation for Distributed systems by Altanai Bisht
References
[1] Paxos - Leslie Lamport [1998] [Lampson, 1996; Prisco et al., 1997;Lamport, 2001; van Renesse and Altinbuken, 2015]
[2] CAP theorem - Gilbert and Lynch [2002]
[3] state machine replication [Lamport 1978; Schneider 1990]
[4] Sybil Attack - John R. Douceur at the Microsoft Research.
[5] Charapko, Aleksey, Ailidani Ailijiang and Murat Demirbas. “Bridging Paxos and Blockchain Consensus.” 2018 IEEE International Conference on Internet of Things
(iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
(2018): 1545-1552.
[6] Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial , JOHN KOLB, MOUSTAFA ABDELBAKY, RANDY H. KATZ, and DAVID E.
CULLER, University of California – Berkeley, USA, ACM Comput. Surv., Vol. 53, No. 1, Article 9, Publication date: February 2020.

More Related Content

PDF
Practical Byzantine Fault Tolernace
PPT
PDF
PDF
FastBFT
PDF
Honeybadger of BFT Protocols
PDF
Ekiden
PDF
Practical Byzantine Fault Tolerance
PDF
Practical Byzantine Fault Tolernace
FastBFT
Honeybadger of BFT Protocols
Ekiden
Practical Byzantine Fault Tolerance

What's hot (20)

PPTX
PDF
Omni ledger
PDF
FlexSC
PPTX
The paxos commit algorithm
PPTX
Istanbul BFT
PPS
the Paxos Commit algorithm
PPT
Mutual exclusion and sync
PPT
Os3
PPTX
Mutual Exclusion using Peterson's Algorithm
PDF
Algorand Consensus Algorithm
PDF
Verifying offchain computations using TrueBit. Sami Makela
PPTX
Critical Section in Operating System
PPTX
Process synchronization
PDF
8. mutual exclusion in Distributed Operating Systems
DOCX
Critical section operating system
PDF
6 Synchronisation
PPTX
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
PPT
Os module 2 c
PPTX
Operating system critical section
PPTX
Concurrency: Mutual Exclusion and Synchronization
Omni ledger
FlexSC
The paxos commit algorithm
Istanbul BFT
the Paxos Commit algorithm
Mutual exclusion and sync
Os3
Mutual Exclusion using Peterson's Algorithm
Algorand Consensus Algorithm
Verifying offchain computations using TrueBit. Sami Makela
Critical Section in Operating System
Process synchronization
8. mutual exclusion in Distributed Operating Systems
Critical section operating system
6 Synchronisation
ACSAC2016: Code Obfuscation Against Symbolic Execution Attacks
Os module 2 c
Operating system critical section
Concurrency: Mutual Exclusion and Synchronization
Ad

Similar to Practical byzantine fault tolerance by altanai (20)

PDF
Byzantine Fault Tolerance problem Blockchain Technology
PPTX
Hyperledger Consensus Algorithms
PDF
Cheapbft
PPTX
Blockchain in disributed computing for study
PPT
Fault Tolerance (Distributed computing)
PDF
techcodes
PDF
Fault tolerance review by tsegabrehan zerihun
PPSX
Foult Tolerence In Distributed System
PDF
PDF
Thriftypaxos
PPTX
Fault tolerance in distributed systems
PDF
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
PDF
Consensus Algorithms: An Introduction & Analysis
PPT
Handling Byzantine Faults
PPT
Chapter 7-Fault Tolerance.ppt
PDF
Exploring Fault Tolerance Strategies in Big Data Infrastructures and Their Im...
PPT
Adaptive fault tolerance in cloud survey
PPTX
Operating system.assig.ppt gokgfchvhj;;hhjcghfxgch
PDF
High Availability of Services in Wide-Area Shared Computing Networks
PPTX
Unit_4_Fault_Tolerance.pptx
Byzantine Fault Tolerance problem Blockchain Technology
Hyperledger Consensus Algorithms
Cheapbft
Blockchain in disributed computing for study
Fault Tolerance (Distributed computing)
techcodes
Fault tolerance review by tsegabrehan zerihun
Foult Tolerence In Distributed System
Thriftypaxos
Fault tolerance in distributed systems
A Novel Approach for Efficient Resource Utilization and Trustworthy Web Service
Consensus Algorithms: An Introduction & Analysis
Handling Byzantine Faults
Chapter 7-Fault Tolerance.ppt
Exploring Fault Tolerance Strategies in Big Data Infrastructures and Their Im...
Adaptive fault tolerance in cloud survey
Operating system.assig.ppt gokgfchvhj;;hhjcghfxgch
High Availability of Services in Wide-Area Shared Computing Networks
Unit_4_Fault_Tolerance.pptx
Ad

More from ALTANAI BISHT (20)

PDF
Cinemarkup
PPTX
Ramudroid presented in woman in robotics 2021
PDF
Telecom Network & SIEM logs analysis using machine learning
PDF
Machine Learning applications in Voice over IP
PDF
Current trends and innovations in voice over IP
PDF
Ramudroid
PDF
Plivo webrtc telephony in your browser
PDF
Hybrid Smart Grid System for Renewable energy
PDF
RFID in Assets and Library Management
PDF
Unified Communications and Collaborations (UC&C)
PDF
Media Streams in IOT via WebRTC
PDF
Ramudroid v7.0
PDF
Hackaday ramudroid 6.5
PDF
WebRTC in IOT presented in KrankyGeek
PPTX
Ramu droid for swach bharat abhiyaan
PDF
Ramu droid @gracehopper
DOCX
Single board computer options
PPTX
Ramu droid
PDF
Real time control and communication ( Robots , Machines , IOT )
PDF
Augmented reality in web rtc browser
Cinemarkup
Ramudroid presented in woman in robotics 2021
Telecom Network & SIEM logs analysis using machine learning
Machine Learning applications in Voice over IP
Current trends and innovations in voice over IP
Ramudroid
Plivo webrtc telephony in your browser
Hybrid Smart Grid System for Renewable energy
RFID in Assets and Library Management
Unified Communications and Collaborations (UC&C)
Media Streams in IOT via WebRTC
Ramudroid v7.0
Hackaday ramudroid 6.5
WebRTC in IOT presented in KrankyGeek
Ramu droid for swach bharat abhiyaan
Ramu droid @gracehopper
Single board computer options
Ramu droid
Real time control and communication ( Robots , Machines , IOT )
Augmented reality in web rtc browser

Recently uploaded (20)

PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Tartificialntelligence_presentation.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPT
What is a Computer? Input Devices /output devices
PPTX
Modernising the Digital Integration Hub
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Five Habits of High-Impact Board Members
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Hybrid model detection and classification of lung cancer
PDF
WOOl fibre morphology and structure.pdf for textiles
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
1 - Historical Antecedents, Social Consideration.pdf
Module 1.ppt Iot fundamentals and Architecture
Tartificialntelligence_presentation.pptx
Developing a website for English-speaking practice to English as a foreign la...
O2C Customer Invoices to Receipt V15A.pptx
sustainability-14-14877-v2.pddhzftheheeeee
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
What is a Computer? Input Devices /output devices
Modernising the Digital Integration Hub
Taming the Chaos: How to Turn Unstructured Data into Decisions
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Five Habits of High-Impact Board Members
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Enhancing emotion recognition model for a student engagement use case through...
A review of recent deep learning applications in wood surface defect identifi...
Hybrid model detection and classification of lung cancer
WOOl fibre morphology and structure.pdf for textiles

Practical byzantine fault tolerance by altanai

  • 1. Practical Byzantine Fault Tolerance Academic Study presentation for Distributed systems By Altanai Bisht Dept of Computer Science , Seattle University ( 2021)
  • 2. About Practical Byzantine Fault Tolerance and Proactive Recovery - MIGUEL CASTRO Microsoft Research And BARBARA LISKOV MIT Laboratory for Computer Science ACM Transactions on Computer Systems, 20(4):398–461, Nov. 2002. Cited on 458, 460
  • 3. Challenges in Distributed Systems Distributed systems are subject to a variety of failures and attacks -Hacker break-in, Data corruption, Software/hardware failure. But in Byzantine failure model: Faulty nodes may exhibit arbitrary behavior - Malicious attacks Consensus Protocol Goals ● Liveness ● Clients receive replies to requests ● Safety ● Replicated service is linearizable i.e. it appears centralized w/ atomic ops We need n > 3f nodes ● 2f+1 to act with confidence, f may never respond Accountable Systems ● Actions are undeniable ● State is tamper evident ● Correctness can be certified [Yumerefendi05] Example: Building trust in federated systems Academic Study presentation for Distributed systems by Altanai Bisht
  • 4. Faults Academic Study presentation for Distributed systems by Altanai Bisht
  • 5. Prior approaches Prior approaches to replication tolerate benign faults - Alsberg and Day [1976], Gifford [1979], Viewstamped Replication Oki and Liskov [1988], Paxos Lamport [1989], and Liskov et al. [1991] Earlier techniques to tolerate Byzantine faults were inefficient and could misclassify replica as faulty. - synchrony [Lamport 1984] rely on bounds on message delays and process speeds Earlier proactive security algorithms assume that program is in read only memory and non compromisable with authenticated channel persisting between replicas even after a compromise - [Ostrovsky and Yung 1991; Herzberg et al. 1995, 1997; Canetti et al. 1997; Garay et al. 2000] Academic Study presentation for Distributed systems by Altanai Bisht
  • 6. Paxos Source IEEE 2018 [5] Academic Study presentation for Distributed systems by Altanai Bisht Guarantee safety, but not liveness
  • 7. Byzantine Fault Tolerance BFT is a state machine replication algorithm that is safe in asynchronous systems such as the Internet Used to build highly available systems and incorporates mechanisms to defend against Byzantine-faulty clients ● Safety ○ Never returns bad replies even in the presence of denial-of-service attacks. ● Liveness ○ provided message delays are bounded eventually ● Recovers replicas proactively ○ provided fewer than 1/3 of the replicas become faulty within a small window of vulnerability Academic Study presentation for Distributed systems by Altanai Bisht
  • 8. System Model Bound on Faults f = |_(n−1)/3 _| is the bound on number of faulty replicas Strong cryptography assume the attacker cannot forge MAC assume the cryptographic hash function is collision resistant Weak Synchrony (Only for Liveness) assume that delay(t) has an asymptotic upper bound ● Deterministic Asynchronous distributed system ● No Impersonation : Public-key signature using cryptographic hash function to compute message digests ● Non Tamperung : uses message authentication codes (MACs) to authenticate all messages Academic Study presentation for Distributed systems by Altanai Bisht
  • 10. Overview : BFT Primary-backup - Primary picks ordering and sends assignment to backups - Backups check sequence - request sequence numbers are dense, no skipping Quorum replication - Order requests correctly despite failures - Quorums : Reliable memory for protocol information - Replicas write information to a quorum and they collect quorum certificates - Intersection - Availability Academic Study presentation for Distributed systems by Altanai Bisht
  • 11. BFT Client waits for a weak certificate with f +1 replies with valid MACs from different replicas, and with the same Timestamp t and result r, before accepting the result. Academic Study presentation for Distributed systems by Altanai Bisht
  • 12. BFT Normal Case Op When primary fails, backup replicas can trigger view changes to select a new primary Low h and high H watermark for sequence number help in Garbage collection to prevents a faulty primary from exhausting the space of sequence numbers Client Primary Replica 0 Replica 1 Replica 2 Replica 3 Atomically multicast requests to the replicas using three-phase protocol (pre-prepare, prepare, and commit) Academic Study presentation for Distributed systems by Altanai Bisht
  • 13. Proactive recovery mechanism for BFT ( BFT-PR) Recovers replicas periodically even if there is no reason to suspect that they are faulty.
  • 14. Overview : BFT PR Assumptions ● Secure Cryptography ● Read-Only Memory : memory storing public keys survives failures, without being corrupted ● Watchdog timer , hands control to a recovery monitor Quorum certificate received by a non faulty replica must be backed by a quorum changing MAC keys during recoveries ● replicas and clients reject messages that are authenticated with old keys or not part of complete certificate Refreshing session keys Recovery and reboot ● Estimation Protocol for HM ● multicasts a recovery request ● Check and fetch state Academic Study presentation for Distributed systems by Altanai Bisht
  • 15. Limitations 1. Does not address the problem of fault-tolerant privacy: a faulty replica may leak information to an attacker. 2. assumes static membership 3. assumes that a replica server’s memory acts as a stable, persistent storage. 4. Strict upper bound on faulty processes ( only fewer than 1/3 of the replicas can fail ie strictly > ⅔ of the total number of processors should be honest.) 5. High Communication overhead - increases exponentially with every new node added 6. Susceptible to Sybill attack in p2p system [4] 1. Does not rely on client to order or synchronize 2. Better in energy efficiency than PoW ( proof of Work) in Bitcoin where every node individually verifies all the transactions 3. Detection of denial-of-service attacks 4. Garbage collection Academic Study presentation for Distributed systems by Altanai Bisht Advantages
  • 16. Applications : 1. Byzantine-fault-tolerant NFS file system using symmetric cryptography to authenticate messages( implemented in paper itself) 2. pBFT in distributed computing and blockchain a. pBFT + DPoS(Delegated Proof-of-Stake) b. pBFT in combination with PoW consensus Academic Study presentation for Distributed systems by Altanai Bisht
  • 17. References [1] Paxos - Leslie Lamport [1998] [Lampson, 1996; Prisco et al., 1997;Lamport, 2001; van Renesse and Altinbuken, 2015] [2] CAP theorem - Gilbert and Lynch [2002] [3] state machine replication [Lamport 1978; Schneider 1990] [4] Sybil Attack - John R. Douceur at the Microsoft Research. [5] Charapko, Aleksey, Ailidani Ailijiang and Murat Demirbas. “Bridging Paxos and Blockchain Consensus.” 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (2018): 1545-1552. [6] Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial , JOHN KOLB, MOUSTAFA ABDELBAKY, RANDY H. KATZ, and DAVID E. CULLER, University of California – Berkeley, USA, ACM Comput. Surv., Vol. 53, No. 1, Article 9, Publication date: February 2020.