Abstract | ||
---|---|---|
General Terms In a recent work, we have shown that it is not possible to de-pendably build any type of distributed f fault or intrusion-tolerant system under the asynchronous model. This result follows from the fact that in an asynchronous environment one cannot guarantee that the system terminates its execu-tion before the occurrence of more than the assumed number of faults. Some systems resorted to proactive recovery as a way to address this problem, by attempting to ensure that no more than f faults ever occur: nodes are periodically rejuvenated to remove the e ects of faults or malicious attacks. How-ever, asynchronous systems with proactive recovery also suf-fer from the same problem. In fact, proactive recovery pro-tocols usually require stronger assumptions (e. g., synchrony, security) than the system that is proactively recovered. To solve this contradiction, we work with a hybrid distrib-uted system model. We propose proactive resilience as a new and more resilient approach to proactive recovery, based on architectural hybridization: proactive recovery functions are encapsulated in architectural devices that meet the required stronger assumptions, and have a well-de ned interface with the recovered system. We present the Proactive Resilience Model (PRM) and de-scribe a design methodology under the PRM. This method-ology is a way of building systems which guaranteedly do not su er more than the assumed number of faults, and we use it to derive a distributed intrusion-tolerant secret sharing system. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1145/1141277.1141435 | ACM Symposium on Applied Computing |
Keywords | Field | DocType |
system model,proactive recovery,proactive resilience,proactive recovery protocol,assumed number,architectural hybridization,intrusion-tolerant system,asynchronous system,stronger assumption,intrusion-tolerant secret sharing system,proactive recovery function,computer science,design methodology,wormholes,system modeling,intrusion tolerance,secret sharing,fault tolerance | Psychological resilience,Asynchronous communication,Secret sharing,Computer security,Computer science,Design methods,Intrusion tolerance,Fault tolerance,Proactive learning,Distributed computing | Conference |
ISBN | Citations | PageRank |
1-59593-108-2 | 10 | 0.59 |
References | Authors | |
15 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
P. Sousa | 1 | 10 | 0.59 |
N. F. Neves | 2 | 10 | 0.59 |
Paulo Veríssimo | 3 | 2513 | 187.25 |