Title
Proactive resilience through architectural hybridization
Abstract
General Terms In a recent work, we have shown that it is not possible to de-pendably build any type of distributed f fault or intrusion-tolerant system under the asynchronous model. This result follows from the fact that in an asynchronous environment one cannot guarantee that the system terminates its execu-tion before the occurrence of more than the assumed number of faults. Some systems resorted to proactive recovery as a way to address this problem, by attempting to ensure that no more than f faults ever occur: nodes are periodically rejuvenated to remove the e ects of faults or malicious attacks. How-ever, asynchronous systems with proactive recovery also suf-fer from the same problem. In fact, proactive recovery pro-tocols usually require stronger assumptions (e. g., synchrony, security) than the system that is proactively recovered. To solve this contradiction, we work with a hybrid distrib-uted system model. We propose proactive resilience as a new and more resilient approach to proactive recovery, based on architectural hybridization: proactive recovery functions are encapsulated in architectural devices that meet the required stronger assumptions, and have a well-de ned interface with the recovered system. We present the Proactive Resilience Model (PRM) and de-scribe a design methodology under the PRM. This method-ology is a way of building systems which guaranteedly do not su er more than the assumed number of faults, and we use it to derive a distributed intrusion-tolerant secret sharing system.
Year
DOI
Venue
2006
10.1145/1141277.1141435
ACM Symposium on Applied Computing
Keywords
Field
DocType
system model,proactive recovery,proactive resilience,proactive recovery protocol,assumed number,architectural hybridization,intrusion-tolerant system,asynchronous system,stronger assumption,intrusion-tolerant secret sharing system,proactive recovery function,computer science,design methodology,wormholes,system modeling,intrusion tolerance,secret sharing,fault tolerance
Psychological resilience,Asynchronous communication,Secret sharing,Computer security,Computer science,Design methods,Intrusion tolerance,Fault tolerance,Proactive learning,Distributed computing
Conference
ISBN
Citations 
PageRank 
1-59593-108-2
10
0.59
References 
Authors
15
3
Name
Order
Citations
PageRank
P. Sousa1100.59
N. F. Neves2100.59
Paulo Veríssimo32513187.25