Erasure-coded byzantine storage with separate metadata

Androulaki, Elli; Cachin, Christian; Dobre, Dan; Vukolic, Marko
OPODIS 2014, 18th International Conference on Principles of Distributed Systems, December 16-19, 2014, Cortina d?Ampezzo, Italy / Also published in LNCS, Vol. 8878/2014

Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost. We present AWE, the first erasure-coded distributed implementation of a multi-writer multi-reader read/write storage object that is, at the same time: (1) asynchronous, (2) wait-free, (3) atomic, (4) amnesic, (i.e., with data nodes storing a bounded number of values) and (5) Byzantine fault-tolerant (BFT) using the optimal number of nodes. Furthermore, AWE is efficient since it does not use public-key cryptography and requires data nodes that support only reads and writes, further reducing the cost of deployment and ownership of a distributed storage solution. Notably, AWE stores metadata separately from -out-of-erasure-coded fragments. This enables AWE to be the first BFT protocol that uses as few as data nodes to tolerate t Byzantine nodes, for any k1

.Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consisteAlthough many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost. We present AWE, the first erasure-coded distributed implementation of a multi-writer multi-reader read/write storage object that is, at the same time: (1) asynchronous, (2) wait-free, (3) atomic, (4) amnesic, (i.e., with data nodes storing a bounded number of values) and (5) Byzantine fault-tolerant (BFT) using the optimal number of nodes. Furthermore, AWE is efficient since it does not use public-key cryptography and requires data nodes that support only reads and writes, further reducing the cost of deployment and ownership of a distributed storage solution. Notably, AWE stores metadata separately from k-out-of-n erasure-coded fragments. This enables AWE to be the first BFT protocol that uses as few as 2t+k data nodes to tolerate t Byzantine nodes, for any k1.

.958Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost. We present AWE, the first erasure-coded distributed implementation of a multi-writer multi-reader read/write storage object that is, at the same time: (1) asynchronous, (2) wait-free, (3) atomic, (4) amnesic, (i.e., with data nodes storing a bounded number of values) and (5) Byzantine fault-tolerant (BFT) using the optimal number of nodes. Furthermore, AWE is efficient since it does not use public-key cryptography and requires data nodes that support only reads and writes, further reducing the cost of deployment and ownership of a distributed storage solution. Notably, AWE stores metadata separately from k-out-of-n erasure-coded fragments. This enables AWE to be the first BFT protocol that uses as few as 2t+k data nodes to tolerate t Byzantine nodes, for any k1.


DOI
Type:
Conférence
City:
Cortina d?Ampezzo
Date:
2014-12-16
Department:
Sécurité numérique
Eurecom Ref:
4230
Copyright:
© Springer. Personal use of this material is permitted. The definitive version of this paper was published in OPODIS 2014, 18th International Conference on Principles of Distributed Systems, December 16-19, 2014, Cortina d?Ampezzo, Italy / Also published in LNCS, Vol. 8878/2014 and is available at : http://dx.doi.org/10.1007/978-3-319-14472-6_6

PERMALINK : https://www.eurecom.fr/publication/4230