期刊文献+

门限Byzantine quorum系统及其在分布式存储中的应用 被引量:6

Threshold Byzantine Quorum System and Distributed Storage
下载PDF
导出
摘要 针对纠删编码和门限方案在分布式存储中的应用,提出门限Byzantine quorum系统(TBQS)的概念.该系统与数据分离算法相结合,可以构造可靠性较强的存储系统,当故障服务器个数不超过服务器总数的1/4时,利用TBQS设计存储策略可以实现容错和无间断服务.讨论了TBQS的存在性,构造了两类TBQS并对其效率进行分析,在此基础上设计了基于TBQS的分布式读写协议. Distributed storage use erasure coding and threshold scheme to provide security and reliability. We present thresh- old Byzantine quorum system (TBQS), which can be used to design reliable storage strategy where up to one fourth of the servers might exhibit Byzantine faults. TBQS can provide fault-tolerance and serviced without interruption together with erasure coding or threshold schemes. We discussed the existence of TBQS, and proposed two types of TBQS called threshold f-masking system and grid TBQS respectively.We also yield a read-write protocol base on TBQS that is both time-efficient and reliable.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第2期314-319,共6页 Acta Electronica Sinica
基金 国家863高技术研究发展计划基金(No.2007AA01Z429,2007AA01Z405) 国家自然基金重点项目(No.60633020) 国家自然科学基金(No.60573036,60503012)
关键词 分布式存储 容错 QUORUM系统 Byzantine故障 distributed storage fault tolerance quorum system Byzantine fault
  • 相关文献

参考文献19

  • 1D Malkhi, M Reiter, Byzantine quorum systems[ J ]. Distributed Computing, 1998,11(4) :203 - 213.
  • 2S Frolund,A Merchant,U Saito, S Spence,A Veitch.A decentralized algorithm for erasure-coded virtual disks[R]. Technical Report HPL-2004-46,HP Labs,2004.
  • 3郭渊博,马建峰.异步及不可靠链路环境下的先应式秘密共享[J].电子学报,2004,32(3):399-403. 被引量:7
  • 4D K Gifford. Weighted voting for replicated data[A] .Proc of 7th Symp on Operating Systems Principles [C ]. New York: ACM Press, 1979.150 - 162.
  • 5S Y Cheung, M H Ammar, M Ahamad. The grid protocol:A high performance scheme for maintaining replicated data [ J ]. Tram Knowledge and Data Eng, 1992,4(6) :582 - 592.
  • 6D Agrawal, A E Abbadi. The generalized tree quorum protocol:An efficient approach for managing replicated data ( corrigenda) [J]. ACMTDS: ACM Transactions on Database Systerm, 18,1992,17(4) :689 - 717.
  • 7C H Cho, J T Wang. Triangular grid protocol: an efficient scheme for replica control with uniform access quorums[ A]. Proc Euro-Par'96 Parallel Processing Conf[ C] .Lyon, France: Springer, 1996. 843 - 851.
  • 8C M Lin,G M Chiu. A new quorum-based scheme for managing replicated data in distributed systems[J]. IEEE Transactions on Computers,2002,51 (12) : 1442 - 1447.
  • 9W S Luk, T T Wong. Two new quorum based algorithms for distributed mutual exclusion [ A ]. Proc Int' l Conf Distributed Computing Systems[ C]. New York: ACM Press, 1997. 100 - 106.
  • 10M Maekawa. A √n algorithm for mutual exclusion in decentralized systems[ J] .ACM Transactions on Computer Systems, 1985,3(2) : 145 - 159.

二级参考文献10

  • 1[1]A Herzberg,S Jarecki,H Krawczyk,M Yung.Proactive secret sharing or:How to cope with perpetual leakage[A].Advances in Cryptology-Crypto′95,the 15th Annual International Cryptology Conference[C].Heidelberg:Springer-Verlag,1995.457-469.
  • 2[2]R Canetti,R Gennaro,A Herzberg,D Naor.Proactive security:Long-term protection against break-ins[J].CryptoBytes,1997,3(1):1-8.
  • 3[3]S Jarecki.Proactive secret sharing and public key cryptosystems[D].Cambridge:Department of Electrical Engineering and Computer Science,Massachusetts Institute of Technology,1995.
  • 4[4]Y Frankel,P Gemmell,P Mackenzie,M Yung.Optimal resilience proactive public-key cryptosystems[A].Proceedings of the 38th Annual Symp.On Foundations of Computer Science[C].New York:IEEE Press,1997.384-393.
  • 5[5]T Draelos,V Hamilton,G Istrail.Proactive DSA application and implementation[R].Albuquerque:Sandia National Laboratories,1998.
  • 6[6]A Herzberg,M Jakobsson,S Jarecki,H Krawczyk,M Yung.Proactive public-key and signature schemes[A].Proceedings of the 4th Annual Conference on Computer Communications Security[C].New York:ACM Press,1997.100-110.
  • 7[7]M Aguilera,S Toueg,B Deianov.Revisiting the weakest failure detector for uniform reliable broadcast[A].Proceedings of the 13th International Symposium on Distributed Computing[C].Heidelberg:Springer-Verlag,1999.19-33.
  • 8[8]R Gennaro,S Jarecki,H Krawczyk,T Rabin.Robust threshold DSS signatures[A].Advances in Cryptology-Eurocrypt'96,International Conference on the Theory and Application of Cryptographic Techniques[C].Heidelberg:Springer-Verlag,1996.354-37.
  • 9[9]C Cachin,K Kursawe,Anna Lysyanskaya,Reto Strobl.Asynchronous verifiable secret sharing and proactive cryptosystems[A].ACM Conference on Computer and Communications Security[C].New York:ACM Press,2002.88-97.
  • 10[10]L Zhou,F.B Schneider,R Renesse.Proactive secret sharing for asynchronous systems[EB/OL].Submitted to ACM Transactions on Infor-mation and System Security.http://research.microsoft.com/users/lidongz/apssTISS.ps.

共引文献6

同被引文献56

  • 1朱强.多服务器模型下的服务器选择算法及仿真[J].计算机工程与应用,2005,41(29):163-166. 被引量:3
  • 2刘海蛟,荆继武,林璟锵,杜皎.一种入侵容忍的资料库[J].中国科学院研究生院学报,2006,23(1):46-51. 被引量:4
  • 3贺玲玲.浅谈基于SAN架构的网络存储系统的设计[J].科技资讯,2006,4(5):110-111. 被引量:3
  • 4刘钢,周敬利,秦磊华,陈小平.纠错码拜占庭容错Quorum中错误检测机制[J].计算机科学,2007,34(5):75-78. 被引量:3
  • 5Abrams M, LaPadula L, Eggers K, et al. A generalized frame-work for access control: An informal description[C]//The 13^th National Computer Security Conference. 1990.
  • 6ITU-T, Rec. X. 812, ISO/IEC 10181-3, The Security Frame - works for Open Systems: Access Control Framework, 1996.
  • 7Beznosov K, Deng Y. Engineering access control in distribution applications. 2000.
  • 8Thompson M, Johnston W, Mudumbai S, et al. Certificate-based access control for distributed resources[C]// Proceeding of Eightth USENIX Security Symposium ( Security ' 99 ). 1998 :215-228.
  • 9Park J S, Sandhu R, Ahn G. Role-based access control on the Web[J].ACM Transaction on Information and System Security. 2001,4(1) :37-71.
  • 10Woo T Y C, Lam S S. A framework for distributed authorization[C]//Proceedings of the 1^st ACM Conference on Computer and Communications Security. ACM Press, 1993:112-118.

引证文献6

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部