期刊文献+

CRDT协议的TLA+描述与验证 被引量:3

Specifying and Verifying CRDT Protocols Using TLA+
下载PDF
导出
摘要 无冲突复制数据类型(conflict-free replicated data types,简称CRDT)是一种封装了冲突消解策略的分布式复制数据类型,它能够保证分布式系统中副本节点间的强最终一致性,即执行了相同更新操作的副本节点具有相同的状态.CRDT协议设计精巧,不易保证其正确性.旨在采用模型检验技术验证一系列CRDT协议的正确性.具体而言,构建了一个可复用的CRDT协议描述与验证框架,包括网络通信层、协议接口层、具体协议层与规约层.网络通信层描述副本节点之间的通信模型,实现了多种类型的通信网络.协议接口层为已知的CRDT协议(分为基于操作的协议与基于状态的协议)提供了统一的接口.在具体协议层,用户可以根据协议的需求选用合适的底层通信网络.规约层则描述了所有CRDT协议都需要满足的强最终一致性与最终可见性(所有的更新操作最终都会被所有的副本节点接收并处理).使用TLA+形式化规约语言实现了该框架,然后以Add-Wins Set复制数据类型为例,展示了如何使用框架描述具体协议,并使用TLC模型检验工具来验证协议的正确性. Conflict-free replicated data types(CRDT) are replicated data types that encapsulate the mechanisms for resolving concurrent conflicts. They guarantee strong eventual consistency among replicas in distributed systems, which requires replicas that have executed the same set of updates be in the same state. However, CRDT protocols are subtle and it is difficult to ensure their correctness. This study leverages model checking to verify the correctness of CRDT protocols. Specifically, a reusable framework is proposed for modelling and verifying CRDT protocols. The framework consists of four layers, i.e., the communication layer, the interface layer, the protocol layer, and the specification layer. The communication layer models the communication among replicas and implements a variety of communication networks. The interface layer provides a uniform interface for existing CRDT protocols, including both the operation-based protocols and the state-based ones. In the protocol layer, users can choose the appropriate underlying communication network required by a specific protocol. The specification layer specifies strong eventual consistency and the eventual visibility property(i.e., all updates are eventually delivered by all replicas) that every CRDT protocol should satisfy. This framework is implemented using a formal specification language called TLA+. It is also demonstrated that how to model CRDT protocols in this framework and how to verify their correctness via the model checking tool called TLC, taking Add-Wins Set as an example.
作者 纪业 魏恒峰 黄宇 吕建 JI Ye;WEI Heng-Feng;HUANG Yu;LÜ Jian(State Key Laboratory for Novel Software Technology(Nanjing University),Nanjing 210023,China)
出处 《软件学报》 EI CSCD 北大核心 2020年第5期1332-1352,共21页 Journal of Software
基金 国家重点研发计划(2017YFB1001801) 国家自然科学基金(61702253,61772258)。
关键词 无冲突复制数据类型 强最终一致性 最终可见性 模型检验 TLA+ conflict-free replicated data types(CRDT) strong eventual consistency eventual visibility model checking TLA+
  • 相关文献

参考文献2

二级参考文献11

  • 1Lallali M,Zaidi F,Cavalli A,et al.Automatic Timed Test Case Generation for Web Services Composition[C] ∥Proc.of the 6th IEEE European Conference on Web Services.United States:IEEE Press,2008:53-62.
  • 2Alur R,Dill D L.A Theory of Timed Automata[J].Theoretical Computer Science,1994,126:183-235.
  • 3Alur R.Timed Automata[C] ∥Proc.of 11th International Conference on Computer-Aided Verification(CAV'99).Berlin:Springer-Verlag,1999,1633:8-22.
  • 4Alur R,Courcoubetis C,Dill D.Verifying Automata Specification of Probabilistic Real-time Systems[C] ∥Proc.of REX Workshop "Real-time:Theory in Practice".Berlin:Springer-Verlag,1991,600:28-44.
  • 5Diaz G,Cuartero F,Valero V,et al.Automatic Verification of the TLS Handshake Protocol[C] ∥Proc.of the 2004 ACM Symposium on Applied Computing.2004,1:789-794.
  • 6Diaz G,Larsen K G,Pardo J,et al.An Approach to Handle Real Time and Probabilistic Behaviors in E-commerce:Validating the SET Protocol[C] ∥Proc.of the 20th Annual ACM Symposium on Applied Computing.2005,1:815-820.
  • 7Larsen K,Pettersson P,Wang Yi.UPPAAL in a Nutshell[J].International Journal on Software Tools for Technology Transfer,1997:134-152.
  • 8Larsen K G,Petterson P,Wang Yi.Diagnostic Model-checking for Real-time Systems[C] ∥Proc.of Workshop on Verification and Control of Hybrid Systems III.1995,1066:575-586.
  • 9Diaz G,Cambronero M E,Pardo J J,et al.Model Checking Techniques Applied to the Design of Web Services[J].CLEI Electronic Journal,2007,10.
  • 10Dang Z,DIMACS Workshop on Design and Form al Verification of Security Protocols.http:/,1997年

共引文献34

同被引文献2

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部