TY - GEN
T1 - Proactive resilience through architectural hybridization
AU - Sousa, Paulo
AU - Neves, Nuno Ferreira
AU - Veríssimo, Paulo
N1 - Generated from Scopus record by KAUST IRTS on 2021-03-16
PY - 2006/1/1
Y1 - 2006/1/1
N2 - In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusion-tolerant system under the asynchronous model. This result follows from the fact that in an asynchronous environment one cannot guarantee that the system terminates its execution before the occurrence of more than the assumed number of faults. Some systems resorted to proactive recovery as a way to address this problem, by attempting to ensure that no more than f faults ever occur: nodes are periodically rejuvenated to remove the effects of faults or malicious attacks. However, asynchronous systems with proactive recovery also suffer from the same problem. In fact, proactive recovery protocols usually require stronger assumptions (e.g., synchrony, security) than the system that is proactively recovered. To solve this contradiction, we work with a hybrid distributed system model. We propose proactive resilience as a new and more resilient approach to proactive recovery, based on architectural hybridization: proactive recovery functions are encapsulated in architectural devices that meet the required stronger assumptions, and have a well-defined interface with the recovered system. We present the Proactive Resilience Model (PRM) and describe a design methodology under the PRM. This methodology is a way of building systems which guaranteedly do not suffer more than the assumed number of faults, and we use it to derive a distributed intrusion-tolerant secret sharing system. Copyright 2006 ACM.
AB - In a recent work, we have shown that it is not possible to dependably build any type of distributed f fault or intrusion-tolerant system under the asynchronous model. This result follows from the fact that in an asynchronous environment one cannot guarantee that the system terminates its execution before the occurrence of more than the assumed number of faults. Some systems resorted to proactive recovery as a way to address this problem, by attempting to ensure that no more than f faults ever occur: nodes are periodically rejuvenated to remove the effects of faults or malicious attacks. However, asynchronous systems with proactive recovery also suffer from the same problem. In fact, proactive recovery protocols usually require stronger assumptions (e.g., synchrony, security) than the system that is proactively recovered. To solve this contradiction, we work with a hybrid distributed system model. We propose proactive resilience as a new and more resilient approach to proactive recovery, based on architectural hybridization: proactive recovery functions are encapsulated in architectural devices that meet the required stronger assumptions, and have a well-defined interface with the recovered system. We present the Proactive Resilience Model (PRM) and describe a design methodology under the PRM. This methodology is a way of building systems which guaranteedly do not suffer more than the assumed number of faults, and we use it to derive a distributed intrusion-tolerant secret sharing system. Copyright 2006 ACM.
UR - http://portal.acm.org/citation.cfm?doid=1141277.1141435
UR - http://www.scopus.com/inward/record.url?scp=33751050132&partnerID=8YFLogxK
U2 - 10.1145/1141277.1141435
DO - 10.1145/1141277.1141435
M3 - Conference contribution
SN - 1595931082
SP - 686
EP - 690
BT - Proceedings of the ACM Symposium on Applied Computing
PB - Association for Computing [email protected]
ER -