Probabilistic Byzantine Tolerance for Cloud Computing

Luciana Arantes, Roy Friedman, Olivier Marin, Pierre Sens

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Tolerating Byzantine failures in the context of cloud computing is costly. Traditional BFT protocols induce a fixed degree of replication for computations and are therefore wasteful. This paper explores probabilistic Byzantine tolerance, in which computation tasks are replicated on dynamic replication sets whose size is determined based on ensuring probabilistic thresholds of correctness. The probabilistic assessment of a trustworthy output by selecting reputable nodes allows a significant reduction in the number of nodes involved in each computation task. The paper further studies several reputation management policies, including the one used by BOINC as well as a couple of novel ones, in terms of their impact of the possible damage inflicted on the system by various Byzantine behavior strategies, and reports some encouraging insights.

Original languageEnglish
Title of host publicationProceedings - 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshops, SRDSW 2015
Pages1-10
Number of pages10
ISBN (Electronic)9781467393027, 9781509000920
DOIs
StatePublished - 4 Jan 2016
Event34th IEEE International Symposium on Reliable Distributed Systems, SRDS 2015 - Montreal, Canada
Duration: 28 Sep 20151 Oct 2015

Publication series

NameProceedings of the IEEE Symposium on Reliable Distributed Systems
Volume2016-January

Conference

Conference34th IEEE International Symposium on Reliable Distributed Systems, SRDS 2015
Country/TerritoryCanada
CityMontreal
Period28/09/151/10/15

Keywords

  • Byzantine
  • cloud
  • reputation

All Science Journal Classification (ASJC) codes

  • Software
  • Theoretical Computer Science
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Probabilistic Byzantine Tolerance for Cloud Computing'. Together they form a unique fingerprint.

Cite this