36 research outputs found
La puissance de désaccord d'un adversaire
International audienceUn des rĂ©sultats fondamentaux de l'algorithmique distribuĂ©e est que le niveau d'accord qui peut ĂȘtre obtenu en prĂ©sence de pannes est exactement . Autrement dit un adversaire qui peut mettre en panne n'importe quel sous ensemble d'au plus processus peut empĂȘcher les autres processus de se mettre d'accord sur valeurs. Mais quelle est la puissance des () autres adversaires qui ne peuvent mettre en panne que certaines combinaisons des processus? Cet article prĂ©sente une caractĂ©risation prĂ©cise d'un adversaire. On y introduit la notion de "puissance de dĂ©saccord". La puissance de dĂ©saccord d'un adversaire est le plus grand entier tel que l'accord des processus sur valeurs soit possible avec cet adversaire. Puis on montre comment {\em calculer} automatiquement cet entier pour un adversaire donnĂ©
Failure detectors as type boosters
The power of an object type T can be measured as the maximum number n of processes that can solve consensus using only objects of T and registers. This number, denoted cons(T), is called the consensus power of T. This paper addresses the question of the weakest failure detector to solve consensus among a number k > n of processes that communicate using shared objects of a type T with consensus power n. In other words, we seek for a failure detector that is sufficient and necessary to "boostâ the consensus power of a type T from n to k. It was shown in Neiger (Proceedings of the 14th annual ACM symposium on principles of distributed computing (PODC), pp. 100-109, 1995) that a certain failure detector, denoted Ω n , is sufficient to boost the power of a type T from n to k, and it was conjectured that Ω n was also necessary. In this paper, we prove this conjecture for one-shot deterministic types. We first show that, for any one-shot deterministic type T with cons(T) †n, Ω n is necessary to boost the power of T from n to n+1. Then we go a step further and show that Ω n is also the weakest to boost the power of (n+1)-ported one-shot deterministic types from n to any k > n. Our result generalizes, in a precise sense, the result of the weakest failure detector to solve consensus in asynchronous message-passing systems (Chandra etal. in J ACM 43(4):685-722, 1996). As a corollary, we show that Ω t is the weakest failure detector to boost the resilience level of a distributed shared memory system, i.e., to solve consensus among n > t processes using (t â 1)-resilient objects of consensus power
Failure detectors as type boosters
The power of an object type T can be measured as the maximum number n of processes that can solve consensus using only objects of T and registers. This number, denoted cons(T), is called the consensus power of T. This paper addresses the question of the weakest failure detector to solve consensus among a number k > n of processes that communicate using shared objects of a type T with consensus power n. In other words, we seek for a failure detector that is sufficient and necessary to "boost" the consensus power of a type T from n to k. It was shown in Neiger (Proceedings of the 14th annual ACM symposium on principles of distributed computing (PODC), pp. 100-109, 1995) that a certain failure detector, denoted Omega (n) , is sufficient to boost the power of a type T from n to k, and it was conjectured that Omega (n) was also necessary. In this paper, we prove this conjecture for one-shot deterministic types. We first show that, for any one-shot deterministic type T with cons(T) n. Our result generalizes, in a precise sense, the result of the weakest failure detector to solve consensus in asynchronous message-passing systems (Chandra et al. in J ACM 43(4):685-722, 1996). As a corollary, we show that Omega (t) is the weakest failure detector to boost the resilience level of a distributed shared memory system, i.e., to solve consensus among n > t processes using (t - 1)-resilient objects of consensus power t
The impossibility of boosting distributed service resilience
We study f -resilient services, which are guaranteed to operate as long as no more than f of the associated processes fail. We prove three theorems asserting the impossibility of boosting the resilience of such services. Our ïŹrst theorem allows any connection pattern between processes and services but assumes these services to be atomic (linearizable) objects. This theorem says that no distributed system in which processes coordinate using f -resilient atomic objects and reliable registers can solve the consensus problem in the presence of f + 1 undetectable process stopping failures. In contrast, we show that it is possible to boost the resilience of some systems solving problems easier than consensus: for example, the 2-set consensus problem is solvable for 2n processes and 2n â 1 failures (i.e., wait-free) using n-process consensus services resilient to n â 1 failures (wait-free). Our proof is short and self-contained. We then introduce the larger class of failure-oblivious services. These are services that cannot use information about failures, although they may behave more ïŹexibly than atomic objects. An example of such a service is totally ordered broadcast. Our second theorem generalizes the ïŹrst theorem and its proof to failure-oblivious services. Our third theorem allows the system to contain failure-aware services, such as failure de- tectors, in addition to failure-oblivious services. This theorem requires that each failure-aware service be connected to all processes; thus, f +1 process failures overall can disable all the failure- aware services. In contrast, it is possible to boost the resilience of a system solving consensus using failure-aware services if arbitrary connection patterns between processes and services are allowed: consensus is solvable for any number of failures using only 1-resilient 2-process perfect failure detectors. As far as we know, this is the ïŹrst time a uniïŹed framework has been used to describe both atomic and non-atomic objects, and the ïŹrst time boosting analysis has been performed for services more general than atomic objects
Semitopology: a new topological model of heterogeneous consensus
A distributed system is permissionless when participants can join and leave
the network without permission from a central authority. Many modern
distributed systems are naturally permissionless, in the sense that a central
permissioning authority would defeat their design purpose: this includes
blockchains, filesharing protocols, some voting systems, and more. By their
permissionless nature, such systems are heterogeneous: participants may only
have a partial view of the system, and they may also have different goals and
beliefs. Thus, the traditional notion of consensus -- i.e. system-wide
agreement -- may not be adequate, and we may need to generalise it.
This is a challenge: how should we understand what heterogeneous consensus
is; what mathematical framework might this require; and how can we use this to
build understanding and mathematical models of robust, effective, and secure
permissionless systems in practice?
We analyse heterogeneous consensus using semitopology as a framework. This is
like topology, but without the restriction that intersections of opens be open.
Semitopologies have a rich theory which is related to topology, but with its
own distinct character and mathematics. We introduce novel well-behavedness
conditions, including an anti-Hausdorff property and a new notion of `topen
set', and we show how these structures relate to consensus. We give a
restriction of semitopologies to witness semitopologies, which are an
algorithmically tractable subclass corresponding to Horn clause theories,
having particularly good mathematical properties. We introduce and study
several other basic notions that are specific and novel to semitopologies, and
study how known quantities in topology, such as dense subsets and closures,
display interesting and useful new behaviour in this new semitopological
context
Advances in Information Security and Privacy
With the recent pandemic emergency, many people are spending their days in smart working and have increased their use of digital resources for both work and entertainment. The result is that the amount of digital information handled online is dramatically increased, and we can observe a significant increase in the number of attacks, breaches, and hacks. This Special Issue aims to establish the state of the art in protecting information by mitigating information risks. This objective is reached by presenting both surveys on specific topics and original approaches and solutions to specific problems. In total, 16 papers have been published in this Special Issue