4.7 Article

Byzantine Fault-tolerant State-machine Replication from a Systems Perspective

Journal

ACM COMPUTING SURVEYS
Volume 54, Issue 1, Pages -

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3436728

Keywords

Byzantine fault tolerance; state-machine replication

Funding

  1. German Research Council (DFG) [DI 2097/1-2]

Ask authors/readers for more resources

Utilizing Byzantine fault-tolerant (BFT) state-machine replication allows for systems resilient against arbitrary faults, but the high complexity of replication protocols makes correct implementation difficult in practice, especially with the numerous solutions developed in recent years. This survey aims to facilitate the construction of BFT systems by providing an overview of advanced techniques and their practical implications.
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems that are resilient against arbitrary faults, a requirement considered crucial for an increasing number of use cases such as permissioned blockchains, firewalls, and SCADA systems. Unfortunately, the strong fault-tolerance guarantees provided by BFT replication protocols come at the cost of a high complexity, which is why it is inherently difficult to correctly implement BFT systems in practice. This is all the more true with regard to the plethora of solutions and ideas that have been developed in recent years to improve performance, availability, or resource efficiency. This survey aims at facilitating the task of building BFT systems by presenting an overview of state-of-the-art techniques and analyzing their practical implications, for example, with respect to applicability and composability. In particular, this includes problems that arise in the context of concrete implementations, but which are often times passed over in literature. Starting with an in-depth discussion of the most important architectural building blocks of a BFT system (i.e., clients, agreement protocol, execution stage), the survey then focuses on selected approaches and mechanisms addressing specific tasks such as checkpointing and recovery.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available