4.7 Article

Byzantine Fault-tolerant State-machine Replication from a Systems Perspective

期刊

ACM COMPUTING SURVEYS
卷 54, 期 1, 页码 -

出版社

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3436728

关键词

Byzantine fault tolerance; state-machine replication

资金

  1. German Research Council (DFG) [DI 2097/1-2]

向作者/读者索取更多资源

Utilizing Byzantine fault-tolerant (BFT) state-machine replication allows for systems resilient against arbitrary faults, but the high complexity of replication protocols makes correct implementation difficult in practice, especially with the numerous solutions developed in recent years. This survey aims to facilitate the construction of BFT systems by providing an overview of advanced techniques and their practical implications.
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems that are resilient against arbitrary faults, a requirement considered crucial for an increasing number of use cases such as permissioned blockchains, firewalls, and SCADA systems. Unfortunately, the strong fault-tolerance guarantees provided by BFT replication protocols come at the cost of a high complexity, which is why it is inherently difficult to correctly implement BFT systems in practice. This is all the more true with regard to the plethora of solutions and ideas that have been developed in recent years to improve performance, availability, or resource efficiency. This survey aims at facilitating the task of building BFT systems by presenting an overview of state-of-the-art techniques and analyzing their practical implications, for example, with respect to applicability and composability. In particular, this includes problems that arise in the context of concrete implementations, but which are often times passed over in literature. Starting with an in-depth discussion of the most important architectural building blocks of a BFT system (i.e., clients, agreement protocol, execution stage), the survey then focuses on selected approaches and mechanisms addressing specific tasks such as checkpointing and recovery.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据