Optimizing Threshold Protocols in Adversarial Structures

  • Authors:
  • Maurice Herlihy;Flavio P. Junqueira;Keith Marzullo;Lucia Draque Penso

  • Affiliations:
  • Brown University,;Yahoo! Research Barcelona,;UC San Diego,;Brown University,

  • Venue:
  • DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many replication protocols are using a threshold modelin which failures are independent and identically distributed (IID). In this model, one assumes that no more than tout of ncomponents can fail. In many real systems, however, failures are not IID, and a straightforward application of threshold protocols yields suboptimal results.Here, we examine the problem of optimally transforming threshold protocols into survivor-set protocols tolerating dependent failures. In particular, we are interested in threshold protocols where the number of components nand the number of failures tare related by n k·t, where kis a positive integer constant k. We develop an optimal transformationthat translates any such threshold protocol to a survivor-set dependent failure model, and hence, to adversarial structures. Our transformation does not require authentication, self-verification or encryption. We characterize equivalence classes of adversarial structures, regarding solvability, using certain hierarchical properties based on set intersection.