Toward a smart cloud: A review of fault-tolerance methods in cloud systems

MA Mukwevho, T Celik - IEEE Transactions on Services …, 2018 - ieeexplore.ieee.org
This paper presents a comprehensive survey of the state-of-the-art work on fault tolerance
methods proposed for cloud computing. The survey classifies fault-tolerance methods into …

Byzantine fault-tolerant state-machine replication from a systems perspective

T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …

[HTML][HTML] Quantum detectable Byzantine agreement for distributed data trust management in blockchain

Z Qu, Z Zhang, B Liu, P Tiwari, X Ning… - Information Sciences, 2023 - Elsevier
No system entity within a contemporary distributed cyber system can be entirely trusted.
Hence, the classic centralized trust management method cannot be directly applied to it …

Rbft: Redundant byzantine fault tolerance

PL Aublin, SB Mokhtar, V Quéma - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
Byzantine Fault Tolerant state machine replication (BFT) protocols are replication protocols
that tolerate arbitrary faults of a fraction of the replicas. Although significant efforts have been …

The bedrock of byzantine fault tolerance: A unified platform for {BFT} protocols analysis, implementation, and experimentation

MJ Amiri, C Wu, D Agrawal, A El Abbadi… - … USENIX Symposium on …, 2024 - usenix.org
Byzantine Fault-Tolerant (BFT) protocols cover a broad spectrum of design dimensions from
infrastructure settings, such as the communication topology, to more technical features, such …

CheapBFT: Resource-efficient Byzantine fault tolerance

R Kapitza, J Behl, C Cachin, T Distler… - Proceedings of the 7th …, 2012 - dl.acm.org
One of the main reasons why Byzantine fault-tolerant (BFT) systems are not widely used lies
in their high resource consumption: 3 f+ 1 replicas are necessary to tolerate only f faults …

Hybrids on steroids: SGX-based high performance BFT

J Behl, T Distler, R Kapitza - … of the Twelfth European Conference on …, 2017 - dl.acm.org
With the advent of trusted execution environments provided by recent general purpose
processors, a class of replication protocols has become more attractive than ever: Protocols …

All about eve:{Execute-Verify} replication for {Multi-Core} servers

M Kapritsos, Y Wang, V Quema, A Clement… - … USENIX Symposium on …, 2012 - usenix.org
This paper presents Eve, a new Execute-Verify architecture that allows state machine
replication to scale to multi-core servers. Eve departs from the traditional agree-execute …

CoC: A unified distributed ledger based supply chain management system

Z Gao, L Xu, L Chen, X Zhao, Y Lu, W Shi - Journal of Computer Science …, 2018 - Springer
Modern supply chain is a complex system and plays an important role for different sectors
under the globalization economic integration background. Supply chain management …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …