Dealing with server corruption in weakly consistent replicated data systems | Wireless Networks Skip to main content
Log in

Dealing with server corruption in weakly consistent replicated data systems

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Providing high availability and the ability to share data despite the weak connectivity of mobile computing raises the problem of trusting replicated data servers that may be corrupt. This is because servers must be run on portable computers, and these machines are less secure and thus less trustworthy than those traditionally used to run servers. We describe the kinds of problems one must be prepared to deal with, noting that even users of secured, non‐portable computers are at risk if servers trust all authorized peers. We show that high availability through data replication on portable computers need not be mutually exclusive with various levels of data security one might want. We give three solutions to this trust problem for a simple example architecture, achieving progressively higher levels of security with progressively higher costs. We then show how to solve this trust problem for the more complex architecture of Bayou, a weakly consistent replicated data system we built at Xerox PARC.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. F. Cristian, H. Aghili, R. Strong and D. Dolev, Atomic broadcast: From simple message diffusion to byzantine agreement, in: Proceedings of 15th Symposium on Fault Tolerant Computing, Ann Arbor, MI (June 1985) pp. 200–206.

  2. R.A. Golding, A weak-consistency architecture for distributed information services, Computing Systems 5(4) (Fall 1992) 379–405.

    Google Scholar 

  3. R.G. Guy, J.S. Heidemann, W. Mak, T.W. Page, Jr., G.J. Popek and D. Rothmeier, Implementation of the Ficus replicated file system, in: Proceedings of Summer USENIX Conference(June 1990) pp. 63–71.

  4. L. Kalwell Jr., S. Beckhardt, T. Halvorsen, R. Ozzie and I. Greif, Replicated document management in a group communication system, in: Groupware: Software for Computer-Supported Cooperative Work, <nt>eds.</nt> D. Marca and G. Bock (IEEE Computer Society Press, 1992) pp. 226–235.

  5. J.J. Kistler and M. Satyanarayanan, Disconnected operation in the Coda file system, ACM Transactions on Computer Systems 10(1) (February 1992) 3–25.

    Google Scholar 

  6. L. Lamport, R. Shostak and M. Pease, The Byzantine generals problem, ACM Transactions on Programming Languages and Systems 4(3) (July 1982) 382–401.

    Google Scholar 

  7. K. Petersen, M.J. Spreitzer, D.B. Terry, M.M. Theimer and A.J. Demers, Flexible update propagation for weakly consistent replication, in: Proceedings of the 16th ACM Symposium on Operating Systems Principles (SOSP), Saint-Malo, France (October 1997) pp. 288–301.

  8. W. Pugh, Skip lists: a probabilistic alternative to balanced trees, Communications of the ACM 33(6) 668–676.

  9. P. Reiher, Personal communication.

  10. B. Schneier, Applied Cryptography(Wiley, New York, 1996).

    Google Scholar 

  11. D.B. Terry, A.J. Demers, K. Petersen, M.J. Spreitzer, M.M. Theimer and B.B. Welch, Session guarantees for weakly consistent replicated data, in: Proceedings of 3rd International Conference on Parallel and Distributed Information Systems, Austin, TX (September 1994) pp. 140–149.

  12. D.B. Terry, M.M. Theimer, K. Petersen, A.J. Demers, M.J. Spreitzer and C.H. Hauser, Managing update conflicts in Bayou, a weakly connected replicated storage system, in: Proceedings of 15th ACM Symposium on Operating Systems Principles, Copper Mountain, CO (December 1995) pp. 172–183.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Spreitzer, M.J., Theimer, M.M., Petersen, K. et al. Dealing with server corruption in weakly consistent replicated data systems. Wireless Networks 5, 357–371 (1999). https://doi.org/10.1023/A:1019175717085

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1019175717085

Keywords

Navigation