• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Brahms: Byzantine Resilient Random Membership Sampling (2008)

Cached

  • Download as a PDF

Download Links

  • [theory.lcs.mit.edu]
  • [www.ee.technion.ac.il]
  • [www.ee.technion.ac.il]
  • [theory.csail.mit.edu]
  • [people.csail.mit.edu]
  • [webee.technion.ac.il]
  • [webee.technion.ac.il]
  • [www.cs.technion.ac.il]
  • [webee.technion.ac.il]
  • [theory.lcs.mit.edu]
  • [webee.technion.ac.il]
  • [webee.technion.ac.il]
  • [people.csail.mit.edu]
  • [webee.technion.ac.il]
  • [www.ee.technion.ac.il]
  • [www.ee.technion.ac.il]
  • [theory.csail.mit.edu]
  • [theory.lcs.mit.edu]
  • [people.csail.mit.edu]
  • [webee.technion.ac.il]
  • [webee.technion.ac.il]
  • [www.cs.technion.ac.il]
  • [www.cs.technion.ac.il]
  • [www.cs.technion.ac.il]
  • [gnunet.org]
  • [webee.technion.ac.il]
  • [www.cs.technion.ac.il]
  • [www.cs.technion.ac.il]
  • [webee.technion.ac.il]
  • [people.csail.mit.edu]
  • [webee.technion.ac.il]
  • [webee.technion.ac.il]
  • [webee.technion.ac.il]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Edward Bortnikov , Maxim Gurevich , Idit Keidar , Gabriel Kliot , Alexander Shraer
Citations:47 - 2 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@TECHREPORT{Bortnikov08brahms:byzantine,
    author = {Edward Bortnikov and Maxim Gurevich and Idit Keidar and Gabriel Kliot and Alexander Shraer},
    title = {Brahms: Byzantine Resilient Random Membership Sampling},
    institution = {},
    year = {2008}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

We present Brahms, an algorithm for sampling random nodes in a large dynamic system prone to malicious behavior. Brahms stores small membership views at each node, and yet overcomes Byzantine attacks by a linear portion of the system. Brahms is composed of two components. The first one is a resilient gossip-based membership protocol. The second one uses a novel memory-efficient approach for uniform sampling from a possibly biased stream of ids that traverse the node. We evaluate Brahms using rigorous analysis, backed by simulations, which show that our theoretical model captures the protocol’s essentials. We study two representative attacks, and show that with high probability, an attacker cannot create a partition between correct nodes. We further prove that each node’s sample converges to a uniform one over time. To our knowledge, no such properties were proven for gossip protocols in the past.

Keyphrases

byzantine resilient random membership sampling    novel memory-efficient approach    rigorous analysis    linear portion    overcomes byzantine attack    protocol essential    representative attack    attacker cannot    gossip protocol    first one    theoretical model    large dynamic system prone    present brahms    node sample converges    random node    malicious behavior    brahms store small membership view    correct node    high probability    uniform sampling    resilient gossip-based membership protocol   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University