2014
DOI: 10.1007/978-3-319-14472-6_6
|View full text |Cite
|
Sign up to set email alerts
|

Erasure-Coded Byzantine Storage with Separate Metadata

Abstract: Although many distributed storage protocols have been introduced, a solution that combines the strongest properties in terms of availability, consistency, fault-tolerance, storage complexity and the supported level of concurrency, has been elusive for a long time. Combining these properties is difficult, especially if the resulting solution is required to be efficient and incur low cost.We present AWE, the first erasure-coded distributed implementation of a multi-writer multireader read/write storage object th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
44
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 19 publications
(44 citation statements)
references
References 33 publications
0
44
0
Order By: Relevance
“…Among the previous works, [7,10,14,15,20,21] have similar correctness requirements as our paper; these references aim to emulate an atomic shared memory that supports concurrent operations in asynchronous networks. We compare our algorithms with the ORCAS-A and ORCAS-B algorithms of [15], the algorithm of [20], which we call the GWGR algorithm, the algorithm of [21], which we call the HGR algorithm, the M-PoWerStore algorithm of [14], the algorithm of [10], which we call the CT algorithm, and the AWE algorithm of [7]. We note that [15] assumes lossy channels and [10,14,21] assume Byzantine failures.…”
Section: Comparison With Related Workmentioning
confidence: 90%
See 4 more Smart Citations
“…Among the previous works, [7,10,14,15,20,21] have similar correctness requirements as our paper; these references aim to emulate an atomic shared memory that supports concurrent operations in asynchronous networks. We compare our algorithms with the ORCAS-A and ORCAS-B algorithms of [15], the algorithm of [20], which we call the GWGR algorithm, the algorithm of [21], which we call the HGR algorithm, the M-PoWerStore algorithm of [14], the algorithm of [10], which we call the CT algorithm, and the AWE algorithm of [7]. We note that [15] assumes lossy channels and [10,14,21] assume Byzantine failures.…”
Section: Comparison With Related Workmentioning
confidence: 90%
“…As noted in the table, a distinguishing feature of CASGC is that it simultaneously has small worst-case communication cost, a bounded storage cost and desirable liveness properties when we consider the class of executions where the number of ongoing write operations, message delays and the rate of client failures are bounded. Here, we make some remarks comparing the storage costs, liveness properties and communication costs of our algorithms with the algorithms of [7,10,14,15,20,21]. …”
Section: Comparison With Related Workmentioning
confidence: 99%
See 3 more Smart Citations