2019 38th Symposium on Reliable Distributed Systems (SRDS) 2019
DOI: 10.1109/srds47363.2019.00032
|View full text |Cite
|
Sign up to set email alerts
|

Merkle Search Trees: Efficient State-Based CRDTs in Open Networks

Abstract: Most recent CRDT techniques rely on a causal broadcast primitive to provide guarantees on the delivery of operation deltas. Such a primitive is unfortunately hard to implement efficiently in large open networks, whose membership is often difficult to track. As an alternative, we argue in this paper that pure state-based CRDTs can be efficiently implemented by encoding states as specialized Merkle trees, and that this approach is well suited to open networks where many nodes may join and leave. At the core of o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 24 publications
(34 reference statements)
0
4
0
Order By: Relevance
“…After The layer stack is appended, the unique Merkle root is created [95], [96]. Cmndbdoes did not merely utilize a "block + chain" chain information structure but, instead, stores the data gathered by all blocks in a Merkle Tree form [97]- [99] organized by a hash pointer. The block hash pointer is likely to change once the information of any block is altered, guaranteeing that the information cannot tamper.…”
Section: Blockchain-based Wireless Sensor Network Architecture For Detection Of Malicious Nodesmentioning
confidence: 99%
“…After The layer stack is appended, the unique Merkle root is created [95], [96]. Cmndbdoes did not merely utilize a "block + chain" chain information structure but, instead, stores the data gathered by all blocks in a Merkle Tree form [97]- [99] organized by a hash pointer. The block hash pointer is likely to change once the information of any block is altered, guaranteeing that the information cannot tamper.…”
Section: Blockchain-based Wireless Sensor Network Architecture For Detection Of Malicious Nodesmentioning
confidence: 99%
“…Besides those commercial products, several research projects have emerged. Merkle Search Trees (MSF) [13] implement a key-value store like Dynamo using a state-based CRDT and a Merkle-tree. It builds the Merkle-tree on top of the flat data structure, while OWebSync will make use of the tree-like structure of the data to build the Merkle-tree.…”
Section: Related Workmentioning
confidence: 99%
“…in Riak [12]. Merkle Search Trees [13] are proposed as a solution to the high bandwidth usage. It uses Merkle-trees [14] to replicate a basic key-value store like in Dynamo [15].…”
Section: Introductionmentioning
confidence: 99%
“…In this case, the last hash which is the odd one out, will be cloned and hashed with itself. So here, the H(9,10) is cloned to get the hash H(9,10,9,10). Using this logic, the process is repeated until a single element remains.…”
mentioning
confidence: 99%