2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2018
DOI: 10.1109/dsn.2018.00019
|View full text |Cite
|
Sign up to set email alerts
|

Troxy: Transparent Access to Byzantine Fault-Tolerant Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…We compare the throughput (Figure 3b) and the latency (Figure 3a measurements show the average of five runs where client and server each exchange 1000 messages. We consider message sizes between 1KB and 100KB: BFT protocols exchange mostly small messages of several kilobytes, only rarely are larger messages necessary, e. g. for HTTP and IMAP use cases as presented in [24]. The measurements show that RDMA Read/Write entails the lowest latency with ≈46 % less compared to RDMA Send/Receive and 53-79 % compared to TCP.…”
Section: Discussionmentioning
confidence: 99%
“…We compare the throughput (Figure 3b) and the latency (Figure 3a measurements show the average of five runs where client and server each exchange 1000 messages. We consider message sizes between 1KB and 100KB: BFT protocols exchange mostly small messages of several kilobytes, only rarely are larger messages necessary, e. g. for HTTP and IMAP use cases as presented in [24]. The measurements show that RDMA Read/Write entails the lowest latency with ≈46 % less compared to RDMA Send/Receive and 53-79 % compared to TCP.…”
Section: Discussionmentioning
confidence: 99%
“…Several research efforts aim to support efficient BFT protocols by leveraging the SGX enclaves (e.g., [6,25]). The security primitives provided by the enclaves can reduce the number of replicas and/or communication phases for running BFT protocols.…”
Section: Use Case Analysismentioning
confidence: 99%
“…SBFT [29] addresses this problem by adding a protocol phase that aggregates request acknowledgements of multiple replicas into a single message to the client. In Troxy [34], a client also has to wait for a single reply only, because the reply voter is hosted inside a trusted domain at the server side and forwards its decisions to the client through a secure channel. In Spider, clients are typically located in the same region as an execution group allowing for communication over short-distance links.…”
Section: Related Workmentioning
confidence: 99%