Marko Vukolic | EURECOM - Academia.edu (original) (raw)

Papers by Marko Vukolic

Research paper thumbnail of SOFSEM 2011: Theory and Practice of Computer Science

Research paper thumbnail of Strict Access Control in a Key-Management Server

Research paper thumbnail of Minimizing retrieval latency for content cloud

Research paper thumbnail of Robust data sharing with key-value stores

... It is important for ensuring termination of concurrent read operations that the writer first ... more ... It is important for ensuring termination of concurrent read operations that the writer first stores thevalue under the eternal key and later under the temporary key. 4.3 Atomic Register Atomicity is achieved by having a client write back its read value before returning it. ...

Research paper thumbnail of Design and Implementation of a Key-Lifecycle Management System

Research paper thumbnail of Position Paper

Research paper thumbnail of Reducing Fair Exchange to Atomic Commit

Research paper thumbnail of Gracefully Degrading Fair Exchange with Security Modules (Extended Abstract

Research paper thumbnail of Reliable Distributed Storage

IEEE Computer, 2009

A distributed storage service lets clients abstract a single reliable shared storage device using... more A distributed storage service lets clients abstract a single reliable shared storage device using a collection of possibly unreliable computing units. Algorithms that implement this abstraction offer certain tradeoffs and vary according to dimensions such as complexity, the consistency semantics provided, and the types of failures tolerated.

Research paper thumbnail of Refined quorum systems

Distributed Computing, 2010

It is considered good distributed computing practice to devise object implementations that tolera... more It is considered good distributed computing practice to devise object implementations that tolerate contention, periods of asynchrony and a large number of failures, but perform fast if few failures occur, the system is synchronous and there is no contention. This paper initiates the first study of quorum systems that help design such implementations by encompassing, at the same time, optimal resilience, as well as optimal best-case complexity. We introduce the notion of a refined quorum system (RQS) of some set S as a set of three classes of subsets (quorums) of S: first class quorums are also second class quorums, themselves being also third class quorums. First class quorums have large intersections with all other quorums, second class quorums typically have smaller intersections with those of the third class, the latter simply correspond to traditional quorums. Intuitively, under uncontended and synchronous conditions, a distributed object implementation would expedite an operation if a quorum of the first class is accessed, then degrade gracefully depending on whether a quorum of the second or the third class is accessed. Our notion of refined quorum system is devised assuming a general adversary structure, and this basically allows algorithms relying on refined quorum systems to relax the assumption of independent process failures, often questioned in practice. We illustrate the power of refined quorums by introducing two new optimal Byzantine-resilient distributed object implementations: an atomic storage and a consensus algorithm. Both match previously established resilience and best-case complexity lower bounds, closing open gaps, as well as new complexity bounds we establish here. Each of our algorithms is representative of a different class of architectures, highlighting the generality of the refined quorum abstraction.

Research paper thumbnail of Refined quorum systems

Distributed Computing, 2007

Research paper thumbnail of Lucky Read/Write Access to Robust Atomic Storage

Research paper thumbnail of Asynchronous Byzantine Consensus: Complexity, Resilience and Authentication (Preliminary Version

Abstract. We present a consensus algorithm that tolerates Byzantine process failures and arbitrar... more Abstract. We present a consensus algorithm that tolerates Byzantine process failures and arbitrarily long periods of network asynchrony. Our algorithm is the first to match the general time-complexity lower bound of [14], for which we give a complete proof. When the necessary conditions ...

Research paper thumbnail of A Scalable and Oblivious Atomicity Assertion

This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOA... more This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOAR enables to check atomicity of a single-writer multi-reader register implementation. The basic idea underlying the low overhead induced by SOAR lies in greedily checking, in a backward manner, specific points of an execution where register operations could be linearized, rather than exploring all possible precedence relations among these. We illustrate the use of SOAR by implementing it in +CAL. The performance of the resulting automatic verification outperforms comparable approaches by more than an order of magnitude already in executions with only 6 read/write operations. This difference increases to 3-4 orders of magnitude in the “negative” scenario, i.e., when checking some non-atomic execution, with only 5 operations. For example, checking atomicity of every possible execution of a single-writer single-reader (SWSR) register with at most 2 write and 3 read operations with the state of the art oblivious assertion takes more than 58 hours to complete, whereas SOAR takes just 9 seconds.

Research paper thumbnail of Best-Case Complexity of Asynchronous Byzantine Consensus

Research paper thumbnail of The Complexity of Asynchronous Byzantine Consensus

Research paper thumbnail of Fast Access to Distributed Atomic Memory

Siam Journal on Computing, 2010

Research paper thumbnail of How fast can a very robust read be

Research paper thumbnail of The complexity of robust atomic storage

Research paper thumbnail of Modern Security with Traditional Distributed Algorithms

Research paper thumbnail of SOFSEM 2011: Theory and Practice of Computer Science

Research paper thumbnail of Strict Access Control in a Key-Management Server

Research paper thumbnail of Minimizing retrieval latency for content cloud

Research paper thumbnail of Robust data sharing with key-value stores

... It is important for ensuring termination of concurrent read operations that the writer first ... more ... It is important for ensuring termination of concurrent read operations that the writer first stores thevalue under the eternal key and later under the temporary key. 4.3 Atomic Register Atomicity is achieved by having a client write back its read value before returning it. ...

Research paper thumbnail of Design and Implementation of a Key-Lifecycle Management System

Research paper thumbnail of Position Paper

Research paper thumbnail of Reducing Fair Exchange to Atomic Commit

Research paper thumbnail of Gracefully Degrading Fair Exchange with Security Modules (Extended Abstract

Research paper thumbnail of Reliable Distributed Storage

IEEE Computer, 2009

A distributed storage service lets clients abstract a single reliable shared storage device using... more A distributed storage service lets clients abstract a single reliable shared storage device using a collection of possibly unreliable computing units. Algorithms that implement this abstraction offer certain tradeoffs and vary according to dimensions such as complexity, the consistency semantics provided, and the types of failures tolerated.

Research paper thumbnail of Refined quorum systems

Distributed Computing, 2010

It is considered good distributed computing practice to devise object implementations that tolera... more It is considered good distributed computing practice to devise object implementations that tolerate contention, periods of asynchrony and a large number of failures, but perform fast if few failures occur, the system is synchronous and there is no contention. This paper initiates the first study of quorum systems that help design such implementations by encompassing, at the same time, optimal resilience, as well as optimal best-case complexity. We introduce the notion of a refined quorum system (RQS) of some set S as a set of three classes of subsets (quorums) of S: first class quorums are also second class quorums, themselves being also third class quorums. First class quorums have large intersections with all other quorums, second class quorums typically have smaller intersections with those of the third class, the latter simply correspond to traditional quorums. Intuitively, under uncontended and synchronous conditions, a distributed object implementation would expedite an operation if a quorum of the first class is accessed, then degrade gracefully depending on whether a quorum of the second or the third class is accessed. Our notion of refined quorum system is devised assuming a general adversary structure, and this basically allows algorithms relying on refined quorum systems to relax the assumption of independent process failures, often questioned in practice. We illustrate the power of refined quorums by introducing two new optimal Byzantine-resilient distributed object implementations: an atomic storage and a consensus algorithm. Both match previously established resilience and best-case complexity lower bounds, closing open gaps, as well as new complexity bounds we establish here. Each of our algorithms is representative of a different class of architectures, highlighting the generality of the refined quorum abstraction.

Research paper thumbnail of Refined quorum systems

Distributed Computing, 2007

Research paper thumbnail of Lucky Read/Write Access to Robust Atomic Storage

Research paper thumbnail of Asynchronous Byzantine Consensus: Complexity, Resilience and Authentication (Preliminary Version

Abstract. We present a consensus algorithm that tolerates Byzantine process failures and arbitrar... more Abstract. We present a consensus algorithm that tolerates Byzantine process failures and arbitrarily long periods of network asynchrony. Our algorithm is the first to match the general time-complexity lower bound of [14], for which we give a complete proof. When the necessary conditions ...

Research paper thumbnail of A Scalable and Oblivious Atomicity Assertion

This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOA... more This paper presents SOAR: the first oblivious atomicity assertion with polynomial complexity. SOAR enables to check atomicity of a single-writer multi-reader register implementation. The basic idea underlying the low overhead induced by SOAR lies in greedily checking, in a backward manner, specific points of an execution where register operations could be linearized, rather than exploring all possible precedence relations among these. We illustrate the use of SOAR by implementing it in +CAL. The performance of the resulting automatic verification outperforms comparable approaches by more than an order of magnitude already in executions with only 6 read/write operations. This difference increases to 3-4 orders of magnitude in the “negative” scenario, i.e., when checking some non-atomic execution, with only 5 operations. For example, checking atomicity of every possible execution of a single-writer single-reader (SWSR) register with at most 2 write and 3 read operations with the state of the art oblivious assertion takes more than 58 hours to complete, whereas SOAR takes just 9 seconds.

Research paper thumbnail of Best-Case Complexity of Asynchronous Byzantine Consensus

Research paper thumbnail of The Complexity of Asynchronous Byzantine Consensus

Research paper thumbnail of Fast Access to Distributed Atomic Memory

Siam Journal on Computing, 2010

Research paper thumbnail of How fast can a very robust read be

Research paper thumbnail of The complexity of robust atomic storage

Research paper thumbnail of Modern Security with Traditional Distributed Algorithms