The Synchronization Power of Auditable Registers

Authors Hagit Attiya , Antonella Del Pozzo, Alessia Milani, Ulysse Pavloff , Alexandre Rapetti



PDF
Thumbnail PDF

File

LIPIcs.OPODIS.2023.4.pdf
  • Filesize: 0.8 MB
  • 23 pages

Document Identifiers

Author Details

Hagit Attiya
  • Technion, Haifa, Israel
Antonella Del Pozzo
  • Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France
Alessia Milani
  • Laboratoire d’Informatique et Systèmes, Aix-Marseille Université and CNRS, Marseille, France
Ulysse Pavloff
  • Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France
Alexandre Rapetti
  • Aix-Marseille Université, Université Paris-Saclay, CEA, List, F-91120, Palaiseau, France

Cite AsGet BibTex

Hagit Attiya, Antonella Del Pozzo, Alessia Milani, Ulysse Pavloff, and Alexandre Rapetti. The Synchronization Power of Auditable Registers. In 27th International Conference on Principles of Distributed Systems (OPODIS 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 286, pp. 4:1-4:23, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2024)
https://doi.org/10.4230/LIPIcs.OPODIS.2023.4

Abstract

Auditability allows to track all the read operations performed on a register. It abstracts the need of data owners to control access to their data, tracking who read which information. This work considers possible formalizations of auditing and their ramification for the possibility of providing it. The natural definition is to require a linearization of all write, read and audit operations together (atomic auditing). The paper shows that atomic auditing is a powerful tool, as it can be used to solve consensus. The number of processes that can solve consensus using atomic audit depends on the number of processes that can read or audit the register. If there is a single reader or a single auditor (the writer), then consensus can be solved among two processes. If multiple readers and auditors are possible, then consensus can be solved among the same number of processes. This means that strong synchronization primitives are needed to support atomic auditing. We give implementations of atomic audit when there are either multiple readers or multiple auditors (but not both) using primitives with consensus number 2 (swap and fetch&add). When there are multiple readers and multiple auditors, the implementation uses compare&swap. These findings motivate a weaker definition, in which audit operations are not linearized together with read and write operations (regular auditing). We prove that regular auditing can be implemented from ordinary reads and writes on atomic registers.

Subject Classification

ACM Subject Classification
  • Computing methodologies → Concurrent computing methodologies
Keywords
  • Auditability
  • atomic register
  • fault tolerance
  • consensus number

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads

References

  1. California Consumer Privacy Act. State of California Department of Justice URL: https://oag.ca.gov/privacy/ccpa.
  2. Identity Theft Resource Center. At mid-year, U.S. data breaches increase at record pace. In ITRC, 2018. Google Scholar
  3. Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, and Jovan Komatovic. As easy as ABC: optimal (a)ccountable (b)yzantine (c)onsensus is easy! In 2022 IEEE International Parallel and Distributed Processing Symposium, IPDPS 2022, Lyon, France, May 30 - June 3, 2022, pages 560-570. IEEE, 2022. URL: https://doi.org/10.1109/IPDPS53621.2022.00061.
  4. Pierre Civit, Seth Gilbert, Vincent Gramoli, Rachid Guerraoui, Jovan Komatovic, Zarko Milosevic, and Adi Seredinschi. Crime and punishment in distributed byzantine decision tasks. In 42nd IEEE International Conference on Distributed Computing Systems, ICDCS 2022, Bologna, Italy, July 10-13, 2022, pages 34-44. IEEE, 2022. URL: https://doi.org/10.1109/ICDCS54860.2022.00013.
  5. Vinicius Vielmo Cogo and Alysson Bessani. Brief Announcement: Auditable Register Emulations. In Seth Gilbert, editor, 35th International Symposium on Distributed Computing (DISC 2021), volume 209 of Leibniz International Proceedings in Informatics (LIPIcs), pages 53:1-53:4, Dagstuhl, Germany, 2021. Schloss Dagstuhl - Leibniz-Zentrum für Informatik. URL: https://doi.org/10.4230/LIPICS.DISC.2021.53.
  6. Antonella Del Pozzo, Alessia Milani, and Alexandre Rapetti. Byzantine auditable atomic register with optimal resilience. In 2022 41st International Symposium on Reliable Distributed Systems (SRDS), pages 121-132. IEEE Computer Society, 2022. URL: https://doi.org/10.1109/SRDS55811.2022.00020.
  7. Denise Demirel, Stephan Krenn, Thomas Lorünser, and Giulia Traverso. Efficient and privacy preserving third party auditing for a distributed storage system. In 2016 11th International Conference on Availability, Reliability and Security (ARES), pages 88-97. IEEE, 2016. URL: https://doi.org/10.1109/ARES.2016.88.
  8. Dipa Dharamadhikari and Sharvaree Tamne. Public auditing schemes (pas) for dynamic data in cloud: A review. In International Conference on Smart Trends for Information Technology and Computer Communications, pages 186-191. Springer, 2017. URL: https://doi.org/10.1007/978-981-13-1423-0_21.
  9. Davide Frey, Mathieu Gestin, and Michel Raynal. The synchronization power (consensus number) of access-control objects: The case of allowlist and denylist. In to appear in 37th International Symposium on Distributed Computing, DISC 2023, 2023. URL: https://doi.org/10.4230/LIPICS.DISC.2023.21.
  10. General Data Protection Regulation. Regulation (EU) 2016/679 URL: https://gdpr-info.eu/.
  11. Andreas Haeberlen, Petr Kouznetsov, and Peter Druschel. Peerreview: Practical accountability for distributed systems. ACM SIGOPS operating systems review, 41(6):175-188, 2007. URL: https://doi.org/10.1145/1294261.1294279.
  12. Maurice Herlihy. Wait-free synchronization. ACM Transactions on Programming Languages and Systems (TOPLAS), 13(1):124-149, 1991. URL: https://doi.org/10.1145/114005.102808.
  13. V Kavya, R Sumathi, and AN Shwetha. A survey on data auditing approaches to preserve privacy and data integrity in cloud computing. In International conference on sustainable communication networks and application, pages 108-118. Springer, 2019. URL: https://doi.org/10.1007/978-3-030-34515-0_12.
  14. Leslie Lamport. On interprocess communication. Distributed computing, 1(2):86-101, 1986. URL: https://doi.org/10.1007/BF01786228.
  15. Anh Le, Athina Markopoulou, and Alexandros G Dimakis. Auditing for distributed storage systems. IEEE/ACM Transactions on Networking, 24(4):2182-2195, 2015. URL: https://doi.org/10.1109/TNET.2015.2450761.
  16. Bo Li, Qiang He, Feifei Chen, Hai Jin, Yang Xiang, and Yun Yang. Auditing cache data integrity in the edge computing environment. IEEE Transactions on Parallel and Distributed Systems, 32(5):1210-1223, 2020. URL: https://doi.org/10.1109/TPDS.2020.3043755.
  17. Jin Li, Kui Ren, and Kwangjo Kim. A2be: Accountable attribute-based encryption for abuse free access control. Cryptology ePrint Archive, 2009. URL: http://eprint.iacr.org/2009/118.
  18. Liad Nahum, Hagit Attiya, Ohad Ben-Baruch, and Danny Hendler. Recoverable and detectable Fetch&Add. In 25th International Conference on Principles of Distributed Systems (OPODIS 2021). Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2021. URL: https://doi.org/10.4230/LIPICS.OPODIS.2021.29.
  19. Personal Information Protection Law of the People’s Republic of China. 30th meeting of the Standing Committee of the 13th National People’s Congress of the People’s Republic of China on August 20. Google Scholar
  20. Antonella Del Pozzo and Thibault Rieutord. Fork accountability in tenderbake. In Sara Tucci Piergiovanni and Natacha Crooks, editors, 5th International Symposium on Foundations and Applications of Blockchain 2022, FAB 2022, June 3, 2022, Berkeley, CA, USA, volume 101 of OASIcs, pages 5:1-5:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022. URL: https://doi.org/10.4230/OASICS.FAB.2022.5.
  21. Hui Tian, Yuxiang Chen, Chin-Chen Chang, Hong Jiang, Yongfeng Huang, Yonghong Chen, and Jin Liu. Dynamic-hash-table based public auditing for secure cloud storage. IEEE Transactions on Services Computing, 10(05):701-714, 2017. URL: https://doi.org/10.1109/TSC.2015.2512589.
  22. Boyang Wang, Baochun Li, and Hui Li. Oruta: Privacy-preserving public auditing for shared data in the cloud. IEEE transactions on cloud computing, 2(1):43-56, 2014. URL: https://doi.org/10.1109/TCC.2014.2299807.
  23. Jiaojiao Wu, Yanping Li, Fang Ren, and Bo Yang. Robust and auditable distributed data storage with scalability in edge computing. Ad Hoc Networks, 117:102494, 2021. URL: https://doi.org/10.1016/J.ADHOC.2021.102494.
  24. Yinghui Zhang, Robert H Deng, Shengmin Xu, Jianfei Sun, Qi Li, and Dong Zheng. Attribute-based encryption for cloud computing access control: A survey. ACM Computing Surveys (CSUR), 53(4):1-41, 2020. URL: https://doi.org/10.1145/3398036.
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail