Secure Conflict-free Replicated Data Types
Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, and Nuno Preguiça. 2021. Secure Conflict-free Replicated Data Types. International Conference on Distributed Computing and Networking 2021
Novelty: new cryptographically secure CRDT protocols for Registers, Sets, Counters, and Bounded Counters
Overview
Method: add encryption over standard CRDT protocols, or partial homomorphic encryption for counters which assume to perform arithmetics as part of the protocol
Constraint/Need: CRDTs should be computable server-side, by servers that do not possess the decryption key
SUPPORTED TOPOLGY
Principals:
- clients with a shared encryption means*
- clients using a secure connection to a server*
- server(s)
- not just relays for client messages, but databases that store the documents
- CRDTS handled by servers, to allow replication to multiple servers, allowing geo-distributed applications
Supported operations:
- client-server setup/[query/update]
- server-server setup/propagation
- server merge (local operation)
*establishement of it is out of the scope of this paper
Honest-But-Curious adversaries: SERVERS
- adversary follows faithfully the protocol, but tries to learn information from its execution
- a reasonable model in specific settings:
- trusted parties under legal constraints
- auditing can be done, with repercussions
THREAT MODEL
Malicious adversaries: NONE
- may behave arbitrarily, but still bound by cryptographic constraints
Trusted parties: USERS
RegisteR
Done via regular encryption
COUNTER
Done via homomorphic encryption, limited to addition thanks to the addition of a plaintext Lamport Clock
Done via regular encryption, plus enventual leakage of the operation and a label for each stored/checked value
SET
BOUNDED COUNTER
Similar to counter, with a delegated invariant check to the client upon updates
RegisteR
COUNTER
SET
BOUNDED COUNTER
lower is better ; more to the right is better
Secure CRDT
CRDT
graphs taken from Secure Conflict-free Replicated Data Types. International Conference on Distributed Computing and Networking 2021, Manuel Barbosa, Bernardo Ferreira, João Marques, Bernardo Portela, and Nuno Preguiça. 2021.
MACRO PERFORMANCE
Average lantency increase of 20 to 38% on their demonstrator
No major outlier in latency, even for create-heavy test cases
Throughput reduction of 5%
DISCUSSION
The system leaks some information to keep operations reasonably costly
Clients are tasked with invariant checking for bounded counters ; similarly constrained structures derived from set/registers would also rely heavily on client verification a posteriori
Users have to be trusted: how to audit operations ; how to enforce authorization/rights on invariants on later synchronization?
Secure Conflict-free Replicated Data Types
By Pierre-Antoine Rault
Secure Conflict-free Replicated Data Types
- 65