Recognition: no theorem link
PROTECT-DB: Protecting Data using Replicated State Machines: Efficient Corruption Detection & Recovery
Pith reviewed 2026-05-13 04:42 UTC · model grok-4.3
The pith
Replicated state machines on deterministic PostgreSQL detect database corruption and repair it concurrently with ongoing transactions.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
By building Byzantine-fault tolerant replicated state machines on a deterministic extension of PostgreSQL, every replica processes transactions from a shared log identically; differences among replicas therefore indicate corruption, enabling efficient detection and concurrent repair without interrupting transaction execution.
What carries the argument
The replicated state machine in which each replica deterministically replays transactions from a shared log or blockchain, with replica outputs compared to expose corruption.
If this is right
- Corruption is detected by comparing replica states after identical transaction execution.
- Repair proceeds without pausing the database for ongoing transactions.
- Performance remains practical according to the reported study.
- The method supplies a foundation for applying BFT replication inside database engines.
Where Pith is reading between the lines
- The same log-and-compare pattern could be added to other database engines once a deterministic execution layer exists.
- Shared logs resemble blockchain structures and might allow hybrid systems that log transactions for both durability and security.
- Reducing replica count or overhead while keeping detection reliable would be a natural next measurement.
Load-bearing premise
All replicas must produce exactly the same results when executing the same transactions from the shared log, which requires a deterministic extension of PostgreSQL.
What would settle it
Run a workload with one replica's state deliberately altered and check whether the system either misses the corruption or takes longer than normal transaction latency to repair it.
Figures
read the original abstract
Data is critical for the operation of any organization and needs to be protected, especially against attacks that compromise the state of the database. In this paper, we explore an approach based on Byzantine-fault tolerant replicated state machines, built on top of a deterministic extension of PostgreSQL. Each replica deterministically executes transactions recorded in a shared log/blockchain. Our focus is on creating a practical system that is designed for efficient and quick detection of corruption, as well as quick repair concurrent with execution of transactions. We also present a performance study showing the efficiency and practicality of our approach. We believe our work lays the foundations for the practical use of the BFT replicated state machine approach in the context of databases.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper proposes PROTECT-DB, a system for protecting databases against corruption attacks using Byzantine fault-tolerant replicated state machines built atop a deterministic extension of PostgreSQL. Replicas execute transactions from a shared log/blockchain to enable efficient corruption detection and concurrent quick repair, with the work including a performance study to demonstrate efficiency and practicality; it positions this as a foundation for practical BFT use in databases.
Significance. If the determinism premise is rigorously established and the performance results hold, the approach could enable practical, low-overhead corruption detection and recovery in production databases by leveraging BFT replication without requiring full system redesigns.
major comments (2)
- Abstract: The central claim of a 'performance study showing the efficiency and practicality of our approach' is asserted without any metrics, experimental setup, results, or data, rendering the efficiency claims unverifiable and load-bearing for the practicality argument.
- Abstract: The corruption detection mechanism depends entirely on identical deterministic execution across replicas from the shared log, yet the manuscript provides no description of the deterministic PostgreSQL extension or how non-determinism sources (timestamps, random functions, query planning, I/O ordering) are eliminated; without this, divergence cannot be reliably attributed to corruption versus implementation artifacts.
Simulated Author's Rebuttal
We thank the referee for their constructive feedback. We address each major comment point by point below and indicate planned revisions to strengthen the manuscript.
read point-by-point responses
-
Referee: Abstract: The central claim of a 'performance study showing the efficiency and practicality of our approach' is asserted without any metrics, experimental setup, results, or data, rendering the efficiency claims unverifiable and load-bearing for the practicality argument.
Authors: We agree that the abstract would be strengthened by including high-level metrics to support the efficiency claims. The detailed experimental setup, results, and data are presented in Section 5 of the manuscript. In revision, we will update the abstract to concisely report key findings, such as throughput overhead below 15% compared to unmodified PostgreSQL and sub-second concurrent recovery times on standard workloads, while preserving brevity. revision: yes
-
Referee: Abstract: The corruption detection mechanism depends entirely on identical deterministic execution across replicas from the shared log, yet the manuscript provides no description of the deterministic PostgreSQL extension or how non-determinism sources (timestamps, random functions, query planning, I/O ordering) are eliminated; without this, divergence cannot be reliably attributed to corruption versus implementation artifacts.
Authors: Section 3.2 of the manuscript describes the deterministic PostgreSQL extension, including replacement of timestamps with log-derived sequence numbers, deterministic seeding for random functions, use of fixed query plans via prepared statements, and log-enforced ordering for I/O. To address the concern that this may not be sufficiently prominent, we will add a brief summary sentence to the abstract and improve cross-referencing from the introduction. We believe this resolves the verifiability issue without requiring new experiments. revision: partial
Circularity Check
No circularity: system description relies on external determinism assumption without self-referential derivation
full rationale
The paper presents an architectural description of a BFT replicated state machine system for database corruption detection and recovery, built atop an assumed deterministic PostgreSQL extension. No equations, fitted parameters, predictions, or derivation chains appear. The determinism premise is stated as a prerequisite rather than derived or fitted within the paper, and the performance study is presented as empirical validation without reducing to self-defined inputs. No self-citations, ansatzes, or renamings of known results are load-bearing. The central claims remain independent of any internal circular reduction.
Axiom & Free-Parameter Ledger
axioms (2)
- domain assumption A deterministic extension of PostgreSQL allows identical transaction execution across replicas from a shared log.
- domain assumption BFT replicated state machines can be built efficiently on top of this extension for practical use.
Reference graph
Works this paper leans on
-
[1]
D. Abadi and J. Faleiro.An overview of deterministic database systems. Communi- cations of the ACM, vol.61, 2018
work page 2018
-
[2]
Daniel J. Abadi and Jose M. Faleiro. An overview of deterministic database systems.Commun. ACM, 61(9):78–88, 2018
work page 2018
-
[3]
Hyper- ledger fabric: a distributed operating system for permissioned blockchains
Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstanti- nos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolić, Sharon Weed Cocco, and Jas...
work page 2018
-
[4]
P. Antonopoulos, R. Kaushik, H. Kodavalla, S. Rosales Aceves, R. Wong, J. Ander- son, and J. Szymaszek.SQL Ledger: Cryptographically Verifiable Data in Azure SQL Database. InProceedings of the ICMD, ACM SIGMOD, 2021
work page 2021
-
[5]
M. Bellare and B. Yee. Forward integrity for secure audit logs. Technical report, UC San Diego, 1998
work page 1998
-
[6]
P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine.Authentic Data Publication over the Internet.Journal of Computer Security, 11, 2002
work page 2002
-
[7]
D. Difallah, A. Pavlo, C. Curino, and P. CudreMauroux. Oltp-bench: An extensible testbed for benchmarking relational databases.Proceedings of the VLDB, 2013
work page 2013
-
[8]
T. Distler. Byzantine fault-tolerant state-machine replication from a systems perspective.ACM Comput. Surv., 54(1), February 2021
work page 2021
-
[9]
Apache Kafka, https://kafka.apache.org/, 2025
Apache Foundation. Apache Kafka, https://kafka.apache.org/, 2025
work page 2025
-
[10]
Apache Software Foundation. Apache Ratis. https://ratis.apache.org, 2025
work page 2025
- [11]
-
[12]
Hector Garcia-Molina, Frank M. Pittelli, and Susan B. Davidson. Applications of Byzantine agreement in database systems.ACM Trans. Database Syst., 11(1):27– 47, 1986
work page 1986
-
[13]
Popov, Vladimir Stankovic, and Lorenzo Strigini
Ilir Gashi, Peter T. Popov, Vladimir Stankovic, and Lorenzo Strigini. On designing dependable services with diverse off-the-shelf SQL servers. InW ADS, volume 3069 of Lecture Notes in Computer Science, Springer, pages 191––214. 2003. 12
work page 2003
-
[14]
Z. Lai, C. Liu, and E. Lo. When private blockchain meets deterministic database. Proceedings of the ACM on Management of Data, 2023
work page 2023
-
[15]
Y. Lu, X. Yu, L. Cao, and S. Madden. Aria: a fast and practical deterministic oltp database.Proceedings of the VLDB, 13, 2020
work page 2020
-
[16]
MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases
Aldelir Fernando Luiz, Lau Cheuk Lung, and Miguel Correia. MITRA: byzantine fault-tolerant middleware for transaction processing on replicated databases. SIGMOD Rec., 43(1):32–38, May 2014
work page 2014
-
[17]
E. Mykletun, M. Narasimha, and G. Tsudik. Authentication and integrity in outsourced databases.ACM Trans. Storage, 2(2):107–138, May 2006
work page 2006
-
[18]
Blockchain meets database: Design and implementation of a blockchain relational database.Proc
Senthil Nathan, Chander Govindarajan, Adarsh Saraf, Manish Sethi, and Praveen Jayachandran. Blockchain meets database: Design and implementation of a blockchain relational database.Proc. VLDB Endow., 12(11):1539–1552, 2019
work page 2019
-
[19]
D. Ongaro and J. Ousterhout.In Search of an Understandable Consensus Algorithm. InAnnual Technical Conference 2014. USENIX Association, 2014
work page 2014
-
[20]
Callinicos: Robust transactional storage for distributed data structures
Ricardo Padilha, Enrique Fynn, Robert Soule, and Fernando Pedone. Callinicos: Robust transactional storage for distributed data structures. InUSENIX Annual Technical Conf., 2016
work page 2016
-
[21]
Augustus: scalable and robust storage for cloud applications
Ricardo Padilha and Fernando Pedone. Augustus: scalable and robust storage for cloud applications. InProceedings of the 8th ACM European Conference on Computer Systems, EuroSys ’13, page 99–112, New York, NY, USA, 2013. Association for Computing Machinery
work page 2013
-
[22]
Byzantium: Byzantine-Fault-Tolerant Database Replication Pro- viding Snapshot Isolation
Nuno Preguic and Rodrigo Rodrigues amd Cristovao Honorato amd Joao Lourenco. Byzantium: Byzantine-Fault-Tolerant Database Replication Pro- viding Snapshot Isolation. InProcs Workshop on Hot Topics in System Depend- ability (HotDep), Usenix, 2008
work page 2008
-
[23]
Kun Ren, Alexander Thomson, and Daniel J. Abadi. An evaluation of the advan- tages and disadvantages of deterministic database systems.Proc. VLDB Endow., 7(10):821–832, 2014
work page 2014
-
[24]
chainifyDB: How to get rid of your blockchain and use your dbms instead
Felix Schuhknecht, Ankur Sharma, Jens Dittrich, and Divya Agrawal. chainifyDB: How to get rid of your blockchain and use your dbms instead. InCIDR, 2021
work page 2021
-
[25]
A. Silberschatz, H. F. Korth, and S. Sudarshan.Database system concepts. McGraw- Hill, 7 edition, 2022
work page 2022
-
[26]
Basil: Breaking up bft with acid (transactions)
Florian Suri-Payer, Matthew Burke, Zheng Wang, Yunhao Zhang, Lorenzo Alvisi, and Natacha Crooks. Basil: Breaking up bft with acid (transactions). InProceed- ings of the ACM SIGOPS 28th Symposium on Operating Systems Principles, SOSP ’21, New York, NY, USA, 2021. Association for Computing Machinery
work page 2021
-
[27]
Pesto: Cooking up high performance bft queries
Florian Suri-Payer, Neil Giridharan, Liam Arzola, Shir Cohen, Lorenzo Alvisi, and Natacha Crooks. Pesto: Cooking up high performance bft queries. InProcs. ACM SIGOPS Symp. on Operating Systems Principles, SOSP ’25, page 529–554, 2025
work page 2025
-
[28]
Alexander Thomson and Daniel J. Abadi. The case for determinism in database systems.Proc. VLDB Endow., 3(1):70–80, 2010
work page 2010
-
[29]
Toler- ating byzantine faults in transaction processing systems using commit barrier scheduling
Ben Vandiver, Hari Balakrishnan, Barbara Liskov, and Samuel Madden. Toler- ating byzantine faults in transaction processing systems using commit barrier scheduling. InProcs. ACM Symposium on Operating Systems Principles SOSP, pages 59–72, 2007
work page 2007
-
[30]
X. Yang, Y. Zhang, S. Wang, B. Yu, F. Li, Y. Li, and W. Yan. Ledgerdb: A centralized ledger database for universal audit and verification.Proc. VLDB Endow., 13, 2020
work page 2020
-
[31]
M. Yin, D. Malkhi, M. K. Reiter, G. G. Gueta, and I. Abraham. Hotstuff: Bft consensus with linearity and responsiveness. InIn Proc. ACM PODC, 2019
work page 2019
-
[32]
C. Yue, M. Zhang, C. Zhu, G. Chen, D. Loghin, and Beng C. Ooi. Veribench: Analyzing the performance of database systems with verifiability.Proc. VLDB Endow., 16, 2023
work page 2023
-
[33]
Sharma, Adriana Szekeres, Arvind Krishnamurthy, and Dan R
Irene Zhang, Naveen Kr. Sharma, Adriana Szekeres, Arvind Krishnamurthy, and Dan R. K. Ports. Building consistent transactions with inconsistent replication. InProceedings of the 25th Symposium on Operating Systems Principles, SOSP ’15, page 263–278, New York, NY, USA, 2015. Association for Computing Machinery
work page 2015
-
[34]
Janus: Enhancing asynchronous common subset with trusted hardware
Liangrong Zhao, Hans Schmiedel, Qin Wang, and Jiangshan Yu. Janus: Enhancing asynchronous common subset with trusted hardware. In2024 Annual Computer Security Applications Conference (ACSAC), pages 488–504, 2024. 13
work page 2024
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.