Secure Clustered Distributed Storage Against Eavesdroppers

被引:0
|
作者
Choi, Beongjun [1 ]
Sohn, Jy-Yong [1 ]
Yoon, Sung Whan [1 ]
Moon, Jaekyun [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Elect Engn, Daejeon 34141, South Korea
基金
新加坡国家研究基金会;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper considers the security issue of practical distributed storage systems (DSSs) which consist of multiple clusters of storage nodes. Noticing that actual storage nodes constituting a DSS are distributed in multiple clusters, two novel eavesdropper models - the node-restricted model and the cluster-restricted model - are suggested which reflect the clustered nature of DSSs. In the node-restricted model, an eavesdropper cannot access the individual nodes, but can eavesdrop incoming/outgoing data for Lc compromised clusters. In the cluster-restricted model, an eavesdropper can access a total of l individual nodes but the number of accessible clusters is limited to Lc. We provide an upper bound on the securely storable data for each model, while a specific network coding scheme which achieves the upper bound is obtained for the node-restricted model, given some mild condition on the node storage size.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Secure distributed storage and retrieval
    Garay, JA
    Gennaro, R
    Jutla, C
    Rabin, T
    DISTRIBUTED ALGORITHMS, PROCEEDINGS, 1997, 1320 : 275 - 289
  • [22] Secure distributed storage and retrieval
    Garay, JA
    Gennaro, R
    Jutla, C
    Rabin, T
    THEORETICAL COMPUTER SCIENCE, 2000, 243 (1-2) : 363 - 389
  • [23] Secure Active Intelligent Reflecting Surface Communication against Colluding Eavesdroppers
    Xu, Jiaxin
    Peng, Yuyang
    Ye, Runlong
    Gan, Wei
    AL-Hazemi, Fawaz
    Mirza, Mohammad Meraj
    MATHEMATICS, 2024, 12 (10)
  • [24] UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers
    Zhang, Huanran
    Shen, Lingfeng
    Wang, Ning
    Mu, Xiaomin
    2022 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY, CYBERC, 2022, : 289 - 293
  • [25] Efficient quantum key distribution secure against no-signalling eavesdroppers
    Acin, Antonio
    Massar, Serge
    Pironio, Stefano
    NEW JOURNAL OF PHYSICS, 2006, 8
  • [26] Secure Transmission via Jamming in Wireless Networks with Possion Spatially Distributed Eavesdroppers
    Hu, Xiang
    Zhang, Xing
    Huang, Haozhou
    Li, Yongjing
    PROCEEDINGS 2016 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS NANA 2016, 2016, : 161 - 166
  • [27] Adaptive Artificial Noise Transmission Against Randomly Distributed Eavesdroppers
    Zheng, Tong-Xing
    Wang, Hui-Ming
    Huang, Rui
    Mu, Pengcheng
    PROCEEDINGS OF THE 2015 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA CHINACOM 2015, 2015, : 248 - 253
  • [28] Protecting Cognitive Radio Networks Against Poisson Distributed Eavesdroppers
    Cai, Yueming
    Xu, Xiaoming
    He, Biao
    Yang, Weiwei
    Zhou, Xiangyun
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [29] Protecting Source Location Privacy in a Clustered Wireless Sensor Networks against Local Eavesdroppers
    Mamoun F. Al-Mistarihi
    Islam M. Tanash
    Fedaa S. Yaseen
    Khalid A. Darabkh
    Mobile Networks and Applications, 2020, 25 : 42 - 54
  • [30] A Class of MSR Codes for Clustered Distributed Storage
    Sohn, Jy-yong
    Choi, Beongjun
    Moon, Jaekyun
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 2366 - 2370