ON SECURE DISTRIBUTED STORAGE UNDER DATA THEFT

被引:0
|
作者
Regalia, Phillip A. [1 ]
Lin, Chin-Yu [2 ]
机构
[1] Natl Sci Fdn, CISE Directorate, 4201 Wilson Blvd, Arlington, VA 22230 USA
[2] Catholic Univ Amer, Dept Elect Engn & Comp Sci, Washington, DC 20064 USA
关键词
secure distributed storage; perfect secrecy; CODES; CHANNELS;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Consider a message coded for storage in which a fraction of the stored data is stolen. Ideally, the data remaining should allow message recovery, while the stolen data should reveal no information on the message. This gives a twist on the erasure wiretap channel, in that "Bob" no longer has a clear channel from "Alice". We show how the storage capacity can, as in other multi-terminal coding problems, be approached using nested codes, and propose nested erasure codes using Krylov subspaces. These offer good performance and perfect secrecy, while integrating the nested code structure naturally.
引用
收藏
页码:2867 / 2871
页数:5
相关论文
共 50 条
  • [1] On Secure Distributed Data Storage Under Repair Dynamics
    Pawar, Sameer
    El Rouayheb, Salim
    Ramchandran, Kannan
    [J]. 2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, : 2543 - 2547
  • [2] Secure Distributed Storage for Bulk Data
    Minowa, Tadashi
    Takahashi, Takeshi
    [J]. NEURAL INFORMATION PROCESSING, ICONIP 2012, PT V, 2012, 7667 : 566 - 575
  • [3] Secure Data Storage in Distributed Cloud Environments
    Jordao, Renata
    Martins, Valerio Aymore
    Buiati, Fabio
    de Sousa Junior, Rafael Timoteo
    de Deus, Flavio Elias
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2014,
  • [4] Reliability analysis of distributed storage systems considering data loss and theft
    Jia, Heping
    Peng, Rui
    Ding, Yi
    Shao, Changzheng
    [J]. PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2020, 234 (02) : 303 - 321
  • [5] HybridS: A Scheme for Secure Distributed Data Storage in WSNs
    Ren, Wei
    Ren, Yi
    Zhang, Hui
    [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 318 - +
  • [6] A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs
    Ren, Yi
    Oleshchuk, Vladimir
    Li, Frank Y.
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [7] Identity-Based Secure Distributed Data Storage Schemes
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) : 941 - 953
  • [8] Feasible Region of Secure and Distributed Data Storage in Adversarial Networks
    Ren, Jian
    Li, Jian
    Li, Tongtong
    Mutka, Matt W.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8980 - 8988
  • [9] CryptDICE: Distributed data protection system for secure cloud data storage and computation
    Rafique, Ansar
    Van Landuyt, Dimitri
    Beni, Emad Heydari
    Lagaisse, Bert
    Joosen, Wouter
    [J]. INFORMATION SYSTEMS, 2021, 96
  • [10] Distributed secure sampled-data control for distributed generators and energy storage systems in microgrids under abnormal deception attacks
    Zhong, Qishui
    Han, Sheng
    Shi, Kaibo
    Zhong, Shouming
    Cai, Xiao
    Kwon, Oh-Min
    [J]. APPLIED ENERGY, 2022, 326