New Results on Multilevel Diversity Coding with Secure Regeneration

01/11/2018
by   Shuo Shao, et al.
0

The problem of multilevel diversity coding with secure regeneration is revisited. Under the assumption that the eavesdropper can access the repair data for all compromised storage nodes, Shao el al. provided a precise characterization of the minimum-bandwidth-regeneration (MBR) point of the achievable normalized storage-capacity repair-bandwidth tradeoff region. In this paper, it is shown that the MBR point of the achievable normalized storage-capacity repair-bandwidth tradeoff region remains the same even if we assume that the eavesdropper can access the repair data for some compromised storage nodes (type 2 compromised nodes) but only the data contents of the remaining compromised nodes (type 1 compromised nodes), as long as the number of type 1 compromised nodes is no greater than that of type 2 compromised nodes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/09/2017

Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point

The problem of multilevel diversity coding with secure regeneration (MDC...
research
01/02/2022

Secure Determinant Codes for Distributed Storage Systems

The information-theoretic secure exact-repair regenerating codes for dis...
research
05/08/2018

On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point

The problem of exact-repair regenerating codes against eavesdropping att...
research
03/13/2018

Storage and Repair Bandwidth Tradeoff for Distributed Storage Systems with Clusters and Separate Nodes

The optimal tradeoff between node storage and repair bandwidth is an imp...
research
01/10/2019

Capacity of Distributed Storage Systems with Clusters and Separate Nodes

In distributed storage systems (DSSs), the optimal tradeoff between node...
research
05/22/2017

Liquid Cloud Storage

A liquid system provides durable object storage based on spreading redun...
research
04/19/2018

Reliable IoT Storage: Minimizing Bandwidth Use in Storage Without Newcomer Nodes

This letter characterizes the optimal policies for bandwidth use and sto...

Please sign up or login with your details

Forgot password? Click here to reset