Secure Determinant Codes for Distributed Storage Systems

01/02/2022
by   Michelle Kleckler, et al.
0

The information-theoretic secure exact-repair regenerating codes for distributed storage systems (DSSs) with parameters (n,k=d,d,ℓ) are studied in this paper. We consider distributed storage systems with n nodes, in which the original data can be recovered from any subset of k=d nodes, and the content of any node can be retrieved from those of any d helper nodes. Moreover, we consider two secrecy constraints, namely, Type-I, where the message remains secure against an eavesdropper with access to the content of any subset of up to ℓ nodes, and type-II, in which the message remains secure against an eavesdropper who can observe the incoming repair data from all possible nodes to a fixed but unknown subset of up to ℓ compromised nodes. Two classes of secure determinant codes are proposed for Type-I and Type-II secrecy constraints. Each proposed code can be designed for a range of per-node storage capacity and repair bandwidth for any system parameters. They lead to two achievable secrecy trade-offs, for type-I and type-II security.

READ FULL TEXT
research
01/05/2018

Improving the Secrecy of Distributed Storage Systems using Interference Alignment

Regenerating codes based on the approach of interference alignment for w...
research
05/08/2018

On Secure Exact-repair Regenerating Codes with a Single Pareto Optimal Point

The problem of exact-repair regenerating codes against eavesdropping att...
research
04/06/2018

Low Complexity Secure Code (LCSC) Design for Big Data in Cloud Storage Systems

In the era of big data, reducing the computational complexity of servers...
research
01/11/2018

New Results on Multilevel Diversity Coding with Secure Regeneration

The problem of multilevel diversity coding with secure regeneration is r...
research
02/26/2019

Achieving Secrecy Capacity of Minimum Storage Regenerating Codes for all Feasible (n, k, d) Parameter Values

This paper addresses the problem of constructing secure exact-repair reg...
research
01/15/2020

Network Information Theoretic Security

Shannon showed that to achieve perfect secrecy in point-to-point communi...
research
03/02/2021

The Capacity Region of Distributed Multi-User Secret Sharing

In this paper, we study the problem of distributed multi-user secret sha...

Please sign up or login with your details

Forgot password? Click here to reset