Improved Perfect Secrecy of Distributed Storage Systems using Interference Alignment

被引:0
作者
Paunkoska, Natasa
Kafedziski, Venceslav
Marina, Ninoslav
机构
来源
2016 8TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT) | 2016年
关键词
distributed storage system (DSS); eavesdropper; perfect security; weak security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Regenerating codes based on the approach of interference alignment for wireless interference channel achieve the cut-set bound for distributed storage systems (DSS). These codes are especially important for efficient repair of a failed node in a minimum storage regenerating (MSR) codes. Moreover, they achieve perfect security against the eavesdropper attacks, i. e., the observer can not reveal the whole message. Here the aim is information protection of individual files and small groups from the entire message, when the attacker has access to a limited number of storage nodes. This paper considers improving the perfect security in such DSS. The enhanced secrecy is presented by performing explicit code construction by using an outer and an inner code. The proposed construction code model includes coset code as an outer code or pre-coding step that ensures the security of the system and an MSR interference alignment code as an inner one that performs an efficient reconstruction and repair process. Using this construction we show that the eavesdropper can not reveal the message, and, that he can not access any subset of individual information from the original message, without any significant loss in the storage capacity.
引用
收藏
页码:240 / 245
页数:6
相关论文
共 14 条
[1]  
[Anonymous], P NETCOD RIV DEL GAR
[2]  
[Anonymous], 2007, ALL C CONTR COMP COM
[3]  
Bernstein D. S., 2005, MATRIX MATH THEORY F
[4]  
Dimakis A. G., 2006, T IEER T INFO THEO A
[5]   Network Coding for Distributed Storage Systems [J].
Dimakis, Alexandros G. ;
Godfrey, P. Brighten ;
Wu, Yunnan ;
Wainwright, Martin J. ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) :4539-4551
[6]  
Kadhe S., 2014, NEDCODE
[7]  
Kadhe S., 2014, ALL C COMM CONT COMP
[8]  
OZAROW LH, 1985, LECT NOTES COMPUT SC, V209, P33
[9]  
Pawar S., 2010, P ISIT
[10]   Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks [J].
Pawar, Sameer ;
El Rouayheb, Salim ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (10) :6734-6753