On the Tradeoff Region of Secure Exact-Repair Regenerating Codes

被引:0
作者
Shao, Shuo [1 ]
Liu, Tie [1 ]
Tian, Chao [2 ]
Shen, Cong [3 ]
机构
[1] Texas A&M Univ, Dept ECE, College Stn, TX 77843 USA
[2] Univ Tennessee, Dept EECS, Knoxville, TN 37996 USA
[3] Univ Sci & Technol China, Dept EEIS, Hefei, Anhui, Peoples R China
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2017年
基金
美国国家科学基金会;
关键词
Distributed storage; exact-repair regenerating codes; information-theoretic security; DISTRIBUTED STORAGE; MULTILEVEL;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider the (n, k, d, l) secure exact-repair regenerating code problem, which generalizes the (n, k, d) exact-repair regenerating code problem with the additional constraint that the stored file needs to be kept information-theoretically secure against an eavesdropper, who can access the data transmitted to regenerate a total of l different failed nodes. For all known results on this problem, the achievable tradeoff regions between the normalized storage capacity and repair bandwidth have a single corner point, achieved by a scheme proposed by Shah, Rashmi and Kumar (the SRK point). Since the achievable tradeoff regions of the exact-repair regenerating code problem without any secrecy constraints are known to have multiple corner points in general, these existing results suggest a phase-change-like behavior, i.e., enforcing a secrecy constraint (l >= 1) immediately reduces the tradeoff region to one with a single corner point. In this work, we first show that when the secrecy parameter l is sufficiently large, the SRK point is indeed the only corner point of the tradeoff region. However, when l is small, we show that the tradeoff region can in fact have multiple corner points. In particular, we establish a precise characterization of the tradeoff region for the (7, 6, 6, 1) problem, which has exactly two corner points. Thus, a smooth transition, instead of a phase-change-type of transition, should be expected as the secrecy constraint is gradually strengthened.
引用
收藏
页码:624 / 628
页数:5
相关论文
共 18 条
[1]  
[Anonymous], 2013, INT SYMP NETW COD
[2]  
[Anonymous], 2011, P IEEE GLOB TEL C GL
[3]   Network Coding for Distributed Storage Systems [J].
Dimakis, Alexandros G. ;
Godfrey, P. Brighten ;
Wu, Yunnan ;
Wainwright, Martin J. ;
Ramchandran, Kannan .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) :4539-4551
[4]  
Duursma I. M., OUTER BOUNDS EXACT R
[5]   Symmetrical Multilevel Diversity Coding and Subset Entropy Inequalities [J].
Jiang, Jinjing ;
Marukala, Neeharika ;
Liu, Tie .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (01) :84-103
[6]   Asymmetric Multilevel Diversity Coding and Asymmetric Gaussian Multiple Descriptions [J].
Mohajer, Soheil ;
Tian, Chao ;
Diggavi, Suhas N. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (09) :4367-4387
[7]   On Secure Distributed Data Storage Under Repair Dynamics [J].
Pawar, Sameer ;
El Rouayheb, Salim ;
Ramchandran, Kannan .
2010 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2010, :2543-2547
[8]   Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction [J].
Rashmi, K. V. ;
Shah, Nihar B. ;
Kumar, P. Vijay .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (08) :5227-5239
[9]  
Roche J. R., 1992, THESIS
[10]   Symmetrical multilevel diversity coding [J].
Roche, JR ;
Yeung, RW ;
Hau, KP .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (03) :1059-1064