Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes

被引:22
作者
Buttyan, Levente [1 ]
Czap, Laszlo [1 ]
Vajda, Istvan [1 ]
机构
[1] Budapest Univ Technol & Econ, Dept Telecommun, Lab Cryptog & Syst Secur CrySys, H-1117 Budapest, Hungary
关键词
Network level security and protection; sensor networks; distributed data storage; network coding; pollution attack; integrity protection;
D O I
10.1109/TDSC.2010.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of pollution attacks in coding-based distributed storage systems. In a pollution attack, the adversary maliciously alters some of the stored encoded packets, which results in the incorrect decoding of a large part of the original data upon retrieval. We propose algorithms to detect and recover from such attacks. In contrast to existing approaches to solve this problem, our approach is not based on adding cryptographic checksums or signatures to the encoded packets, and it does not introduce any additional redundancy to the system. The results of our analysis show that our proposed algorithms are suitable for practical systems, especially in wireless sensor networks.
引用
收藏
页码:824 / 838
页数:15
相关论文
共 33 条
  • [1] On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems
    Gaeta, Rossano
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 292 - 302
  • [2] Securing Coding-Based Cloud Storage Against Pollution Attacks
    Anglano, Cosimo
    Gaeta, Rossano
    Grangetto, Marco
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (05) : 1457 - 1469
  • [3] Remote Data Checking for Network Coding-based Distributed Storage Systems
    Chen, Bo
    Curtmola, Reza
    Ateniese, Giuseppe
    Burns, Randal
    PROCEEDINGS OF THE 2010 ACM WORKSHOP CLOUD COMPUTING SECURITY WORKSHOP (CCSW'10:), 2010, : 29 - 40
  • [4] Network Coding-Based Network Coding Recovery Scheme
    Zhao, Yunlong
    Kang, Shilong
    Iwai, Masayuki
    Sezaki, Kaoru
    Tobe, Yoshito
    15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 626 - 632
  • [5] Node Recovery Schemes for Minimizing Repair Time in Distributed Storage System with Network Coding
    Chi, Kaikai
    Tian, Zhijian
    Zhu, Yi-hua
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2857 - 2861
  • [6] Distributed Joint Source-Channel Coding-Based Adaptive Dynamic Network Coding
    Aljohani, Abdulah Jeza
    Ng, Soon Xin
    IEEE ACCESS, 2020, 8 : 86715 - 86731
  • [7] Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding
    Hu, Yuchong
    Xu, Yinlong
    Wang, Xiaozhao
    Zhan, Cheng
    Li, Pei
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (02) : 268 - 276
  • [8] Byzantine Attacks against Network Coding in Peer to Peer Distributed Storage
    Lima, Luisa
    Barros, Joao
    Koetter, Ralf
    2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, : 1164 - +
  • [9] Securing network coding against pollution attacks based on space and time properties
    He, Ming
    Wang, Hong
    Chen, Lin
    Gong, Zhenghu
    Dai, Fan
    Liu, Zhihong
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2086 - 2090
  • [10] Reputation-based defense scheme against pollution attacks on network coding
    Wang T.
    Cai Y.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (11): : 2491 - 2499