Loading [MathJax]/extensions/MathMenu.js
Securing data against limited-knowledge adversaries in distributed storage systems | IEEE Conference Publication | IEEE Xplore

Securing data against limited-knowledge adversaries in distributed storage systems


Abstract:

We study the problem of constructing secure regenerating codes that protect data integrity in distributed storage systems (DSS) in which some nodes may be compromised by ...Show More

Abstract:

We study the problem of constructing secure regenerating codes that protect data integrity in distributed storage systems (DSS) in which some nodes may be compromised by a malicious adversary. The adversary can corrupt the data stored on and transmitted by the nodes under its control. The “damage” incurred by the actions of the adversary depends on how much information it knows about the data in the whole DSS. We focus on the limited-knowledge model in which the adversary knows only the data on the nodes under its control. The only secure capacity-achieving codes known in the literature for this model are for the bandwidth-limited regime and repair degree d = n−1, i.e., when a node fails in a DSS with n nodes all the remaining n − 1 nodes are contacted for repair. We extend these results to the more general case of d ≤ n − 1 in the bandwidth-limited regime. Our capacity-achieving scheme is based on the use of product-matrix codes with special hashing functions and allow the identification of the compromised nodes and their elimination from the DSS while preserving the data integrity.
Date of Conference: 14-19 June 2015
Date Added to IEEE Xplore: 01 October 2015
ISBN Information:

ISSN Information:

Conference Location: Hong Kong, China
No metrics found for this document.

I. Introduction

We consider the problem of securing data in distributed storage systems (DSS) under failure and repair (rebuilding) dynamics against a malicious adversary that can control a certain number of nodes in the system. DSS experience frequent node failures due to the use of inexpensive commodity hardware [1], [2]. Data redundancy is used to prevent from data loss. Typically, replication codes are used and multiple copies of the data, typically 3, are stored in the DSS. Recently, major cloud storage companies [3], [4] have started using erasure codes, such as regenerating codes [5] and locally repairable codes [3], to achieve data reliability with a lower storage cost and better tradeoffs with other system resources, such as repair bandwidth and data locality.

Usage
Select a Year
2025

View as

Total usage sinceOct 2015:96
00.20.40.60.811.2JanFebMarAprMayJunJulAugSepOctNovDec010010000000
Year Total:2
Data is updated monthly. Usage includes PDF downloads and HTML views.

Contact IEEE to Subscribe

References

References is not available for this document.