Secure distributed storage systems: Local repair with minimum bandwidth regeneration

Ankit Singh Rawat, Natalia Silberstein, O. Ozan Koyluoglu, Sriram Vishwanath

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

This paper addresses the issue of securing information stored on a distributed storage system from a passive eavesdropping attack. The security notion is perfect secrecy, i.e., the system is said to be secure only if the mutual information between the stored information and the observations at the adversary is zero. The paper summarizes state of the art on securing repair-efficient distributed storage systems. Then, storage systems that employ locally repairable codes with minimum bandwidth regenerating codes as local codes (MBR-LRCs) are investigated. A secure file size upper bound and a construction of secure MBR-LRCs are provided. These two are shown to match under special cases, establishing the secrecy capacity of these systems.

Original languageEnglish
Title of host publicationISCCSP 2014 - 2014 6th International Symposium on Communications, Control and Signal Processing, Proceedings
PublisherInstitute of Electrical and Electronics Engineers
Pages5-8
Number of pages4
ISBN (Print)9781479928903
DOIs
StatePublished - 1 Jan 2014
Externally publishedYes
Event6th International Symposium on Communications, Control and Signal Processing, ISCCSP 2014 - Athens, Greece
Duration: 21 May 201423 May 2014

Publication series

NameISCCSP 2014 - 2014 6th International Symposium on Communications, Control and Signal Processing, Proceedings

Conference

Conference6th International Symposium on Communications, Control and Signal Processing, ISCCSP 2014
Country/TerritoryGreece
CityAthens
Period21/05/1423/05/14

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Fingerprint

Dive into the research topics of 'Secure distributed storage systems: Local repair with minimum bandwidth regeneration'. Together they form a unique fingerprint.

Cite this