TY - GEN
T1 - On secure distributed storage systems with exact repair
AU - Tandon, Ravi
AU - Amuru, Saidhiraj
AU - Clancy, T. Charles
AU - Buehrer, R. Michael
PY - 2014
Y1 - 2014
N2 - Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n nodes and can be recovered entirely from any k out of n nodes. Whenever a node fails, d 2 [k, n) nodes help in repairing the failed node. The focus of this work is on the exact repair capabilities of a DSS, where a failed node is replaced with an identical node. Securing this DSS from passive eavesdropping attacks is studied in this paper. The eavesdropper is capable of wiretapping the repair process of a subset of nodes in the storage system. The main contribution of this paper is the optimal characterization of the secure storage-vs-exact-repair-bandwidth tradeoff region which prior to this work was unknown. We focus on the simplest nontrivial instances of this problem, namely (n, k, d) = (3,2,2) and (4,3,3), and present novel information-theoretic converse proofs that validate these optimal tradeoff regions.
AB - Distributed storage systems (DSS) in the presence of a passive eavesdropper are considered in this paper. A typical DSS is characterized by 3 parameters (n, k, d) where, a file is stored in a distributed manner across n nodes and can be recovered entirely from any k out of n nodes. Whenever a node fails, d 2 [k, n) nodes help in repairing the failed node. The focus of this work is on the exact repair capabilities of a DSS, where a failed node is replaced with an identical node. Securing this DSS from passive eavesdropping attacks is studied in this paper. The eavesdropper is capable of wiretapping the repair process of a subset of nodes in the storage system. The main contribution of this paper is the optimal characterization of the secure storage-vs-exact-repair-bandwidth tradeoff region which prior to this work was unknown. We focus on the simplest nontrivial instances of this problem, namely (n, k, d) = (3,2,2) and (4,3,3), and present novel information-theoretic converse proofs that validate these optimal tradeoff regions.
UR - http://www.scopus.com/inward/record.url?scp=84906993217&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84906993217&partnerID=8YFLogxK
U2 - 10.1109/ICC.2014.6883931
DO - 10.1109/ICC.2014.6883931
M3 - Conference contribution
AN - SCOPUS:84906993217
SN - 9781479920037
T3 - 2014 IEEE International Conference on Communications, ICC 2014
SP - 3908
EP - 3912
BT - 2014 IEEE International Conference on Communications, ICC 2014
PB - IEEE Computer Society
T2 - 2014 1st IEEE International Conference on Communications, ICC 2014
Y2 - 10 June 2014 through 14 June 2014
ER -