Skip to main content

Secure MBR Array Codes in the Presence of Special Type Eavesdropper

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (NEW2AN 2020, ruSMART 2020)

Abstract

Minimum bandwidth regenerating (MBR) array codes are a class of regenerating codes that provide reliability of data while ensuring low repair bandwidth or, in other words, the amount of information downloaded for the repair of temporally unavailable node. An important aspect of all distributed storage systems is security. In this paper, we address the security issues of MBR array codes in the presence of eavesdropper with access to limited number of elements from each node. We provide an explicit construction of MBR array codes secure against such eavesdropper and prove the bound on the total amount of information stored in such a system.

The research was partially funded by RFBR, projects no. 19-01-00364, 19-37-90022, 20-07-00652, and joint RFBR and JSPS project no. 20-51-50007.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aftab, U., Siddiqui, G.F.: Big data augmentation with data warehouse: a survey. In: 2018 IEEE International Conference on Big Data (Big Data), pp. 2785–2794 (2018)

    Google Scholar 

  2. Agarwal, A., Mazumdar, A.: Security in locally repairable storage. In: 2015 IEEE Information Theory Workshop (ITW), pp. 1–5 (2015)

    Google Scholar 

  3. Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539–4551 (2010)

    Article  Google Scholar 

  4. Han, Y.S., Pai, H., Zheng, R., Varshney, P.K.: Update-efficient error-correcting product-matrix codes. IEEE Trans. Commun. 63(6), 1925–1938 (2015)

    Article  Google Scholar 

  5. Kadhe, S., Sprintson, A.: Security for minimum storage regenerating codes and locally repairable codes. In: 2017 IEEE International Symposium on Information Theory (ISIT), pp. 1028–1032 (2017)

    Google Scholar 

  6. Kruglik, S.: Ph.d. forum: Security issues in distributed storage networks. In: 2020 IEEE 21th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–2 (2020)

    Google Scholar 

  7. Kruglik, S., Rybin, P., Frolov, A.: On the secrecy capacity of distributed storage with locality and availability. In: 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall), pp. 1–5 (2019)

    Google Scholar 

  8. Li, J., Tang, X., Tian, C.: A generic transformation for optimal repair bandwidth and rebuilding access in MDS codes. In: 2017 IEEE International Symposium on Information Theory (ISIT), pp. 1623–1627 (2017)

    Google Scholar 

  9. Lin, S., Chung, W.: Novel repair-by-transfer codes and systematic exact-MBR codes with lower complexities and smaller field sizes. IEEE Trans. Parallel Distrib. Syst. 25(12), 3232–3241 (2014)

    Article  Google Scholar 

  10. Pawar, S., El Rouayheb, S., Ramchandran, K.: On secure distributed data storage under repair dynamics. In: 2010 IEEE International Symposium on Information Theory, pp. 2543–2547 (2010)

    Google Scholar 

  11. Rashmi, K.V., Shah, N.B., Kumar, P.V.: Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction. IEEE Trans. Inf. Theory 57(8), 5227–5239 (2011)

    Article  MathSciNet  Google Scholar 

  12. Rashmi, K.V., Shah, N.B., Kumar, P.V., Ramchandran, K.: Explicit construction of optimal exact regenerating codes for distributed storage. In: 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1243–1249 (2009)

    Google Scholar 

  13. Rashmi, K.V., Shah, N.B., Ramchandran, K., Kumar, P.V.: Information-theoretically secure erasure codes for distributed storage. IEEE Trans. Inf. Theory 64(3), 1621–1646 (2018)

    Article  MathSciNet  Google Scholar 

  14. Rawat, A.S., Koyluoglu, O.O., Silberstein, N., Vishwanath, S.: Secure locally repairable codes for distributed storage systems. In: 2013 IEEE International Symposium on Information Theory, pp. 2224–2228 (2013)

    Google Scholar 

  15. Rhea, S., Eaton, P., Geels, D., Weatherspoon, H., Zhao, B., Kubiatowicz, J.: Pond: the oceanstore prototype. In: 2nd USENIX Conference File Storage Technol. (FAST), pp. 1–14 (203)

    Google Scholar 

  16. Shah, N.B., Rashmi, K.V., Kumar, P.V.: Information-theoretically secure regenerating codes for distributed storage. In: 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011, pp. 1–5 (2011)

    Google Scholar 

  17. Ye, M., Barg, A.: Explicit constructions of high-rate MDS array codes with optimal repair bandwidth. IEEE Trans. Inf. Theory 63(4), 2001–2014 (2017)

    Article  MathSciNet  Google Scholar 

  18. Yekhanin, S.: Locally decodable codes. Found. Trends Theor. Comput. Sci. 6(3), 139–255 (2012)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

Authors thanks A. Frolov and G. Kabatiansky for introducing this problem to him and for numerous fruitful discussions during work on this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stanislav Kruglik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kruglik, S. (2020). Secure MBR Array Codes in the Presence of Special Type Eavesdropper. In: Galinina, O., Andreev, S., Balandin, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN ruSMART 2020 2020. Lecture Notes in Computer Science(), vol 12526. Springer, Cham. https://doi.org/10.1007/978-3-030-65729-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-65729-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-65728-4

  • Online ISBN: 978-3-030-65729-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics