Secure clustered distributed storage against eavesdroppers

Beongjun Choi, Jy Yong Sohn, Sung Whan Yoon, Jaekyun Moon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper considers the security issue of practical distributed storage systems (DSSs) which consist of multiple clusters of storage nodes. Noticing that actual storage nodes constituting a DSS are distributed in multiple clusters, two novel eavesdropper models - the node-restricted model and the cluster-restricted model - are suggested which reflect the clustered nature of DSSs. In the node-restricted model, an eavesdropper cannot access the individual nodes, but can eavesdrop incoming/outgoing data for Lc compromised clusters. In the cluster-restricted model, an eavesdropper can access a total of l individual nodes but the number of accessible clusters is limited to Lc. We provide an upper bound on the securely storable data for each model, while a specific network coding scheme which achieves the upper bound is obtained for the node-restricted model, given some mild condition on the node storage size.

Original languageEnglish
Title of host publication2017 IEEE International Conference on Communications, ICC 2017
EditorsMerouane Debbah, David Gesbert, Abdelhamid Mellouk
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467389990
DOIs
Publication statusPublished - 2017 Jul 28
Event2017 IEEE International Conference on Communications, ICC 2017 - Paris, France
Duration: 2017 May 212017 May 25

Publication series

NameIEEE International Conference on Communications
ISSN (Print)1550-3607

Other

Other2017 IEEE International Conference on Communications, ICC 2017
Country/TerritoryFrance
CityParis
Period17/5/2117/5/25

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Secure clustered distributed storage against eavesdroppers'. Together they form a unique fingerprint.

Cite this