On the Confidentiality of Information Dispersal Algorithms and Their Erasure Codes
نویسنده
چکیده
Information Dispersal Algorithms (IDAs) have been widely applied to reliable and secure storage and transmission of data files in distributed systems. An IDA is a method that encodes a file F of size L = |F | into n unrecognizable pieces F1, F2, · · · , Fn, each of size L/m (m < n), so that the original file F can be reconstructed from any m pieces. The core of an IDA is the adopted non-systematic m-of-n erasure code. This paper makes a systematic study on the confidentiality of an IDA and its connection with the adopted erasure code. Two levels of confidentiality are defined: weak confidentiality (in the case where some parts of the original file F can be reconstructed explicitly from fewer than m pieces) and strong confidentiality (in the case where nothing of the original file F can be reconstructed explicitly from fewer than m pieces). For an IDA that adopts an arbitrary non-systematic erasure code, its confidentiality may fall into weak confidentiality. To achieve strong confidentiality, this paper explores a sufficient and feasible condition on the adopted erasure code. Then, this paper shows that Rabin’s IDA has strong confidentiality. At the same time, this paper presents an effective way to construct an IDA with strong confidentiality from an arbitrary m-of-(m+ n) erasure code. Then, as an example, this paper constructs an IDA with strong confidentiality from a Reed-Solomon code, the computation complexity of which is comparable to or sometimes even lower than that of Rabin’s IDA.
منابع مشابه
Evaluating Information Dispersal Algorithms
The explosion in data acquisition and storage has led to the emergence of data-intensive applications that are used to process enormous quantity of information using methods such as the MapReduce paradigm. Data-Intensive Distributed File Systems (DI-DFS) have been designed to support these kinds of applications. These large-scale storage systems require faulttolerance mechanisms to handle failu...
متن کاملA Non-MDS Erasure Code Scheme for Storage Applications
This paper investigates the use of redundancy and self repairing against node failures indistributed storage systems using a novel non-MDS erasure code. In replication method, accessto one replication node is adequate to reconstruct a lost node, while in MDS erasure codedsystems which are optimal in terms of redundancy-reliability tradeoff, a single node failure isrepaired after recovering the ...
متن کاملAn Integrated Distributed Storage Design Offering Data Retrievability and Recoverability Using Soft Decision Decoding of Block Codes
Active distributed storages need to assure both consistency and dynamic data support, in addition to availability, confidentiality and resiliency. Further, since storage durability suffers in untrusted and unreliable environments, it becomes crucial to (a) select the most reliable set of servers to assure data retrievability and (b) dynamically identify errant servers and restore the data to en...
متن کاملSecure and Reliable Distributed Storage: Unifying Algorithms, Resilience Metric and Evaluation Framework
We propose a non-cryptographic algorithm for secure and reliable distributed storage without placing much trust on the file servers. In particular, the algorithm makes novel use of binary error control codes to protect store, and repair files. It features low computation overhead while achieving a joint defense in reliability, confidentiality, and integrity, which are collectively quantified us...
متن کاملIStore: Towards High Efficiency, Performance, and Reliability in Distributed Data Storage with Information Dispersal Algorithms
Reliability is one of the major challenges for high performance computing and cloud computing. Data replication is a commonly used mechanism to achieve high reliability. Unfortunately, it has a low storage efficiency among other shortcomings. As an alternative to data replication, information dispersal algorithms offer higher storage efficiency, but at the cost of being too computing-intensive ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1206.4123 شماره
صفحات -
تاریخ انتشار 2012