File Download

There are no files associated with this item.

  • Find it @ UNIST can give you direct access to the published full text of this article. (UNISTARs only)
Related Researcher

윤성환

Yoon, Sung Whan
Machine Intelligence and Information Learning Lab.
Read More

Views & Downloads

Detailed Information

Cited time in webofscience Cited time in scopus
Metadata Downloads

Full metadata record

DC Field Value Language
dc.citation.endPage 7668 -
dc.citation.number 11 -
dc.citation.startPage 7646 -
dc.citation.title IEEE TRANSACTIONS ON INFORMATION THEORY -
dc.citation.volume 65 -
dc.contributor.author Choi, Beongjun -
dc.contributor.author Sohn, Jy-Yong -
dc.contributor.author Yoon, Sung Whan -
dc.contributor.author Moon, Jaekyun -
dc.date.accessioned 2023-12-21T18:18:19Z -
dc.date.available 2023-12-21T18:18:19Z -
dc.date.created 2020-03-25 -
dc.date.issued 2019-11 -
dc.description.abstract This paper investigates interplay among storage overhead, bandwidth requirement, and security constraint in distributed storage. In the model used in our analysis, storage nodes are dispersed in multiple clusters. When a node fails, necessary content gets restored by downloading data from different nodes that may possibly be in other clusters. The bandwidth required for transferring data for node repair is assumed more scarce for cluster-to-cluster links than the links connecting intra-cluster nodes. Eavesdropping takes place on links across clusters only, and a fraction of the total number of clusters is assumed compromised. When a cluster is compromised, any repair traffic going in and out of it is eavesdropped. For this clustered model with eavesdroppers, we analyze the security of distributed storage systems (DSSs) and provide guidelines on designing system solutions for securing the data. First, under the setting of functional repair, we derive a general upper bound on the secrecy capacity, the maximum data size that can be stored in DSSs with perfect secrecy. In the practically important bandwidth-limited regime where the node storage size is equal to the repair bandwidth, the upper bound is shown to be achievable through proposed code constructions. Moreover, we obtain a closed-form expression for the required system resources-node storage size and repair bandwidth-to store a given amount of data with perfect secrecy. Second, we investigate the behavior of secrecy capacity as the number of compromised clusters increases. According to our mathematical analysis, the secrecy capacity decreases as a quadratic function until the number of compromised clusters reaches a certain threshold. Finally, based on the fundamental relationship between the system resources and the secrecy capacity, we provide a guideline on balancing intra- and cross-cluster repair bandwidths depending on the given system security level. -
dc.identifier.bibliographicCitation IEEE TRANSACTIONS ON INFORMATION THEORY, v.65, no.11, pp.7646 - 7668 -
dc.identifier.doi 10.1109/TIT.2019.2924895 -
dc.identifier.issn 0018-9448 -
dc.identifier.scopusid 2-s2.0-85077497379 -
dc.identifier.uri https://scholarworks.unist.ac.kr/handle/201301/31651 -
dc.identifier.url https://ieeexplore.ieee.org/document/8745527/ -
dc.identifier.wosid 000507921700045 -
dc.language 영어 -
dc.publisher IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC -
dc.title Secure Clustered Distributed Storage Against Eavesdropping -
dc.type Article -
dc.description.isOpenAccess FALSE -
dc.relation.journalWebOfScienceCategory Computer Science, Information Systems; Engineering, Electrical & Electronic -
dc.relation.journalResearchArea Computer Science; Engineering -
dc.type.docType Article -
dc.description.journalRegisteredClass scie -
dc.description.journalRegisteredClass scopus -
dc.subject.keywordAuthor Distributed storage system -
dc.subject.keywordAuthor secrecy capacity -
dc.subject.keywordAuthor eavesdropper -
dc.subject.keywordAuthor network coding -
dc.subject.keywordPlus CODES -

qrcode

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.