Partially Collaborative Storage Codes in the Presence of an Eavesdropper

We consider the study of codes designed for distributed storage systems, whose maintenance design criterion is to reduce the repair bandwidth, in a generic setting where t failures, t ≥ 1, are repaired collaboratively, thus involving the participation of t storage nodes. Yet each of these t nodes is...

Full description

Saved in:
Bibliographic Details
Main Authors: Liu, Shiqiu, Oggier, Frédérique
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2016
Subjects:
Online Access:https://hdl.handle.net/10356/103743
http://hdl.handle.net/10220/40655
http://www.inderscience.com.ezlibproxy1.ntu.edu.sg/info/inarticle.php?artid=76955
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-103743
record_format dspace
spelling sg-ntu-dr.10356-1037432023-02-28T19:33:18Z Partially Collaborative Storage Codes in the Presence of an Eavesdropper Liu, Shiqiu Oggier, Frédérique School of Physical and Mathematical Sciences Mathematical Sciences We consider the study of codes designed for distributed storage systems, whose maintenance design criterion is to reduce the repair bandwidth, in a generic setting where t failures, t ≥ 1, are repaired collaboratively, thus involving the participation of t storage nodes. Yet each of these t nodes is actually actively exchanging data with only a subset formed by t − s of the t − 1 other nodes, for 1 ≤ s ≤ t, explaining the term “partially collaborative”. To understand the role of the different code parameters, namely the threshold t of failures, the degree s of collaboration, but also the repair bandwidth, we adopt the general scenario where an eavesdropper may spy on some storage nodes, and their communication links. By doing so, we recover previous results on partially collaborative codes, and discuss some aspects of cooperation and security in terms of their influence on the repair bandwidth in the presence of an eavesdropper. MOE (Min. of Education, S’pore) Accepted version 2016-06-09T06:15:05Z 2019-12-06T21:19:15Z 2016-06-09T06:15:05Z 2019-12-06T21:19:15Z 2015 2015 Journal Article Liu, S., & Oggier, F. (2016). Partially collaborative storage codes in the presence of an eavesdropper. International Journal of Information and Coding Theory, 3(3), 177-196. 1753-7703 https://hdl.handle.net/10356/103743 http://hdl.handle.net/10220/40655 http://www.inderscience.com.ezlibproxy1.ntu.edu.sg/info/inarticle.php?artid=76955 188562 en International Journal of Information and Coding Theory © 2015 Inderscience. This is the author created version of a work that has been peer reviewed and accepted for publication by International Journal of Information and Coding Theory, Inderscience. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: [http://www.inderscience.com.ezlibproxy1.ntu.edu.sg/info/inarticle.php?artid=76955]. 23 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Mathematical Sciences
spellingShingle Mathematical Sciences
Liu, Shiqiu
Oggier, Frédérique
Partially Collaborative Storage Codes in the Presence of an Eavesdropper
description We consider the study of codes designed for distributed storage systems, whose maintenance design criterion is to reduce the repair bandwidth, in a generic setting where t failures, t ≥ 1, are repaired collaboratively, thus involving the participation of t storage nodes. Yet each of these t nodes is actually actively exchanging data with only a subset formed by t − s of the t − 1 other nodes, for 1 ≤ s ≤ t, explaining the term “partially collaborative”. To understand the role of the different code parameters, namely the threshold t of failures, the degree s of collaboration, but also the repair bandwidth, we adopt the general scenario where an eavesdropper may spy on some storage nodes, and their communication links. By doing so, we recover previous results on partially collaborative codes, and discuss some aspects of cooperation and security in terms of their influence on the repair bandwidth in the presence of an eavesdropper.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Liu, Shiqiu
Oggier, Frédérique
format Article
author Liu, Shiqiu
Oggier, Frédérique
author_sort Liu, Shiqiu
title Partially Collaborative Storage Codes in the Presence of an Eavesdropper
title_short Partially Collaborative Storage Codes in the Presence of an Eavesdropper
title_full Partially Collaborative Storage Codes in the Presence of an Eavesdropper
title_fullStr Partially Collaborative Storage Codes in the Presence of an Eavesdropper
title_full_unstemmed Partially Collaborative Storage Codes in the Presence of an Eavesdropper
title_sort partially collaborative storage codes in the presence of an eavesdropper
publishDate 2016
url https://hdl.handle.net/10356/103743
http://hdl.handle.net/10220/40655
http://www.inderscience.com.ezlibproxy1.ntu.edu.sg/info/inarticle.php?artid=76955
_version_ 1759855124106182656