TY - GEN
T1 - Data secrecy in distributed storage systems under exact repair
AU - Goparaju, Sreechakra
AU - Rouayheb, Salim El
AU - Calderbank, Robert
AU - Poor, H. Vincent
PY - 2013
Y1 - 2013
N2 - The problem of securing data against eavesdropping in distributed storage systems is studied. The focus is on systems that use linear codes and implement exact repair to recover from node failures. The maximum file size that can be stored securely is determined for systems in which all the available nodes help in repair (i.e., repair degree d = n-1, where n is the total number of nodes) and for any number of compromised nodes. Similar results in the literature are restricted to the case of at most two compromised nodes. Moreover, new explicit upper bounds are given on the maximum secure file size for systems with d < n - 1. The key ingredients for the contribution of this paper are new results on subspace intersection for the data downloaded during repair. The new bounds imply the interesting fact that the maximum amount of data that can be stored securely decreases exponentially with the number of compromised nodes. Whether this exponential decrease is fundamental or is a consequence of the exactness and linearity constraints remains an open question.
AB - The problem of securing data against eavesdropping in distributed storage systems is studied. The focus is on systems that use linear codes and implement exact repair to recover from node failures. The maximum file size that can be stored securely is determined for systems in which all the available nodes help in repair (i.e., repair degree d = n-1, where n is the total number of nodes) and for any number of compromised nodes. Similar results in the literature are restricted to the case of at most two compromised nodes. Moreover, new explicit upper bounds are given on the maximum secure file size for systems with d < n - 1. The key ingredients for the contribution of this paper are new results on subspace intersection for the data downloaded during repair. The new bounds imply the interesting fact that the maximum amount of data that can be stored securely decreases exponentially with the number of compromised nodes. Whether this exponential decrease is fundamental or is a consequence of the exactness and linearity constraints remains an open question.
UR - http://www.scopus.com/inward/record.url?scp=84883442288&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84883442288&partnerID=8YFLogxK
U2 - 10.1109/NetCod.2013.6570831
DO - 10.1109/NetCod.2013.6570831
M3 - Conference contribution
AN - SCOPUS:84883442288
SN - 9781479908233
T3 - 2013 International Symposium on Network Coding, NetCod 2013
BT - 2013 International Symposium on Network Coding, NetCod 2013
T2 - 2013 International Symposium on Network Coding, NetCod 2013
Y2 - 7 June 2013 through 9 June 2013
ER -