Filters








162,149 Hits in 6.4 sec

Security in Twin-code framework

Ninoslav Marina, Aneta Velkoska, Natasha Paunkoska, Ljupcho Baleski
2015 2015 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)  
We prove that this Twin MDS code framework gives better performance than MBR codes and equal with MSR codes in the distribution process and investigate its security performance comparing with the security  ...  We constructed a distributed storage system, Twin MDS code framework which is more efficient than the regenerating codes based storage systems.  ...  We proved that when the eavesdropper has an access in the stored data, the secure file size in this new storage framework is greater than the secure file size in the DSS modeled with MBR codes, for β =  ... 
doi:10.1109/icumt.2015.7382437 dblp:conf/icumt/MarinaVPB15 fatcat:6c7foqtrrvddhfgcgqa7z3w65m

Secure Code Based Mostly Information Forwarding System in Cloud Storage

G.Shaik Abdullah
2014 IOSR Journal of Computer Engineering  
With this thought, we tend to propose a completely unique proxy re-encryption theme and integrate it with a secure redistributed code to create a secure distributed wares area structure.  ...  Our system meets the wants that storage servers severally perform re-coding and key servers severally perform partial coding.  ...  Use proxy re-encryption to permit for access management while not granting full coding rights to the access management server.  ... 
doi:10.9790/0661-16225357 fatcat:63fiq2mlxbcr7hafup73iousi4

Fault-tolerant and secure distributed data storage using random linear network coding

Pouya Ostovari, Jie Wu
2016 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)  
In this work, we perform a trade-off between security of a distributed storage system and its fault tolerance.  ...  Also, it can be used in distributed storage systems to store a large data on different storages and provide fault tolerance against storage failures.  ...  SYSTEM MODEL We consider a distributed data storage system, which contains n storages. Each of these data storages might fail with a given probability.  ... 
doi:10.1109/wiopt.2016.7492920 dblp:conf/wiopt/Ostovari016 fatcat:3orurdl3brbgnmxvnagcje72li

Identity Broadcast Virtual Proxy for Centralized Cloud Server

Roshitha P P, Sneha T Subramanian, T Sivakumar
2017 International Journal of Engineering Research and  
A secured distributed storage system is formulated using a secured threshold proxy re-encryption server that integrates with a decentralized erasure code.  ...  Online storing and retrieving data in third party's cloud system causes serious conflict over data security and data confidentiality during the data transactions.  ...  Multiple users can interact with the storage system. The distributed storage system supports secure and robust data storage and retrieval.  ... 
doi:10.17577/ijertv6is050243 fatcat:r37dmypsxrfspbaymtrjntpcz4

Special focus on distributed storage coding

Xiaohu Tang, Shu-Tao Xia, Chao Tian, Qin Huang, Xiang-Gen Xia
2018 Science China Information Sciences  
The paper "Storage and repair bandwidth tradeoff for distributed storage systems with clusters and separate nodes" investigates the optimal tradeoff for the cluster DSSs under general storage/repair parameters  ...  The survey paper "Erasure coding for distributed storage: an overview" provides an overview of the advances in erasure coding with efficient repairs that have taken place in the past decade; in particular  ...  The paper "New results on multilevel diversity coding with secure regeneration" characterizes the minimum-bandwidthregeneration (MBR) point of the achievable normalized storage-capacity repair-bandwidth  ... 
doi:10.1007/s11432-018-9550-y fatcat:5d3y7vrkqbai5bkhjap6o6af3i

Information-Theoretically Secure Regenerating Codes for Distributed Storage

N. B. Shah, K. V. Rashmi, P. V. Kumar
2011 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011  
Regenerating codes are a class of codes for distributed storage networks that provide reliability and availability of data, and also perform efficient node repair.  ...  Another important aspect of a distributed storage network is its security.  ...  Definition 1 ({ , } secure distributed storage system): Consider a distributed storage system in which an eavesdropper gains access to the data stored in some ( − ) nodes, and the data stored as well as  ... 
doi:10.1109/glocom.2011.6133754 dblp:conf/globecom/ShahRK11 fatcat:vhgcdfmsyfhodiovdgxt66a6su

Information-theoretically Secure Regenerating Codes for Distributed Storage [article]

Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar
2011 arXiv   pre-print
Regenerating codes are a class of codes for distributed storage networks that provide reliability and availability of data, and also perform efficient node repair.  ...  Another important aspect of a distributed storage network is its security.  ...  Definition 1 ({ℓ, ℓ ′ } secure distributed storage system): Consider a distributed storage system in which an eavesdropper gains access to the data stored in some (ℓ − ℓ ′ ) nodes, and the data stored  ... 
arXiv:1107.5279v1 fatcat:rvnq2uy6p5fjxbpmsruvccxzxy

SECURITY IN DISTRIBUTED STORAGE SYSTEMS – ENCRYPTION ALGORITHM VS. CODING SCHEMES

Nataša Paunkoska
2019 Journal of Electrical Engineering and Information Technologies  
The concept for data distribution and storage play important role for obtaining efficient, reliable and secure system.  ...  A b s t r a c t: Distributed storage systems (DSS) are crucial for managing large amount of data produced on daily bases.  ...  The goal of this paper is to appoint which are the vulnerable points in the distributed storage system with respect of security attacks.  ... 
doi:10.51466/jeeit1941-2051p fatcat:hdzhkitrarfxdjtpimokblibpm

Security in locally repairable storage

Abhishek Agarwal, Arya Mazumdar
2015 2015 IEEE Information Theory Workshop (ITW)  
In other words, we propose to study a locally repairable distributed storage system that is secure against a passive eavesdropper that can observe some subsets of nodes.  ...  We provide a number of results related to such systems including upper-bounds and achievability results on the number of bits that can be securely stored with these constraints.  ...  SECURITY FOR SCHEMES WITH CO-OPERATIVE REPAIR Co-operative repair for a locally repairable scheme addresses simultaneous multiple failures in a distributed storage system.  ... 
doi:10.1109/itw.2015.7133116 dblp:conf/itw/AgarwalM15 fatcat:4ewatucrjnhk7klxqc6lbhah4m

A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification

S.V. Divya, R.S. Shaji, P. Venkadesh
2014 Research Journal of Applied Sciences Engineering and Technology  
The aim of the study is to propose an integrated encrypting, encoding, forwarding and online alert scheme with a decentralized scattered code such that a secure distributed and forward storage system is  ...  To build a secure storage data forwarding system with dynamic online alerts that serves multiple functions is challenging when the storage system is distributed and has no dominant authority.  ...  which constructs a secure decentralized erasure code with low storage cost.  ... 
doi:10.19026/rjaset.7.625 fatcat:7lhykqc36bdlvaptwn3buy6gbm

Security in Locally Repairable Storage

Abhishek Agarwal, Arya Mazumdar
2016 IEEE Transactions on Information Theory  
In other words, we propose to study a locally repairable distributed storage system that is secure against a passive eavesdropper that can observe some subsets of nodes.  ...  We provide a number of results related to such systems including upper-bounds and achievability results on the number of bits that can be securely stored with these constraints.  ...  SECURITY FOR SCHEMES WITH CO-OPERATIVE REPAIR Co-operative repair for a locally repairable scheme addresses simultaneous multiple failures in a distributed storage system.  ... 
doi:10.1109/tit.2016.2605118 fatcat:kp4tlnq33baztlnqzbz62rvlae

Regional Financial Data Processing Based on Distributed Decoding Technology

You Zhou, Xingsi Xue
2022 Security and Communication Networks  
Aiming at the problems of low storage efficiency, small storage space, and poor stability of traditional financial data storage systems, a dynamic and secure financial data storage system based on distributed  ...  In addition, a distributed security computing scheme based on hierarchical coding is proposed, and the influence of different subtask sizes and different computing layers on the scheme is analyzed.  ...  In addition, for the matrix multiplication problem under distributed security coding, Yang and Lee proposed a distributed security computing method based on polynomial code [15] , but the completion time  ... 
doi:10.1155/2022/1043140 fatcat:t3wgg77lgjealkfwvutrnlyipu

Symptoms Based Treatment Based on Personal Health Record Using Cloud Computing

P. Dhivya, S. Roobini, A. Sindhuja
2015 Procedia Computer Science  
A secured threshold proxy re-encryption server and integrates it with a decentralized erasure code such that a secure distributed storage system.  ...  To generate proxy re-encryption key for one-time data access. A proxy server will be created virtually for one time data access.  ...  A secured threshold proxy re-encryption server and integrates it with a decentralized erasure code such that a secure distributed storage system.  ... 
doi:10.1016/j.procs.2015.03.179 fatcat:h7u3psfxobel5hx6m52m2u3d7e

Enhanced Secured Communication Optimization In Data Packets Using Proxy Protocols

Shahul Hameed A, Dr. A. Shaji George, Bashiru Aremu, Digvijay Pandey
2021 International Journal of Intelligent Communication, Computing and Networks  
Essentially distributed storage engineering would provide a range of higher performing capacity staff that provides long-term internet storage management and even the distributed storage architecture.  ...  The principle objective of this paper is to build up a Computational Private Information Retrieval conventions on cloud design utilizing deletion code for made sure about information sending.  ...  Accessibility is an extraordinarily desirable yet negligibly built ability system property. Although  ... 
doi:10.51735/ijiccn/001/15 fatcat:jowl3dbbqjer7lxbobxe3kwpzu

Secrecy and Accessibility in Distributed Storage [article]

Lukas Holzbaur, Stanislav Kruglik, Alexey Frolov, Antonia Wachter-Zeh
2020 arXiv   pre-print
A distributed storage system (DSS) needs to be efficiently accessible and repairable.  ...  We establish the capacity for the alphabet independent case and give an explicit code construction. For the alphabet-dependent case we give existence results based on a random coding argument.  ...  SMALL FIELDS In Section IV, we showed how to find an optimal t-collusion secure storage code over F q with optimal access complexity r = t + 1 for all parameters (n, k, d, t) whenever n ≥ q.  ... 
arXiv:2001.05337v1 fatcat:fb4en3y7jfbvlo5k25d4jffhcu
« Previous Showing results 1 — 15 out of 162,149 results