Information-Theoretically Secure Erasure Codes for Distributed Storage

From MaRDI portal
Publication:4566732

DOI10.1109/TIT.2017.2769101zbMATH Open1390.94867arXiv1508.03787OpenAlexW2963136329MaRDI QIDQ4566732FDOQ4566732


Authors: Korlakai Vinayak Rashmi, Nihar B. Shah, Kannan Ramchandran, P. Vijay Kumar Edit this on Wikidata


Publication date: 27 June 2018

Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)

Abstract: Repair operations in distributed storage systems potentially expose the data to malicious acts of passive eavesdroppers or active adversaries, which can be detrimental to the security of the system. This paper presents erasure codes and repair algorithms that ensure security of the data in the presence of passive eavesdroppers and active adversaries, while maintaining high availability, reliability and efficiency in the system. Our codes are optimal in that they meet previously proposed lower bounds on the storage, network-bandwidth, and reliability requirements for a wide range of system parameters. Our results thus establish the capacity of such systems. Our codes for security from active adversaries provide an additional appealing feature of `on-demand security' where the desired level of security can be chosen separately for each instance of repair, and our algorithms remain optimal simultaneously for all possible levels. The paper also provides necessary and sufficient conditions governing the transformation of any (non-secure) code into one providing on-demand security.


Full work available at URL: https://arxiv.org/abs/1508.03787







Cited In (4)





This page was built for publication: Information-Theoretically Secure Erasure Codes for Distributed Storage

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4566732)