Securing distributed storage systems based on arbitrary regenerating codes
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes a coding scheme to securely store a secret file in a distributed storage system that uses an arbitrary regenerating code. Our scheme encodes the secret file to the input of a certain regenerating code by using the coset coding scheme with a maximum rank distance (MRD) code. We show that our scheme can protect the secret file from being leaked to an eavesdropper in the distributed storage system. Existing security schemes for distributed storage systems are based on specific regenerating codes, and they cannot be used with other regenerating codes. In contrast, our scheme can guarantee the security against the eavesdropper independently of the construction of the underlying regenerating code.
- The Institute of Electronics, Information and Communication Engineersの論文
著者
-
Kurihara Jun
Kddi R&d Laboratories Inc.
-
Miyake Yutaka
Kddi R & D Labs. Inc.
-
Kurihara Jun
KDDI R&D Laboratories, Inc.
関連論文
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme
- A-7-3 Revocation and Addition Mechanisms for Fast (k, n)-Threshold Schemes
- On a Fast (K, n)-Threshold Secret Sharing Scheme
- A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
- (Network Services Basics) Notification of Certificate Revocation Status between Different Domains under a PKI System ( Object-Oriented Technologies)
- A-7-9 Key Management for Privacy Protection in Sensor Information Network using Threshold Cryptography
- A-7-18 Proposal of Privacy Protection Mechanism for Sensor Information Network
- TCP Gateway for Satellite-based Internet Service Considering Accommodation of Multiple Customers (特集 次世代移動通信ネットワークとその応用)
- Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation
- Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists
- Secure Host Name Resolution Infrastructure for Overlay Networks(Networking Technologies for Overlay Networks)
- Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
- Software Protection Combined with Tamper-Proof Device
- Fast Implementation of KCipher-2 for Software and Hardware
- Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
- FOREWORD
- Securing distributed storage systems based on arbitrary regenerating codes
- BS-7-44 Decodability Attacks in XOR Network Coding