Coding for Trusted Storage in Untrusted Networks

We focus on the problem of secure distributed storage over multiple untrusted clouds or networks. Our main contribution is a low complexity scheme that relies on erasure coding techniques for achieving prescribed levels of confidentiality and reliability. Using matrices that have no singular square...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on information forensics and security Vol. 7; no. 6; pp. 1890 - 1899
Main Authors Oliveira, Paulo F., Lima, Luísa, Vinhoza, Tiago T. V., Barros, João, Medard, Muriel
Format Journal Article
LanguageEnglish
Published IEEE 01.12.2012
Subjects
Online AccessGet full text
ISSN1556-6013
1556-6021
DOI10.1109/TIFS.2012.2217331

Cover

Loading…
More Information
Summary:We focus on the problem of secure distributed storage over multiple untrusted clouds or networks. Our main contribution is a low complexity scheme that relies on erasure coding techniques for achieving prescribed levels of confidentiality and reliability. Using matrices that have no singular square submatrices, we subject the original data to a linear transformation. The resulting coded symbols are then stored in different networks. This scheme allows users with access to a threshold number of networks to reconstruct perfectly the original data, while ensuring that eavesdroppers with access to any number of networks smaller than this threshold are unable to decode any of the original symbols. This holds even if the attackers are able to guess some of the missing symbols. We further quantify the achievable level of security, and analyze the complexity of the proposed scheme.
ISSN:1556-6013
1556-6021
DOI:10.1109/TIFS.2012.2217331