Skip to main content
Top

2018 | OriginalPaper | Chapter

QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage

Authors : Chong Wang, Ke Zhou, Ronglei Wei

Published in: Cloud Computing and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To address the reliability and privacy concerns in cloud storage systems, we present a quasi-systematic erasure code with partial security, referred to as QS-code. As a new family of maximum distance separable (MDS) codes, it has a number of advantages, privacy-preserving, efficient and reliable in data access and storage. In QS-code, the coded data maintain the originality of one of the two data blocks in the original file, allowing for efficient data accessing, while preserving the privacy of the other. Results of our experiment showed that QS-code outperforms encryption technology in computational efficiency.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Adeli, M., Liu, H.: On the inherent security of linear network coding. IEEE Commun. Lett. 17(8), 1668–1671 (2013)CrossRef Adeli, M., Liu, H.: On the inherent security of linear network coding. IEEE Commun. Lett. 17(8), 1668–1671 (2013)CrossRef
2.
go back to reference Bhattad, K.: Weakly secure network coding. In: The Workshop on Network Coding, pp. 281–285 (2005) Bhattad, K.: Weakly secure network coding. In: The Workshop on Network Coding, pp. 281–285 (2005)
3.
go back to reference Dau, S.H., Skachek, V., Chee, Y.M.: On the security of index coding with side information. IEEE Trans. Inf. Theory 58(6), 3975–3988 (2012)MathSciNetCrossRef Dau, S.H., Skachek, V., Chee, Y.M.: On the security of index coding with side information. IEEE Trans. Inf. Theory 58(6), 3975–3988 (2012)MathSciNetCrossRef
4.
go back to reference Dau, S.H., Song, W., Yuen, C.: On block security of regenerating codes at the MBR point for distributed storage systems. In: IEEE International Symposium on Information Theory, pp. 1967–1971 (2014) Dau, S.H., Song, W., Yuen, C.: On block security of regenerating codes at the MBR point for distributed storage systems. In: IEEE International Symposium on Information Theory, pp. 1967–1971 (2014)
5.
go back to reference Dau, S.H., Song, W., Yuen, C.: Secure erasure codes with partial decodability. In: IEEE International Conference on Communications, pp. 388–394 (2014) Dau, S.H., Song, W., Yuen, C.: Secure erasure codes with partial decodability. In: IEEE International Conference on Communications, pp. 388–394 (2014)
6.
go back to reference Ernvall, T., Rouayheb, S.E., Hollanti, C., Poor, H.V.: Capacity and security of heterogeneous distributed storage systems. IEEE J. Sel. Areas Commun. 31(12), 2701–2709 (2013)CrossRef Ernvall, T., Rouayheb, S.E., Hollanti, C., Poor, H.V.: Capacity and security of heterogeneous distributed storage systems. IEEE J. Sel. Areas Commun. 31(12), 2701–2709 (2013)CrossRef
7.
go back to reference Hu, P., Sung, C.W., Ho, S., Chan, T.H.: Optimal coding and allocation for perfect secrecy in multiple clouds. IEEE Trans. Inf. Forensics Secur. 11(2), 388–399 (2016)CrossRef Hu, P., Sung, C.W., Ho, S., Chan, T.H.: Optimal coding and allocation for perfect secrecy in multiple clouds. IEEE Trans. Inf. Forensics Secur. 11(2), 388–399 (2016)CrossRef
8.
go back to reference Huang, K., Parampalli, U., Xian, M.: On secrecy capacity of minimum storage regenerating codes. IEEE Trans. Inf. Theory PP(99), 1 (2015)MATH Huang, K., Parampalli, U., Xian, M.: On secrecy capacity of minimum storage regenerating codes. IEEE Trans. Inf. Theory PP(99), 1 (2015)MATH
9.
go back to reference Kadhe, S., Sprintson, A.: Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes. arXiv preprint arXiv:1710.06753 (2017) Kadhe, S., Sprintson, A.: Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes. arXiv preprint arXiv:​1710.​06753 (2017)
10.
go back to reference Lacan, J., Fimes, J.: Systematic mds erasure codes based on vandermonde matrices. IEEE Commun. Lett. 8(9), 570–572 (2004)CrossRef Lacan, J., Fimes, J.: Systematic mds erasure codes based on vandermonde matrices. IEEE Commun. Lett. 8(9), 570–572 (2004)CrossRef
11.
go back to reference Lin, H.Y., Tzeng, W.G.: A secure decentralized erasure code for distributed networked storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)CrossRef Lin, H.Y., Tzeng, W.G.: A secure decentralized erasure code for distributed networked storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)CrossRef
12.
go back to reference Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRef Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRef
13.
go back to reference Macwilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. North-Holland (1977) Macwilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. North-Holland (1977)
14.
go back to reference Pawar, S., Rouayheb, S.E., Ramchandran, K.: Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans. Inf. Theory 57(10), 6734–6753 (2011)MathSciNetCrossRef Pawar, S., Rouayheb, S.E., Ramchandran, K.: Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans. Inf. Theory 57(10), 6734–6753 (2011)MathSciNetCrossRef
15.
go back to reference Rashmi, K.V., Shah, N.B., Ramchandran, K., Kumar, P.V.: Information-theoretically secure erasure codes for distributed storage. IEEE Trans. Inf. Theory 64(3), 1621–1646 (2018)MathSciNetCrossRef Rashmi, K.V., Shah, N.B., Ramchandran, K., Kumar, P.V.: Information-theoretically secure erasure codes for distributed storage. IEEE Trans. Inf. Theory 64(3), 1621–1646 (2018)MathSciNetCrossRef
16.
18.
go back to reference Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: IEEE Information Theory Workshop on Networking and information theory, ITW 2009, pp. 281–285 (2009) Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: IEEE Information Theory Workshop on Networking and information theory, ITW 2009, pp. 281–285 (2009)
19.
go back to reference Tang, H., Liu, F., Shen, G., Jin, Y., Guo, C.: UniDrive: synergize multiple consumer cloud storage services. In: Middleware Conference, pp. 137–148 (2015) Tang, H., Liu, F., Shen, G., Jin, Y., Guo, C.: UniDrive: synergize multiple consumer cloud storage services. In: Middleware Conference, pp. 137–148 (2015)
20.
go back to reference Yan, M., Sprintson, A., Zelenko, I.: Weakly secure data exchange with generalized reed solomon codes. In: IEEE International Symposium on Information Theory, pp. 1366–1370 (2014) Yan, M., Sprintson, A., Zelenko, I.: Weakly secure data exchange with generalized reed solomon codes. In: IEEE International Symposium on Information Theory, pp. 1366–1370 (2014)
21.
go back to reference Zhang, P., Jiang, Y., Lin, C., Fan, Y., Shen, X.: P-coding: secure network coding against eavesdropping attacks. In: Conference on Information Communications, pp. 2249–2257 (2010) Zhang, P., Jiang, Y., Lin, C., Fan, Y., Shen, X.: P-coding: secure network coding against eavesdropping attacks. In: Conference on Information Communications, pp. 2249–2257 (2010)
22.
go back to reference Zhang, X., Liu, C., Nepal, S., Chen, J.: An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5), 542–555 (2013)MathSciNetCrossRef Zhang, X., Liu, C., Nepal, S., Chen, J.: An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5), 542–555 (2013)MathSciNetCrossRef
23.
go back to reference Zhang, X., Liu, C., Nepal, S., Pandey, S., Chen, J.: A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1192–1202 (2013)CrossRef Zhang, X., Liu, C., Nepal, S., Pandey, S., Chen, J.: A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1192–1202 (2013)CrossRef
Metadata
Title
QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage
Authors
Chong Wang
Ke Zhou
Ronglei Wei
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_19

Premium Partner