Skip to main content

2018 | OriginalPaper | Buchkapitel

QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage

verfasst von : Chong Wang, Ke Zhou, Ronglei Wei

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

To address the reliability and privacy concerns in cloud storage systems, we present a quasi-systematic erasure code with partial security, referred to as QS-code. As a new family of maximum distance separable (MDS) codes, it has a number of advantages, privacy-preserving, efficient and reliable in data access and storage. In QS-code, the coded data maintain the originality of one of the two data blocks in the original file, allowing for efficient data accessing, while preserving the privacy of the other. Results of our experiment showed that QS-code outperforms encryption technology in computational efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adeli, M., Liu, H.: On the inherent security of linear network coding. IEEE Commun. Lett. 17(8), 1668–1671 (2013)CrossRef Adeli, M., Liu, H.: On the inherent security of linear network coding. IEEE Commun. Lett. 17(8), 1668–1671 (2013)CrossRef
2.
Zurück zum Zitat Bhattad, K.: Weakly secure network coding. In: The Workshop on Network Coding, pp. 281–285 (2005) Bhattad, K.: Weakly secure network coding. In: The Workshop on Network Coding, pp. 281–285 (2005)
3.
Zurück zum Zitat Dau, S.H., Skachek, V., Chee, Y.M.: On the security of index coding with side information. IEEE Trans. Inf. Theory 58(6), 3975–3988 (2012)MathSciNetCrossRef Dau, S.H., Skachek, V., Chee, Y.M.: On the security of index coding with side information. IEEE Trans. Inf. Theory 58(6), 3975–3988 (2012)MathSciNetCrossRef
4.
Zurück zum Zitat Dau, S.H., Song, W., Yuen, C.: On block security of regenerating codes at the MBR point for distributed storage systems. In: IEEE International Symposium on Information Theory, pp. 1967–1971 (2014) Dau, S.H., Song, W., Yuen, C.: On block security of regenerating codes at the MBR point for distributed storage systems. In: IEEE International Symposium on Information Theory, pp. 1967–1971 (2014)
5.
Zurück zum Zitat Dau, S.H., Song, W., Yuen, C.: Secure erasure codes with partial decodability. In: IEEE International Conference on Communications, pp. 388–394 (2014) Dau, S.H., Song, W., Yuen, C.: Secure erasure codes with partial decodability. In: IEEE International Conference on Communications, pp. 388–394 (2014)
6.
Zurück zum Zitat Ernvall, T., Rouayheb, S.E., Hollanti, C., Poor, H.V.: Capacity and security of heterogeneous distributed storage systems. IEEE J. Sel. Areas Commun. 31(12), 2701–2709 (2013)CrossRef Ernvall, T., Rouayheb, S.E., Hollanti, C., Poor, H.V.: Capacity and security of heterogeneous distributed storage systems. IEEE J. Sel. Areas Commun. 31(12), 2701–2709 (2013)CrossRef
7.
Zurück zum Zitat Hu, P., Sung, C.W., Ho, S., Chan, T.H.: Optimal coding and allocation for perfect secrecy in multiple clouds. IEEE Trans. Inf. Forensics Secur. 11(2), 388–399 (2016)CrossRef Hu, P., Sung, C.W., Ho, S., Chan, T.H.: Optimal coding and allocation for perfect secrecy in multiple clouds. IEEE Trans. Inf. Forensics Secur. 11(2), 388–399 (2016)CrossRef
8.
Zurück zum Zitat Huang, K., Parampalli, U., Xian, M.: On secrecy capacity of minimum storage regenerating codes. IEEE Trans. Inf. Theory PP(99), 1 (2015)MATH Huang, K., Parampalli, U., Xian, M.: On secrecy capacity of minimum storage regenerating codes. IEEE Trans. Inf. Theory PP(99), 1 (2015)MATH
9.
Zurück zum Zitat Kadhe, S., Sprintson, A.: Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes. arXiv preprint arXiv:1710.06753 (2017) Kadhe, S., Sprintson, A.: Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes. arXiv preprint arXiv:​1710.​06753 (2017)
10.
Zurück zum Zitat Lacan, J., Fimes, J.: Systematic mds erasure codes based on vandermonde matrices. IEEE Commun. Lett. 8(9), 570–572 (2004)CrossRef Lacan, J., Fimes, J.: Systematic mds erasure codes based on vandermonde matrices. IEEE Commun. Lett. 8(9), 570–572 (2004)CrossRef
11.
Zurück zum Zitat Lin, H.Y., Tzeng, W.G.: A secure decentralized erasure code for distributed networked storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)CrossRef Lin, H.Y., Tzeng, W.G.: A secure decentralized erasure code for distributed networked storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)CrossRef
12.
Zurück zum Zitat Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRef Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012)CrossRef
13.
Zurück zum Zitat Macwilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. North-Holland (1977) Macwilliams, F.J., Sloane, N.J.A.: The Theory of Error-correcting Codes. North-Holland (1977)
14.
Zurück zum Zitat Pawar, S., Rouayheb, S.E., Ramchandran, K.: Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans. Inf. Theory 57(10), 6734–6753 (2011)MathSciNetCrossRef Pawar, S., Rouayheb, S.E., Ramchandran, K.: Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans. Inf. Theory 57(10), 6734–6753 (2011)MathSciNetCrossRef
15.
Zurück zum Zitat Rashmi, K.V., Shah, N.B., Ramchandran, K., Kumar, P.V.: Information-theoretically secure erasure codes for distributed storage. IEEE Trans. Inf. Theory 64(3), 1621–1646 (2018)MathSciNetCrossRef Rashmi, K.V., Shah, N.B., Ramchandran, K., Kumar, P.V.: Information-theoretically secure erasure codes for distributed storage. IEEE Trans. Inf. Theory 64(3), 1621–1646 (2018)MathSciNetCrossRef
16.
17.
18.
Zurück zum Zitat Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: IEEE Information Theory Workshop on Networking and information theory, ITW 2009, pp. 281–285 (2009) Silva, D., Kschischang, F.R.: Universal weakly secure network coding. In: IEEE Information Theory Workshop on Networking and information theory, ITW 2009, pp. 281–285 (2009)
19.
Zurück zum Zitat Tang, H., Liu, F., Shen, G., Jin, Y., Guo, C.: UniDrive: synergize multiple consumer cloud storage services. In: Middleware Conference, pp. 137–148 (2015) Tang, H., Liu, F., Shen, G., Jin, Y., Guo, C.: UniDrive: synergize multiple consumer cloud storage services. In: Middleware Conference, pp. 137–148 (2015)
20.
Zurück zum Zitat Yan, M., Sprintson, A., Zelenko, I.: Weakly secure data exchange with generalized reed solomon codes. In: IEEE International Symposium on Information Theory, pp. 1366–1370 (2014) Yan, M., Sprintson, A., Zelenko, I.: Weakly secure data exchange with generalized reed solomon codes. In: IEEE International Symposium on Information Theory, pp. 1366–1370 (2014)
21.
Zurück zum Zitat Zhang, P., Jiang, Y., Lin, C., Fan, Y., Shen, X.: P-coding: secure network coding against eavesdropping attacks. In: Conference on Information Communications, pp. 2249–2257 (2010) Zhang, P., Jiang, Y., Lin, C., Fan, Y., Shen, X.: P-coding: secure network coding against eavesdropping attacks. In: Conference on Information Communications, pp. 2249–2257 (2010)
22.
Zurück zum Zitat Zhang, X., Liu, C., Nepal, S., Chen, J.: An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5), 542–555 (2013)MathSciNetCrossRef Zhang, X., Liu, C., Nepal, S., Chen, J.: An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud. J. Comput. Syst. Sci. 79(5), 542–555 (2013)MathSciNetCrossRef
23.
Zurück zum Zitat Zhang, X., Liu, C., Nepal, S., Pandey, S., Chen, J.: A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1192–1202 (2013)CrossRef Zhang, X., Liu, C., Nepal, S., Pandey, S., Chen, J.: A privacy leakage upper bound constraint-based approach for cost-effective privacy preserving of intermediate data sets in cloud. IEEE Trans. Parallel Distrib. Syst. 24(6), 1192–1202 (2013)CrossRef
Metadaten
Titel
QS-Code: A Quasi-Systematic Erasure Code with Partial Security for Cloud Storage
verfasst von
Chong Wang
Ke Zhou
Ronglei Wei
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-00012-7_19