On Secret Sharing Schemes based on Regenerating Codes
|
|
- Felix Harrington
- 5 years ago
- Views:
Transcription
1 On Secret Sharing Schemes base on Regenerating Coes Masazumi Kurihara (University of Electro-Communications) 0 IEICE General Conference Okayama Japan 0- March 0. (Proc. of 0 IEICE General Conference AS-- pp.s7-s8)
2 Data file Distribute Storage System (Secret Sharing Scheme?) Network encoing Data Collector (Reconstruction) Helper noe Helper noe Helper noe Faile noe (Repair the faile noe) (Regeneration)
3 Regenerating Coes A.G.Dimakis P.B.Gofrey Y.Wu M.J.Wainwright K.Ramchanran Network Coing for Distribute Storage Systems IEEE IT Trans. Vol.6 no [Dimakis et al.00] Repair Problem ( --- symmetry --- ) -- Repairing a faile noe -- Regenerating ata that was store in the faile noe
4 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage (The results of Dimakis et al.). Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes)
5 Keywors an their relation Coes for Distribute Storage Reconstruction(Recovery) Erasure coes (MDS coes RS coes etc.) Reconstruction an Regeneration Regenerating coes Network Coing (for multicast non-multicast) Liner network Coing Ranom linear network Coing Secret Sharing MDS-coe-base Secret Sharing Regenerating-coe-base Secret Sharing (Secure Regenerating Coes)
6 Distribute Storage using ( n k ) MDS coes ( n ) MDS coe ( n k ) MDS coe Message (one symbol) Noe Noe Share DC Message ( k symbols) Noe Noe Share k DC Noe k Noe n at most n- faile noes Noe n Traeoff between Reunancy an Reliability at most n-k faile noes Performance metric 6
7 Regenerating Coes Collection of six parameters ( n k α B ) Reconstruction property A ata collector can reconstruct the original ata by using the ata ownloae from any k active noes. Regeneration property A faile noe can regenerate the ata which was store in itself by using the ata ownloae from any active noes. Erasure coes Regenerating coes 7
8 message B= 6 (Message size) Noe u u u 6 encoing Message Encoing an Shares (Share size = storage ) Noe c c Noe Noe Noe Share α= c c c c c c c c ( n k α B ) n= (Total number of noes in a network) 8
9 message B= 6 (message size) u u u u u 6 encoing n= Reconstruction Property( k ) Share α= (Share size = storage ) c c c c c c c c c c ( n k α B ) c c c c c c k= k shares provie is the minimum ata for reconstructing the original message. DC Reconstruction u u u 6 Original message 9
10 Maintaining the reliable istribute storage system (Repair a faile noe i.e. regenerate the share of it) cut Share α= message B= 6 c c u u u 6 c c c c Faile noe c c c c 0
11 Regeneration by reconstruction message B= 6 u u u 6 encoing cut Share α= c c c c c c c c c c c Share c c c c c k= The original message Repair-Banwith kα=x=6(=b) Reconstruction u u u 6 c c encoing
12 message B= 6 u u u 6 encoing Point ( k ) Regeneration Property ( an ) cut Share α= (Share size = storage ) c c c c c c c c c c ( n k α B ) = (piece size ) = Repair-Banwith =x= (<6=B) Repair the faile noe -vector = ( ) = (piece-vector size ) Regeneration Noe c c ( Exact-regeneration )
13 message B= 6 u u u u u 6 encoing cut Share α= (Share size = storage ) c c c c c c c c Why k? If <k then = (piece size ) ( =<=k ) = Repair the faile noes Noe Noe Noe Repair-Banwith x k = x c c c c c c skip c c k shares provie is the minimum ata for reconstructing the message.
14 . Reucing the repair-banwith ( Fixe k an ). Traeoff between Storage α an Repair-Banwith message B u u u 6 encoing cut Share α (Share size = Storage ) c c c c c c c c c c Trae-off (piece size ) Repair-Banwith Repair the faile noe -vector = ( ) (piece-vector size ) Regeneration Noe c c
15 Traeoff between Storage α an Repair-Banwith Banwith to repair one noe / / /9 O Minimum Storage Regenerating(MSR) point (α) point / /8 /9 Storage per noe α ( B= k= = ) Minimum Banwith Regenerating(MBR) point α
16 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage. Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes) 6
17 (Linear) Network Coing for multicast t Single source s terminal t i terminal Capacity for network coe for multicast mim{maxflow( s t i ) i =... m} t m terminal 7
18 Max-flow min-cut theorem Min-cut t s isjoint path t Max-flow from source s to terminal t_{} maxflow( s t ) = Information flow graph 8
19 Repairable istribute storage system ( Network coing for multicast )(/) Repaire noes k Message B DC k DC n- n Keep n active noes in a network 9
20 Repairable istribute storage system ( Network coing for multicast )(/) k Message B DC k DC n- n 0
21 Repairable istribute storage system ( Network coing for multicast )(/) k Message B Multicast DC k DC n- n
22 Capacity for (nkαb)regenerating Coes(/) isjoint path k Message B DC k DC n- n
23 Capacity for (nkαb)regenerating Coes(/) k Message B DC - α α in out - in α Zoom in out in α out k DC
24 Capacity for (nkαb)regenerating Coes(/) Message B - in α out in - α out in α out k DC isjoint path Flow from Source to DC
25 Capacity for (nkαb)regenerating Coes(/) Message B - in α out in α out k - in α out DC isjoint path
26 Capacity for (nkαb)regenerating Coes(/) Message B in α min{ α } - out in α out k isjoint path min{ (-) α } - in α min{ (-) α } out DC The Capacity C for (nkαb)regenerating Coes Min-cut C = k i= min{( i + ) α} B Information flow graph 6
27 MSR an MBR points (α) Capacity for (nkαb) regenerating coes Minimum Storage Regenerating(MSR) point Minimum Banwith Regenerating(MBR) point 7 = + = k i i C } ) min{( α + = = ) ( k k B α α + = = ) ( k k B α
28 Traeoff between Storage α an Repair-Banwith Banwith to repair one noe / / /9 O Minimum Storage Regenerating(MSR) point (α) point / /8 /9 Storage per noe α ( B= k= = ) Minimum Banwith Regenerating(MBR) point α 8
29 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage. Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes) 9
30 Exact vs. Functional Regeneration [Rashmi et al.0] Functional-Regeneration(Functional-Repair) The resulting network of n noes continues to possess reconstruction an regeneration properties Exact-Regeneration(Exact-Repair) The repaire noe stores exactly the same ata as was store in it prior to failure. Functional-Repair Partial Exact-Repair Exact-Repair (Creit : Fig. in [Suh et al. 00]) 0
31 Coes for regenerations Functional-Regeneration Network Coing for multicast (Multicasting Problem on information flow graph) [Dimakis et al.007][wu et al.007] [Dimakis et al.00] Partial Exact-Regeneration Interference alignment (MSR coes =n-)[shah et al.00] ( MSR coes with systematic-noes an parity-noes ) Exact-Regeneration Interference alignment (MSR coes) [Suh et al.0] [Shah et al.0b] Complete graph an MDS coe (MBR coes) [Shah et al. 0a] Prouct-Matrix framework [Rashmi et al.0] (nk) MBR coes for all values of (nk) (nk) MSR coes for all values of (nk) >=k- (the first- general- explicit- exact-constructions of MSR an MBR coes)
32 MSR coes by Interference alignment (Fig. in [Suh et al.00]) ( n= k=α= = = B= ) MSR coe example Share (size α=) Systematic noe a a Message B= a a b b Parity noe a a a a b b + b + b + b + b = Regeneration b + b a + + a + b b a + a + b + b piece (size =) piece (size =) piece (size =) Noe a a
33 MBR an MSR coes on Prouct-Matrix framework [Rashmi et al.0] Using the property of symmetric matrices such that if a matrix M is a symmetric matrix then where M A ( t t AM ) = MA : x : x symmetric matrix matrix AB ( AB) t BA example BA t since t t t t M A = ( A M ) = ( A M ) M = M t
34 ( n k )MBR coes n by complete graph an ( B )MDS coe[shah et al.0](/) k (=α=n- = B= (n-)k - ) example (n= k==α= = B=6) MBR coe Share message u u 6 c c c c c c c c c 6 c c c c c c c 6 c c 6 Complete graph with n= noes an n eges
35 MBR coes by Complete graph an MDS coe (/) example (n= k==α= = B=6) MBR coe Share message c c c c c c Reconstruction DC u u 6 c c c c c c6 c c c c c6 c c c 6 c Noe Regeneration c c c
36 Contents. Concept of regenerating coes. Relation between network-coing an istribute-storage. Several current regenerating coes. Secret sharing scheme base on regenerating coes (Secure regenerating coes) 6
37 Information flow Share -vector message ( size B ) u u u 6 Share Share c c ( size α ) DC c c c c c c c c c c ( size ) c c Noe Share Reconstruction Regeneration -vector = ( ) c c (size ) 7
38 Secure Regenerating Coes (Secret Sharing base on Regenerating Coes) Share -vector message ( size B ) S secret R Ranom symbols Share Share c c ( size α ) DC c c c c c c c c c c ( size ) c c Noe Share Reconstruction Regeneration -vector = ( ) c c (size ) 8
39 Regeneration by reconstruction message B S S R R R R encoing cut Share α c c c c c c c c c c c Share c c c c c k Entire message c c Repair-Banwith kα=b Reconstruction S S R R R R encoing 9
40 Regeneration by regenerating coes cut Share α message B S S R R R R encoing c c c c c c c c c c Noe Repair the faile noe -vector = ( ) (piece-vector size ) Regeneration c c Repair-Banwith <B) ( Exact-regeneration ) 0
41 Secure Regenerating Coes (Secret sharing base on Regenerating coes) Exact-Regeneration(MSR an MBR coes) Informationally secure regenerating coes Secure MBR coes Complete graph an MDS coe : [Pawar et al. 0] Prouct-Matrix framework : Secure MSR coes [Kurihara an Kuwakao0]( non-linear ramp scheme) [Shah et al. 0] Prouct-Matrix framework : [Kurihara an Kuwakao0ab] [Kuwakao an Kurihara0] Computationally secure regenerating coes [Kuwakao an Kurihara0] [Shah et al. 0]
42 Computationally-Secure Regenerating(CS-R) coes message [Kuwakao an Kurihara0] Ranom symbols secret Regenerating coe Informationally-Secure Regenerating(IS-R) coe share share Creit: Kuwakao an Kurihara Computationally-Secure Regenerating coe CSS0
43 Computationally-Secure Regenerating(CS-R) coes message Ranom symbols Key Regenerating coe [Kuwakao an Kurihara0] Improve Coing Rate Informational security (IS-R coe) secret encripting ciphertext Regenerating coe Computational security share share Creit: Kuwakao an Kurihara Computationally-Secure Regenerating coe CSS0 share
44 Recall ( n k )MBR coes n by complete graph an ( B )MDS coe[shah et al.0a] (=α=n- = B= (n-)k - k ) example (n= k==α= = B=6) MBR coe Share message u u 6 c c c c c c c c c 6 c c c c c c c 6 c c 6 Complete graph with n= noes an n eges
45 Secure ( n k )MBR coes [Pawar et al. 0] by Complete graph an MDS coe example (n= k==α= = l= ) secure MBR coe Message B=6 u u 6 c c c Share c c c c c c 6 Setting : S :Secret R R... R : Ranom symbols Perfect secrecy for at most two shares Encoing : S R R R R R c c c 6 (Fig. in [Pawar et al. 0]) c c = R for i =... i i 6 = S + R + R R
46 Secure Regenerating Coes (Secret Sharing base on Regenerating Coes) Share -vector message ( size B ) S secret R Ranom symbols Share Share c c ( size α ) DC c c c c c c c c c c ( size ) c c Noe Share Reconstruction Regeneration -vector = ( ) c c (size ) 6
47 Secrecy Capacity for secure regenerating coe [Pawar et al. 0](/) Ranom variables - Secret : - Share : - : - -Vector : C D D ( i f h Reconstruction Property S For any k shares i f D Regeneration Property ( faile noe ) For any pieces for repair the faile noe that is piece-vector ( = n) f = ( D {... n} h {... n}\{ f }) f C C k f H ( S C ) = C k ) ( f 0 D f D f D f H ( C f D f ) = 0 {... n}) f f 7
48 Secrecy Capacity for secure regenerating coe [Pawar et al. 0](/) Regeneration Property ( faile noe ) For any pieces for repair the faile noe D f D f D f that is piece-vector C f H ( C f D f ) = 0 (The share is uniquely etermine from the piece-vector.) H ( S D ) H ( S C f In general f i.e. f since the Markov chain S D f C f. Thus if I( S; ) = 0 then I( S; ) = 0 because D f However it is not always true that H ( D f C f ) 0. ) H ( S) = H ( S D ) H ( S C ) H ( S) f C f f I( S; D ) I( S; C f f ) f D f 8
49 Secrecy Capacity for secure regenerating coe [Pawar et al. 0](/) Secrecy property For m piece-vector D for any m repaire noes f H ( S D D ) H ( S) Secrecy capacity for (n k α B ; m ) secure regeneration coe : C S = C S sup H ( S) H ( S C Ck ) = 0 H ( S D D ) = H ( S) The upper boun of the secrecy capacity : f D fm m f fm = m Reconstruction Property C S k i= m+ min{( i + ) α} Information flow graph 9
50 Conclusions Regenerating coes for istribute storage [Dimakis et al.00] Reconstruction an Regeneration(repair faile noe) Reucing banwith to repair Traeoff between Storage an Repair-Banwith MSR an MBR coes Network coing for istribute storage [Dimakis et al.00] Capacity for regenerating coes Linear network coing for multicast Exact-regeneration vs. Functional-regeneration Secure Regenerating Coes Secret sharing base on (exact-)regenerating coes Share piece an piece-vector 0
51 References(/) [Dimakis et al.00] Dimakis A.G.; Gofrey P.B.; Yunnan Wu; Wainwright M.J.; Ramchanran K.; Network Coing for Distribute Storage Systems Information Theory IEEE Transactions on Volume: 6 Issue: 9 Publication Year: 00 Page(s): 9 [Dimakis et al.007]a. G. Dimakis P. B. Gofrey Y. Wu M. Wainwright an K. Ramchanran "Network coing for istribute storage systems" Proc. IEEE INFOCOM 007 [Wu et al.007]y. Wu A. G. Dimakis an K. Ramchanran "Deterministic regenerating coes for istribute storage" Proc. Allerton Conf. Control Computing an Communication 007 [Rashmi et al.0] Rashmi K.V.; Shah N.B.; Kumar P.V.; Optimal Exact-Regenerating Coes for Distribute Storage at the MSR an MBR Points via a Prouct-Matrix Construction Information Theory IEEE Transactions on Volume: 7 Issue: 8 Publication Year: 0 Page(s): 7-9 [Suh et al.0] Changho Suh; Ramchanran K.; Exact-Repair MDS Coe Construction Using Interference Alignment Information Theory IEEE Transactions on Volume: 7 Issue: Publication Year: 0 Page(s): -
52 References(/) [Shah et al.00]n. B. Shah K. V. Rashmi P. V. Kumar an K. Ramchanran Explicit coes minimizing repair banwith for istribute storage in Proc. IEEE Information Theory Workshop Cairo Egypt Jan.00. [Shah et al.0] Shah N.B.; Rashmi K.V.; Kumar P.V.; Information-Theoretically Secure Regenerating Coes for Distribute Storage Global Telecommunications Conference (GLOBECOM 0) 0 IEEE Publication Year: 0 Page(s): [Shah et al.0a] Shah N.B.; Rashmi K.V.; Vijay Kumar P.; Ramchanran K.; Distribute Storage Coes With Repair-by-Transfer an Nonachievability of Interior Points on the Storage- Banwith Traeoff Information Theory IEEE Transactions on Volume: 8 Issue: 0 Page(s): 87-8 [Shah et al.0b] Shah N. B.; Rashmi K. V.; Kumar P. V.; Ramchanran K.; Interference Alignment in Regenerating Coes for Distribute Storage: Necessity an Coe Constructions Information Theory IEEE Transactions on Volume: 8 Issue: 0 Page(s): - 8 [Pawaer et al.0] Pawar S.; El Rouayheb S.; Ramchanran K.; Securing Dynamic Distribute Storage Systems Against Eavesropping an Aversarial Attacks Information Theory IEEE Transactions on Volume: 7 Issue: 0 0 Page(s): 67-67
53 References(/) [Kurihara an Kuwakao0a]M.Kurihara an H.Kuwakao ``On regenerating coes an secret sharing for istribute storage'' IEICE Technical Report(in Japanese) IT00-6(0-0) pp.-8(in Japanese) Jan. 0. [Kurihara an Kuwakao0b]M.Kurihara an H.Kuwakao `On an extene version of Rashmi-Shah-Kumar regenerating coes an secret sharing for istribute storage'' IEICE Technical Report IT00-(0-0) pp.0-0(in Japanese) Mar. 0. [Kurihara an Kuwakao0c]M.Kurihara an H.Kuwakao ``On ramp secret sharing schemes for istribute storage systems uner repair ynamics'' IEICE Technical Report IT0-7(0-7) pp.-6(in Japanese) July 0. [Kurihara an Kuwakao0]M.Kurihara an H.Kuwakao ``Ramp secret sharing schemes base on MBR coes'' IEICE Technical Report ISEC0-(0-) pp.6-68(in Japanese) Nov. 0. [Kuwakao an Kurihara an0]h.kuwakao an M.Kurihara ``Computationally-Secure Regenerating Coe'' Proceeings of Computer Security Symposium 0 pp Oct. 0.
54 The last slie Delete 6 pages in which recent results ware written. [Kurihara an Kuwakao 0] (See the full version) // 時 分
SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES
SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES Haotian Zhao, Yinlong Xu and Liping Xiang School of Computer Science and Technology, University of Science
More informationCoding Techniques for Distributed Storage Systems
Coding Techniques for Distributed Storage Systems Jung-Hyun Kim, {jh.kim06}@yonsei.ac.kr, Hong-Yeop Song Yonsei Univ. Seoul, KORE 3 rd CITW, Oct. 25. 1, 2013 Contents Introduction Codes for Distributed
More informationExact Optimized-cost Repair in Multi-hop Distributed Storage Networks
Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1
More informationInformation-theoretically Secure Regenerating Codes for Distributed Storage
Information-theoretically Secure Regenerating Codes for Distributed Storage Nihar B. Shah, K. V. Rashmi and P. Vijay Kumar Abstract Regenerating codes are a class of codes for distributed storage networks
More informationNetwork Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13
Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 *Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. "Network Coding for Distributed
More informationEnabling Node Repair in Any Erasure Code for Distributed Storage
Enabling Node Repair in Any Erasure Code for Distributed Storage K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Fellow, IEEE Abstract Erasure codes are an efficient means of storing data across a network
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,
More informationRegenerating Codes for Errors and Erasures in Distributed Storage
Regenerating Codes or Errors and Erasures in Distributed Storage K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE, and P Vijay Kumar, Fellow, IEEE arxiv:0050v csit] 3 May 0 Abstract Regenerating
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationAn Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage
An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage Chenhui LI*, Songtao LIANG* * Shanghai Key Laboratory of Intelligent Information Processing, Fudan University,
More informationInterference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions
2134 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 4, APRIL 2012 Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Nihar B Shah, K V Rashmi, P
More informationNetwork Codes for Next-Generation Distributed Storage:! Opportunities & Challenges. Kannan Ramchandran
Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges Kannan Ramchandran University of California, Berkeley Joint work with: Salim El Rouayheb (UCB), Hao Zhang (UCB), Sameer
More informationBASIC Regenerating Code: Binary Addition and Shift for Exact Repair
BASIC Regenerating Code: Binary Addition and Shift for Exact Repair Hanxu Hou, Kenneth W. Shum, Minghua Chen and Hui Li Shenzhen Eng. Lab of Converged Networks Technology, Shenzhen Key Lab of Cloud Computing
More informationMinimization of Storage Cost in Distributed Storage Systems with Repair Consideration
Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Quan Yu Department of Electronic Engineering City University of Hong Kong Email: quanyu2@student.cityu.edu.hk Kenneth
More informationEECS 121: Coding for Digital Communication & Beyond Fall Lecture 22 December 3. Introduction
EECS 121: Coding for Digital Communication & Beyond Fall 2013 Lecture 22 December 3 Lecturer: K. V. Rashmi Scribe: Ajay Shanker Tripathi 22.1 Context Introduction Distributed storage is a deeply relevant
More informationFractional Repetition Codes for Repair in Distributed Storage Systems
Fractional Repetition Codes for Repair in Distributed Storage Systems Salim El Rouayheb and Kannan Ramchandran Department of Electrical Engineering and Computer Sciences University of California, Bereley
More informationCodes for Modern Applications
Codes for Modern Applications Current Research Topics in the Code and Signal Design Group P. Vijay Kumar Indian Institute of Science, Bangalore, India Nov. 16, 2018 1/28 Codes for Modern Applications:
More informationData Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment Saravana
More informationDRESS Code For The Storage Cloud
DRESS Code For The Storage Cloud Distributed Replication-based Exact Simple Storage Salim El Rouayheb EECS Department University of California, Berkeley Joint work with: Sameer Pawar Nima Noorshams Prof.
More informationYour Data is in the Cloud: Who Exactly is Looking After It?
Your Data is in the Cloud: Who Exactly is Looking After It? P Vijay Kumar Dept of Electrical Communication Engineering Indian Institute of Science IISc Open Day March 4, 2017 1/33 Your Data is in the Cloud:
More informationDuality for Simple Multiple Access Networks
Duality for Simple Multiple Access Networks Iwan Duursma Department of Mathematics and Coordinated Science Laboratory U of Illinois at Urbana-Champaign DIMACS Workshop on Network Coding December 15-17,
More informationA survey on regenerating codes
International Journal of Scientific and Research Publications, Volume 4, Issue 11, November 2014 1 A survey on regenerating codes V. Anto Vins *, S.Umamageswari **, P.Saranya ** * P.G Scholar, Department
More informationOn Coding Techniques for Networked Distributed Storage Systems
On Coding Techniques for Networked Distributed Storage Systems Frédérique Oggier frederique@ntu.edu.sg Nanyang Technological University, Singapore First European Training School on Network Coding, Barcelona,
More informationCooperative Pipelined Regeneration in Distributed Storage Systems
Cooperative ipelined Regeneration in Distributed Storage Systems Jun Li, in Wang School of Computer Science Fudan University, China Baochun Li Department of Electrical and Computer Engineering University
More informationWhen Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable
When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable Imad Ahmad, Chih-Chun Wang; {ahmadi,chihw}@purdue.edu School of Electrical and Computer Engineering, Purdue University,
More informationResume Maintaining System for Referral Using Cloud Computing
Resume Maintaining System for Referral Using Cloud Computing Pranjali A. Pali 1, N.D. Kale 2 P.G. Student, Department of Computer Engineering, TSSM S PVPIT, Bavdhan, Pune, Maharashtra India 1 Associate
More informationCodes for distributed storage from 3 regular graphs
Codes for distributed storage from 3 regular graphs Shuhong Gao, Fiona Knoll, Felice Manganiello, and Gretchen Matthews Clemson University arxiv:1610.00043v1 [cs.it] 30 Sep 2016 October 4, 2016 Abstract
More informationCapacity Assurance in Hostile Networks
PhD Dissertation Defense Wednesday, October 7, 2015 3:30 pm - 5:30 pm 3112 Engineering Building Capacity Assurance in Hostile Networks By: Jian Li Advisor: Jian Ren ABSTRACT Linear network coding provides
More informationAnalysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space
Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationSymmetric Private Information Retrieval For MDS Coded Distributed Storage
Symmetric Private Information Retrieval For DS Coded Distributed Storage Qiwen Wang, and ikael Skoglund School of Electrical Engineering, KTH Royal Institute of Technology Email: {qiwenw, skoglund}@kthse
More informationCoded Cooperative Data Exchange for Multiple Unicasts
Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:
More informationSynchronizing Edits in Distributed Storage Networks
Synchronizing Edits in Distributed Storage Networks Salim El Rouayheb, Sreechakra Goparaju, Han Mao Kiah, Olgica Milenkovic Department of Electrical and Computer Engineering, Illinois Institute of Technology,
More informationOn Data Parallelism of Erasure Coding in Distributed Storage Systems
On Data Parallelism of Erasure Coding in Distributed Storage Systems Jun Li, Baochun Li Department of Electrical and Computer Engineering, University of Toronto, Canada {junli, bli}@ece.toronto.edu Abstract
More informationHybrid Approaches for Distributed Storage Systems
Hybrid Approaches for Distributed Storage Systems Julio Araujo, Frédéric Giroire, Julian Monteiro To cite this version: Julio Araujo, Frédéric Giroire, Julian Monteiro. Hybrid Approaches for Distributed
More informationModern Erasure Codes for Distributed Storage Systems
Modern Erasure Codes for Distributed Storage Systems Srinivasan Narayanamurthy (Srini) NetApp Everything around us is changing! r The Data Deluge r Disk capacities and densities are increasing faster than
More informationBenefits of Coded Placement for Networks with Heterogeneous Cache Sizes
Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering
More informationCORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems
CORE: Augmenting Regenerating-Coding-Based Recovery for Single and Concurrent Failures in Distributed Storage Systems Runhui Li, Jian Lin, Patrick P. C. Lee Department of Computer Science and Engineering,
More informationModern Erasure Codes for Distributed Storage Systems
Modern Erasure Codes for Distributed Storage Systems Storage Developer Conference, SNIA, Bangalore Srinivasan Narayanamurthy Advanced Technology Group, NetApp May 27 th 2016 1 Everything around us is changing!
More informationLatency Analysis for Distributed Storage
Latency Analysis for Distributed Storage Parimal Parag, Archana Bura Department of Electrical Communication Engineering Indian Institute of Science, Bengaluru, KA 56002, India parimal, archanabura}@ece.iisc.ernet.in
More informationPerformance Models of Access Latency in Cloud Storage Systems
Performance Models of Access Latency in Cloud Storage Systems Qiqi Shuai Email: qqshuai@eee.hku.hk Victor O.K. Li, Fellow, IEEE Email: vli@eee.hku.hk Yixuan Zhu Email: yxzhu@eee.hku.hk Abstract Access
More informationBroadcast Repair for Wireless Distributed Storage Systems
Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAn Application of deterministic Network Coding in MANETs
An Application of deterministic Network Coding in MANETs Leenta M.J. Grobler, Albert S.J. Helberg, Henri Marais, Coenraad C. Naudé School for Electrical, Electronic and Computer Engineering North-West
More informationarxiv: v1 [cs.it] 9 Oct 2012
Coding for Fast Content Download Gauri Joshi EECS Dept., MIT Cambridge, MA 0239, USA Email: gauri@mit.edu Yanpei Liu ECE Dept., Univ. Wisconsin Madison Madison, WI, 53705, USA Email: yliu73@wisc.edu Emina
More informationPrivate Information Retrieval from MDS Coded Data in Distributed Storage Systems
Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Razan Tajeddine Salim El Rouayheb ECE Department IIT Chicago Emails: rtajeddi@hawiitedu salim@iitedu arxiv:160201458v1 [csit]
More informationA Survey on Erasure Coding Techniques for Cloud Storage System
A Survey on Erasure Coding Techniques for Cloud Storage System Kiran P. Pawar #1, R. M. Jogdand *2 #1 M.Tech, Department of Computer Science, Gogte Institute of technology, Udyambag Belagavi, Karnataka,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationContents on the Move: Content Caching and Delivery at the Wireless Network Edge
Contents on the Move: Content Caching an Delivery at the Wireless Network Ege Deniz Günüz Imperial College Lonon 20 June 2017 icore/ Commnet2 Joint Workshop: Content Caching an Distribute Storage for Future
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationA Systematic Approach to Network Coding Problems using Conflict Graphs
A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,
More informationLOW-DENSITY PARITY-CHECK (LDPC) codes [1] can
208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer
More informationSource Coding with Distortion through Graph Coloring
Source Coding with Distortion through Graph Coloring Vishal Doshi, Devavrat Shah, and Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139
More informationPROTECTING the privacy of downloaded information
IEEE TRASACTIOS O IFORMATIO THEORY, VO. 64, O. 3, MARCH 208 945 The Capacity of Private Information Retrieval From Coded Databases arim Banawan, Student Member, IEEE, and Sennur Ulukus, Fellow, IEEE Abstract
More informationSecret Share Dissemination across a Network
Secret Share Dissemination across a Network Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {nihar, rashmikv,
More informationSecret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds
Secret Sharing Across a Network with Low Communication Cost: istributed Algorithm and Bounds Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran, Fellow, IEEE epartment of Electrical Engineering and Computer
More informationCache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching
Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationReconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou
More informationTHE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH. Haotian Zhang and José M. F. Moura
THE DESIGN OF STRUCTURED REGULAR LDPC CODES WITH LARGE GIRTH Haotian Zhang and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 523 {haotian,
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationMax-Flow Protection using Network Coding
Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State
More informationL3. An Introduction to Block Ciphers. Rocky K. C. Chang, 29 January 2015
L3. An Introduction to Block Ciphers Rocky K. C. Chang, 29 January 2015 Outline Product and iterated ciphers A simple substitution-permutation network DES and AES Modes of operations Cipher block chaining
More informationDesign of Orthogonal Graph Wavelet Filter Banks
Design of Orthogonal Graph Wavelet Filter Banks Xi ZHANG Department of Communication Engineering and Informatics The University of Electro-Communications Chofu-shi, Tokyo, 182-8585 JAPAN E-mail: zhangxi@uec.ac.jp
More informationAVALANCHE: A NETWORK CODING ANALYSIS
COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application
More informationOn Secure Distributed Data Storage Under Repair Dynamics
On Secure Distributed Data Storage Under Repair Dynamics Sameer Pawar Salim El Rouayheb Kannan Ramchandran Electrical Engeerg and Computer Sciences University of California at Berkeley Technical Report
More informationOPTIMIZING THE POWER USING FUSED ADD MULTIPLIER
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationA Connection between Network Coding and. Convolutional Codes
A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source
More informationOne-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks
Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm
More informationPIR schemes with small download complexity and low storage requirements
PIR schemes with small download complexity and low storage requirements By Simon R. Blackburn, Tuvi Etzion, Maura B. Paterson Birkbeck Pure Mathematics Preprint Series Preprint Number 24 www.bbk.ac.uk/ems/research/pure/preprints
More informationNetwork Image Coding for Multicast
Network Image Coding for Multicast David Varodayan, David Chen and Bernd Girod Information Systems Laboratory, Stanford University Stanford, California, USA {varodayan, dmchen, bgirod}@stanford.edu Abstract
More informationFast Data Encipherment Algorithm FEAL. Electrical Communication Laboratories, NTT , Take, Yokosuka-shi, Kanagawa-ken, , Japan
Fast Data Encipherment Algorithm FEAL Akihiro Shimizu 81 Shoj i. Miyaguchi Electrical Communication Laboratories, NTT 1-2356, Take, Yokosuka-shi, Kanagawa-ken, 238-03, Japan BACKGROUND In data communications
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationUnit 1 Lesson 13 Proving Theorems involving parallel and perp lines WITH ANSWERS!.notebook. Proofs involving Parallel lines
Unit 1 Lesson 13 Proofs involving Parallel lines We will need to recall the different postulates and Theorems involving Parallel lines... Can you name the following types of angles from the diagram below???
More informationGraph based codes for distributed storage systems
/23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA
More informationLoopy Belief Propagation
Loopy Belief Propagation Research Exam Kristin Branson September 29, 2003 Loopy Belief Propagation p.1/73 Problem Formalization Reasoning about any real-world problem requires assumptions about the structure
More informationModeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects
1293 Modeling and Analysis of Crosstalk between Differential Lines in High-speed Interconnects F. Xiao and Y. Kami University of Electro-Communications, Japan Abstract The crosstalk between a single-ended
More informationPerformance Analysis of Gray Code based Structured Regular Column-Weight Two LDPC Codes
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 11, Issue 4, Ver. III (Jul.-Aug.2016), PP 06-10 www.iosrjournals.org Performance Analysis
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationGuessing Facets: Polytope Structure and Improved LP Decoder
Appeared in: International Symposium on Information Theory Seattle, WA; July 2006 Guessing Facets: Polytope Structure and Improved LP Decoder Alexandros G. Dimakis 1 and Martin J. Wainwright 1,2 1 Department
More informationPERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION
20th European Signal Processing Conference EUSIPCO 2012) Bucharest, Romania, August 27-31, 2012 PERFORMANCE OF THE DISTRIBUTED KLT AND ITS APPROXIMATE IMPLEMENTATION Mauricio Lara 1 and Bernard Mulgrew
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationCS 161 Computer Security
Popa & Wagner Spring 2016 CS 161 Computer Security Discussion 5 Week of February 19, 2017 Question 1 Diffie Hellman key exchange (15 min) Recall that in a Diffie-Hellman key exchange, there are values
More informationA generalized precompiling scheme for surviving path memory management in Viterbi decoders
A generalized precompiling scheme for surviving path memory management in Viterbi decoders Emmanuel BOUTON, Nicolas DEMASSEUX Telecom Paris, E.N.S.T, 46 rue Barrault, 75634 PARS CEDEX 3, FRANCE e-mail
More informationNetwork Coding for Three Unicast Sessions: Interference Alignment Approaches
Network Coding for Three Unicast Sessions: Interference Alignment Approaches Abinesh Ramakrishnan, Abhik Das, Hamed Maleki, Athina Markopoulou, Syed Jafar, Sriram Vishwanath EECS Dept., University of California,
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationDelegating Auditing Task to TPA for Security in Cloud Computing
Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper
More informationA Communication Architecture for Large Heterogeneous Wireless Networks
A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent
More informationPrivacy, Security, and Repair in Distributed Storage Systems. Siddhartha Kumar
Privacy, Security, and Repair in Distributed Storage Systems Siddhartha Kumar Thesis for the Degree of Philosophiae Doctor (PhD) University of Bergen, Norway 2018 Privacy, Security, and Repair in Distributed
More informationA Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 125-132 International Research Publications House http://www. ripublication.com A Distributed
More informationInternational Journal of Wavelets, Multiresolution and Information Processing c World Scientific Publishing Company
International Journal of Wavelets, Multiresolution and Information Processing c World Scientific Publishing Company IMAGE MIRRORING AND ROTATION IN THE WAVELET DOMAIN THEJU JACOB Electrical Engineering
More informationThe Modified Scheme is still vulnerable to. the parallel Session Attack
1 The Modified Scheme is still vulnerable to the parallel Session Attack Manoj Kumar Department of Mathematics, Rashtriya Kishan (P.G.) College Shamli- Muzaffarnagar-247776 yamu_balyan@yahoo.co.in Abstract
More informationPlanar Graphs with Many Perfect Matchings and Forests
Planar Graphs with Many Perfect Matchings and Forests Michael Biro Abstract We determine the number of perfect matchings and forests in a family T r,3 of triangulated prism graphs. These results show that
More informationOptimal Distributed P2P Streaming under Node Degree Bounds
Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,
More informationFundamental Limits of Caching: Improved Bounds For Small Buffer Users
Fundamental Limits of Caching: Improved Bounds For Small Buffer Users Zhi Chen Member, IEEE Pingyi Fan Senior Member, IEEE and Khaled Ben Letaief Fellow, IEEE 1 Abstract arxiv:1407.1935v2 [cs.it] 6 Nov
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationRate-optimal Binary Locally Repairable Codes with Joint Information Locality CSDL. Yonsei University, Korea ( jh.kim06, my.nam,
Rate-optimal Binary Locally Repairable Codes with Joint Information Locality CSDL Jung-Hyun Kim, Mi-Young Nam, and Hong-Yeop Song Yonsei University, Korea ( jh.kim6, my.nam, hysong@yonsei.ac.kr) 25 / /
More informationErasure Codes for Heterogeneous Networked Storage Systems
Erasure Codes for Heterogeneous Networked Storage Systems Lluís Pàmies i Juárez Lluís Pàmies i Juárez lpjuarez@ntu.edu.sg . Introduction Outline 2. Distributed Storage Allocation Problem 3. Homogeneous
More information