2004
DOI: 10.1007/978-3-540-24614-5_14
|View full text |Cite
|
Sign up to set email alerts
|

Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2

Abstract: Abstract. DS2 is a dependable and secure data storage for mobile, wireless networks based on a peer-to-peer paradigm. DS 2 provides support to create and share files under a write-once model, and ensures data confidentiality and dependability by encoding files in a Redundant Residue Number System. The paper analyzes the code efficiency of DS 2 using a set of moduli allowing for efficient encoding and decoding procedures based on single precision arithmetic, and discusses the security issues. The comparison of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Due to these desirable properties, IDA has found its potential applications to secure and fault-tolerant storage and transmission of information. [Chessa et al 2004] further extended this idea and investigated the storage problem in the context of a redundant residue number system (RRNS) for encoding information, which aims to provide a dependable and secure data storage to mobile wireless networks. The idea of using number theoretic constructs for information dispersal can be traced back to Asmuth and Blakley [1982], who proposed an algorithm based on the Chinese Remainder theorem.…”
Section: Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…Due to these desirable properties, IDA has found its potential applications to secure and fault-tolerant storage and transmission of information. [Chessa et al 2004] further extended this idea and investigated the storage problem in the context of a redundant residue number system (RRNS) for encoding information, which aims to provide a dependable and secure data storage to mobile wireless networks. The idea of using number theoretic constructs for information dispersal can be traced back to Asmuth and Blakley [1982], who proposed an algorithm based on the Chinese Remainder theorem.…”
Section: Performance Analysismentioning
confidence: 99%
“…Data dependability is ensured since data can be reconstructed in the presence of up to s ≤ r residue erasures, combined with up to r−s 2 corrupted residues. It has been shown in Chessa et al [2004] that RRNS and IDA have comparable performance in terms of code efficiency and complexity; however, whether space efficiency can be obtained remains unclear. Another severe drawback of this approach is that, to reduce the computational overhead in the encoding and decoding process, the system has to maintain a large library of parameter values together with a big set of moduli.…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations