2016
DOI: 10.1109/tit.2016.2605118
|View full text |Cite
|
Sign up to set email alerts
|

Security in Locally Repairable Storage

Abstract: Abstract-In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem that we consider is to find optimal ways to distribute shares of a secret among a set of storage-nodes (participants) such that the content of each node (share) can be recovered by using contents of only few other nodes, and at the same time the secret can be reconstructed by only some allowable subsets of nodes. As a special case, an eavesdropper observing some set of specific nodes (such as les… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 23 publications
0
8
0
Order By: Relevance
“…In this work we only consider ideal storage systems. This security model is the same as in [3], [4], but while these works considered local repair of nodes, we require the property of local access.…”
Section: B Problem Descriptionmentioning
confidence: 99%
See 3 more Smart Citations
“…In this work we only consider ideal storage systems. This security model is the same as in [3], [4], but while these works considered local repair of nodes, we require the property of local access.…”
Section: B Problem Descriptionmentioning
confidence: 99%
“…we consider an arbitrary randomized mapping f . We note that the bounds do not depend on r and are based on the techniques from [3].…”
Section: Boundsmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite importance of repairing the content of unavailable node, this paper focus on another aspect of distributed storage systems namely safety of stored data. Due to distributed nature of such systems and as a consequence, increasing use of untrusted node providers or communication channels, they are vulnerable to different type of attacks or data leakage [12][13][14]. In this paper, we focus on threats caused by eavesdropper that gains access to some portion of stored information.…”
Section: Introductionmentioning
confidence: 99%