Proceedings of the 5th ACM Conference on Data and Application Security and Privacy 2015
DOI: 10.1145/2699026.2699122
|View full text |Cite
|
Sign up to set email alerts
|

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems

Abstract: Erasure coding is one of the main mechanisms to add redundancy in a distributed storage system, by which a file with k data segments is encoded into a file with n coded segments such that any k coded segments can be used to recover the original k data segments. Each coded segment is stored at a storage server. Under an adversarial setting in which the storage servers can exhibit Byzantine behavior, remote data checking (RDC) can be used to ensure that the stored data remains retrievable over time. The main pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…The solution could be to introduce redundancy. In storage domain, multiple coding techniques like replication [20], erasure coding [16] and network coding [17] can be utilized to add redundancy. Considering both the MAP table and the key table are small in size as well as their dynamic nature, we can simply use replication and create duplicate copies for both of them.…”
Section: Discussionmentioning
confidence: 99%
“…The solution could be to introduce redundancy. In storage domain, multiple coding techniques like replication [20], erasure coding [16] and network coding [17] can be utilized to add redundancy. Considering both the MAP table and the key table are small in size as well as their dynamic nature, we can simply use replication and create duplicate copies for both of them.…”
Section: Discussionmentioning
confidence: 99%
“…By using erasure codes, data retrievability and reliability are guaranteed among distributed storage servers, and clients can detect and repair file corruption. The authors in [41] achieve a more efficient mechanism for repairs by extending HAIL [33] and moving bulk computations to the cloud provider. The authors in [42] present a scheme for remote data checking in network coding-based distributed storage systems.…”
Section: Provable Data Possession and Proof Of Retrievabilitymentioning
confidence: 99%
“…Deduplication is a widely used technique in the cloud environment [4], aiming at removing cross-user duplicates. Note that the deduplication does not contradict with the known durability technique, which replicates data redundantly [20][21][22][23] such that data can be always recoverable upon being corrupted. This is because the redundant data created for durability purposes usually belong to a single user, and the deduplication technique removes redundant data cross users, which were unknown by users and have not been used for durability purposes.…”
Section: Deduplication and Proofs Of Ownership (Pows)mentioning
confidence: 99%