Abstract
In this paper, we consider the security of exact-repair regenerating codes operating at the minimum-storage-regenerating (MSR) point. The security requirement (introduced in Shah et. al.) is that no information about the stored data file must be leaked in the presence of an eavesdropper who has access to the contents of ℓ1 nodes as well as all the repair traffic entering a second disjoint set of ℓ2 nodes. We derive an upper bound on the size of a data file that can be securely stored that holds whenever ℓ2 ≤ d - k + 1. This upper bound proves the optimality of the product-matrix-based construction of secure MSR regenerating codes by Shah et. al.
Original language | English |
---|---|
Title of host publication | ISCCSP 2014 - 2014 6th International Symposium on Communications, Control and Signal Processing, Proceedings |
Publisher | IEEE, Institute of Electrical and Electronics Engineers |
Pages | 10-14 |
Number of pages | 5 |
ISBN (Print) | 9781479928903 |
DOIs | |
Publication status | Published - 2014 |
Externally published | Yes |
Event | IEEE International Symposium on Control, Communications and Signal Processing (ISCCSP) 2014 - Athens, Greece Duration: 21 May 2014 → 23 May 2014 Conference number: 6th https://ieeexplore.ieee.org/xpl/conhome/6862736/proceeding (Proceedings) |
Conference
Conference | IEEE International Symposium on Control, Communications and Signal Processing (ISCCSP) 2014 |
---|---|
Abbreviated title | ISCCSP 2014 |
Country/Territory | Greece |
City | Athens |
Period | 21/05/14 → 23/05/14 |
Internet address |
Keywords
- MSR codes
- product-matrix construction
- regenerating codes
- Secure regenerating codes