An Overflow Problem in Network Coding for Secure Cloud Storage

In this paper, we present the overflow problem of a network coding storage system (NCSS) when the encoding parameters and the storage parameters are mismatched. The overflow problem of the NCSS occurs because the network-coded encryption yields extended coded data, resulting in high storage and processing overhead. To avoid the overflow problem, we propose an overflow-avoidance NCSS scheme that takes account of security and storage requirements in both encoding and storage procedures. We provide the analytical results of the maximum allowable stored encoded data under the perfect secrecy criterion. The design guidelines to achieve high coding efficiency with the lowest storage cost are also presented.

[1]  Huayu Zhang,et al.  Repair Tree: Fast Repair for Single Failure in Erasure-Coded Distributed Storage Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.

[2]  Jörg Widmer,et al.  Network coding: an instant primer , 2006, CCRV.

[3]  Yang Tang,et al.  NCCloud: applying network coding for the storage repair in a cloud-of-clouds , 2012, FAST.

[4]  Anantha Chandrakasan,et al.  Energy-Aware Hardware Implementation of Network Coding , 2011, Networking Workshops.

[5]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[6]  A. Klinger THE VANDERMONDE MATRIX , 1967 .

[7]  Pei Li,et al.  Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding , 2010, IEEE Journal on Selected Areas in Communications.

[8]  Camilla Hollanti,et al.  Capacity and Security of Heterogeneous Distributed Storage Systems , 2013, IEEE Journal on Selected Areas in Communications.

[9]  Ning Cai,et al.  Secure Network Coding on a Wiretap Network , 2011, IEEE Transactions on Information Theory.

[10]  Sriram Vishwanath,et al.  Secure distributed storage systems: Local repair with minimum bandwidth regeneration , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[11]  A. Robert Calderbank,et al.  Data secrecy in distributed storage systems under exact repair , 2013, 2013 International Symposium on Network Coding (NetCod).

[12]  Shu-Tao Xia,et al.  Network coding for data-retrieving in cloud storage systems , 2015, 2015 International Symposium on Network Coding (NetCod).

[13]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[14]  Athanasios V. Vasilakos,et al.  Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Toan Duc Bui,et al.  Efficient data uploading based on network coding in LTE-Advanced heterogeneous networks , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).

[16]  Jian Li,et al.  An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[17]  Nihar B. Shah,et al.  Information-Theoretically Secure Regenerating Codes for Distributed Storage , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[18]  Yang Tang,et al.  NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds , 2014, IEEE Transactions on Computers.

[19]  Li-Chun Wang,et al.  Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems , 2016, IEEE Transactions on Parallel and Distributed Systems.

[20]  Song Guo,et al.  On the Throughput of Two-Way Relay Networks Using Network Coding , 2014, IEEE Transactions on Parallel and Distributed Systems.

[21]  Muriel Médard,et al.  Coding for Trusted Storage in Untrusted Networks , 2012, IEEE Transactions on Information Forensics and Security.

[22]  Bin Tang,et al.  An LDPC Approach for Chunked Network Codes , 2018, IEEE/ACM Transactions on Networking.

[23]  Wei-Ho Chung,et al.  Novel Repair-by-Transfer Codes and Systematic Exact-MBR Codes with Lower Complexities and Smaller Field Sizes , 2014, IEEE Transactions on Parallel and Distributed Systems.

[24]  Chi Wan Sung,et al.  Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds , 2016, IEEE Transactions on Information Forensics and Security.

[25]  Patrick P. C. Lee,et al.  Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  Ming Xian,et al.  On Secrecy Capacity of Minimum Storage Regenerating Codes , 2015, IEEE Transactions on Information Theory.

[27]  Kannan Ramchandran,et al.  On secure distributed data storage under repair dynamics , 2010, 2010 IEEE International Symposium on Information Theory.

[28]  Arya Mazumdar,et al.  Security in Locally Repairable Storage , 2016, IEEE Transactions on Information Theory.

[29]  Frank H. P. Fitzek,et al.  Network Coding in Heterogeneous Multicore IoT Nodes With DAG Scheduling of Parallel Matrix Block Operations , 2017, IEEE Internet of Things Journal.

[30]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[31]  Shenghao Yang,et al.  Batched Sparse Codes , 2012, IEEE Transactions on Information Theory.

[32]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[33]  Baochun Li,et al.  Beehive: Erasure Codes for Fixing Multiple Failures in Distributed Storage Systems , 2017, IEEE Transactions on Parallel and Distributed Systems.

[34]  Yun Liu,et al.  Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage , 2017, IEEE Access.

[35]  Muriel Médard,et al.  Trusted Storage over Untrusted Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[36]  Tao Xiang,et al.  Secure cloud storage meets with secure network coding , 2016, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[37]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[38]  Yunnan Wu,et al.  Distributed utility maximization for network coding based multicasting: a shortest path approach , 2006, IEEE Journal on Selected Areas in Communications.

[39]  Xuemin Shen,et al.  An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security , 2018, IEEE Journal on Selected Areas in Communications.

[40]  R. Yeung,et al.  Secure network coding , 2002, Proceedings IEEE International Symposium on Information Theory,.

[41]  Patrick P. C. Lee,et al.  Enabling Efficient and Reliable Transition from Replication to Erasure Coding for Clustered File Systems , 2015, IEEE Transactions on Parallel and Distributed Systems.

[42]  Dimitris S. Papailiopoulos,et al.  Simple regenerating codes: Network coding for cloud storage , 2011, 2012 Proceedings IEEE INFOCOM.

[43]  R. Michael Buehrer,et al.  Toward Optimal Secure Distributed Storage Systems With Exact Repair , 2016, IEEE Transactions on Information Theory.