Characterization of Secrecy Capacity for General MSR Codes under Passive Eavesdropping Model

In this paper, we revisit the problem of characterizing the secrecy capacity of MSR codes under the passive {l1, l2}-eavesdropper model, where the eavesdropper has access to data stored on l1 nodes as well as the repair traffic for an additional l2 nodes. We analyze the secrecy capacity of MSR codes from an information theory perspective. Specifically, we investigate the basic reconstruction and regeneration properties of MSR codes and find some information theoretic features on the contents of storage nodes as well as repair traffic. Leveraging these properties with a definition of the secrecy capacity, we derive new upper bounds on the secrecy capacity for MSR codes. These explicit upper bounds on the secrecy capacity bring out an interesting fact that the secrecy capacity of MSR codes is not only related to {l1, l2}, but also closely depends on ?, the amount of data downloaded from each helper node during the repair process. Similar bounds on the secrecy capacity in the literature are either restricted to the situation that l2\leq2, or based on the assumption of linear coding. To the best of our knowledge, this is a novel characterization of the secrecy capacity of general MSR codes without the above constraints.

[1]  T. Asano,et al.  ENTROPY , RELATIVE ENTROPY , AND MUTUAL INFORMATION , 2008 .

[2]  P. Vijay Kumar,et al.  Optimal linear codes with a local-error-correction property , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[3]  Syed Ali Jafar,et al.  Interference Alignment and Spatial Degrees of Freedom for the K User Interference Channel , 2007, 2008 IEEE International Conference on Communications.

[4]  Helmut Knebl,et al.  Introduction to Cryptography , 2002, Information Security and Cryptography.

[5]  Cheng Huang,et al.  On the Locality of Codeword Symbols , 2011, IEEE Transactions on Information Theory.

[6]  Kannan Ramchandran,et al.  Explicit construction of optimal exact regenerating codes for distributed storage , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[7]  Kannan Ramchandran,et al.  Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks , 2010, IEEE Transactions on Information Theory.

[8]  Cheng Huang,et al.  Erasure Coding in Windows Azure Storage , 2012, USENIX Annual Technical Conference.

[9]  Syed A. Jafar,et al.  Interference Alignment and the Degrees of Freedom for the 3 User Interference Channel , 2007 .

[10]  Sriram Vishwanath,et al.  Optimal Locally Repairable and Secure Codes for Distributed Storage Systems , 2012, IEEE Transactions on Information Theory.

[11]  Jehoshua Bruck,et al.  Zigzag Codes: MDS Array Codes With Optimal Rebuilding , 2011, IEEE Transactions on Information Theory.

[12]  Kannan Ramchandran,et al.  Distributed Storage Codes With Repair-by-Transfer and Nonachievability of Interior Points on the Storage-Bandwidth Tradeoff , 2010, IEEE Transactions on Information Theory.

[13]  Nihar B. Shah,et al.  Information-Theoretically Secure Regenerating Codes for Distributed Storage , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[14]  Yunghsiang Sam Han,et al.  Update-efficient regenerating codes with minimum per-node storage , 2013, 2013 IEEE International Symposium on Information Theory.

[15]  Rudolf Ahlswede,et al.  Network information flow , 2000, IEEE Trans. Inf. Theory.

[16]  Yunnan Wu,et al.  Reducing repair traffic for erasure coding-based storage via interference alignment , 2009, 2009 IEEE International Symposium on Information Theory.

[17]  Jie Li,et al.  A Framework of Constructions of Minimal Storage Regenerating Codes With the Optimal Access/Update Property , 2013, IEEE Transactions on Information Theory.

[18]  Alexandros G. Dimakis,et al.  Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[19]  Nihar B. Shah,et al.  Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction , 2010, IEEE Transactions on Information Theory.

[20]  Kannan Ramchandran,et al.  Regenerating codes for errors and erasures in distributed storage , 2012, 2012 IEEE International Symposium on Information Theory Proceedings.

[21]  A. Robert Calderbank,et al.  Data secrecy in distributed storage systems under exact repair , 2013, 2013 International Symposium on Network Coding (NetCod).

[22]  Yunnan Wu,et al.  A Survey on Network Codes for Distributed Storage , 2010, Proceedings of the IEEE.

[23]  Nihar B. Shah,et al.  Optimality of the product-matrix construction for secure MSR regenerating codes , 2014, 2014 6th International Symposium on Communications, Control and Signal Processing (ISCCSP).

[24]  Kannan Ramchandran,et al.  Exact-repair MDS codes for distributed storage using interference alignment , 2010, 2010 IEEE International Symposium on Information Theory.

[25]  John Kubiatowicz,et al.  Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.