Visible to the public Secure RAID schemes for distributed storage

TitleSecure RAID schemes for distributed storage
Publication TypeConference Paper
Year of Publication2016
AuthorsHuang, W., Bruck, J.
Conference Name2016 IEEE International Symposium on Information Theory (ISIT)
KeywordsB codes, Complexity theory, computational complexity, Computer architecture, Decoding, decoding complexities, Distributed databases, distributed storage, eavesdropping nodes, encoding, EVENODD codes, Generators, Information theory, information-theoretic security, Logic gates, low-complexity schemes, node failures, optimal encoding complexities, practical high rate regime, pubcrawl, RAID, RAID architecture, random access, Reed-Solomon codes, reliability, Resiliency, Resilient Security Architectures, Systematics, XOR-based systematic secure RAID schemes
Abstract

We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal encoding and decoding complexities, from the EVENODD codes and B codes, which are array codes widely used in the RAID architecture. These schemes optimally tolerate two node failures and two eavesdropping nodes. For more general parameters, we construct efficient systematic secure RAID schemes from Reed-Solomon codes. Our results suggest that building "keyless", information-theoretic security into the RAID architecture is practical.

URLhttp://ieeexplore.ieee.org/document/7541529/
DOI10.1109/ISIT.2016.7541529
Citation Keyhuang_secure_2016