Secure RAID schemes for distributed storage
Title | Secure RAID schemes for distributed storage |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Huang, W., Bruck, J. |
Conference Name | 2016 IEEE International Symposium on Information Theory (ISIT) |
Keywords | B codes, Complexity theory, computational complexity, Computer architecture, Decoding, decoding complexities, Distributed databases, distributed storage, eavesdropping nodes, encoding, EVENODD codes, Generators, Information theory, information-theoretic security, Logic gates, low-complexity schemes, node failures, optimal encoding complexities, practical high rate regime, pubcrawl, RAID, RAID architecture, random access, Reed-Solomon codes, reliability, Resiliency, Resilient Security Architectures, Systematics, XOR-based systematic secure RAID schemes |
Abstract | We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal encoding and decoding complexities, from the EVENODD codes and B codes, which are array codes widely used in the RAID architecture. These schemes optimally tolerate two node failures and two eavesdropping nodes. For more general parameters, we construct efficient systematic secure RAID schemes from Reed-Solomon codes. Our results suggest that building "keyless", information-theoretic security into the RAID architecture is practical. |
URL | http://ieeexplore.ieee.org/document/7541529/ |
DOI | 10.1109/ISIT.2016.7541529 |
Citation Key | huang_secure_2016 |
- Logic gates
- B codes
- Complexity theory
- computational complexity
- computer architecture
- Decoding
- decoding complexities
- Distributed databases
- distributed storage
- eavesdropping nodes
- encoding
- EVENODD codes
- Generators
- information theory
- information-theoretic security
- XOR-based systematic secure RAID schemes
- low-complexity schemes
- node failures
- optimal encoding complexities
- practical high rate regime
- pubcrawl
- RAID
- RAID architecture
- random access
- Reed-Solomon codes
- Reliability
- Resiliency
- Resilient Security Architectures
- Systematics