Coding for Trusted Storage in Untrusted Networks
Oliveira, P. F.
; Lima, L. L.
; Vinhoza, T. T. V.
;
Barros, J.
; Médard, M. M.
IEEE Transactions on Information Forensics and Security Vol. 7, Nº 6, pp. 1890 - 1899, December, 2012.
ISSN (print): 1556-6013
ISSN (online): 1556-6021
Scimago Journal Ranking: 0,87 (in 2012)
Digital Object Identifier: 10.1109/TIFS.2012.2217331
Abstract
We focus on the problem of secure distributed storage over multiple untrusted clouds or networks. Our main contribution is a low complexity scheme that relies on erasure coding techniques for achieving prescribed levels of confidentiality and reliability. Using matrices that have no singular square submatrices, we subject the original data to a linear transformation. The resulting coded symbols are then stored in different networks. This scheme allows users with access to a threshold number of networks to reconstruct perfectly the original data, while ensuring that eavesdroppers with access to any number of networks smaller than this threshold are unable to decode any of the original symbols. This holds even if the attackers are able to guess some of the missing symbols. We further quantify the achievable level of security, and analyze the complexity of the proposed scheme.