Design of Regenerating Code Based on Security Level in Cloud Storage System

Author:

Zhang Fan1ORCID,Xu Jian2,Yang Gangqiang3ORCID

Affiliation:

1. School of Information Engineering, Shandong Management University, Jinan 250357, China

2. School of Intelligent Engineering, Shandong Management University, Jinan 250357, China

3. School of Information Science and Engineering, Shandong University, Qingdao 226237, China

Abstract

Cloud storage is an indispensable part of cloud computing solutions and the security of its stored data has become a key issue in the research and application of cloud storage systems. To solve this problem, this paper studies the anti-eavesdropping regenerating code technology for cloud storage systems, from the perspective of information theory. As opposed to the existing research ideas on regenerating code theory, that enable the system to obtain strong/weak security, this paper focuses on quantifying the relationship between security and system performance parameters, evaluating the system performance gains that can be obtained by appropriately reducing security, and designing regenerating code schemes with different information security levels to meet the personalized requirements of cloud storage customers. This paper puts forward a generalized matrix transposing method and applies it to the coding construction of fractional repetition codes. The scheme proposed in this paper will provide new ideas and methods for research on secure regenerating code technology in cloud storage systems.

Funder

Major Basic Research Program of the Shandong Provincial Natural Science Foundation

Research Program of the Shandong Provincial Natural Science Foundation

Doctoral Research Funds of Shandong Management University

QiHang Research Project Funds of Shandong Management University

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering

Reference33 articles.

1. Secure Determinant Codes for Distributed Storage Systems;Elmahdy;IEEE Trans. Inf. Theory,2023

2. Private Information Retrieval Schemes with Product-Matrix MBR Codes;Lavauzelle;IEEE Trans. Inf. Forensics Secur.,2021

3. On the Impact of Pollution Attacks on Coding-Based Distributed Storage Systems;Gaeta;IEEE Trans. Inf. Forensics Secur.,2022

4. Secure Codes with Accessibility for Distributed Storage;Holzbaur;IEEE Trans. Inf. Forensics Secur.,2021

5. Network coding for distributed storage systems;Dimakis;IEEE Trans. Inf. Theory,2010

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3