Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems

Network coding is an important cloud storage technique, which can recover data with small repair bandwidth and high reliability compared to the existing erasure coding and replication methods. However, regardless of which data recovery technique is used, the repaired data in a geographically distrib...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on parallel and distributed systems Ročník 27; číslo 8; s. 2261 - 2273
Hlavní autori: Chen, Yu-Jia, Wang, Li-Chun, Liao, Chen-Hung
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York IEEE 01.08.2016
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:1045-9219, 1558-2183
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Network coding is an important cloud storage technique, which can recover data with small repair bandwidth and high reliability compared to the existing erasure coding and replication methods. However, regardless of which data recovery technique is used, the repaired data in a geographically distributed cloud storage system are easy to be eavesdropped at the transmission link between the local datacenter and its remote backup site. This kind of network security issue is called link eavesdropping in this paper. For a network coded cloud storage system, we propose a systematic design methodology to determine the important data recovery system parameters for any specified security level. Through analysis, we present the performance curves to relate the remote repair bandwidth and the number of coded data fragments. Consequently, all the important system parameters of a network coded data recovery system, including the number of storage nodes and the link capacity between the datacenter and the backup site, can be precisely designed for satisfying different security level requirements.
AbstractList Network coding is an important cloud storage technique, which can recover data with small repair bandwidth and high reliability compared to the existing erasure coding and replication methods. However, regardless of which data recovery technique is used, the repaired data in a geographically distributed cloud storage system are easy to be eavesdropped at the transmission link between the local datacenter and its remote backup site. This kind of network security issue is called link eavesdropping in this paper. For a network coded cloud storage system, we propose a systematic design methodology to determine the important data recovery system parameters for any specified security level. Through analysis, we present the performance curves to relate the remote repair bandwidth and the number of coded data fragments. Consequently, all the important system parameters of a network coded data recovery system, including the number of storage nodes and the link capacity between the datacenter and the backup site, can be precisely designed for satisfying different security level requirements.
Author Chen-Hung Liao
Yu-Jia Chen
Li-Chun Wang
Author_xml – sequence: 1
  givenname: Yu-Jia
  surname: Chen
  fullname: Chen, Yu-Jia
– sequence: 2
  givenname: Li-Chun
  surname: Wang
  fullname: Wang, Li-Chun
– sequence: 3
  givenname: Chen-Hung
  surname: Liao
  fullname: Liao, Chen-Hung
BookMark eNp9kE1PwjAYxxuDiYB-AONliRcvw6ddu3VHg_gSiZKA56VsT8lwrLMtGL69mxgPHDz1Sfr7Py-_AenVpkZCLimMKIX0djG7n48YUDFiXMZJwk5InwohQ0Zl1Gtr4CJMGU3PyMC5NQDlAnifvEzUDl1hTdOU9SqYWdxh7UtTB9rY4BX9l7EfwdgU3e-kzu2-8VgE48psi2DujVUrDOZ753HjzsmpVpXDi993SN4fJovxUzh9e3we303DPGKxD5XMteS0AJpKsYRYRjFfJkzxQmqNFOhS57GOE62iKOUS0kTFCMi0FEoVAqIhuTn0baz53KLz2aZ0OVaVqtFsXdZeLGIB4ge9PkLXZmvrdruWAk4lA8Fbih6o3BrnLOqsseVG2X1GIev0Zp3erNOb_eptM8lRJi-96sx5q8rq3-TVIVki4t-khMmUCxl9A4f0iWM
CODEN ITDSEO
CitedBy_id crossref_primary_10_1109_TCSII_2019_2928558
crossref_primary_10_1109_JAS_2022_105548
crossref_primary_10_1109_TPDS_2018_2870890
crossref_primary_10_3233_JHS_210661
crossref_primary_10_1016_j_comcom_2020_05_004
crossref_primary_10_3390_s24030850
crossref_primary_10_1016_j_micpro_2020_103328
crossref_primary_10_1109_ACCESS_2019_2958987
crossref_primary_10_2478_cait_2019_0003
crossref_primary_10_1109_TNSM_2019_2909116
crossref_primary_10_1109_JIOT_2018_2875065
crossref_primary_10_1109_TIT_2019_2924895
crossref_primary_10_1109_JIOT_2019_2902376
Cites_doi 10.1109/ICC.2008.336
10.1109/4236.957894
10.1109/ISIT.2010.5513795
10.1109/JSAC.2010.100217
10.1109/icc.2011.5962548
10.1109/TCOMM.2013.122313.130492
10.1109/ISIT.2013.6620424
10.1109/ISIT.2010.5513357
10.1109/TIT.2010.2054295
10.1007/978-3-642-13797-6_15
10.1109/ISIT.2007.4557281
10.1109/GLOCOM.2010.5683473
10.1109/TNET.2010.2053718
10.1109/TIT.2013.2288784
10.1109/ISCCSP.2014.6877802
10.1109/TPDS.2013.187
10.1109/TIT.2010.2090197
10.1109/TNET.2003.818197
10.1109/ISIT.2012.6283046
10.1109/JSAC.2013.131210
10.1007/3-540-37795-6_28
10.1109/ISNETCOD.2011.5978919
10.1109/GLOCOM.2011.6133754
10.1109/TIT.2011.2162191
10.1109/ICCIS.2010.351
10.1109/NetCod.2013.6570831
10.1109/JPROC.2010.2096170
10.1109/TIT.2006.874535
10.1109/TETC.2014.2310456
10.1109/ISIT.2010.5513354
10.1109/INFCOM.2007.78
10.1007/3-540-45748-8_31
10.1109/INFCOMW.2011.5928887
10.1109/JSAC.2006.879356
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TPDS.2015.2486772
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Xplore
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 1558-2183
EndPage 2273
ExternalDocumentID 4118065171
10_1109_TPDS_2015_2486772
7289458
Genre orig-research
GrantInformation_xml – fundername: National Science Council
  grantid: NSC-102-2221-E-009-012-MY3
  funderid: 10.13039/501100001868
GroupedDBID --Z
-~X
.DC
0R~
29I
4.4
5GY
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACIWK
AENEX
AGQYO
AGSQL
AHBIQ
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
IEDLZ
IFIPE
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
TN5
TWZ
UHB
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c326t-a8cf841d01985b068364b72a4d8ffe101bfc6f67fa33948097a6e0e2f85aad503
IEDL.DBID RIE
ISICitedReferencesCount 20
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000380060500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1045-9219
IngestDate Sun Sep 28 07:41:51 EDT 2025
Sun Oct 05 00:15:55 EDT 2025
Sat Nov 29 03:36:09 EST 2025
Tue Nov 18 22:11:21 EST 2025
Wed Aug 27 02:52:20 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c326t-a8cf841d01985b068364b72a4d8ffe101bfc6f67fa33948097a6e0e2f85aad503
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
PQID 1804182054
PQPubID 85437
PageCount 13
ParticipantIDs crossref_primary_10_1109_TPDS_2015_2486772
ieee_primary_7289458
proquest_miscellaneous_1835650550
crossref_citationtrail_10_1109_TPDS_2015_2486772
proquest_journals_1804182054
PublicationCentury 2000
PublicationDate 2016-Aug.-1
2016-8-1
20160801
PublicationDateYYYYMMDD 2016-08-01
PublicationDate_xml – month: 08
  year: 2016
  text: 2016-Aug.-1
  day: 01
PublicationDecade 2010
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on parallel and distributed systems
PublicationTitleAbbrev TPDS
PublicationYear 2016
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref35
ref13
cao (ref42) 0
ref34
ref12
ref37
ref14
bhagwan (ref5) 0; 1
ref31
ref30
ref33
ref11
ref32
ref10
dabek (ref6) 0
ref2
ref1
ref39
ref17
ref38
ref16
ref19
ref18
chen (ref36) 0
cai (ref25) 0
cidon (ref21) 0
ref23
ref26
ref20
ref41
ref22
ref28
qiao (ref24) 0
ref27
ref29
ref8
ref7
ref9
ref4
ref3
rodrigues (ref15) 0
ref40
References_xml – ident: ref28
  doi: 10.1109/ICC.2008.336
– ident: ref1
  doi: 10.1109/4236.957894
– ident: ref8
  doi: 10.1109/ISIT.2010.5513795
– ident: ref40
  doi: 10.1109/JSAC.2010.100217
– ident: ref20
  doi: 10.1109/icc.2011.5962548
– ident: ref41
  doi: 10.1109/TCOMM.2013.122313.130492
– ident: ref35
  doi: 10.1109/ISIT.2013.6620424
– ident: ref39
  doi: 10.1109/ISIT.2010.5513357
– ident: ref19
  doi: 10.1109/TIT.2010.2054295
– ident: ref22
  doi: 10.1007/978-3-642-13797-6_15
– start-page: 85
  year: 0
  ident: ref6
  article-title: Designing a DHT for low latency and high throughput
  publication-title: Proc 1st Conf Symp Netw Syst Des Implementation
– ident: ref30
  doi: 10.1109/ISIT.2007.4557281
– ident: ref14
  doi: 10.1109/GLOCOM.2010.5683473
– ident: ref38
  doi: 10.1109/TNET.2010.2053718
– start-page: 1
  year: 0
  ident: ref24
  article-title: An efficient error-detection and error-correction scheme for network coding
  publication-title: Proc IEEE Global Telecommun Conf
– start-page: 119
  year: 0
  ident: ref25
  article-title: Network coding and error correction
  publication-title: Proc IEEE Inf Theory Workshop
– volume: 1
  start-page: 25
  year: 0
  ident: ref5
  article-title: Total recall: System support for automated availability management
  publication-title: Proc 1st Conf Symp Netw Syst Des Implementation
– start-page: 37
  year: 0
  ident: ref21
  article-title: Copysets: Reducing the frequency of data loss in cloud storage
  publication-title: Proc USENIX Annu Techn Conf
– ident: ref37
  doi: 10.1109/TIT.2013.2288784
– ident: ref13
  doi: 10.1109/ISCCSP.2014.6877802
– ident: ref27
  doi: 10.1109/TPDS.2013.187
– ident: ref34
  doi: 10.1109/TIT.2010.2090197
– ident: ref23
  doi: 10.1109/TNET.2003.818197
– start-page: 226
  year: 0
  ident: ref15
  article-title: High availability in DHTs: Erasure coding vs. replication
  publication-title: Proc 4th Int Workshop Peer-To-Peer Syst
– ident: ref33
  doi: 10.1109/ISIT.2012.6283046
– ident: ref11
  doi: 10.1109/JSAC.2013.131210
– ident: ref17
  doi: 10.1007/3-540-37795-6_28
– ident: ref18
  doi: 10.1109/ISNETCOD.2011.5978919
– ident: ref9
  doi: 10.1109/GLOCOM.2011.6133754
– ident: ref10
  doi: 10.1109/TIT.2011.2162191
– ident: ref3
  doi: 10.1109/ICCIS.2010.351
– start-page: 2711
  year: 0
  ident: ref36
  article-title: An eavesdropping prevention problem when repairing network coded data from remote distributed storage
  publication-title: Proc IEEE Global Commun Conf
– ident: ref12
  doi: 10.1109/NetCod.2013.6570831
– ident: ref29
  doi: 10.1109/JPROC.2010.2096170
– ident: ref7
  doi: 10.1109/TIT.2006.874535
– ident: ref4
  doi: 10.1109/TETC.2014.2310456
– ident: ref32
  doi: 10.1109/ISIT.2010.5513354
– ident: ref31
  doi: 10.1109/INFCOM.2007.78
– ident: ref16
  doi: 10.1007/3-540-45748-8_31
– ident: ref2
  doi: 10.1109/INFCOMW.2011.5928887
– start-page: 693
  year: 0
  ident: ref42
  article-title: LT Codes-based secure and reliable cloud storage service
  publication-title: Proc IEEE Int Conf Comput Commun
– ident: ref26
  doi: 10.1109/JSAC.2006.879356
SSID ssj0014504
Score 2.272506
Snippet Network coding is an important cloud storage technique, which can recover data with small repair bandwidth and high reliability compared to the existing...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 2261
SubjectTerms Back up systems
Bandwidth
Cloud computing
Coding
Computer information security
Data recovery
Data replication
data security
Data storage
Distributed databases
distributed storage
Eavesdropping
Encoding
Links
Maintenance engineering
Network coding
Networks
Security
Title Eavesdropping Prevention for Network Coding Encrypted Cloud Storage Systems
URI https://ieeexplore.ieee.org/document/7289458
https://www.proquest.com/docview/1804182054
https://www.proquest.com/docview/1835650550
Volume 27
WOSCitedRecordID wos000380060500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Xplore
  customDbUrl:
  eissn: 1558-2183
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014504
  issn: 1045-9219
  databaseCode: RIE
  dateStart: 19900101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS-RAEC508LB7WHXcZccXLXhajPYk_cpRxhFBGARdmFtIVzqyIInMC_z3Vic9QVGEvQXS6YT-UqmvUtVfAZxa60RcGoy4LFUkLCaRRWWjnCxPSWuNw6JpNqEnEzOdpncbcNbthXHONcVn7twfNrn8osal_1V2oSk6ENJswqbWqt2r1WUMhGxaBVJ0IaOUzDBkMIc8vXi4u7r3RVzyPPb6cjp-54OapiofvsSNe7ne_r8H24EfgUayyxb3XdhwVR-21y0aWLDYPnx_oze4B7fjfOXmxaz2ogyPbC3fVFeMqCubtBXhbFR7f8bGFc5enomQstFTvSzYPUXn9PFhQeP8J_y9Hj-MbqLQTSFComgLWn0sjRgWxOmMtFyZRAmr41wUpiwdWaYtUZVKl3mSpMLwVOfKcUdAyjwvJE9-Qa-qK_cbmJRoFSbDGLGgACs1imYjv0YOF41GOQC-Xt8Mg9S473jxlDUhB08zD0nmIckCJAP4013y3OpsfDV4z2PQDQzLP4DDNYhZsMR5NvQCS0RzpBjASXeabMgnRvLK1Us_JiFeyylY2_985gP4RvdXbeHfIfQWs6U7gi1cLf7NZ8fNi_gKWurbwA
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1RS9xAEB6sFWofatWK11q7gk-ludtLdjebx3KeKOoheIJvITvZFEESubsI_ntnk71QUQTfAtksYb_MzjeZ2W8ADo2xIiw0BlwWKhAGo8CgMkFGlqekMdpi3jSbiCcTfXOTXK7An-4sjLW2KT6zfXfZ5PLzCmv3q2wQU3QgpP4AH6UQIW9Pa3U5AyGbZoEUX8ggIUP0OcwhTwbTy6MrV8Yl-6FTmIvDZ16oaavyYi9uHMzxxvte7St88USS_W2R34QVW27BxrJJA_M2uwWf_1Mc3IazcfZg5_mscrIM_9hSwKkqGZFXNmlrwtmoch6NjUucPd4TJWWju6rO2RXF57T9MK9y_g2uj8fT0Ung-ykESCRtQeuPhRbDnFidloYrHSlh4jATuS4KS7ZpClSFiossihKheRJnynJLUMosyyWPdmC1rEq7C0xKNAqjYYiYU4iVaEWzkWcjl4s6RtkDvlzfFL3YuOt5cZc2QQdPUgdJ6iBJPSQ9-N09ct8qbbw1eNth0A30y9-DvSWIqbfFeTp0EktEdKTowUF3m6zIpUay0la1GxMRs-UUrn1_feZf8OlkenGenp9Ozn7AOr2LassA92B1MavtT1jDh8XtfLbffJRP8FLfBw
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Eavesdropping+Prevention+for+Network+Coding+Encrypted+Cloud+Storage+Systems&rft.jtitle=IEEE+transactions+on+parallel+and+distributed+systems&rft.au=Chen%2C+Yu-Jia&rft.au=Wang%2C+Li-Chun&rft.au=Liao%2C+Chen-Hung&rft.date=2016-08-01&rft.issn=1045-9219&rft.volume=27&rft.issue=8&rft.spage=2261&rft.epage=2273&rft_id=info:doi/10.1109%2FTPDS.2015.2486772&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TPDS_2015_2486772
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1045-9219&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1045-9219&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1045-9219&client=summon