1,075 research outputs found
Distributed Storage in Mobile Wireless Networks with Device-to-Device Communication
We consider the use of distributed storage (DS) to reduce the communication
cost of content delivery in wireless networks. Content is stored (cached) in a
number of mobile devices using an erasure correcting code. Users retrieve
content from other devices using device-to-device communication or from the
base station (BS), at the expense of higher communication cost. We address the
repair problem when a device storing data leaves the cell. We introduce a
repair scheduling where repair is performed periodically and derive analytical
expressions for the overall communication cost of content download and data
repair as a function of the repair interval. The derived expressions are then
used to evaluate the communication cost entailed by DS using several erasure
correcting codes. Our results show that DS can reduce the communication cost
with respect to the case where content is downloaded only from the BS, provided
that repairs are performed frequently enough. If devices storing content arrive
to the cell, the communication cost using DS is further reduced and, for large
enough arrival rate, it is always beneficial. Interestingly, we show that MDS
codes, which do not perform well for classical DS, can yield a low overall
communication cost in wireless DS.Comment: After final editing for publication in TCO
Capacity and Security of Heterogeneous Distributed Storage Systems
We study the capacity of heterogeneous distributed storage systems under
repair dynamics. Examples of these systems include peer-to-peer storage clouds,
wireless, and Internet caching systems. Nodes in a heterogeneous system can
have different storage capacities and different repair bandwidths. We give
lower and upper bounds on the system capacity. These bounds depend on either
the average resources per node, or on a detailed knowledge of the node
characteristics. Moreover, we study the case in which nodes may be compromised
by an eavesdropper, and give bounds on the system secrecy capacity. One
implication of our results is that symmetric repair maximizes the capacity of a
homogeneous system, which justifies the model widely used in the literature.Comment: 7 pages, 2 figure
Regenerating-Code-Based Cloud Storage using Privacy-Preserving Public Auditing
In Regenerating-code-based cloud storage using Privacy-Preserving public auditing scheme there is no need of data owners for data change, we can change data using proxy and partial keys. Using Third Party Auditor which provide more security and allows the user to know the information about the data stored in the cloud. We elaborate on the correctness of verification with public auditing scheme and regenerating codes have gained Data integrity on cloud data storage
- …