1,075 research outputs found

    Distributed Storage in Mobile Wireless Networks with Device-to-Device Communication

    Get PDF
    We consider the use of distributed storage (DS) to reduce the communication cost of content delivery in wireless networks. Content is stored (cached) in a number of mobile devices using an erasure correcting code. Users retrieve content from other devices using device-to-device communication or from the base station (BS), at the expense of higher communication cost. We address the repair problem when a device storing data leaves the cell. We introduce a repair scheduling where repair is performed periodically and derive analytical expressions for the overall communication cost of content download and data repair as a function of the repair interval. The derived expressions are then used to evaluate the communication cost entailed by DS using several erasure correcting codes. Our results show that DS can reduce the communication cost with respect to the case where content is downloaded only from the BS, provided that repairs are performed frequently enough. If devices storing content arrive to the cell, the communication cost using DS is further reduced and, for large enough arrival rate, it is always beneficial. Interestingly, we show that MDS codes, which do not perform well for classical DS, can yield a low overall communication cost in wireless DS.Comment: After final editing for publication in TCO

    Capacity and Security of Heterogeneous Distributed Storage Systems

    Full text link
    We study the capacity of heterogeneous distributed storage systems under repair dynamics. Examples of these systems include peer-to-peer storage clouds, wireless, and Internet caching systems. Nodes in a heterogeneous system can have different storage capacities and different repair bandwidths. We give lower and upper bounds on the system capacity. These bounds depend on either the average resources per node, or on a detailed knowledge of the node characteristics. Moreover, we study the case in which nodes may be compromised by an eavesdropper, and give bounds on the system secrecy capacity. One implication of our results is that symmetric repair maximizes the capacity of a homogeneous system, which justifies the model widely used in the literature.Comment: 7 pages, 2 figure

    Regenerating-Code-Based Cloud Storage using Privacy-Preserving Public Auditing

    Get PDF
    In Regenerating-code-based cloud storage using Privacy-Preserving public auditing scheme there is no need of data owners for data change, we can change data using proxy and partial keys. Using Third Party Auditor which provide more security and allows the user to know the information about the data stored in the cloud. We elaborate on the correctness of verification with public auditing scheme and regenerating codes have gained Data integrity on cloud data storage
    • …
    corecore