13 research outputs found
Weakly Secure MDS Codes for Simple Multiple Access Networks
We consider a simple multiple access network (SMAN), where sources of
unit rates transmit their data to a common sink via relays. Each relay is
connected to the sink and to certain sources. A coding scheme (for the relays)
is weakly secure if a passive adversary who eavesdrops on less than
relay-sink links cannot reconstruct the data from each source. We show that
there exists a weakly secure maximum distance separable (MDS) coding scheme for
the relays if and only if every subset of relays must be collectively
connected to at least sources, for all . Moreover, we
prove that this condition can be verified in polynomial time in and .
Finally, given a SMAN satisfying the aforementioned condition, we provide
another polynomial time algorithm to trim the network until it has a sparsest
set of source-relay links that still supports a weakly secure MDS coding
scheme.Comment: Accepted at ISIT'1
Secure Partial Repair in Wireless Caching Networks with Broadcast Channels
We study security in partial repair in wireless caching networks where parts
of the stored packets in the caching nodes are susceptible to be erased. Let us
denote a caching node that has lost parts of its stored packets as a sick
caching node and a caching node that has not lost any packet as a healthy
caching node. In partial repair, a set of caching nodes (among sick and healthy
caching nodes) broadcast information to other sick caching nodes to recover the
erased packets. The broadcast information from a caching node is assumed to be
received without any error by all other caching nodes. All the sick caching
nodes then are able to recover their erased packets, while using the broadcast
information and the nonerased packets in their storage as side information. In
this setting, if an eavesdropper overhears the broadcast channels, it might
obtain some information about the stored file. We thus study secure partial
repair in the senses of information-theoretically strong and weak security. In
both senses, we investigate the secrecy caching capacity, namely, the maximum
amount of information which can be stored in the caching network such that
there is no leakage of information during a partial repair process. We then
deduce the strong and weak secrecy caching capacities, and also derive the
sufficient finite field sizes for achieving the capacities. Finally, we propose
optimal secure codes for exact partial repair, in which the recovered packets
are exactly the same as erased packets.Comment: To Appear in IEEE Conference on Communication and Network Security
(CNS
Weakly Secure Regenerating Codes for Distributed Storage
We consider the problem of secure distributed data storage under the paradigm
of \emph{weak security}, in which no \emph{meaningful information} is leaked to
the eavesdropper. More specifically, the eavesdropper cannot get any
information about any individual message file or a small group of files. The
key benefit of the weak security paradigm is that it incurs no loss in the
storage capacity, which makes it practically appealing.
In this paper, we present a coding scheme, using a coset coding based outer
code and a Product-Matrix Minimum Bandwidth Regenerating code (proposed by
Rashmi et al.) as an inner code, that achieves weak security when the
eavesdropper can observe any single storage node. We show that the proposed
construction has good security properties and requires small finite field size.Comment: Extended version of the paper accepted in NetCod 201
Network Coding-Based Next-Generation IoT for Industry 4.0
Industry 4.0 has become the main source of applications of the Internet of Things (IoT), which is generating new business opportunities. The use of cloud computing and artificial intelligence is also showing remarkable improvements in industrial operation, saving millions of dollars to manufacturers. The need for time-critical decision-making is evidencing a trade-off between latency and computation, urging Industrial IoT (IIoT) deployments to integrate fog nodes to perform early analytics. In this chapter, we review next-generation IIoT architectures, which aim to meet the requirements of industrial applications, such as low-latency and highly reliable communications. These architectures can be divided into IoT node, fog, and multicloud layers. We describe these three layers and compare their characteristics, providing also different use-cases of IIoT architectures. We introduce network coding (NC) as a solution to meet some of the requirements of next-generation communications. We review a variety of its approaches as well as different scenarios that improve their performance and reliability thanks to this technique. Then, we describe the communication process across the different levels of the architecture based on NC-based state-of-the-art works. Finally, we summarize the benefits and open challenges of combining IIoT architectures together with NC techniques
Guesswork
The security of systems is often predicated on a user or application selecting an object, a password
or key, from a large list. If an inquisitor wishing to identify the object in order to gain access to a
system can only query each possibility, one at a time, then the number of guesses they must make in
order to identify the selected object is likely to be large. If the object is selected uniformly at random
using, for example, a cryptographically secure pseudo-random number generator, then the analysis of
the distribution of the number of guesses that the inquisitor must make is trivial.
If the object has not been selected perfectly uniformly, but with a distribution that is known to the
inquisitor, then the quantification of security is relatively involved. This thesis contains contributions
to the study of this subject, dubbed Guesswork, motivated both by fundamental investigations into
computational security as well as modern applications in secure storage and communication.
This thesis begins with two introductory chapters. One describes existing results in Guesswork and
summarizes the contributions found in the thesis. The other recapitulates some of the mathematical
tools that are employed in the thesis. The other five chapters of contain new contributions to our
understanding of Guesswork, much of which has already experienced peer review and been published.
The chapters themselves are designed to be self-contained and so readable in isolation
Guesswork
The security of systems is often predicated on a user or application selecting an object, a password
or key, from a large list. If an inquisitor wishing to identify the object in order to gain access to a
system can only query each possibility, one at a time, then the number of guesses they must make in
order to identify the selected object is likely to be large. If the object is selected uniformly at random
using, for example, a cryptographically secure pseudo-random number generator, then the analysis of
the distribution of the number of guesses that the inquisitor must make is trivial.
If the object has not been selected perfectly uniformly, but with a distribution that is known to the
inquisitor, then the quantification of security is relatively involved. This thesis contains contributions
to the study of this subject, dubbed Guesswork, motivated both by fundamental investigations into
computational security as well as modern applications in secure storage and communication.
This thesis begins with two introductory chapters. One describes existing results in Guesswork and
summarizes the contributions found in the thesis. The other recapitulates some of the mathematical
tools that are employed in the thesis. The other five chapters of contain new contributions to our
understanding of Guesswork, much of which has already experienced peer review and been published.
The chapters themselves are designed to be self-contained and so readable in isolation
Coding for the Clouds: Coding Techniques for Enabling Security, Locality, and Availability in Distributed Storage Systems
Cloud systems have become the backbone of many applications such as multimedia
streaming, e-commerce, and cluster computing. At the foundation of any cloud architecture
lies a large-scale, distributed, data storage system. To accommodate the massive
amount of data being stored on the cloud, these distributed storage systems (DSS) have
been scaled to contain hundreds to thousands of nodes that are connected through a networking
infrastructure. Such data-centers are usually built out of commodity components,
which make failures the norm rather than the exception.
In order to combat node failures, data is typically stored in a redundant fashion. Due to
the exponential data growth rate, many DSS are beginning to resort to error control coding
over conventional replication methods, as coding offers high storage space efficiency. This
paradigm shift from replication to coding, along with the need to guarantee reliability, efficiency,
and security in DSS, has created a new set of challenges and opportunities, opening
up a new area of research. This thesis addresses several of these challenges and opportunities
by broadly making the following contributions. (i) We design practically amenable,
low-complexity coding schemes that guarantee security of cloud systems, ensure quick
recovery from failures, and provide high availability for retrieving partial information; and
(ii) We analyze fundamental performance limits and optimal trade-offs between the key
performance metrics of these coding schemes.
More specifically, we first consider the problem of achieving information-theoretic
security in DSS against an eavesdropper that can observe a limited number of nodes. We
present a framework that enables design of secure repair-efficient codes through a joint
construction of inner and outer codes. Then, we consider a practically appealing notion
of weakly secure coding, and construct coset codes that can weakly secure a wide class of regenerating codes that reduce the amount of data downloaded during node repair.
Second, we consider the problem of meeting repair locality constraints, which specify
the number of nodes participating in the repair process. We propose a notion of unequal
locality, which enables different locality values for different nodes, ensuring quick recovery
for nodes storing important data. We establish tight upper bounds on the minimum
distance of linear codes with unequal locality, and present optimal code constructions.
Next, we extend the notion of locality from the Hamming metric to the rank and subspace
metrics, with the goal of designing codes for efficient data recovery from special types of
correlated failures in DSS.We construct a family of locally recoverable rank-metric codes
with optimal data recovery properties.
Finally, we consider the problem of providing high availability, which is ensured by
enabling node repair from multiple disjoint subsets of nodes of small size. We study
codes with availability from a queuing-theoretical perspective by analyzing the average
time necessary to download a block of data under the Poisson request arrival model when
each node takes a random amount of time to fetch its contents. We compare the delay
performance of the availability codes with several alternatives such as conventional erasure
codes and replication schemes
Network Coding for Delay Constrained Wireless Systems with Feedback
Rousseau Pierre. Une base de colonne découverte dans l'église de Saint-Germain-des-Prés à Paris. In: Bulletin de la Société Nationale des Antiquaires de France, 1975, 1977. pp. 47-48