3,029 research outputs found
Explicit Construction of Optimal Exact Regenerating Codes for Distributed Storage
Erasure coding techniques are used to increase the reliability of distributed
storage systems while minimizing storage overhead. Also of interest is
minimization of the bandwidth required to repair the system following a node
failure. In a recent paper, Wu et al. characterize the tradeoff between the
repair bandwidth and the amount of data stored per node. They also prove the
existence of regenerating codes that achieve this tradeoff.
In this paper, we introduce Exact Regenerating Codes, which are regenerating
codes possessing the additional property of being able to duplicate the data
stored at a failed node. Such codes require low processing and communication
overheads, making the system practical and easy to maintain. Explicit
construction of exact regenerating codes is provided for the minimum bandwidth
point on the storage-repair bandwidth tradeoff, relevant to
distributed-mail-server applications. A subspace based approach is provided and
shown to yield necessary and sufficient conditions on a linear code to possess
the exact regeneration property as well as prove the uniqueness of our
construction.
Also included in the paper, is an explicit construction of regenerating codes
for the minimum storage point for parameters relevant to storage in
peer-to-peer systems. This construction supports a variable number of nodes and
can handle multiple, simultaneous node failures. All constructions given in the
paper are of low complexity, requiring low field size in particular.Comment: 7 pages, 2 figures, in the Proceedings of Allerton Conference on
Communication, Control and Computing, September 200
Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions
Regenerating codes are a class of recently developed codes for distributed
storage that, like Reed-Solomon codes, permit data recovery from any arbitrary
k of n nodes. However regenerating codes possess in addition, the ability to
repair a failed node by connecting to any arbitrary d nodes and downloading an
amount of data that is typically far less than the size of the data file. This
amount of download is termed the repair bandwidth. Minimum storage regenerating
(MSR) codes are a subclass of regenerating codes that require the least amount
of network storage; every such code is a maximum distance separable (MDS) code.
Further, when a replacement node stores data identical to that in the failed
node, the repair is termed as exact.
The four principal results of the paper are (a) the explicit construction of
a class of MDS codes for d = n-1 >= 2k-1 termed the MISER code, that achieves
the cut-set bound on the repair bandwidth for the exact-repair of systematic
nodes, (b) proof of the necessity of interference alignment in exact-repair MSR
codes, (c) a proof showing the impossibility of constructing linear,
exact-repair MSR codes for d < 2k-3 in the absence of symbol extension, and (d)
the construction, also explicit, of MSR codes for d = k+1. Interference
alignment (IA) is a theme that runs throughout the paper: the MISER code is
built on the principles of IA and IA is also a crucial component to the
non-existence proof for d < 2k-3. To the best of our knowledge, the
constructions presented in this paper are the first, explicit constructions of
regenerating codes that achieve the cut-set bound.Comment: 38 pages, 12 figures, submitted to the IEEE Transactions on
Information Theory;v3 - The title has been modified to better reflect the
contributions of the submission. The paper is extensively revised with
several carefully constructed figures and example
When and By How Much Can Helper Node Selection Improve Regenerating Codes?
Regenerating codes (RCs) can significantly reduce the repair-bandwidth of
distributed storage networks. Initially, the analysis of RCs was based on the
assumption that during the repair process, the newcomer does not distinguish
(among all surviving nodes) which nodes to access, i.e., the newcomer is
oblivious to the set of helpers being used. Such a scheme is termed the blind
repair (BR) scheme. Nonetheless, it is intuitive in practice that the newcomer
should choose to access only those "good" helpers. In this paper, a new
characterization of the effect of choosing the helper nodes in terms of the
storage-bandwidth tradeoff is given. Specifically, answers to the following
fundamental questions are given: Under what conditions does proactively
choosing the helper nodes improve the storage-bandwidth tradeoff? Can this
improvement be analytically quantified?
This paper answers the former question by providing a necessary and
sufficient condition under which optimally choosing good helpers strictly
improves the storage-bandwidth tradeoff. To answer the latter question, a
low-complexity helper selection solution, termed the family repair (FR) scheme,
is proposed and the corresponding storage/repair-bandwidth curve is
characterized. For example, consider a distributed storage network with 60
total number of nodes and the network is resilient against 50 node failures. If
the number of helper nodes is 10, then the FR scheme and its variant
demonstrate 27% reduction in the repair-bandwidth when compared to the BR
solution. This paper also proves that under some design parameters, the FR
scheme is indeed optimal among all helper selection schemes. An explicit
construction of an exact-repair code is also proposed that can achieve the
minimum-bandwidth-regenerating point of the FR scheme. The new exact-repair
code can be viewed as a generalization of the existing fractional repetition
code.Comment: 35 pages, 10 figures, submitted to IEEE Transactions on Information
Theory on September 04, 201
Improving the Secrecy of Distributed Storage Systems using Interference Alignment
Regenerating codes based on the approach of interference alignment for
wireless interference channel achieve the cut-set bound for distributed storage
systems. These codes provide data reliability, and perform efficient exact node
repair when some node fails. Interference alignment as a concept is especially
important to improve the repair efficiency of a failed node in a minimum
storage regenerating (MSR) code. In addition it can improve the stored data
security in presence of passive intruders. In this paper we construct a new
code resilient against a threat model where a passive eavesdropper can access
the data stored on a subset of nodes and the downloaded data during the repair
process of a subset of failed nodes. We achieve an optimal secrecy capacity for
the new explicit construction of MSR interference alignment code. Hence, we
show that the eavesdropper obtains zero information from the original message
stored across the distributed storage, and that we achieve a perfect secrecy.Comment: 20 pages, 3 figure
Convertible Codes: New Class of Codes for Efficient Conversion of Coded Data in Distributed Storage
Erasure codes are typically used in large-scale distributed storage systems to provide durability of data in the face of failures. In this setting, a set of k blocks to be stored is encoded using an [n, k] code to generate n blocks that are then stored on different storage nodes. A recent work by Kadekodi et al. [Kadekodi et al., 2019] shows that the failure rate of storage devices vary significantly over time, and that changing the rate of the code (via a change in the parameters n and k) in response to such variations provides significant reduction in storage space requirement. However, the resource overhead of realizing such a change in the code rate on already encoded data in traditional codes is prohibitively high.
Motivated by this application, in this work we first present a new framework to formalize the notion of code conversion - the process of converting data encoded with an [n^I, k^I] code into data encoded with an [n^F, k^F] code while maintaining desired decodability properties, such as the maximum-distance-separable (MDS) property. We then introduce convertible codes, a new class of code pairs that allow for code conversions in a resource-efficient manner. For an important parameter regime (which we call the merge regime) along with the widely used linearity and MDS decodability constraint, we prove tight bounds on the number of nodes accessed during code conversion. In particular, our achievability result is an explicit construction of MDS convertible codes that are optimal for all parameter values in the merge regime albeit with a high field size. We then present explicit low-field-size constructions of optimal MDS convertible codes for a broad range of parameters in the merge regime. Our results thus show that it is indeed possible to achieve code conversions with significantly lesser resources as compared to the default approach of re-encoding
High-Rate Regenerating Codes Through Layering
In this paper, we provide explicit constructions for a class of exact-repair
regenerating codes that possess a layered structure. These regenerating codes
correspond to interior points on the storage-repair-bandwidth tradeoff, and
compare very well in comparison to scheme that employs space-sharing between
MSR and MBR codes. For the parameter set with , we
construct a class of codes with an auxiliary parameter , referred to as
canonical codes. With in the range , these codes operate in
the region between the MSR point and the MBR point, and perform significantly
better than the space-sharing line. They only require a field size greater than
. For the case of , canonical codes can also be shown to
achieve an interior point on the line-segment joining the MSR point and the
next point of slope-discontinuity on the storage-repair-bandwidth tradeoff.
Thus we establish the existence of exact-repair codes on a point other than the
MSR and the MBR point on the storage-repair-bandwidth tradeoff. We also
construct layered regenerating codes for general parameter set ,
which we refer to as non-canonical codes. These codes also perform
significantly better than the space-sharing line, though they require a
significantly higher field size. All the codes constructed in this paper are
high-rate, can repair multiple node-failures and do not require any computation
at the helper nodes. We also construct optimal codes with locality in which the
local codes are layered regenerating codes.Comment: 20 pages, 9 figure
- …