956 research outputs found
Cooperative Local Repair in Distributed Storage
Erasure-correcting codes, that support local repair of codeword symbols, have
attracted substantial attention recently for their application in distributed
storage systems. This paper investigates a generalization of the usual locally
repairable codes. In particular, this paper studies a class of codes with the
following property: any small set of codeword symbols can be reconstructed
(repaired) from a small number of other symbols. This is referred to as
cooperative local repair. The main contribution of this paper is bounds on the
trade-off of the minimum distance and the dimension of such codes, as well as
explicit constructions of families of codes that enable cooperative local
repair. Some other results regarding cooperative local repair are also
presented, including an analysis for the well-known Hadamard/Simplex codes.Comment: Fixed some minor issues in Theorem 1, EURASIP Journal on Advances in
Signal Processing, December 201
Secure Cooperative Regenerating Codes for Distributed Storage Systems
Regenerating codes enable trading off repair bandwidth for storage in
distributed storage systems (DSS). Due to their distributed nature, these
systems are intrinsically susceptible to attacks, and they may also be subject
to multiple simultaneous node failures. Cooperative regenerating codes allow
bandwidth efficient repair of multiple simultaneous node failures. This paper
analyzes storage systems that employ cooperative regenerating codes that are
robust to (passive) eavesdroppers. The analysis is divided into two parts,
studying both minimum bandwidth and minimum storage cooperative regenerating
scenarios. First, the secrecy capacity for minimum bandwidth cooperative
regenerating codes is characterized. Second, for minimum storage cooperative
regenerating codes, a secure file size upper bound and achievability results
are provided. These results establish the secrecy capacity for the minimum
storage scenario for certain special cases. In all scenarios, the achievability
results correspond to exact repair, and secure file size upper bounds are
obtained using min-cut analyses over a suitable secrecy graph representation of
DSS. The main achievability argument is based on an appropriate pre-coding of
the data to eliminate the information leakage to the eavesdropper
- …