메뉴 건너뛰기




Volumn 7, Issue 6, 2012, Pages 1890-1899

Coding for trusted storage in untrusted networks

Author keywords

Distributed storage; erasure codes; security

Indexed keywords

CODED SYMBOLS; DISTRIBUTED STORAGE; ERASURE CODES; ERASURE CODING; OR-NETWORKS; SECURITY; SQUARE SUBMATRICES; THRESHOLD NUMBERS; UNTRUSTED NETWORK;

EID: 84870261636     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2217331     Document Type: Article
Times cited : (40)

References (34)
  • 2
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • M. Armbrust et al., "A view of cloud computing," Commun. ACM, vol. 53, no. 4, pp. 50-58, 2010.
    • (2010) Commun ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1
  • 3
    • 84926099526 scopus 로고    scopus 로고
    • Physical-layer security from inform
    • Cambridge U.K.: Cambridge Univ. Press
    • M. Bloch and J. Barros, Physical-Layer Security: From Inform. Theory to Security Eng. Cambridge, U.K.: Cambridge Univ. Press, 2011.
    • (2011) Theory to Security Eng
    • Bloch, M.1    Barros, J.2
  • 4
    • 33745180496 scopus 로고    scopus 로고
    • Decentralized erasure codes for distributed networked storage
    • DOI 10.1109/TIT.2006.874535
    • A. G. Dimakis, V. Prabhakaran, and K. Ramchandran, "Decentralized erasure codes for distributed networked storage," IEEE/ACM Trans. Netw., vol. 52, no. 6, pp. 2809-2816, Jun. 2006. (Pubitemid 43898929)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2809-2816
    • Dimakis, A.G.1    Prabhakaran, V.2    Ramchandran, K.3
  • 6
    • 84889424136 scopus 로고    scopus 로고
    • Error correction coding math
    • Hoboken NJ Wiley
    • T. K. Moon, Error Correction Coding: Math. Methods and Algorithms. Hoboken, NJ: Wiley, 2005.
    • (2005) Methods and Algorithms
    • Moon, T.K.1
  • 10
    • 84857740763 scopus 로고    scopus 로고
    • Secure network coding for wiretap networks of type II
    • Mar.
    • S. E. Rouayheb, E. Soljanin, and A. Sprintson, "Secure network coding for wiretap networks of type II," IEEE Trans. Inf. Theory, vol. 58, no. 3, pp. 1361-1371, Mar. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.3 , pp. 1361-1371
    • Rouayheb, S.E.1    Soljanin, E.2    Sprintson, A.3
  • 14
    • 78650893906 scopus 로고    scopus 로고
    • Secure network coding on a wiretap network
    • Jan.
    • N. Cai and R. W. Yeung, "Secure network coding on a wiretap network," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 424-435, Jan. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 424-435
    • Cai, N.1    Yeung, R.W.2
  • 16
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 17
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • Montvale, NJ AFIPS Press
    • G. Blakley, "Safeguarding cryptographic keys," in Proc. Nat. Comput. Conf., Montvale, NJ, 1979, vol. 48, pp. 313-317, AFIPS Press.
    • (1979) Proc. Nat. Comput. Conf. , vol.48 , pp. 313-317
    • Blakley, G.1
  • 19
    • 84947912552 scopus 로고    scopus 로고
    • All-or-nothing encryption and the package transform
    • Fast Software Encryption
    • R. Rivest, "All-or-nothing encryption and the package transform," in Fast Software Encryption. New York: Springer, 1997, pp. 210-218. (Pubitemid 127100717)
    • (1997) Lecture Notes in Computer Science , Issue.1267 , pp. 210-218
    • Rivest, R.L.1
  • 21
    • 0344839058 scopus 로고    scopus 로고
    • On the security properties of OAEP as an all-or-nothing transform
    • Springer
    • V. Boyko, "On the security properties of OAEP as an all-or-nothing transform," in Proc. Advances in Cryptology (Crypto'99), 1999, pp. 783-783, Springer.
    • (1999) Proc. Advances in Cryptology (Crypto'99 , pp. 783-783
    • Boyko, V.1
  • 22
    • 0010137766 scopus 로고    scopus 로고
    • Something about All or Nothing (Transforms)
    • DOI 10.1023/A:1008304703074
    • D. R. Stinson, "Something about all or nothing (transforms)," Designs, Codes and Cryptography, vol. 22, no. 2, pp. 133-138, 2001. (Pubitemid 33672294)
    • (2001) Designs, Codes, and Cryptography , vol.22 , Issue.2 , pp. 133-138
    • Stinson, D.R.1
  • 23
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • Apr
    • M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 25
    • 79955971286 scopus 로고    scopus 로고
    • DepSky: Dependable and secure storage in a cloud-of-clouds
    • Salzburg, Austria, Apr
    • A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, "DepSky: Dependable and secure storage in a cloud-of-clouds," in Proc. EuroSys'11, Salzburg, Austria, Apr. 2011.
    • (2011) Proc. EuroSys'11
    • Bessani, A.1    Correia, M.2    Quaresma, B.3    André, F.4    Sousa, P.5
  • 28
    • 4744370532 scopus 로고    scopus 로고
    • Systematic MDS erasure codes based on Vandermonde matrices
    • Sep
    • J. Lacan and J. Fimes, "Systematic MDS erasure codes based on Vandermonde matrices," IEEE Commun. Lett., vol. 8, no. 9, pp. 570-572, Sep. 2004.
    • (2004) IEEE Commun. Lett , vol.8 , Issue.9 , pp. 570-572
    • Lacan, J.1    Fimes, J.2
  • 29
    • 84861355529 scopus 로고    scopus 로고
    • On the security of index coding with side information
    • Jun.
    • S. H. Dau, V. Skachek, and Y. M. Chee, "On the security of index coding with side information," IEEE Trans. Inf. Theory, vol. 58, no. 6, pp. 3975-3988, Jun. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.6 , pp. 3975-3988
    • Dau, S.H.1    Skachek, V.2    Chee, Y.M.3
  • 31
    • 0036953758 scopus 로고    scopus 로고
    • LT codes
    • Washington DC Nov IEEE Computer Society
    • M. Luby, "LT codes," in Proc. 43rd Symp. Found. Comput. Sci., Washington, DC, Nov. 2002, pp. 271-280, IEEE Computer Society.
    • (2002) Proc. 43rd Symp. Found. Comput. Sci. , pp. 271-280
    • Luby, M.1
  • 32
    • 0000376665 scopus 로고
    • Fast algorithms with preprocessing for matrix-vector multiplication problems
    • Dec
    • I. Gohberg and V. Olshevsky, "Fast algorithms with preprocessing for matrix-vector multiplication problems," J. Complexity, vol. 10, no. 4, pp. 411-427, Dec. 1994.
    • (1994) J. Complexity , vol.10 , Issue.4 , pp. 411-427
    • Gohberg, I.1    Olshevsky, V.2
  • 33
    • 0017495724 scopus 로고
    • A note onWyner's wiretap channel (Corresp.)
    • May
    • A. B. Carleial andM. E. Hellman, "A note onWyner's wiretap channel (Corresp.)," IEEE Trans. Inf. Theory, vol. 23, no. 3, pp. 387-390, May 1977.
    • (1977) IEEE Trans. Inf. Theory , vol.23 , Issue.3 , pp. 387-390
    • Carleial, A.B.1    Hellman, M.E.2
  • 34
    • 49549125198 scopus 로고    scopus 로고
    • A network coding approach to secret key distribution
    • Sep
    • P. F. Oliveira and J. Barros, "A network coding approach to secret key distribution," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 414-423, Sep. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.3 , pp. 414-423
    • Oliveira, P.F.1    Barros, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.