Advanced Search
Volume 36 Issue 5
Jun.  2014
Turn off MathJax
Article Contents
Liu Jian, Wang Hui-Mei, Xian Ming, Huang Kun. Weakly Secure Regenerating Codes for Cloud Storage against Eavesdropper[J]. Journal of Electronics & Information Technology, 2014, 36(5): 1221-1228. doi: 10.3724/SP.J.1146.2013.01035
Citation: Liu Jian, Wang Hui-Mei, Xian Ming, Huang Kun. Weakly Secure Regenerating Codes for Cloud Storage against Eavesdropper[J]. Journal of Electronics & Information Technology, 2014, 36(5): 1221-1228. doi: 10.3724/SP.J.1146.2013.01035

Weakly Secure Regenerating Codes for Cloud Storage against Eavesdropper

doi: 10.3724/SP.J.1146.2013.01035
  • Received Date: 2013-07-16
  • Rev Recd Date: 2013-11-27
  • Publish Date: 2014-05-19
  • Erasure codes and regenerating codes can guarantee data reliability, but fail to provide data confidential when some nodes are observed by eavesdropper. Thus, two regenerating code schemes satisfying the security property against the eavesdropper are proposed in this paper. Combining the All-or-Nothing transform and exact repair regenerating codes, the proposed schemes not only ensure that an intruder eavesdropping limited number of nodes are unable to obtain any meaningful information about the original data symbols, but also provide data reliability with low repair bandwidth. Furthermore, a general construction method is presented, and the security is proved, and the performance of the proposed scheme is evaluated by a serial of experiments. The result shows that the proposed schemes achieve faster encode/decode procedures and better secrecy capacity compared with other secure regenerating coding schemes or threshold storage schemes.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2579) PDF downloads(987) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return