JAIST Repository >
b. 情報科学研究科・情報科学系 >
b11. 会議発表論文・発表資料等 >
b11-1. 会議発表論文・発表資料 >
このアイテムの引用には次の識別子を使用してください:
http://hdl.handle.net/10119/13471
|
タイトル: | SW-POR: A Novel POR Scheme Using Slepian-Wolf Coding for Cloud Storage |
著者: | THAO, Tran Phuong KHO, Lee Chin LIM, Azman Osman |
キーワード: | Proof of Retrievability Network Coding Slepian-Wolf Code |
発行日: | 2014-12 |
出版者: | Institute of Electrical and Electronics Engineers (IEEE) |
誌名: | 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing, and IEEE 11th Intl Conf on and Autonomic and Trusted Computing, and IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom) |
開始ページ: | 464 |
終了ページ: | 472 |
DOI: | 10.1109/UIC-ATC-ScalCom.2014.11 |
抄録: | Cloud Computing is a service by which clients can outsource their data to reduce the burdens of data storage and maintenance. However, cloud providers are untrustworthy, which therefore introduce several security challenges: data integrity, data availability and data confidentiality. Since integrity and availability are prerequisite conditions for the existence of a system, researchers focus on these before confidentiality. To ensure integrity and availability, network coding-based POR (Proof of Retrievability) schemes have been proposed to enable the client to check whether the distributed data stored in the cloud servers is intact or not. However, most existing schemes have not achieved exact-repair feature and efficiency. In this paper, we propose a new POR scheme named SW-POR (Slepian-Wolfbased Proof of Retrievability) to address these gaps. Our scheme supports exact repair in which the repaired data is the same as the original corrupted data. Our scheme also can reduce the storage, computation, communication overheads and the size of a coded block. We proposed SW-POR based on Slepian-Wolf data compression code. We prove our security using entropy theory and implement SW-POR to show the costs. |
Rights: | This is the author's version of the work. Copyright (C) 2014 IEEE. 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing, and IEEE 11th Intl Conf on and Autonomic and Trusted Computing, and IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UTC-ATC-ScalCom), 2014, 464-472. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
URI: | http://hdl.handle.net/10119/13471 |
資料タイプ: | author |
出現コレクション: | b11-1. 会議発表論文・発表資料 (Conference Papers)
|
このアイテムのファイル:
ファイル |
記述 |
サイズ | 形式 |
22112.pdf | | 407Kb | Adobe PDF | 見る/開く |
|
当システムに保管されているアイテムはすべて著作権により保護されています。
|