Go to:
Logótipo
Você está em: Start > Publications > View > Coding for Trusted Storage in Untrusted Networks
Map of Premises
Principal
Publication

Coding for Trusted Storage in Untrusted Networks

Title
Coding for Trusted Storage in Untrusted Networks
Type
Article in International Scientific Journal
Year
2012
Authors
Paulo Oliveira
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications Without AUTHENTICUS Without ORCID
Luisa Lima
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page Without ORCID
Tiago Vinhoza
(Author)
FEUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page Without ORCID
M. Medard
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Journal
Vol. 7 No. 6
Pages: 1890-1899
ISSN: 1556-6013
Publisher: IEEE
Indexing
Publicação em ISI Web of Science ISI Web of Science
Scientific classification
FOS: Engineering and technology > Electrical engineering, Electronic engineering, Information engineering
Other information
Abstract (EN): We focus on the problem of secure distributed storage over multiple untrusted clouds or networks. Our main contribution is a low complexity scheme that relies on erasure coding techniques for achieving prescribed levels of confidentiality and reliability. Using matrices that have no singular square submatrices, we subject the original data to a linear transformation. The resulting coded symbols are then stored in different networks. This scheme allows users with access to a threshold number of networks to reconstruct perfectly the original data, while ensuring that eavesdroppers with access to any number of networks smaller than this threshold are unable to decode any of the original symbols. This holds even if the attackers are able to guess some of the missing symbols. We further quantify the achievable level of security, and analyze the complexity of the proposed scheme.
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Related Publications

Of the same journal

Wireless Secrecy Regions With Friendly Jamming (2011)
Article in International Scientific Journal
J. P. Vilela; M. Bloch; J. Barros; S. W. McLaughlin
Uncoordinated Frequency Hopping for Wireless Secrecy Against Non-Degraded Eavesdroppers (2018)
Article in International Scientific Journal
Sá Sousa, J; João P. Vilela
Secure Communication in Stochastic Wireless Networks - Part II: Maximum Rate and Collusion (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secure Communication in Stochastic Wireless Networks - Part I: Connectivity (2012)
Article in International Scientific Journal
P. Pinto; J. Barros; M. Win
Secrecy Transmission on Parallel Channels: Theoretical Limits and Performance of Practical Codes (2014)
Article in International Scientific Journal
Baldi, M; Chiaraluce, F; Laurenti, N; Tomasin, S; Renna, F

See all (11)

Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-27 at 07:24:23 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book