Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
169 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks (1009.2556v2)

Published 14 Sep 2010 in cs.IT, cs.CR, and math.IT

Abstract: We address the problem of securing distributed storage systems against eavesdropping and adversarial attacks. An important aspect of these systems is node failures over time, necessitating, thus, a repair mechanism in order to maintain a desired high system reliability. In such dynamic settings, an important security problem is to safeguard the system from an intruder who may come at different time instances during the lifetime of the storage system to observe and possibly alter the data stored on some nodes. In this scenario, we give upper bounds on the maximum amount of information that can be stored safely on the system. For an important operating regime of the distributed storage system, which we call the 'bandwidth-limited regime', we show that our upper bounds are tight and provide explicit code constructions. Moreover, we provide a way to short list the malicious nodes and expurgate the system.

Citations (177)

Summary

Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks

In the paper titled "Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks," the authors address the pressing challenge of preserving data integrity and confidentiality in dynamic distributed storage systems (DSS). These systems, characterized by continuous node failures and repairs, are susceptible to security vulnerabilities introduced by passive eavesdroppers and active adversaries. The paper investigates the secrecy and resiliency capacities of DSS in the presence of various intruder models.

The core contribution of the paper lies in the formulation of upper bounds for the secrecy and resiliency capacities when confronted with different types of intruders: passive eavesdroppers, omniscient adversaries, and limited-knowledge adversaries. The authors define the secrecy capacity as the maximal amount of data that can be stored securely in the face of potential eavesdropping, ensuring that no information is leaked to a passive intruder. Conversely, the resiliency capacity is defined as the quantity of data that can be stored reliably, even when some nodes are controlled by a malicious adversary.

For the passive eavesdropper scenario, the authors derive that the secrecy capacity is constrained by the loss of information attributable to compromised nodes, formalized as C_s(α,γ) ≤ ∑_{i=\ell+1}{k} min{(d-i+1)β,α}, where β is the data downloaded per node during repair, and α is the storage capacity. In contrast, when facing an active omniscient adversary, the resiliency capacity is derived under the assumption that redundancy is required to guard against node corruption: C_r(α,γ) ≤ ∑_{i=2b+1}{k} min{(d-i+1)β,α}. For an active adversary with limited knowledge, the resiliency capacity bound becomes less restrictive, shown as C_r(α,γ) ≤ ∑_{i=b+1}{k} min{(d-i+1)β,α}.

A significant emphasis is placed on the bandwidth-limited regime, where the repair bandwidth is constrained, but the node storage capacity is not. The authors demonstrate that their upper bounds are tight for this regime, particularly when the repair degree d is set to the maximum possible value (d = n-1). Achieving these bounds relies on the strategic use of coding techniques, including nested MDS codes and RSKR-repetition codes, to efficiently utilize the storage space and maintain data integrity even in the face of adversarial intrusion.

The implications of this research are profound, as they offer a framework for designing secure storage systems that can operate reliably despite ongoing dynamics like node failures or intruder attacks. By enabling the identification of compromised nodes and expurgation of malicious ones, these findings contribute to the enhancement of data security in distributed systems, a foundational aspect in modern cloud and peer-to-peer storage applications.

Future research could explore refining these bounds further or developing more efficient cryptographic protocols tailored to DSS, as the sensitivity to repair dynamics emphasizes the complexity of maintaining security without sacrificing performance. Furthermore, practical implementations of these DSS security protocols could provide valuable insights into deployment and scalability challenges in real-world settings.