Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2897518.2897525acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article
Public Access

Repairing Reed-solomon codes

Published: 19 June 2016 Publication History

Abstract

A fundamental fact about polynomial interpolation is that k evaluations of a degree-(k-1) polynomial f are sufficient to determine f. This is also necessary in a strong sense: given k-1 evaluations, we learn nothing about the value of f on any k'th point. In this paper, we study a variant of the polynomial interpolation problem. Instead of querying entire evaluations of f (which are elements of a large field F), we are allowed to query partial evaluations; that is, each evaluation delivers a few elements from a small subfield of F, rather than a single element from F. We show that in this model, one can do significantly better than in the traditional setting, in terms of the amount of information required to determine the missing evaluation. More precisely, we show that only O(k) bits are necessary to recover a missing evaluation. In contrast, the traditional method of looking at k evaluations requires Omega(k log(k)) bits. We also show that our result is optimal for linear methods, even up to the leading constants. Our motivation comes from the use of Reed-Solomon (RS) codes for distributed storage systems, in particular for the exact repair problem. The traditional use of RS codes in this setting is analogous to the traditional interpolation problem. Each node in a system stores an evaluation of f, and if one node fails we can recover it by reading k other nodes. However, each node is free to send less information, leading to the modified problem above. The quickly-developing field of regenerating codes has yielded several codes which take advantage of this freedom. However, these codes are not RS codes, and RS codes are still often used in practice; in 2011, Dimakis et al. asked how well RS codes could perform in this setting. Our results imply that RS codes can also take advantage of this freedom to download partial symbols. In some parameter regimes---those with small levels of sub-packetization---our scheme for RS codes outperforms all known regenerating codes. Even with a high degree of sub-packetization, our methods give non-trivial schemes, and we give an improved repair scheme for a specific (14,10)-RS code used in the Facebook Hadoop Analytics cluster.

References

[1]
Cadambe, V. R., Huang, C., Jafar, S. A., and Li, J. Optimal repair of mds codes in distributed storage via subspace interference alignment. arXiv:1106.1250 (2011).
[2]
Cadambe, V. R., Huang, C., and Li, J. Permutation code: Optimal exact-repair of a single failed node in mds code based distributed storage systems. In Information Theory Proceedings (ISIT), 2011 IEEE International Symposium on (2011), IEEE, pp. 1225–1229.
[3]
Cadambe, V. R., Jafar, S., Maleki, H., Ramchandran, K., Suh, C., et al. Asymptotic interference alignment for optimal repair of mds codes in distributed storage. Information Theory, IEEE Transactions on 59, 5 (2013), 2974–2987.
[4]
Dimakis, A. G., Godfrey, P., Wu, Y., Wainwright, M. J., and Ramchandran, K. Network coding for distributed storage systems. Information Theory, IEEE Transactions on 56, 9 (2010), 4539–4551.
[5]
Dimakis, A. G., Ramchandran, K., Wu, Y., and Suh, C. A survey on network codes for distributed storage. Proceedings of the IEEE 99, 3 (2011), 476–489.
[6]
https://github.com/facebookarchive/hadoop-20/ tree/master/src/contrib/raid/src/java/org/ apache/hadoop/raid. Accessed: July 2015.
[7]
Goparaju, S., Tamo, I., and Calderbank, R. An improved sub-packetization bound for minimum storage regenerating codes. Information Theory, IEEE Transactions on 60, 5 (2014), 2770–2779.
[8]
Guruswami, V., and Wootters, M. Repairing reed-solomon codes. arXiv:1509.04764 (2015).
[9]
Han, Y. S., Pai, H.-T., Zheng, R., and Varshney, P. K. Update-efficient regenerating codes with minimum per-node storage. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on (2013), IEEE, pp. 1436–1440.
[10]
Han, Y. S., Zheng, R., and Mow, W. H. Exact regenerating codes for byzantine fault tolerance in distributed storage. In INFOCOM Proceedings (2012), IEEE, pp. 2498–2506.
[11]
Huang, W., Langberg, M., Kliewer, J., and Bruck, J. Communication efficient secret sharing. arXiv:1505.07515 (2015).
[12]
MacWilliams, F. J., and Sloane, N. J. A. The theory of error correcting codes. Elsevier, 1977.
[13]
Papailiopoulos, D. S., Dimakis, A. G., and Cadambe, V. R. Repair optimal erasure codes through hadamard designs. Information Theory, IEEE Transactions on 59, 5 (2013), 3021–3037.
[14]
Rashmi, K., Shah, N. B., Kumar, P. V., and Ramchandran, K. Explicit codes minimizing repair bandwidth for distributed storage. In Allerton Conference on Communication, Control, and Computing (2009), IEEE, pp. 1243–1249.
[15]
Rashmi, K., Shah, N. B., Kumar, P. V., and Ramchandran, K. Explicit construction of optimal exact regenerating codes for distributed storage. In Allerton Conference on Communication, Control, and Computing (2009), IEEE, pp. 1243–1249.
[16]
Sathiamoorthy, M., Asteris, M., Papailiopoulos, D., Dimakis, A. G., Vadali, R., Chen, S., and Borthakur, D. Xoring elephants: Novel erasure codes for big data. In Proceedings of the VLDB Endowment (2013), vol. 6, VLDB Endowment, pp. 325–336.
[17]
Shanmugam, K., Papailiopoulos, D. S., Dimakis, A. G., and Caire, G. A repair framework for scalar mds codes. Selected Areas in Communications, IEEE Journal on 32, 5 (2014), 998–1007.
[18]
Suh, C., and Ramchandran, K. Exact-repair MDS codes for distributed storage using interference alignment. In Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on (2010), IEEE, pp. 161–165.
[19]
Suh, C., and Ramchandran, K. On the existence of optimal exact-repair mds codes for distributed storage. arXiv:1004.4663 (2010).
[20]
Tamo, I., and Barg, A. Bounds on locally recoverable codes with multiple recovering sets. In Information Theory (ISIT), 2014 IEEE International Symposium on (2014), IEEE, pp. 691–695.
[21]
Tamo, I., and Barg, A. A family of optimal locally recoverable codes. Information Theory, IEEE Transactions on 60, 8 (2014), 4661–4676.
[22]
Tamo, I., Papailiopoulos, D. S., and Dimakis, A. G. Optimal locally repairable codes and connections to matroid theory. In Information Theory Proceedings (ISIT), 2013 IEEE International Symposium on (2013), IEEE, pp. 1814–1818.
[23]
Tamo, I., Wang, Z., and Bruck, J. Zigzag codes: Mds array codes with optimal rebuilding. Information Theory, IEEE Transactions on 59, 3 (2013), 1597–1616.
[24]
Tamo, I., Wang, Z., and Bruck, J. Access versus bandwidth in codes for storage. Information Theory, IEEE Transactions on 60, 4 (2014), 2028–2037.
[25]
University of Texas ECE Department. Erasure Coding for Distributed Storage wiki. http://storagewiki.ece.utexas.edu/. Accessed: July 2015.
[26]
Wu, Y., and Dimakis, A. G. Reducing repair traffic for erasure coding-based storage via interference alignment. In Information Theory Proceedings (ISIT), 2009 IEEE International Symposium on (2009), IEEE, pp. 2276–2280.
[27]
Wu, Y., Dimakis, A. G., and Ramchandran, K. Deterministic regenerating codes for distributed storage. In Allerton Conference on Control, Computing, and Communication (2007).

Cited By

View all
  • (2024)Optimal Two-Dimensional Reed–Solomon Codes Correcting Insertions and DeletionsIEEE Transactions on Information Theory10.1109/TIT.2024.338784870:7(5012-5016)Online publication date: Jul-2024
  • (2024)Cooperative Repair of Reed-Solomon Codes via Linearized Permutation PolynomialsIEEE Transactions on Information Theory10.1109/TIT.2023.334765470:7(4747-4758)Online publication date: Jul-2024
  • (2024)Bounds on the Statistical Leakage-Resilience of Shamir's Secret Sharing2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619359(184-189)Online publication date: 7-Jul-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '16: Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
June 2016
1141 pages
ISBN:9781450341325
DOI:10.1145/2897518
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 June 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Exact Repair Problem
  2. Reed-Solomon Codes
  3. Regenerating Codes

Qualifiers

  • Research-article

Funding Sources

Conference

STOC '16
Sponsor:
STOC '16: Symposium on Theory of Computing
June 19 - 21, 2016
MA, Cambridge, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)292
  • Downloads (Last 6 weeks)38
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Optimal Two-Dimensional Reed–Solomon Codes Correcting Insertions and DeletionsIEEE Transactions on Information Theory10.1109/TIT.2024.338784870:7(5012-5016)Online publication date: Jul-2024
  • (2024)Cooperative Repair of Reed-Solomon Codes via Linearized Permutation PolynomialsIEEE Transactions on Information Theory10.1109/TIT.2023.334765470:7(4747-4758)Online publication date: Jul-2024
  • (2024)Bounds on the Statistical Leakage-Resilience of Shamir's Secret Sharing2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619359(184-189)Online publication date: 7-Jul-2024
  • (2024)Repairing a Single Erasure in Reed-Solomon Codes with Side Information2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619203(2122-2127)Online publication date: 7-Jul-2024
  • (2024)Private Repair of a Single Erasure in Reed-Solomon Codes2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619130(2640-2645)Online publication date: 7-Jul-2024
  • (2024)MSR Codes with Linear Field Size and Smallest Sub-packetization for Any Number of Helper Nodes2024 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT57864.2024.10619086(807-812)Online publication date: 7-Jul-2024
  • (2024)Towards Breaking the Half-Barrier of Local Leakage-Resilient Shamir’s Secret SharingAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68388-6_10(257-285)Online publication date: 18-Aug-2024
  • (2024)Constructing Leakage-Resilient Shamir’s Secret Sharing: Over Composite Order FieldsAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58737-5_11(286-315)Online publication date: 26-May-2024
  • (2023)Privacy-preserving cryptographic algorithms and protocols: a survey on designs and applicationsSCIENTIA SINICA Informationis10.1360/SSI-2022-043453:9(1688)Online publication date: 6-Sep-2023
  • (2023)Designing Compact Repair Groups for Reed-Solomon Codes2023 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT54713.2023.10206491(2027-2032)Online publication date: 25-Jun-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media