Nothing Special   »   [go: up one dir, main page]

skip to main content
article

Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes

Published: 01 October 2015 Publication History

Abstract

LDPC codes, LT codes, and digital fountain techniques have received significant attention from both academics and industry in the past few years. By employing the underlying ideas of efficient Belief Propagation (BP) decoding process in LDPC and LT codes, this paper designs the BP-XOR codes and use them to design three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and LDPC secret sharing schemes. By establishing the equivalence between the edge-colored graph model and degree-two BP-XOR secret sharing schemes, we are able to design novel perfect and ideal \(2\)Image (wang-ieq1-2344662.gif) is missing or otherwise invalid.-out-of-\(n\)Image (wang-ieq2-2344662.gif) is missing or otherwise invalid. BP-XOR secret sharing schemes. By employing techniques from array code design, we are also able to design other \((n,k)\)Image (wang-ieq3-2344662.gif) is missing or otherwise invalid. threshold LDPC secret sharing schemes. In the efficient (pseudo) BP-XOR/LDPC secret sharing schemes that we will construct, only linear number of XOR (exclusive-or) operations on binary strings are required for both secret distribution phase and secret reconstruction phase. For a comparison, we should note that Shamir secret sharing schemes require \(O(n\,\log\, n)\)Image (wang-ieq4-2344662.gif) is missing or otherwise invalid. field operations for the secret distribution phase and \(O(n^2)\)Image (wang-ieq5-2344662.gif) is missing or otherwise invalid. field operations for the secret reconstruction phase. Furthermore, our schemes achieve the optimal update complexity for secret sharing schemes. By update complexity for a secret sharing scheme, we mean the average number of bits in the participant's shares that needs to be revised when certain bit of the master secret is changed. The extremely efficient secret sharing schemes discussed in this paper could be used for massive data storage in cloud environments achieving privacy and reliability without employing encryption techniques.

Cited By

View all
  • (2021)FastShare: Scalable Secret Sharing by Leveraging Locality2021 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT45174.2021.9518282(1118-1123)Online publication date: 12-Jul-2021
  • (2019): privacy-preserving data outsourcing framework with differential privacyKnowledge and Information Systems10.1007/s10115-019-01405-762:5(1923-1960)Online publication date: 12-Oct-2019
  • (2018)How to Best Share a Big SecretProceedings of the 11th ACM International Systems and Storage Conference10.1145/3211890.3211896(76-88)Online publication date: 4-Jun-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Cloud Computing
IEEE Transactions on Cloud Computing  Volume 3, Issue 4
October 2015
48 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 October 2015

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)FastShare: Scalable Secret Sharing by Leveraging Locality2021 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT45174.2021.9518282(1118-1123)Online publication date: 12-Jul-2021
  • (2019): privacy-preserving data outsourcing framework with differential privacyKnowledge and Information Systems10.1007/s10115-019-01405-762:5(1923-1960)Online publication date: 12-Oct-2019
  • (2018)How to Best Share a Big SecretProceedings of the 11th ACM International Systems and Storage Conference10.1145/3211890.3211896(76-88)Online publication date: 4-Jun-2018
  • (2017)Candidate MDS Array Codes for Tolerating Three Disk Failures in RAID-7 ArchitecturesProceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies10.1145/3148055.3148056(33-42)Online publication date: 5-Dec-2017

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media