-
Low Complexity Secure Code (LCSC) Design for Big Data in Cloud Storage Systems
Authors:
Mohsen Karimzadeh Kiskani,
Hamid R. Sadjadpour,
Mohammad Reza Rahimi,
Fred Etemadieh
Abstract:
In the era of big data, reducing the computational complexity of servers in data centers will be an important goal. We propose Low Complexity Secure Codes (LCSCs) that are specifically designed to provide information theoretic security in cloud distributed storage systems. Unlike traditional coding schemes that are designed for error correction capabilities, these codes are only designed to provid…
▽ More
In the era of big data, reducing the computational complexity of servers in data centers will be an important goal. We propose Low Complexity Secure Codes (LCSCs) that are specifically designed to provide information theoretic security in cloud distributed storage systems. Unlike traditional coding schemes that are designed for error correction capabilities, these codes are only designed to provide security with low decoding complexity. These sparse codes are able to provide (asymptotic) perfect secrecy similar to Shannon cipher. The simultaneous promise of low decoding complexity and perfect secrecy make these codes very desirable for cloud storage systems with large amount of data. The design is particularly suitable for large size archival data such as movies and pictures. The complexity of these codes are compared with traditional encryption techniques.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
A Secure Approach for Caching Contents in Wireless Ad Hoc Networks
Authors:
Mohsen Karimzadeh Kiskani,
Hamid Sadjadpour
Abstract:
Caching aims to store data locally in some nodes within the network to be able to retrieve the contents in shorter time periods. However, caching in the network did not always consider secure storage (due to the compromise between time performance and security). In this paper, a novel decentralized secure coded caching approach is proposed. In this solution, nodes only transmit coded files to avoi…
▽ More
Caching aims to store data locally in some nodes within the network to be able to retrieve the contents in shorter time periods. However, caching in the network did not always consider secure storage (due to the compromise between time performance and security). In this paper, a novel decentralized secure coded caching approach is proposed. In this solution, nodes only transmit coded files to avoid eavesdropper wiretapping and protect the user contents. In this technique random vectors are used to combine the contents using XOR operation. We modeled the proposed coded caching scheme by a Shannon cipher system to show that coded caching achieves asymptotic perfect secrecy. The proposed coded caching scheme significantly simplifies the routing protocol in cached networks while it reduces over-caching and achieves a higher throughput capacity compared to uncoded caching in reactive routing. It is shown that with the proposed coded caching scheme any content can be retrieved by selecting a random path while achieving asymptotic optimum solution. We have also studied the cache hit probability and shown that the coded cache hit probability is significantly higher than uncoded caching. A secure caching update algorithm is also presented.
△ Less
Submitted 31 August, 2017;
originally announced September 2017.
-
Secure and Private Cloud Storage Systems with Random Linear Fountain Codes
Authors:
Mohsen Karimzadeh Kiskani,
Hamid Sadjadpour
Abstract:
An information theoretic approach to security and privacy called Secure And Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to distributed data storage systems. In this approach, random combinations of all contents are stored across the network. Our coding approach is based on Random Linear Fountain (RLF) codes. To retrieve a content, a group of servers collaborate with each…
▽ More
An information theoretic approach to security and privacy called Secure And Private Information Retrieval (SAPIR) is introduced. SAPIR is applied to distributed data storage systems. In this approach, random combinations of all contents are stored across the network. Our coding approach is based on Random Linear Fountain (RLF) codes. To retrieve a content, a group of servers collaborate with each other to form a Reconstruction Group (RG). SAPIR achieves asymptotic perfect secrecy if at least one of the servers within an RG is not compromised. Further, a Private Information Retrieval (PIR) scheme based on random queries is proposed. The PIR approach ensures the users privately download their desired contents without the servers knowing about the requested contents indices. The proposed scheme is adaptive and can provide privacy against a significant number of colluding servers.
△ Less
Submitted 18 June, 2017;
originally announced June 2017.
-
Throughput Analysis of Decentralized Coded Content Caching in Cellular Networks
Authors:
Mohsen Karimzadeh Kiskani,
Hamid R. Sadjadpour
Abstract:
Decentralized coded content caching for next generation cellular networks is studied. The contents are linearly combined and cached in under-utilized caches of User Terminals (UTs) and its throughput capacity is compared with decentralized uncoded content caching. In both scenarios, we consider multihop Device-to-Device (D2D) communications and the use of femtocaches in the network. It is shown th…
▽ More
Decentralized coded content caching for next generation cellular networks is studied. The contents are linearly combined and cached in under-utilized caches of User Terminals (UTs) and its throughput capacity is compared with decentralized uncoded content caching. In both scenarios, we consider multihop Device-to-Device (D2D) communications and the use of femtocaches in the network. It is shown that decentralized coded content caching can increase the network throughput capacity compared to decentralized uncoded caching by reducing the number of hops needed to deliver the desired content. Further, the throughput capacity for Zipfian content request distribution is computed and it is shown that the decentralized coded content cache placement can increase the throughput capacity of cellular networks by a factor of $(\log(n))^2$ where $n$ is the number of nodes served by a femtocache.
△ Less
Submitted 9 November, 2016;
originally announced November 2016.
-
Capacity of Cellular Networks with Femtocache
Authors:
Mohsen Karimzadeh Kiskani,
Hamid R. Sadjadpour
Abstract:
The capacity of next generation of cellular networks using femtocaches is studied when multihop communications and decentralized cache placement are considered. We show that the storage capability of future network User Terminals (UT) can be effectively used to increase the capacity in random decentralized uncoded caching. We further propose a random decentralized coded caching scheme which achiev…
▽ More
The capacity of next generation of cellular networks using femtocaches is studied when multihop communications and decentralized cache placement are considered. We show that the storage capability of future network User Terminals (UT) can be effectively used to increase the capacity in random decentralized uncoded caching. We further propose a random decentralized coded caching scheme which achieves higher capacity results than the random decentralized uncoded caching. The result shows that coded caching which is suitable for systems with limited storage capabilities can improve the capacity of cellular networks by a factor of log(n) where n is the number of nodes served by the femtocache.
△ Less
Submitted 18 April, 2016;
originally announced April 2016.
-
Multihop Caching-Aided Coded Multicasting for the Next Generation of Cellular Networks
Authors:
Mohsen Karimzadeh Kiskani,
Hamid R. Sadjadpour
Abstract:
Next generation of cellular networks deploying wireless distributed femtocaching infrastructure proposed by Golrezaei et. al. are studied. By taking advantage of multihop communications in each cell, the number of required femtocaching helpers is significantly reduced. This reduction of femtocaches is achieved by using the underutilized storage and communication capabilities in the User Terminals…
▽ More
Next generation of cellular networks deploying wireless distributed femtocaching infrastructure proposed by Golrezaei et. al. are studied. By taking advantage of multihop communications in each cell, the number of required femtocaching helpers is significantly reduced. This reduction of femtocaches is achieved by using the underutilized storage and communication capabilities in the User Terminals (UTs), which results in reducing the deployment costs of distributed femtocaches. A multihop index coding technique is proposed to code the cached contents in helpers to achieve order optimal capacity gains. This can serve as an efficient content delivery algorithm for the solution provided by Golrezaei et. al. As an example, we consider a wireless cellular system in which contents have a popularity distribution. It has been shown that if the contents follow a high content reuse popularity distribution, our approach can replace many unicast communication with multicast communication. We will prove that simple linear index codes found by heuristics based on graph coloring algorithms can achieve order optimal capacity under Zipfian content popularity distribution.
△ Less
Submitted 6 June, 2016; v1 submitted 7 December, 2014;
originally announced December 2014.