...
首页> 外文期刊>Cloud Computing, IEEE Transactions on >Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes
【24h】

Privacy-Preserving Data Storage in Cloud Using Array BP-XOR Codes

机译:使用阵列BP-XOR代码在云中保护隐私的数据存储

获取原文
获取原文并翻译 | 示例
           

摘要

LDPC codes, LT codes, and digital fountain techniques have received significant attention from both academics and industry in the past few years. By employing the underlying ideas of efficient Belief Propagation (BP) decoding process in LDPC and LT codes, this paper designs the BP-XOR codes and use them to design three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and LDPC secret sharing schemes. By establishing the equivalence between the edge-colored graph model and degree-two BP-XOR secret sharing schemes, we are able to design novel perfect and ideal -out-of- BP-XOR secret sharing schemes. By employing techniques from array code design, we are also able to design other threshold LDPC secret sharing schemes. In the efficient (pseudo) BP-XOR/LDPC secret sharing schemes that we will construct, only linear number of XOR (exclusive-or) operations on binary strings are required for both secret distribution phase and secret reconstruction phase. For a comparison, we should note that Shamir secret sharing schemes require field operations for the secret distribution phase and field operations for the se- ret reconstruction phase. Furthermore, our schemes achieve the optimal update complexity for secret sharing schemes. By update complexity for a secret sharing scheme, we mean the average number of bits in the participant's shares that needs to be revised when certain bit of the master secret is changed. The extremely efficient secret sharing schemes discussed in this paper could be used for massive data storage in cloud environments achieving privacy and reliability without employing encryption techniques.
机译:在过去的几年中,LDPC码,LT码和数字喷泉技术受到了学术界和行业的极大关注。通过利用LDPC和LT码中有效信念传播(BP)解码过程的基本思想,本文设计BP-XOR码,并使用它们来设计三类秘密共享方案,称为BP-XOR秘密共享方案,即伪BP。 -XOR秘密共享方案和LDPC秘密共享方案。通过建立边缘彩色图模型和二级BP-XOR秘密共享方案之间的等价关系,我们能够设计出新颖的,完美的,理想的BP-XOR秘密共享方案。通过采用阵列代码设计中的技术,我们还能够设计其他阈值LDPC秘密共享方案。在我们将构建的高效(伪)BP-XOR / LDPC秘密共享方案中,秘密分发阶段和秘密重建阶段都只需要对二进制字符串进行线性数量的XOR(异或)运算。为了进行比较,我们应该注意,Shamir秘密共享方案在秘密分发阶段需要现场操作,而在秘密重建阶段需要现场操作。此外,我们的方案实现了秘密共享方案的最佳更新复杂性。所谓秘密共享方案的更新复杂度,是指当主秘密的某些位发生变化时需要修改的参与者共享中的平均位数。本文讨论的极为有效的秘密共享方案可用于云环境中的海量数据存储,而无需采用加密技术即可实现隐私和可靠性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号