1 / 22

NC-Audit: Auditing for Network Coding Storage

NC-Audit: Auditing for Network Coding Storage. Anh Le and Athina Markopoulou University of California, Irvine. Outline. Background Related Work Key Techniques NC-Audit Evaluation Conclusion. NC-Based Distributed Storage. Key ideas: - Sub- packetization - Mixing when repair.

mare
Download Presentation

NC-Audit: Auditing for Network Coding Storage

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NC-Audit: Auditing for Network Coding Storage Anh Le and AthinaMarkopoulou University of California, Irvine

  2. Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage

  3. NC-Based Distributed Storage • Key ideas:- Sub-packetization- Mixing when repair [Dimakis, 2011] NC-Audit: Auditing for NC Storage

  4. The Auditing Problem Data Audit Audit Security Message NC-Audit: Auditing for NC Storage

  5. Threat Model • Storage node hides data corruption • TPA acquires data from the auditing NC-Audit: Auditing for NC Storage

  6. Desired Properties of NC-Audit • Data correctness guarantee • Privacy-preservingauditing • Support for repair and data dynamics • Low overhead NC-Audit: Auditing for NC Storage

  7. Related Work • Integrity Checking for Remote Data • Proof of Retrievability[Juels ’07], [Shacham ’08] • Proof of Data Posession[Ateniese ’07] • Support for Data Dynamics[Ateniese ’08], [Erway ’09][Wang ’09] • Privacy Preserving Auditing[Shah ’06], [Wang ’10] • For NC Storage • Error Detection[Dikaliotis ’10] • Proof of Retrievability[Chen ’10] NC-Audit: Auditing for NC Storage

  8. Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage

  9. The Naïve Scheme • Inefficient • Does not support repair • Violate privacy … ek ek eM e1 tM tk tk t1 k ei ti HMAC HMAC NC-Audit: Auditing for NC Storage

  10. Key Techniques of NC-Audit c c t t NCrypt c Σαiei • SpaceMac- Homomorphic MAC • NCrypt- CPA-secure encryption … ek eM ek Σαiei Σαiei e1 tM tk tk t1 t t k1, .., kn k ei ti HMAC SpaceMac HMAC SpaceMac NC-Audit: Auditing for NC Storage

  11. SpaceMac[Le, NetCod 10]Homomorphic Message Authentication Codes NC-Audit: Auditing for NC Storage

  12. NCryptRandom Linear CPA-Secure Encryption NC-Audit: Auditing for NC Storage

  13. Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage

  14. NC-Audit = SpaceMac + NCrypt • Homomorphic MAC: SpaceMac • Random Linear Encryption: NCrypt e t e c e t t t e c c t NC-Audit: Auditing for NC Storage

  15. Repairing with Regular Scheme e1 e7 e3 e4 e’7 e2 e8 e5 e6 e'8 t6 t1 t3 t2 t4 t'8 t5 t'7 t8 t7 α1e1 + α2e2 High cost Node 1 e’7 t'7 α3e3+ α4e4 e'8 t'8 Node 2 α5e5 + α6e6 Node 3 Node 4 Node 4 NC-Audit: Auditing for NC Storage

  16. Repairing with NC-Audit e2 e3 e1 e4 e5 e6 α1e1 + α2e2 e8 e’7 α5e5 + α6e6 α3e3+ α4e4 e'8 e7 t'8 t4 t2 t6 α1t1 + α2t2 t7 α3t3 + α4t4 t3 t'7 α5t5 + α6t6 t1 t5 t8 Node 1 Node 2 Node 3 Node 4 Node 4 NC-Audit: Auditing for NC Storage

  17. Security Guarantees of NC-Audit • Data Posession • Privacy NC-Audit: Auditing for NC Storage

  18. Outline • Background • Related Work • Key Techniques • NC-Audit • Evaluation • Conclusion NC-Audit: Auditing for NC Storage

  19. Performance Evaluation • Comparisons: • [Wang et al., ESORICS ’09] • [Wang et al., INFOCOM ’10] • [Chen et al., CCSW ’10] • Implementation: • Java: - javax.crypto • 80-bit security: - q = 28, l = 10- 4 KB block NC-Audit: Auditing for NC Storage

  20. Performance Evaluation NC-Audit: Auditing for NC Storage

  21. Conclusion • NC-Audit: Auditing scheme for NC storage • Data correctness guarantee- SpaceMac • Privacy-preservingauditing- NCrypt • Support for repair and data dynamics • Low overhead NC-Audit: Auditing for NC Storage

  22. http://www.ics.uci.edu/~anhml/software.html This work is supported by NSF and AFOSR

More Related