Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks

Download
2020-06-01
Yang, Siyi
Hareedy, Ahmed
Calderbank, Robert
Dolecek, Lara
The continuous rise of the blockchain technology is moving various information systems towards decentralization. Blockchain-based decentralized storage networks (DSNs) offer significantly higher privacy and lower costs to customers compared with centralized cloud storage associated with specific vendors. Coding is required to retrieve data stored on failing components. While coding solutions for centralized storage have been intensely studied, those for DSNs have not yet been discussed. In this paper, we propose a coding scheme where each node receives extra protection through cooperation with nodes in its neighborhood in a heterogeneous DSN with any given topology. Our scheme can achieve faster recovery speed compared with existing network coding methods, and can correct more erasure patterns compared with our previous work.
2020 IEEE International Symposium on Information Theory, ISIT 2020

Suggestions

Hierarchical Coding for Cloud Storage: Topology-Adaptivity, Scalability, and Flexibility
Yang, Siyi; Hareedy, Ahmed; Calderbank, Robert; Dolecek, Lara (2022-06-01)
In order to accommodate the ever-growing data from various, possibly independent, sources and the dynamic nature of data usage rates in practical applications, modern cloud data storage systems are required to be scalable, flexible, and heterogeneous. The recent rise of the blockchain technology is also moving various information systems towards decentralization to achieve high privacy at low costs. While codes with hierarchical locality have been intensively studied in the context of centralized cloud stor...
Decentralized secure multiparty computation
Taşcı, Buse; Cenk, Murat; Department of Cryptography (2019)
Advances in blockchain technology have led to new applications that aim to eliminate central systems, to improve transparency and user control in transactions whiledealing with the privacy and security challenges. In this thesis, a system which enables users to control their private data and to share chosen data to other parties usingsecure computation techniques is reviewed. Then, we present a blockchain-based digital identity system depending on this architecture. This system ensures that identity informa...
Hierarchical multitasking control of discrete event systems: Computation of projections and maximal permissiveness
Schmidt, Klaus Verner; Cury, José E.r. (null; 2010-12-01)
This paper extends previous results on the hierarchical and decentralized control of multitasking discrete event systems (MTDES). Colored observers, a generalization of the observer property, together with local control consistency, allow to derive sufficient conditions for synthesizing modular and hierarchical control that are both strongly nonblocking (SNB) and maximally permissive. A polynomial procedure to verify if a projection fulfills the above properties is proposed and in the case they fail for a g...
Joint Virtual Machine Embedding and Wireless Data Center Topology Management
Bütün, Beyza; Onur, Ertan; Department of Computer Engineering (2022-5-10)
With emerging technologies such as the Internet of Things and 5G, generated data grows enormously. Hence, Data Center Networks (DCNs) have an important duty to store and process a significant amount of data, which makes them a critical component of the network. To meet the massive amount of traffic demands, wired DCNs need to deploy large numbers of servers and power-hungry switches, and huge lengths of wires. An enormous increase in the usage of cables causes high cabling complexity and cost while deployin...
Diversity Analysis of Hierarchical Modulation in Wireless Relay Networks
Yalcyn, Ahmet Zahid; Yüksel Turgut, Ayşe Melda (2014-07-01)
In communication systems, hierarchical modulation is used to increase system robustness and to send different information flows simultaneously. However, when used in cooperative communication systems, hierarchical modulation is prone to error propagation, which is the most important problem that prevents the achievement of full diversity gains. Depending on the signal-to-noise ratio between the source and the relay, threshold digital relaying can be used to mitigate error propagation. Mitigating error propa...
Citation Formats
S. Yang, A. Hareedy, R. Calderbank, and L. Dolecek, “Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks,” California, Amerika Birleşik Devletleri, 2020, vol. 2020-June, Accessed: 00, 2022. [Online]. Available: https://hdl.handle.net/11511/98531.