Computer Science ›› 2020, Vol. 47 ›› Issue (2): 313-319.doi: 10.11896/jsjkx.181102161

• Information Security • Previous Articles    

Replica Dynamic Storage Based on RBEC

HONG Hai-cheng,CHEN Dan-wei   

  1. (School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China)
  • Received:2018-11-23 Online:2020-02-15 Published:2020-03-18
  • About author:HONG Hai-cheng,born in 1994,master.His main research interests include network security and network dynamic defense technology;CHEN Dan-wei,born in 1970,Ph.D,professor.His main research interests include Virtualization and cloud technologyand Computer communication network and security.
  • Supported by:
    This work was supported by the Key Program of the National Natural Science Foundation of China (61602114) and National Key R&D Program of China (2017YFB0801703).

Abstract: With the rapid development of cloud storage technology,the existing cloud storage architectures and storage patterns are presented in a static way to users and attackers,making the data face more security threats.This paper proposed a duplicate dynamic storage scheme based on Random Binary Extension Code (RBEC).The scheme uses a network code to store the data blocks on the cloud nodes.The data information of the nodes can be changed randomly and time-varying by the node data transformation based on Binary Random Extension Code.By changing the attack surface,it can increase the complexity and cost of the attacker,reduce the vulnerability exposure and the probability of being attacked,and improve the flexibility of the system.The theoretical analysis and simulation results show that the coding computation time cost of this method is not high in the whole dynamic transformation,and its main time cost is the transmission of data encoding blocks between nodes.In addition,the performance of this method was compared with the general regenerative code mimetic transformation schemes.Because of the characteristics of REBC,that is,the probability of the regenerated encoding matrix satisfying the MDS property is almost 1,the performance overhead of this method is better than that of general regenerative code which may transform many times in the encoding process.

Key words: Attack surface, Moving target defense, Network coding, Random binary extensive code, Replica storage

CLC Number: 

  • TP393
[1]CHEN H C H,HU Y,LEE P P C,et al.NCCloud:A network-coding-based storage system in a cloud-of-clouds[J].IEEE Transactions on computers,2014,63(1):31-44.
[2]LEONTIADIS I,CURTMOLA R.Secure Storage with Replication and Transparent Deduplication[C]∥Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy.ACM,2018:13-23.
[3]SHAHABINEJAD M,ARDAKANI M,KHABBAZIAN M.An erasure code with reduced average locality for distributed sto-rage systems[C]∥2017 International Conference on Computing,Networking and Communications(ICNC).IEEE,2017:427-431.
[4]GLIGOROSKI D,KRALEVSKA K,JENSEN R E,et al.Repair Duality with Locally Repairable and Locally Regenerating Codes[C]∥2017 IEEE 15th Intl Dependable,Autonomic and Secure Computing,15th Intl Conf on Pervasive Intelligence & Computing,3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech).IEEE,2017:979-984.
[5]MAHAJAN J,BORKAR B S.Public Auditing for Regenerating Code Based Cloud Storage[C]∥International Conference on Science and Engineering for Sustainable Development.IEEE,2017:16-22.
[6]WARAMBHE P,GODE S,MULE S.Privacy-Preserving and Public Auditing for Regenerating-Code-Based Cloud Storage Using Finger Print Authentication[C]∥International Conference on Communication & Electronic Information Engineering.IEEE,2017:153-166.
[7]SURYAWANSHI M,KAMBLE A,HIREKHAN S,et al.Privacy-Preserving and Public Auditing for Regenerating-Code-Based Cloud Storage[C]∥International Conference on Communication &Electronic Information Engineering.IEEE,2018:763-769.
[8]GURUSWAMI V,WOOTTERS M.Repairing reed-solomon codes[J].IEEE Transactions on Information Theory,2017,63(9):5684-5698.
[9]JIANG S,MO F,LAU F C M,et al.Tree-Permutation-Matrix Based LDPC Codes[J].IEEE Transactions on Circuits and Sys-tems II:Express Briefs,2018,65(8):1019-1023.
[10]KUMAR S,ROSNES E,I AMAT A G.Secure repairable fountain codes[J].IEEE Communications Letters,2016,20(8):1491-1494.
[11]HAO J,LU Y B,LIU X J,et al.Survey for regenerating codes for distributed Storage[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2013,25(1):30-38.
[12]KADHE S,SPRINTSON A.Universally weakly secure coset coding schemes for minimum storage regenerating (MSR) codes[C]∥2017 55th Annual Allerton Conference on Communication,Control,and Computing (Allerton).IEEE,2017:25-30.
[13]DAU S H,SONG W,YUEN C.On block security of regenerating codes at the MBR point for distributed storage systems[C]∥2014 IEEE International Symposium on Information Theory (ISIT).IEEE,2014:1967-1971.
[14]EVANS D,NGUYEN-TUONG A,KNIGHT J.Effectiveness of moving target defenses[M]∥Moving Target Defense.New York:Springer,2011:29-48.
[15]LEI C,ZHANG H Q,TAN J L,et al.Moving Target Defense Techniques:A Survey[J].Security and Communication Networks,2018(2):14-27.
[16]CARVALHO M,FORD R.Moving-target defenses for computer networks[J].IEEE Security & Privacy,2014,12(2):73-76.
[17]WANG S,ZHANG L,TANG C.A new dynamic address solution for moving target defense[C]∥Information Technology,Networking,Electronic and Automation Control Conference.IEEE,2016:1149-1152.
[18]CHEN L,ZHANG J Z,TENG P G,et al.Random Binary Extensive Code:An Efficient Code for Distributed Storage System[J].Chinese Journal of Computers,2017,40(9):1980-1995.
[19]CHEN Y,WANG L J,YAN X C,et al.Mimic storage scheme based on regenerated code [J].Journal on Communications,2018,39(4):21-34.
[1] GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331.
[2] HAN Xiao-dong, GAO Fei, ZHANG Li-wei. Novel Real-time Algorithm for Critical Path of Linear Network Coding [J]. Computer Science, 2020, 47(9): 232-237.
[3] XU Guang-xian, CUI Jun-jie. Anti-eavesdropping Network Coding Based on Quantum GHZ State [J]. Computer Science, 2020, 47(7): 314-321.
[4] SONG Ying, ZHONG Xian, SUN Bao-lin, GUI Chao. Sliding Window-based Network Coding Cooperative Algorithm in MANET [J]. Computer Science, 2020, 47(11): 322-326.
[5] ZHANG Jin-hui, DENG Qian, LI Zhen-yu. Study on Application of Network Coding and Multipath Transmission in Internet Live Video Broadcasting [J]. Computer Science, 2019, 46(8): 171-177.
[6] JI Bao-feng, WANG Yi-dan, XING Bing-bing, LI Yu-qi, GAO Hong-feng, HAN Cong-cheng. Enhancement Method of Throughput in Ultra-dense Network Based on Hierarchical Multi-hop Physical Layer Network Coding [J]. Computer Science, 2019, 46(7): 56-60.
[7] CHEN Jie, XIE Xian-zhong, HUANG Qian, LI Jia. Network Coding TCP Protocol Based on Cross-layer Optimization in Wireless Vehicle Networks [J]. Computer Science, 2019, 46(2): 88-94.
[8] GUO Bin, YU Dan-dan, LU Wei, HUANG Ming-he, ZENG Ya-lin. Selective Network Coding Strategy Based on Packet Loss Prediction [J]. Computer Science, 2019, 46(11A): 399-404.
[9] HAN Li and QIAN Huan-yan. Opportunistic Routing Algorithm Combining Intra-session Coding and Inter-session Coding in Wireless Network [J]. Computer Science, 2018, 45(5): 69-74.
[10] LIU Yan-tao, LIU Heng. Cloud Storage System Based on Network Coding [J]. Computer Science, 2018, 45(12): 293-298.
[11] LU Ming-yue, GUO Dao-xing and NIU He-hao. New Physical Layer Network Coding Denoising Mapping Algorithm Based on MQAM [J]. Computer Science, 2017, 44(Z6): 284-287.
[12] XU Jing, LIU Yan-tao, XIA Gui-yang and Yasser MORGAN. Network Coding Based Topology Inference:A Survey [J]. Computer Science, 2016, 43(Z6): 242-248.
[13] TAO Wen, JIN Ling, BAI Guang-wei and SHEN Hang. Performance Model for Network-coding-aware Opportunistic Routing in Wireless Networks [J]. Computer Science, 2016, 43(9): 156-159.
[14] WANG Zhen-chao, CAI Zhi-jie and XUE Wen-ling. Opportunistic Routing Algorithm Based on Partial Network Coding for Wireless Networks [J]. Computer Science, 2016, 43(9): 152-155.
[15] WANG Zhen-chao, CAI Zhi-jie and XUE Wen-ling. Network Coding Based Energy-aware Routing Protocol for Ad Hoc Network [J]. Computer Science, 2016, 43(7): 106-110.
Full text



No Suggested Reading articles found!