{"title":"双码框架下的对抗性攻击","authors":"N. Marina, Natasha Paunkoska, Aneta Velkoska","doi":"10.1109/ICUMT.2016.7765381","DOIUrl":null,"url":null,"abstract":"Ensuring the security and reliability of the stored data in a Distributed Storage System (DSS) is a pivotal issue in a distributed storage network. The storage system must be secured against passive and active types of attacks for efficient protection of the stored data. The aim is achieving satisfactory level of security of the storage system and at the same time maintaining the desired level of reliability, which arises when there are node failures. In our work we apply this concept in a Twin-code framework, in presence of an intruder who can observe and modify the stored data on the networks nodes. We are making a new code construction, which is simultaneously secure against passive and active attacks and at the same time satisfies particular bound for reliability. Moreover, for this construction we are proving the level of security under the above mentioned constraints.","PeriodicalId":174688,"journal":{"name":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Adversarial attacks in the twin-code framework\",\"authors\":\"N. Marina, Natasha Paunkoska, Aneta Velkoska\",\"doi\":\"10.1109/ICUMT.2016.7765381\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring the security and reliability of the stored data in a Distributed Storage System (DSS) is a pivotal issue in a distributed storage network. The storage system must be secured against passive and active types of attacks for efficient protection of the stored data. The aim is achieving satisfactory level of security of the storage system and at the same time maintaining the desired level of reliability, which arises when there are node failures. In our work we apply this concept in a Twin-code framework, in presence of an intruder who can observe and modify the stored data on the networks nodes. We are making a new code construction, which is simultaneously secure against passive and active attacks and at the same time satisfies particular bound for reliability. Moreover, for this construction we are proving the level of security under the above mentioned constraints.\",\"PeriodicalId\":174688,\"journal\":{\"name\":\"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"volume\":\"7 4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICUMT.2016.7765381\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICUMT.2016.7765381","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ensuring the security and reliability of the stored data in a Distributed Storage System (DSS) is a pivotal issue in a distributed storage network. The storage system must be secured against passive and active types of attacks for efficient protection of the stored data. The aim is achieving satisfactory level of security of the storage system and at the same time maintaining the desired level of reliability, which arises when there are node failures. In our work we apply this concept in a Twin-code framework, in presence of an intruder who can observe and modify the stored data on the networks nodes. We are making a new code construction, which is simultaneously secure against passive and active attacks and at the same time satisfies particular bound for reliability. Moreover, for this construction we are proving the level of security under the above mentioned constraints.