1

New Results on Multilevel Diversity Coding with Secure Regeneration Shuo Shao, Student Member, IEEE, Tie Liu, Senior Member, IEEE, Chao Tian, Senior Member, IEEE and Cong Shen, Senior Member, IEEE

Abstract—The problem of multilevel diversity coding with secure regeneration is revisited. Under the assumption that the eavesdropper can access the repair data for all compromised storage nodes, Shao el al. provided a precise characterization of the minimum-bandwidth-regeneration (MBR) point of the achievable normalized storage-capacity repair-bandwidth tradeoff region. In this paper, it is shown that the MBR point of the achievable normalized storage-capacity repair-bandwidth tradeoff region remains the same even if we assume that the eavesdropper can access the repair data for some compromised storage nodes (type II compromised nodes) but only the data contents of the remaining compromised nodes (type I compromised nodes), as long as the number of type I compromised nodes is no greater than that of type II compromised nodes.

I. I NTRODUCTION Diversity coding, node repair, and security are three basic ingredients of modern distributed storage systems. The interplay of all three ingredients is captured by a fairly general mathematical model known multilevel diversity coding with secure regeneration (MDC-SR) [1]. More specifically, in an (n, d, `) MDC-SR problem, a total of d − ` independent files M`+1 , . . . , Md of size B`+1 , . . . , Bd , respectively, are to be encoded and stored in n distributed storage nodes, each of capacity α. The encoding needs to ensure that: • (Diversity coding) the file Mj can be perfectly recovered by having full access to any j out of the total n storage nodes for any j ∈ {` + 1, . . . , d}; •

(Node repair) when node failures occur and there are d remaining nodes in the system, any failed node can be recovered by downloading data of size β from each one of the remaining nodes;

(Security) the files M`+1 , . . . , Md needs to be kept information-theoretically secure against an eavesdropper, which can access the repair data for ` compromised storage nodes. Setting ` = 0, the above problem reduces to the problem of multilevel diversity coding with regeneration (MDC-R) considered in [2], [3]. Setting Bj = 0 for all j 6= k, the above problem reduces to the (n, k, d, `) secure regenerating •

S. Shao is with the Department of Electrical Engineering, Shanghai Jiaotong University, Shanghai, China (e-mail:[email protected]) T. Liu and C. Tian are with the Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USA (email: {tieliu,chao.tian}@tamu.edu) C. Shen is with School of Information Science and Technology, University of Science and Technology of China (USTC), Hefei, China 230027, (e-mail: [email protected]).

code (SRC) problem considered in [4]–[11]. The goal is to understand the optimal tradeoffs between the storage capacity and repair bandwidth in satisfying all three aforementioned requirements. From the code construction perspective, it is natural to consider the so-called separate coding scheme, i.e., to construct a code for the (n, d, `) MDC-SR problem, we can simply use an (n, j, d, `) SRC to encode the file Mj for each j ∈ {`+1, . . . , d}, and the coded messages for each file remain separate when stored in the storage nodes and during the repair processes. However, despite being a natural scheme, it was shown in [2] that separate coding is in general suboptimal in achieving the optimal tradeoffs between the normalized storage-capacity and repair-bandwidth for the MDC-R problem (which is a special case of the MDC-SR problem as mentioned previously). On the other hand, it has been shown [1] that separate coding can, in fact, achieve the minimum-bandwidth-regenerating (MBR) point of the achievable normalized storage-capacity and repairbandwidth tradeoff region for the general MDC-SR problem. Nevertheless, the optimal tradeoffs between the storage capacity α and download bandwidth β , and, the performance of the minimum-storage-regenerating (MSR) point are still not fully understood. Especially for the MSR point, a code was given in [6] for SRC problem by extending the known MSR code without any security constraint. This coding scheme can achieve the MSR point when d ≥ 2k − 2 and the eavesdropper can only observe type I compromised nodes (the definition of type I compromised node will be defined in the following part). However, it is still unknown as to whether this code is optimal for the more general eavesdropper model in our paper. In this paper, we shall revisit the MDC-SR problem with a more general eavesdropping model. More specifically, instead of assuming that the eavesdropper can access the repair data for all compromised storage nodes, we shall assume that the compromised storage nodes can be divided into two different categories: type I compromised nodes and type II compromised nodes. While for the type II compromised nodes, we assume that the eavesdropper can access the repair data as before, for the type I compromised nodes we assume that the eavesdropper can only access the stored data contents. Let `1 and `2 be the number of type I compromised nodes and type II compromised nodes respectively, and ` := `1 + `2 be the total number of compromised nodes. By the node repair requirement, the data contents stored at any node can be fully recovered from its repair data. Therefore, for any fixed `, the eavesdropper becomes weaker as `1 increases, which leads to a potentially larger achievable normalized storage-capacity and repair-bandwidth tradeoff region. A question of fundamental

2

interest is to understand whether increasing `1 can lead to a strictly larger achievable normalized storage-capacity and repair-bandwidth tradeoff region. Our main result of the paper is to show that the MBR point of the achievable normalized storage-capacity and repair-bandwidth tradeoff region remains the same, as long as `1 ≤ `/2 (or equivalently, `1 ≤ `2 by the fact that `2 = ` − `1 ). From the technical viewpoint, this is mainly accomplished by establishing two outer bounds (one of them must be “horizontal”, i.e., on the normalized repairbandwidth only) on the achievable normalized storage-capacity and repair-bandwidth tradeoff region, which intersect precisely at the MBR point. The rest of the paper is organized as follows. In Section II we formally introduce the problem of MDC-SR with the generalized eavesdropping model. The main results of the paper are then presented in Section III. In Section IV, we introduce two “exchange” lemmas and use them to establish the main results of the paper. Finally, we conclude the paper in Section V. Notation. Sets and random variables will be written in calligraphic and sans-serif fonts respectively, to differentiate from the real numbers written in normal math fonts. For any two integers t ≤ t0 , we shall denote the set of consecutive integers {t, t + 1, . . . , t0 } by [t : t0 ]. The use of the brackets will be suppressed otherwise.

The main deference between our definition in this paper and that in [1] is the model of eavesdropper. The eavesdropper now can observer a more complicated data combination consisted of both stored content and repair content.Let `1 and `2 be two nonnegative integers such that ` := `1 + `2 < d. A normalized message-rate storage-capacity repair¯ is said to be achievbandwidth tuple (B¯`+1 , . . . , B¯d , α, ¯ β) able for the (n, d, `1 , `2 ) generalized MDC-SR problem if an (n, d, 1, . . . , 1, N`+1 , . . . , Nd , K, T, S) code (i.e., Nj = 1 for all j ∈ [1 : `]) can be found such that: •

(rate normalization) α Pd

t=`+1 Bt

function fi :



for each A ⊆ [1 : n] : |A| ∈ [1 : d], a message-decoding function gA : [1 : T ]|A| → [1 : N|A| ];



for each B ⊆ [1 : n] : |B| = d, i0 ∈ B, and i ∈ [1 : n] \ B, a repair-encoding function fiB0 →i : [1 : T ] → [1 : S];



for each B ⊆ [1 : n] : |B| = d and i ∈ [1 : n] \ B, a repair-decoding function giB : [1 : S]d → [1 : T ].

For each j ∈ [1 : d], let Mj be a message that is uniformly distributed over [1 : Nj ]. The messages M1 , . . . , Md are assumed to be mutually independent. Let K be a random key that is uniformly distributed over [1 : K] and independent of the messages (M1 , . . . , Md ). For each i ∈ [1 : n], let Wi = fi (M1 , . . . , Md , K) be the data stored at the ith storage node, and for each B ⊆ [1 : n] : |B| = d, i0 ∈ B, and B i ∈ [1 : n] \ B, let SB i0 →i = fi0 →i (Wi0 ) be the data downloaded 0 from the i th storage node in order to regenerate the data originally stored at the ith storage node under the context of repair group B. Obviously, (Bj = log Nj : j ∈ [1 : d]),

α = log T,

and β = log S

represent the message sizes, storage capacity, and repair bandwidth, respectively.

t=`+1 Bt

¯ P = β, d

Bj

t=`+1 Bt

¯j =B

for any j ∈ [` + 1 : d]; •

(message recovery) (2)

M|A| = gA (Wi : i ∈ A)

for any A ⊆ [1 : n] : |A| ∈ [` + 1 : d]; •

(node regeneration) 0 Wi = giB (SB i0 →i : i ∈ B)

(3)

for any B ⊆ [1 : n] : |B| = d and i ∈ [1 : n] \ B; •

• for Q each i ∈ [1  : n], a message-encoding d [1 : N ] × [1 : K] → [1 : T ]; j j=1

β

(1)

(repair secrecy)

II. T HE G ENERALIZED MDC-SR P ROBLEM In this paper, we study a distributed storage system that share the same file recovery and node repair function with [1]. Let (n, d, N1 , . . . , Nd , K, T, S) be a tuple of positive integers such that d < n. Formally, an (n, d, N1 , . . . , Nd , K, T, S) code consists of:

= α, ¯ P d

I((M`+1 , . . . , Md ); (Wi : i ∈ E1 ), (S→j : j ∈ E2 )) = 0 (4)

for any E1 , E2 ⊆ [1 : n] such that |E1 | = `1 , |E2 | = `2 and E1 ∩ E2 = ∅ (so E1 and E2 represent the sets of type I and type II compromised storage nodes, respectively), where 0 S→i := (SB i0 →i : B ⊆ [1 : n], |B| = d, B 63 i, i ∈ B) is the collection of data that can be downloaded from the other nodes to regenerate node i. ¯ tuples is the The closure of all achievable (B¯`+1 , . . . , B¯d , α, ¯ β) achievable normalized message-rate storage-capacity repairbandwidth tradeoff region Rn,d,`1 ,`2 for the (n, d, `1 , `2 ) generalized MDC-SR problem. For a fixed normalized messagerate tuple (B¯`+1 , . . . , B¯d ), the achievable normalized storagecapacity repair-bandwidth tradeoff region is the collection of ¯ all normalized storage-capacity repair-bandwidth pairs (α, ¯ β) ¯ ∈R and is denoted by such that (B¯`+1 , . . . , B¯d , α, ¯ β) n,d,`1 `2 ¯ ¯ Rn,d,`1 ,`2 (B `+1 , . . . , Bd ).

Fixing ` and setting `1 = 0, the (n, d, `1 , `2 ) generalized MDC-SR problem reduces to the (n, d, `) MDC-SR problem considered previously in [1], where it was shown that any achievable normalized message-rate storage-capacity repair¯ ∈R bandwidth tuple (B¯`+1 , . . . , B¯d , α, ¯ β) n,d,` must satisfy: β¯ ≥

d X

−1 ¯ Td,j,` Bj

(5)

j=`+1

and

α ¯ + (d(d − `) − `)β¯ ≥ (d − `)(d + 1)

d X

−1 ¯ Td,j,` Bj .

j=`+1

(6)

3

When set as equalities, the intersection of (5) and (6) is given by:   d d X X  −1 −1 ¯j , ¯j  α, ¯ β¯ = d Td,j,` B Td,j,` B j=`+1

(7)

j=`+1

which can be achieved by separate encoding with a previous scheme proposed by Shah, Rashmi, and Kumar [6]. This provides a precise characterization of the MBR point for the (n, d, `) MDC-SR problem. III. M AIN R ESULTS Our main result of the paper is to show that the tradeoff point (7) remains to be the MBR point of Rn,d,`1 ,`2 for the generalized MDC-SR problem as long as `1 ≤ `2 . The results are summarized in the following theorem. Theorem 1: For the generalized MDC-SR problem, any achievable normalized message-rate storage-capacity repair¯ ∈ R bandwidth tuple (B¯`+1 , . . . , B¯d , α, ¯ β) n,d,`1 ,`2 must satisfy: β¯ ≥

d X

−1 ¯ Td,j,` Bj

(8)

j=`+1

and in addition, when `1 ≤ `2 = ` − `1 , we also have α ¯ + Td,d,`1 +1 β¯ ≥ (Td,d,`1 + `1 )

d X

−1 ¯ Td,j,` Bj

(9)

Fig. 1. The optimal tradeoff region for (4, 3, 0, 0) MDC-SR problem ¯1 , B ¯2 , B ¯3 ) = (0, 1/3, 2/3) . The outer bounds (8), (10) and (6) when (B are evaluated as β¯ ≥ 8/45, α ¯ + 3β¯ ≥ 16/15, and α ¯ + 9β¯ ≥ 32/15, respectively. When set as equalities, they intersect precisely at the MBR point (8/15, 8/45).

n storage nodes must give rise to a (d + 1, d, `) MDCSR problem. Therefore, these outer bounds must apply as well. When n = d + 1, any repair group B of size d is uniquely determined by the node j to be repaired, i.e., B = [1 : n] \ {j}, and hence can be dropped from the notation SB i→j without causing any confusion. 2) Code symmetry. Due to the built-in symmetry of the problem, to prove the outer bounds (8) and (9), we only need to consider the so-called symmetrical codes [12] for which the joint entropy of any subset of random variables from ((M1 , . . . , Md ), K,

j=`+1

(Wi : i ∈ [1 : n]), (Si→j : i, j ∈ [1 : n], i 6= j)

Pk

where Td,k,` := t=`+1 (d + 1 − t). When set as equalities, the intersection of (8) and (9) is precisely given by (7). We may thus conclude immediately that (7) is the MBR point of Rn,d,`1 ,`2 for the generalized MDC-SR problem as long as `1 ≤ `2 . Note that setting `1 = 0, the outer bound (9) reduces to α ¯+

d d(d − 1) ¯ d(d + 1) X −1 ¯ β≥ Td,j,` Bj . 2 2

(10)

j=`+1

So while the outer bound (8) coincides with (5), the outer bound (9) does not reduce to (6) when setting `1 = 0. Simple calculations yield that the outer bound (10) is stronger than (6) if and only if ` ≤ d/2. In particular, when ` = 0, the outer bound (10) reduces to that for the (n, d) MDC-R problem [3], while the outer bound (6) is strictly weaker. Fig. 1 shows the comparison of (10) and (6) when (B¯1 , B¯2 , B¯3 ) = (0, 1/3, 2/3) in (4, 3, 0, 0) MDC-SR problem. In this figure, the outer bound (6) is below outer bound (10), though both of them intersect with (8) at the MBR point.

remains unchanged under any permutation over the storage-node indices. 3) Key collections of random variables. Focusing on the symmetrical (n = d + 1, d, N1 , . . . , Nd , K, T, S) codes, the following collections of random variables play a key role in our proof: MA := (Mi : i ∈ A), M

(m)

:= M[1:m] ,

Let us first outline the main ingredients for proving the outer bounds (8) and (9). 1) Total number of nodes. To prove the outer bounds (8) and (9), let us first note that these bounds are independent of the total number of storage nodes n in the system. Therefore, in our proof, we only need to consider the cases where n = d + 1. For the cases where n > d + 1, since any subsystem consisting of d + 1 out of the total

A ⊆ [1 : d]

m ∈ [1 : d]

WA := (Wi : i ∈ A) , A ⊆ [1 : n]  Si→B := Si→j : j ∈ B , i ∈ [1 : n], B ⊆ [1 : n] \ {i}  SB→j := Si→j : i ∈ B , j ∈ [1 : n], B ⊆ [1 : n] \ {j} S→j := S[1:j−1]∪[j+1:n]→j , j ∈ [1 : n]  S→B := S→j : j ∈ B , B ⊆ [1 : n] S→j := S[1:j−1]→j ,

j ∈ [1 : n]

S→B := (S→j : j ∈ B), S→j := S[j+1:n]→j ,

IV. P ROOF OF THE M AIN R ESULTS



j ∈ [1 : n]

S→B := (S→j : j ∈ B), (t,s)

U

(s)

U

B ⊆ [1 : n]

B ⊆ [1 : n]

:= (W[1:t] , S→[t+1:s] ),

:= U

(0,s)

s ∈ [1 : n], t ∈ [0 : s]

.

These collections of random variables have also been used in [3], [11]. An important part of the proof is to understand the relations between the collections of random variables defined above, and to use them to derive the desired converse results. We shall

4

Proof: Set i = i0 = `1 , j1 = m and j2 = ` in (12). We

discuss this next. have

Td,m,` d−m

A. Technical Lemmas



Lemma 1: For any (n = d + 1, d, N1 , . . . , Nd , K, T, S) code that satisfies the node regeneration requirement (3), (S→[t+1:s] , W[t+1:s] ) is a function of U(t,s) for any s ∈ [1 : n] and t ∈ [0 : s − 1]. The above lemma, which was first introduced in [1], [11], demonstrates the “compactness” of U(t,s) and has a number of direct consequences. For example, for any fixed s ∈ [1 : n], it is clear from Lemma 1 that U(t2 ,s) is a function of U(t1 ,s) and hence H(U(t2 ,s) ) ≤ H(U(t1 ,s) ) for any 0 ≤ t1 ≤ t2 ≤ s − 1. Lemma 2 (Exchange lemma I [1]): For any symmetrical (n = d + 1, d, N1 , . . . , Nd , K, T, S) code that satisfies the node regeneration requirement (3), we have d+1−j H(U(i,m) |M(m) ) + H(U |M(m) ) d−m 0 d+1−j ≥ H(U(i,m+1) |M(m) ) + H(U(i ,j−1) |M(m) ) d−m (i0 ,j)

(11) for any m ∈ [1 : d − 1], i ∈ [0 : m − 1], i0 ∈ [0 : i], and j ∈ [i0 + 1 : m − i + i0 + 1]. Corollary 3: For any symmetrical (n = d+1, d, N1 , . . . , Nd , K, T, S) code that satisfies the node regeneration requirement (3), we have Td,j1 ,j2

0 H(U(i,j1 ) |M(j1 ) ) + H(U(i ,j1 ) |M(j1 ) )

d − j1 ≥

Td,j1 ,j2 d − j1

0 H(U(i,j1 +1) |M(j1 ) ) + H(U(i ,j2 ) |M(j1 ) ) (12)

for any j1 ∈ [1 : d − 1], i = [0 : j1 ], i0 ∈ [max{0, i − 1} : i] and j2 ∈ [i0 : j1 − 1]. Proof: Set m = j1 in (11). We have 0 d+1−j H(U(i,j1 ) |M(j1 ) ) + H(U(i ,j) |M(j1 ) ) d − j1 0 d+1−j ≥ H(U(i,j1 +1) |M(j1 ) ) + H(U(i ,j−1) |M(j1 ) ) d − j1

(13) for any j ∈ [j2 +1 : j1 ]. Add the inequalities (13) for j ∈ [j2 +1 : Pj1 −1 (i0 ,j) |M(j1 ) ) j1 ] and cancel the common term j=j +1 H(U from both sides. We have Td,j1 ,j2 d − j1 ≥

2

d − j1

Td,m,` d−m

H(U(`1 ,m+1) |M(m) ) + H(U(`1 ,`) |M(m) ), (15)

which can be equivalently written as Td,m+1,` d−m

H(U(`1 ,m) |M(m) )



Td,m,` d−m

H(U(`1 ,m+1) |M(m) ) + H(U(`1 ,`) |M(m) )

(16) by the fact that Td,m,` + (d − m) = Td,m+1,` . Multiplying both sides of (16) by d−m −1 −1 = Td,m,` − Td,m+1,` Td,m+1,` Td,m,`

completes the proof of (12). Lemma 5 (exchange lemma II): For any symmetrical (n = d + 1, d, N1 , . . . , Nd , K, T, S) code that satisfies the node regeneration requirement (3), we have d − `1 H(U(`1 ,`) ) + H(U(`1 ,`1 +1) , S` +1→[1:` ] ) 1 1 d−` d − `1 (`1 ,`+1) (`1 ,`1 ) ≥ H(U ) + H(U , S` +1→[1:` ] ) (17) 1 1 d−` for any ` ∈ [1 : d − 1] and `1 ∈ [0 : b`/2c].

Proof: See the Appendix. We note here that when setting `1 = 0, the above lemma coincides with Lemma 2 with i = i0 = 0 and j = 1. B. The Proof Consider a symmetrical (n = d+1, d, 1, . . . , 1, N`+1 , . . . , Nd , K, T, S) regenerating code that satisfies the rate normalization requirement (1), the message recovery requirement (2), the node regeneration requirement (3), and the repair secrecy requirement (4). Let us first prove a few intermediate results. The outer bounds (8) and (9) will then follow immediately. Proposition 1: m X 1 −1 H(U(`1 ,`+1) ) ≥ Td,j,` Bj + d−` j=`+1   1 −1 −1 Td,m,` H(U(`1 ,m) |M[`+1:m] ) + − Td,m,` H(U(`1 ,`) ) d−`

(18)

0 H(U(i,j1 ) |M(j1 ) ) + H(U(i ,j1 ) |M(j1 ) )

Td,j1 ,j2

H(U(`1 ,m) |M(m) ) + H(U(`1 ,m) |M(m) )

for any m ∈ [` + 1 : d]. Consequently,

0 H(U(i,j1 +1) |M(j1 ) ) + H(U(i ,j2 ) |M(j1 ) ).

d X 1 1 −1 Td,j,` Bj + H(U(`1 ,`+1) ) ≥ H(U(`1 ,`) ). d−` d−` j=`+1

Corollary 4: For any symmetrical (n = d+1, d, N1 , . . . , Nd , K, T, S) code that satisfies the node regeneration requirement (3), we have −1 −1 Td,m,` H(U(`1 ,m) |M(m) ) ≥ Td,m+1,` H(U(`1 ,m+1) |M(m) )+ −1 −1 (Td,m,` − Td,m+1,` )H(U(`1 ,`) |M(m) )

(14) for any ` ∈ [0 : d − 1], `1 ∈ [0 : `] and m ∈ [` + 1 : d − 1].

(19) Proof: To see (18), consider proof by induction. For the base case with m = ` + 1, we have 1 H(U(`1 ,`+1) ) d−` (a) 1 = H(U(`1 ,`+1) , M`+1 ) d−`  (b) 1  = H(M`+1 ) + H(U(`1 ,`+1) |M`+1 ) d−`

5

(c)

=

 1  B`+1 + H(U(`1 ,`+1) |M`+1 ) d−`

(d) −1 −1 = Td,`+1,` B`+1 + Td,`+1,` H(U(`1 ,`+1) |M`+1 )

where (a) follows from the fact that M`+1 is a function of W[1:`+1] , which is a function of U(`1 ,`+1) by Lemma 1; (b) follows from the chain rule for entropy; (c) follows from the fact that H(M`+1 ) = B`+1 ; and (d) follows from the fact that Td,`+1,` = d − `. Assuming that (18) holds for some m ∈ [` + 1 : d − 1], we have 1 H(U(`1 ,`+1) ) d−` m (a) X −1 −1 ≥ Td,j,` Bj + Td,m,` H(U(`1 ,m) |M[`+1:m] )+

−1 Td,d,` H(U(`1 ,d) |M[`+1:d] ) +



 1 −1 − Td,d,` H(U(`1 ,`) ). d−`

(20) Note that H(U(`1 ,d) |M[`+1:d] ) ≥ H(U(`1 ,`) |M[`+1:d] ) = H(U(`1 ,`) )

(21) where the last equality follows from the fact that I(U(`1 ,`) ; M[`+1:d] ) = 0 by the repair secrecy requirement (4). Substituting (21) into (20) completes the proof of (19). Proposition 2: ` ` H(S` +1→[1:` ] ) + 1 H(U(`1 ,`) ) ≥ 1 H(U(`1 ,`+1) ). 1 1 d−` d−`

(22)

j=`+1





1 −1 − Td,m,` H(U(`1 ,`) ) d−` m (b) X −1 −1 ≥ Td,j,` Bj + Td,m+1,` H(U(`1 ,m+1) |M[`+1:m] )+ j=`+1

 1 −1 − Td,m+1,` H(U(`1 ,`) ) d−` m (c) X −1 Td,j,` Bj + ≥ 

j=`+1 −1 Td,m+1,` H(U(`1 ,m+1) , Mm+1 |M[`+1:m] )+





1 −1 − Td,m+1,` H(U(`1 ,`) ) d−` m (d) X −1 −1 = Td,j,` Bj + Td,m+1,` H(Mm+1 |M[`+1:m] )+ j=`+1 −1 Td,m+1,` H(U(`1 ,m+1) |M[`+1:m+1] )+



 1 −1 − Td,m+1,` H(U(`1 ,`) ) d−` m (e) X −1 −1 = Td,j,` Bj + Td,m+1,` Bm+1 + j=`+1 −1 Td,m+1,` H(U(`1 ,m+1) |M[`+1:m+1] )+



=

 1 −1 − Td,m+1,` H(U(`1 ,`) ) d−`

m+1 X

Proof: First note that for any m ∈ [1 : `2 + 1] and k ∈ [` + 1 : d + 1], we have H(S` +1→[1:m] ) + H(U(`1 ,`) , S[`+2:k]→`+1 ) 1 (a)

= H(Sk+1→[` +1:` +m−1]∪{`+1} )+ 1 1 H(U(`1 ,`) , S→[` +1:`] , S[`+2:k]→`+1 ) 1

(b)

≥ H(Sk+1→[` +1:` +m−1] ) + H(U(`1 ,`) , S[`+2:k+1]→`+1 ) 1 1

(c)

= H(S` +1→[1:m−1] ) + H(U(`1 ,`) , S[`+2:k+1]→`+1 ) (23) 1

where (a) and H(S` +1→[1:m] ) 1 H(Sk+1→[1:m−1] )

(c) follow from the fact that = H(Sk+1→[1:m−1]∪{`+1} ) and = H(S` +1→[1:m−1] ) due to the 1 symmetrical code that we consider, and (b) follows from

the submodularity of the entropy function. Add (23) over P`1 −1 m ∈ [1 : `1 ] and cancel m=1 H(Sd+1→[1:m] ) from both sides. We have H(Sd+1→[1:`] ) + `1 H(U(`1 ,`) , S[`+2:k+1]→`+1 ) ≥ `1 H(U(`1 ,`) , S[`+2:k+1]→`+1 ).

Add

(25)

over k ∈ [` + 1 (`1 ,`) , S H(U [`+2:k+1]→`+1 ) k=`+1

Pd−1

where (a) follows from the induction assumption; (b) follows from Corollary 3; (c) follows from the fact that Mm+1 is a function of W[1:m+1] , which is is a function of U(`1 ,m+1) by Lemma 1; (d) follows from the chain rule for entropy; and (e) follows from the facts that Mm+1 is independent of M[`+1:m] and that H(Mm+1 ) = Bm+1 . This completes the induction step and hence the proof of (18).

d]

=`1 H(U(`1 ,`+1) ).

Multiplying both sides by (22)

(25)

(d − `)−1

completes the proof of

Proposition 3: H(U(`1 +1,m) ) + ≥ (d − m)

m X

d−m H(U(`1 ,`+1) ) d−` −1 Td,j,` Bj + H(U(`1 +1,m+1) ) +

j=`+1

j=`+1

cancel sides.

≥`1 H(U(`1 ,`) , S[`+2:d+1]→`+1 )

d−m H(U(`1 ,`) ) d−`

(26)

To see (19), simply set m = d in (18). We have d X 1 −1 H(U(`1 ,`+1) ) ≥ Td,j,` Bj + d−`

and both

(d − `)H(Sd+1→[1:`] ) + `1 H(U(`1 ,`) )

−1 −1 Td,j,` + Td,m+1,` H(U(`1 ,m+1) |M[`+1:m+1] )+

 1 −1 − Td,m+1,` H(U(`1 ,`) ) d−`

:

from

We have

j=`+1



(24)

for any m ∈ [` + 1 : d − 1]. Consequently, H(U(`1 +1,`+1) ) +

Td,d,`+1 d−`

H(U(`1 ,`+1) )

6

≥ Td,d,`

d X j=`+1

Td,d,` −1 H(U(`1 ,`) ). Td,j,` Bj + d−`

(27)



(a)

≥ H(U(`1 +1,m) |M[`+1:m] )+  m X −1 −1 (d − m)  Td,j,` Bj + Td,m,` H(U(`1 ,m) |M[`+1:m] ) 

Td,d,`+1 d−`

H(U(`1 ,`) ).

(28) Note that 

d−1 X

(d − m)

m=`+1

−1 Td,j,` Bj 

j=`+1



d−1 X

=



m X

−1 Td,j,` Bj 

d−1 X



d−1 X

(d − m) =

m=j

j=`+1

  1 −1 − Td,m,` H(U(`1 ,`) ) d−`

−1 Td,j,` Bj  +

j=`+1

H(U(`1 +1,d) ) +

j=`+1

+



m X

(d − m)

m=`+1

Proof: To see (26), note that for any m ∈ [` + 1 : d − 1], we have d−m H(U(`1 ,`+1) ) H(U(`1 +1,m) |M[`+1:m] ) + d−`



d−1 X

−1 Td,j,` Td,d,j Bj .

j=`+1

(29) Furthermore,

= H(U(`1 +1,m) |M[`+1:m] )+

(a)

−1 (d − m)Td,m,` H(U(`1 ,m) |M[`+1:m] )+     m X 1 −1 −1 (d − m)  Td,j,` Bj + − Td,m,` H(U(`1 ,`) ) d−`

H(U(`1 +1,d) ) = H(U(`1 +1,d) , M[`+1:d] ) (b)

= H(U(`1 +1,d) |M[`+1:d] ) + H(M[`+1:d] ) d X

(c)

= H(U(`1 +1,d) |M[`+1:d] ) +

j=`+1

Bj

j=`+1

(b)

≥ H(U(`1 +1,m+1) |M[`+1:m] )+

d X

≥ H(U(`1 ,`) |M[`+1:d] ) +

−1 (d − m)Td,m,` H(U(`1 ,`) |M[`+1:m] )+     m X 1 −1 −1 (` ,`) Td,j,` Bj + (d − m)  − Td,m,` H(U 1 ) d−` j=`+1

Bj

j=`+1 d X

(d)

= H(U(`1 ,`) ) +

(30)

Bj

j=`+1

(c)

−1 where (a) follows from the fact that M[`+1:d] is a function = H(U(`1 +1,m+1) |M[`+1:m] ) + (d − m)Td,m,` H(U(`1 ,`) )+     of W[1:d] , which is is a function of U(`1 +1,d) by Lemma 1; m X 1 −1 −1 (`1 `)   (b) follows from the chain rule for entropy; (c) follows from Td,j,` Bj + (d − m) − Td,m,` H(U ) P d−` the fact that H(M[`+1:d] ) = dj=`+1 Bj ; and (d) follows from j=`+1 m X the fact that I(U(`1 ,`) ; M[`+1:d] ) = 0 due to the repair secrecy −1 Td,j,` Bj + = H(U(`1 +1,m+1) |M[`+1:m] ) + (d − m) j=`+1

d−m H(U(`1 ,`) ) d−` where (a) follows from (18) of Proposition 1; (b) follows from Corollary 4; and (c) follows from the fact that I(U(`1 ,`) ; M[`+1:m] ) = 0 due to the repair secrecy requirement (4). Adding H(M[`+1:m] ) to both sides and using the facts that (`1 +1,m)

H(U

requirement (4).

Substituting (29) and (30) into (28) gives: H(U(`1 +1,`+1) ) + d−1 X



d−1 X

d X

Bj +

j=`+1

1+ =

H(U(`1 ,`+1) )

Td,d,`+1 d−`



H(U(`1 ,`) )

−1 Td,j,` (Td,d,j + Td,j,` )Bj + Bd +

j=`+1

(`1 +1,m+1)

H(U

−1 Td,j,` Td,d,j Bj +



(a)

and that

d−`

j=`+1

|M[`+1:m] ) + H(M[`+1:m] )

= H(U(`1 +1,m) , M[`+1:m] ) = H(U(`1 +1,m) )

Td,d,`+1

|M[`+1:m] ) + H(M[`+1:m] ) (b)

(a)

= Td,d,`

= H(U(`1 +1,m+1) , M[`+1:m] ) = H(U(`1 +1,m+1) )

complete the proof of (26). Here, (a) and (b) are due to the facts that M[`+1:m] is a function of W[1:m] , which is a function of both U(`1 +1,m) and U(`1 +1,m+1) by Lemma 1. To see (27), add (26) over m ∈ [` + 1 : d − 1] and cancel (`1 +1,m) ) from both sides of the inequality. We m=`+2 H(U have Pd−1

H(U(`1 +1,`+1) ) +

Td,d,`+1 d−`

H(U(`1 ,`+1) )

d−1 X

−1 Td,j,` Bj + Bd +

j=`+1

= Td,d,`

d X j=`+1

−1 Td,j,` Bj +

Td,d,` d−`

Td,d,` d−`

Td,d,` d−`

H(U(`1 ,`) )

H(U(`1 ,`) )

H(U(`1 ,`) )

where (a) follows from the fact that Td,d,j + Td,j,` = Td,d,` . This completes the proof of the proposition. We are now ready to prove the outer bounds (8) and (9). To prove (8), note that β+

 (a) 1  1 H(U(`1 ,`) ) ≥ H(S→`+1 ) + H(U(`1 ,`) ) d−` d−`

7

(b)

1 H(U(`1 ,`+1) ) d−` d (c) X 1 −1 ≥ Td,j,` Bj + H(U(`1 ,`) ) d−` ≥

j=`+1

where (a) follows from the fact that H(S→`+1 ) ≤ (d − `)β ; (b) follows from the union bound on entropy; and (c) follows 1 H(U(`1 ,`) ) from from (19) of Proposition 1. Cancelling d−` both sides of the inequality and normalizing both sides by Pd t=`+1 Bt complete the proof of (8). To prove (9), note that α + Td,d,`1 +1 β +

`1 + Td,d,`1 d−`

H(U(`1 ,`) )

(g)

≥ H(S` +1→[1:` ] ) + H(U(`1 +1,`1 +1) , S` +1→[1:` ] )+ 1 1 1 1   Td,d,`+1 `1 (`1 ,`) Td,d,`1 +1 β + + H(U )+ d−` d−` Td,`,`1 H(U(`1 ,`+1) ) d−`

(h)

` ≥ H(S` +1→[1:` ] ) + 1 H(U(`1 ,`) )+ 1 1 d−` Td,d,`+1 H(U(`1 ,`) )+ H(U(`1 +1,`1 +1) ) + Td,d,`1 +1 β + d−` Td,`,`1 H(U(`1 ,`+1) ) d−`

(i)



(a)

= α + Td,d,`1 +1 β+   Td,`,`1 +1 Td,d,`+1 `1 d − `1 + + + + 1 H(U(`1 ,`) ) d−` d−` d−` d−` Td,`,`1 +1 = H(U(`1 ,`) ) + H(U(`1 ,`) )+ d−` α + Td,d,`1 +1 β+   Td,d,`+1 `1 d − `1 + + H(U(`1 ,`) ) d−` d−` d−`

(b) Td,`,` +1 1

H(U(`1 ,`+1) ) + H(U(`1 ,`1 +1) )+ d−` α + Td,d,`1 +1 β+   Td,d,`+1 `1 d − `1 + + H(U(`1 ,`) ) d−` d−` d−` d − `1 = H(U(`1 ,`) ) + H(U(`1 ,`1 +1) , S` +1→[1:` ] )+ 1 1 d−`   T `1 d,d,`+1 α + Td,d,`1 +1 β + + H(U(`1 ,`) )+ d−` d−` Td,`,`1 +1 H(U(`1 ,`+1) ) d−` ≥

(c) d − ` 1



H(U(`1 ,`+1) ) + H(U(`1 ,`1 ) , S` +1→[1:` ] )+ 1 1 d−`   Td,d,`+1 `1 α + Td,d,`1 +1 β + + H(U(`1 ,`) )+ d−` d−` Td,`,`1 +1 H(U(`1 ,`+1) ) d−`

(d)

= α + H(U(`1 ,`1 ) , S` +1→[1:` ] )+ 1  1  Td,d,`+1 `1 Td,d,`1 +1 β + H(U(`1 ,`) )+ + d−` d−` Td,`,`1 H(U(`1 ,`+1) ) d−`

(e)

≥ H(W`+1 ) + H(U(`1 ,`1 ) , S` +1→[1:` ] )+ 1 1  Td,d,`+1 `1 Td,d,`1 +1 β + + H(U(`1 ,`) )+ d−` d−` Td,`,`1 H(U(`1 ,`+1) ) d−`

(f )

= H(W`+1 , S` +1→[1:` ] ) + H(U(`1 ,`1 ) , S` +1→[1:` ] )+ 1 1 1 1   Td,d,`+1 `1 (`1 ,`) Td,d,`1 +1 β + + H(U )+ d−` d−` Td,`,`1 H(U(`1 ,`+1) ) d−`

`1 H(U(`1 ,`+1) ) + H(U(`1 +1,`1 +1) ) + Td,d,`1 +1 β d−` Td,`,`1 Td,d,`+1 + H(U(`1 ,`) ) + H(U(`1 ,`+1) ) d−` d−`

(j)

= H(U(`1 +1,`1 +1) ) + Td,`+1,`1 +1 β Td,d,`+1 H(U(`1 ,`) ) + Td,d,`+1 β+ + d−` Td,`,`1 + `1 H(U(`1 ,`+1) ) d−` (k) Td,d,`+1 ≥ H(U(`1 +1,`+1) ) + H(U(`1 ,`+1) )+ d−` Td,`,`1 + `1 H(U(`1 ,`+1) ) d−` d (l) X −1 ≥ (Td,d,` + Td,`,`1 + `1 ) Td,j,` Bj + j=`+1

Td,d,` + Td,`,`1 + `1 H(U(`1 ,`) ) d−` d X Td,d,`1 + `1 (m) −1 Td,j,` Bj + H(U(`1 ,`) ) = (Td,d,`1 + `1 ) d−` j=`+1

where (a) follows from the fact that Td,`,`1 +1 + Td,d,`+1 + d − `1 + d − ` = Td,d,`1 ; (b) follows from Corollary 3 that Td,`,`1 +1 d−`

H(U(`1 ,`) ) + H(U(`1 ,`) ) ≥ Td,`,`1 +1 d−`

H(U(`1 ,`+1) ) + H(U(`1 ,`1 +1) )

by setting j1 = `, j2 = `1 + 1 and i = i0 = `1 in 12; (c) follows from (17) in Lemma 5; (d) follows from the fact that Td,`,`1 +1 + d − `1 = Td,`,`1 ; (e) follows from the fact that H(W`+1 ) ≤ α; (f ) and (h) follows from the fact that S` +1→[1:` ] is a function of W`1 +1 ; (g) follows from the 1 1 fact that H(W`+1 , S`1 +1→[1:`1 ] )+H(U(`1 ,`1 ) , S`1 +1→[1:`1 ] ) ≥ H(S` +1→[1:` ] ) + H(U(`1 +1,`1 +1) , S` +1→[1:` ] ) due to sub1 1 1 1 modularity; (i) follows from (22) in Proposition 2; (j) follows from the fact that Td,d,`1 +1 = Td,d,`+1 + Td,`+1,`1 +1 ; (k) follows from the facts that Td,`+1,`1 +1 β ≥ S→[`1 +2:`+1] and (d − `)β ≥ S→`+1 ; (l) follows from (19) and (27) of Proposition 1 and 3 respectively; (m) follows from the fact T +`1 1 that Td,d,` +Td,`,`1 = Td,d,`1 . Cancelling d,d,` H(U(`1 ,`) ) d−` from both sides of the inequality and normalizing both sides P by dt=`+1 Bt complete the proof of (9).

8

S[`+2:d+1]→`+1 , S`+1→[` +1:2` ] |M(`) ) 1 1

V. C ONCLUDING REMARKS This paper considered the problem of MDC-SR with a generalized eavesdropping model. It was shown that the MBR point of the achievable normalized storage-capacity repairbandwidth tradeoff region depends on the numbers of type I and type II compromised storage nodes only via their total, as long as the number of type I compromised nodes is less than or equal to the number of type II compromised nodes. Moving forward, it would be interesting to see whether this result extends to the entire achievable normalized storage-capacity repair-bandwidth tradeoff region.

H(U(`1 ,`) |M(`) ) + H(U`1 ,`1 +1 |M(`) ) ≥ H(W[1:`] , S→[` +1:`] , S[1:`]→`+1 |M(`) )+ 1 H(W[` +1:2` ] , S[1:` ]→`+1 , S[2` :`]→`+1 , 1

1

1

1

S[`+2:d+1]→`+1 , S`+1→[` +1:2` ] |M(`) ) 1 1 (a)

A PPENDIX P ROOF OF THE E XCHANGE L EMMA II

≥ H(W[1:`] , S→[` +1:`] , 1

First note that d − `1 > d − `, so we may write d − `1 = s(d − `) + r for some integer s ≥ 1 and r ∈ [1 : d − `]. Next, let    t, at := t + `1 ,   t + j,

where (a) follows from the fact that S→`1 +1 is a function of U(`1 ,`1 +1) by Lemma 1, and (b) and (c) follow from the symmetrical code that we consider; (d) follows that S`+1→[` +1:2` ] is a function of S→`+1 . It follows that 1 1

S[1:`]→`+1 , S[`+2:d+1]→`+1 |M(`) )+ H(W[` +1:2` ] , S[1:` ]→`+1 , S[2` :`]→`+1 , 1 1 1 1 S`+1→[` +1:2` ] |M(`) ) 1 1

t ∈ [1 : `1 ] t ∈ [`1 + 1 : ` − `1 ] t ∈ [` − `1 + 1 : d − `].

= H(U(`1 ,`) , S→`+1 |M(`) )+ H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−1 |M(`) ) 1 1 1 1 τq →`+1

Finally, let τ0 := {at : t ∈ [1 : r]} and

q=0

(`1 ,`+1)

τq := {at : t ∈ [r + 1 + (q − 1)(d − `) : r + q(d − `)]}

= H(U

for any q ∈ [1 : s]. It is straightforward to verify that: • τq ∩ τq 0 = ∅ for any q 6= q 0 ; Ss−1 • q=0 τq = [1 : `1 ] ∪ [2`1 + 1 : `]; • τs = [` + 2 : d + 1]. Consider a symmetrical (n = d+1, d, N1 , . . . , Nd , T, S) code that satisfies the node regeneration requirement (3). Let us show by induction that for any p ∈ [1 : s], we have pH(U(`1 ,`) |M(`) ) + H(U(`1 ,`1 +1) |M(`) )

|M

(`)

)+

H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−1 |M(`) ) 1 1 1 1 τq →`+1 q=0

where (a) follows from the submodularity of the entropy function. This completes the proof of the base case of p = 1. Assume that (31) holds for some p ∈ [1 : s − 1]. We have (p + 1)H(U(`1 ,`) |M(`) ) + H(U(`1 ,`1 +1) |M(`) )   = H(U(`1 ,`) |M(`) ) + pH(U(`1 ,`) |M(`) ) + H(U(`1 ,`1 +1) |M(`) ) ≥ H(U(`1 ,`) |M(`) ) + pH(U(`1 ,`+1) |M(`) )+

≥ pH(U(`1 ,`+1) |M(`) )+ H(W[` +1:2` ] , S` →[` +1:2` ] , SSs−p |M(`) ). 1 1 1 1 1 τq →`+1 q=0

H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−p |M(`) ). 1 1 1 1 τq →`+1 q=0

(32)

(31) To prove the base case of p = 1, first note that H(U(`1 ,`) |M(`) ) (a)

= H(U(`1 ,`) , W[1:` ] , S→[` +1:`] |M(`) ) 1 1

= H(W[1:` ] , S→[` +1:`] |M(`) ) 1 1 (b)

= H(W[1:`] , S→[` +1:`] , S[1:`]→`+1 |M(`) ) 1

where (a) follows from the fact that (W[`1 :`] , S→[`1 +1:`] ) is a function of U(`1 ,`) by Lemma 1, and (b) follows from the fact that S[1:`]→`+1 is a function of W[1:`] . Furthermore, (`1 ,`1 +1)

H(U

|M

(`)

Note that both S`+1→[`1 +1:2`1 ] and SSs−(p+1)

are

functions of W[1:`] , which is in turn a function Lemma 1. We thus have

by

q=0

H(U(`1 ,`) |M(`) ) = H(U(`1 ,`) , S`+1→[` +1:2` ] , SSs−(p+1) |M(`) ). 1 1 τ →`+1 q q=0

Furthermore, by the symmetrical code that we consider we have H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−p |M(`) ) 1 1 1 1 τq →`+1 q=0

= H(W[` +1:2` ] , S`+1→[` +1:2` ] , 1 1 1 1

)

(a)

= H(U(`1 ,`1 +1) , S→`1 +1 |M(`) )

SSs−(p+1) q=0

= H(W[1:` ] , S→`1 +1 |M(`) ) 1

It follows that

(b)

H(U(`1 ,`) |M(`) )+

= H(W[` +1:2` ] , S→2`1 +1 |M(`) ) 1 1

(c)

= H(W[` +1:2` ] , S→`+1 |M 1 1

(d)

τq →`+1 of U(`1 ,`)

(`)

)

= H(W[` +1:2` ] , S[1:` ]→`+1 , S[2` +1:`]→`+1 , 1 1 1 1

τq →`+1

, S[`+2:d+1]→`+1 |M(`) ).

H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−p |M(`) ) 1 1 1 1 τq →`+1 q=0

= H(U(`1 ,`) , S`+1→[` +1,2` ] , SSs−(p+1) |M(`) )+ 1 1 τ →`+1 q q=0

9

 r  H(U(`1 ,`+1) |M(`) ) − H(U(`1 ,`) |M(`) ) (36) d−` where (a) follows from the fact that (W[` +1:2` ] , S`+1→[` +1:2` ] ) is a function of U(`1 ,`) =

H(W[` +1:2` ] , S`+1→[` +1:2` ] , 1 1 1 1 SSs−(p+1) q=0

τq →`+1

, S[`+2:d+1]→`+1 |M(`) )

1

(a)

S[`+2:d+1]→`+1 |M

(`)

1

1

1

by Lemma 1. Substituting (35) and (36) into (34) gives:

≥ H(U(`1 ,`) , S`+1→[` +1,2` ] , SSs−(p+1) , 1 1 τq →`+1 q=0



)+

H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−(p+1) |M(`) ) 1 1 1 1 τ →`+1 q q=0 = H(U(`1 ,`+1) |M(`) )+ H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−(p+1) |M(m) ) 1 1 1 1 τq →`+1 q=0

(33) where (a) follows from the submodularity of the entropy function. Substituting (33) into (32) gives



r H(U(`1 ,`) |M(`) ) + H(U(`1 ,`1 +1) |M(`) ) s+ d−`   r ≥ s+ H(U(`1 ,`+1) |M(`) ) + H(U(`1 ,`1 ) |M(`) ) d−`

which is equivalent to (11) by noting that s+

s(d − `) + r d − `1 r = = . d−` d−` d−`

This completes the proof of the exchange lemma. R EFERENCES

[1] S. Shao, T. Liu, C. Tian and C. Shen, ”Multilevel diversity coding with secure regeneration: Separate coding achieves the MBR point,” Preprint. (p + 1)H(U(`1 ,`) |M(`) ) + H(U(`1 ,`1 +1) |M(`) ) [Online] https://arxiv.org/pdf/1712.03326.pdf (`1 ,`+1) (`) [2] C. Tian and T. Liu, “Multilevel diversity coding with regeneration,” IEEE ≥ (p + 1)H(U |M )+ Trans. Inf. Theory, vol. 62, no. 9, pp. 4833–4847, Sep. 2016. H(W[` +1:2` ] , S`+1→[` +1:2` ] , SSs−(p+1) |M(`) ) [3] S. Shao, T. Liu, and C. Tian, “Multilevel diversity coding with regen1 1 1 1 τq →`+1 q=0 eration: Separate coding achieves the MBR point,” in Proc. Ann. Conf. Inf. Sci. Systems (CISS), Princeton, NJ, USA, Mar. 2016, pp. 602–607. which completes the induction step and hence the proof of [4] S. Pawar, S. El Rouayheb, and K. Ramchandran, “On secure distributed (31). data storage under repair dynamics,” in Proc. IEEE Int. Sym. Inf. Theory (ISIT), Austin, TX, USA, Jun. 2010, pp. 2543–2547. [5] S. Pawar, S. El Rouayheb, and K. Ramchandran, “Securing dynamic disSetting p = s in (31), we have tributed storage systems against eavesdropping and adversarial Attacks,” IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6734–6753, Oct. 2011. sH(U(`1 ,`) |M(`) ) + H(U(`1 ,`1 +1) |M(`) ) [6] N. B. Shah, K. V. Rashmi, and P. V. Kumar, “Information-theoretically ≥ sH(U(`1 ,`+1) |M(`) )+ secure regenerating codes for distributed storage,” in Proc. IEEE Glo. Tel. Conference (GLOBECOM), Houston, TX, USA, Dec. 2011, pp. 1–5. (`) H(W[` +1:2` ] , S`+1→[` +1:2` ] , Sτ0 →`+1 |M ) [7] S. Goparaju, S. El Rouayheb, R. Calderbank, and H. V. Poor, “Data 1 1 1 1 secrecy in distributed storage systems under exact repair,” in Proc. IEEE = sH(U(`1 ,`+1) |M(`) ) + H(W[` +1:2` ] , S`+1→[` +1:2` ] |M(`) )+ Int. Sym. Net. Coding (NetCod), Calgary, AB, Canada, Jun. 2013, pp. 1– 1 1 1 1 6. (`) H(Sτ0 →`+1 |W[` +1:2` ] , S`+1→[` +1:2` ] , M ). (34) [8] A. S. Rawat, O. O. Koyluoglu, N. Silberstein, and S. Vishwanath, “Opti1 1 1 1 mal locally repairable and secure codes for distributed storage systems”, By the symmetrical codes that we consider, we have IEEE Trans. Inf. Theory. vol. 60, no. 1, pp. 212–236, Jan. 2014. [9] R. Tandon, S. Amuru, T. C. Clancy, and R. M. Buehrer, “Towards (`) H(W[` +1:2` ] , S`+1→[` +1:2` ] |M ) optimal secure distributed storage systems with exact repair,” IEEE 1 1 1 1 Trans. Inf. Theory, vol. 62, no. 6, pp. 3477–3492, Jun. 2016. (`) = H(W[1:` ] , S`+1→[1:` ] |M ) [10] F. Ye, K. W. Shum, and R. W. Yeung, ”The Rate Region for Secure 1 1 Distributed Storage Systems,” in IEEE Trans. on Inf. Theory, vol. 63, = H(W[1:` ] , S` +1→[1:` ] |M(`) ) (35) no. 11, pp. 7038-7051, Nov. 2017. 1 1 1 [11] S. Shao, T. Liu, C. Tian, and C. Shen, “On the tradeoff region of and secure exact-repair regenerating codes,” IEEE Trans. Inf. Theory, vol. 63, no. 11, pp. 7253–7266, Nov. 2017. H(Sτ0 →`+1 |W[` +1:2` ] , S`+1→[` +1:2` ] , M(`) ) [12] C. Tian, “Characterizing the rate region of the (4, 3, 3) exact-repair 1 1 1 1 regenerating codes,” IEEE J. Sel. Are. Communications, vol. 32, no. 5, (`) = H(Sτ →`+1 |W[` +1:2` ] , S`+1→[` +1:2` ] , M ) pp. 967–975, May 2014. 1 1 1 1 S. Han, “Nonnegative entropy measures of multivariate symmetric for any subset τ ⊆ [` + 2 : d + 1] such that |τ | = r. By Han’s [13] T. correlations,” Inf. Control, vol. 36, no. 2, pp. 133–156, Feb. 1978.

subset inequality [13], we have

H(Sτ0 →`+1 |W[` +1:2` ] , S`+1→[` +1:2` ] , M(`) ) 1 1 1 1 r H(S[`+2:d+1]→`+1 |W[` +1:2` ] , ≥ 1 1 d−` S`+1→[` +1:2` ] , M(`) ) 1 1 r H(S[`+2:d+1]→`+1 |W[` +1:2` ] , ≥ 1 1 d−` S`+1→[` +1:2` ] , M(`) , U(`1 ,`) ) 1 1 (a) r = H(S[`+2:d+1]→`+1 |U(`1 ,`) , M(`) ) d − ` r = H(S[`+2:d+1]→`+1 , U(`1 ,`) |M(`) )− d−`  H(U(`1 ,`) |M(`) )

New Results on Multilevel Diversity Coding with Secure ...

I. INTRODUCTION. Diversity coding, node repair, and security are three basic ... information-theoretically secure against an eavesdropper, which can .... f. B i →i. (W i. ) be the data downloaded from the i th storage node in order to regenerate the data originally stored at the ith storage node under the context of repair group ...

255KB Sizes 2 Downloads 200 Views

Recommend Documents

Cyclic Delay Diversity with Space-Frequency Coding ...
A comparison between ..... 4 shows a comparison of the proposed technique with Cyclic .... space-time block coding and cyclic delay diversity for a broadband.

Cyclic Delay Diversity with Space-Frequency Coding ...
Abstract - Space-Frequency Coding (SFC) is a transmit diversity scheme to achieve full spatial diversity. ... exploited by using Forward Error Correction (FEC) code to improve performance. In this paper we ..... [16] Dehghani M. J., Aravind R., Jam S

Fast Multilevel Transduction on Graphs
matrix [1]; the second term is the fit term, which measures how well the predicted labels fit the original labels .... Gl = (Vl, El), we split Vl into two sets, Cl and Fl.

Fast Multilevel Transduction on Graphs
nominator of these methods is that the data are represented by the nodes of a graph, the ... ship of our method with multigrid methods, and provide a theoretical ..... MB main memory. 5.1 A Synthetic ... 20. 22 graph level computing time (sec.).

New Results on Decentralized Diagnosis of Discrete Event Systems
nostic protocols become necessary to deal with fault diagnosis in distributed systems where the information is decentralized [1,8]. In decentralized architectures ...

New Results on Decentralized Diagnosis of ... - Semantic Scholar
site; i.e., the decisions of the respective diagnosers will not require to be merged other than ..... It can be shown that it suffices to build diagnosers at each site.

New Results on the DMC Capacity and Renyi's ...
This proposed problem has great significance in cryptography and communications. In early 2015, Yi JANET Lu first constructed novel imaginary channel transition matrices and introduced Shannon's channel cod- ing problem to statistical cryptanalysis.

New Results on Decentralized Diagnosis of Discrete ...
Idaho Falls, ID 83403-2528 [email protected]. Stéphane Lafortune. Dept. of EECS. The University of Michigan. 1301 Beal Ave, Ann Arbor. MI 48109-2122 [email protected]. Abstract. The past decade has witnessed the development of a body of theory

New Results on Discrete-Event Counting under ...
Email: {tyoo,garcia}@anlw.anl.gov. Abstract—We present ...... [3] ——, “Option: a software package to design and implement optimzied ... Automation, vol. 19, no.

New Results on Discrete-Event Counting under ...
Email: {tyoo,garcia}@anlw.anl.gov. Abstract—We present an ..... only if there is a fault free cycle in the automaton A. Therefore, ..... [3] ——, “Option: a software package to design and implement optimzied safeguards ... Automation, vol. 19,

On the Multi-User Diversity with Fixed Power ...
that most commercial wireless communication systems tend to adopt, then the .... primary network, which is another advantage of the FPT strategy, compared ...

Universal Secure Network Coding by Non-linear Secret ...
Chung Chan ([email protected], [email protected]) is with the. Institute of Network .... J ⊆ [l] = {1,...,l}, express the wiretapped information as w = ∑ i∈J. sitiB +. ⎛ ..... [5] L. H. Ozarow and A. D. Wyner, “Wire-tap channel II.”

Universal Secure Network Coding by Non-linear ...
Abstract—A secure network code is devised where the secret is precoded non-linearly at the source node and multicast linearly over the network. It achieves ...

Universal Secure Network Coding by Non-linear Secret ...
precoding step universal to a class of linear network codes and so it works even without a complete knowledge of the network topology. [7] gave a construction ...

Multiterminal Secure Source Coding for a Common ...
the problems of multiterminal secret key agreement and secure computation. ...... possible to apply the information identity in [16] to relate the secure source ...

Secure Multiparty Computations on Bitcoin
Firstly, we show that the Bitcoin system provides an attractive way to .... This situation is clearly unsatisfactory from the security point of view, ..... All of the popular sites charge a fee for their service, called the house edge (on top of the

On Achieving Optimal Throughput with Network Coding
problem of achieving optimal throughput in data networks, with single or multiple ...... degree already, which also has a low capacity, since the link bandwidth is ...

A Review on Deadline Aware Dynamic Multilevel ...
issues like data aggregation from source node to base station and routing protocols ... data packet should be given higher priority and non-real-time data packet ...

Secure Dependencies with Dynamic Level ... - Semantic Scholar
evolve due to declassi cation and subject current level ... object classi cation and the subject current level. We ...... in Computer Science, Amsterdam, The Nether-.

Mining Diversity on Networks
University of Illinois at Urbana-Champaign. 3 ... University of California at Santa Barbara. 5 ... diversity ranking algorithm is developed for computation on dynamic networks. ... In a research collaboration network of computer scientists, the di-.