Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2

  • Conference paper

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2928))

Included in the following conference series:

  • 735Accesses

Abstract

DS2 is a dependable and secure data storage for mobile, wireless networks based on a peer-to-peer paradigm. DS2 provides support to create and share files under a write-once model, and ensures data confidentiality and dependability by encoding files in a Redundant Residue Number System. The paper analyzes the code efficiency of DS2 using a set of moduli allowing for efficient encoding and decoding procedures based on single precision arithmetic, and discusses the security issues. The comparison of DS2 with the Information Dispersal Algorithm approach (IDA) shows that DS2 features security features which are not provided by IDA, while the two approaches are comparable from the viewpoint of code efficiency and encoding/decoding complexity.

Similar content being viewed by others

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing,  ch. 5, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)

    Chapter  Google Scholar 

  2. Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proc. IEEE 2nd Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (1999)

    Google Scholar 

  3. Feeney, L.M., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proc. IEEE 20th INFOCOM, Anchorage, AK, vol. 3, pp. 1548–1557 (2001)

    Google Scholar 

  4. Thekkath, C.A., Mann, T., Lee, E.K.: Frangipani: A Scalable Distributed File System. In: Proc. ACM 17th Symposium on Operating Systems Principles, pp. 224–237 (1997)

    Google Scholar 

  5. Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M.E., Siegel, E.H.: Steere: Coda: a highly available file system for a distributed workstation environment. IEEE Transactions on Computers 39(4), 447–459 (1990)

    Article  Google Scholar 

  6. Anderson, T.E., Dahlin, M., Neefe, J., Patterson, D., Roselli, D., Wang, R.: Serverless Network File System. In: Proc. ACM 15th Symposium on Operating System Principles, Copper Mountain Resort, Colorado, pp. 109–126 (1995)

    Google Scholar 

  7. Fabre, J.C., Deswarte, Y., Randell, B.: Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. In: Proc. 1st European Dependable Computing Conference, Berlin, Germany, pp. 21–38 (1994)

    Google Scholar 

  8. Chen, Y., Edler, J., Goldberg, A., Gottlieb, A., Sobti, S., Yianilos, P.: A Prototype Implementation of Archival Intermemory. In: Proc. ACM 4th Conference on Digital libraries, Berkeley, CA, pp. 28–37 (1999)

    Google Scholar 

  9. Kubiatowicz, J., et al.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: Proc. ACM 9th Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, pp. 190–201 (2000)

    Google Scholar 

  10. Rabin, M.O.: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM 36(2), 335–348 (1989)

    Article MATH MathSciNet  Google Scholar 

  11. Rizzo, L.: Effective Erasure Codes for Reliable Computer Communication Protocols. ACM Computer Communication Review 27(2), 24–36 (1997)

    Article  Google Scholar 

  12. Chessa, S., Maestrini, P.: Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks. In: Proc. IEEE DSN 2003, International Conference on Dependable System and Networks, San Francisco, USA (2003)

    Google Scholar 

  13. Barsi, F., Maestrini, P.: Error Correcting Properties of Redundant Residue Number Systems. IEEE Transactions on Computers C-22(3), 307–315 (1973)

    Article MathSciNet  Google Scholar 

  14. Mandelbaum, D.: Error Correction in Residue Arithmetic. IEEE Transactions on Computers C-21(6), 538–545 (1972)

    Article MathSciNet  Google Scholar 

  15. Szabo, N.S., Tanaka, R.I.: Residue Arithmetic and its Applications to Computer Technology. Mc Graw-Hill, New York (1967)

    MATH  Google Scholar 

  16. Mandelbaum, D.: On a Class of Arithmetic Codes and Decoding Algorithm. IEEE Transactions on Information Theory IT-21, 85–88 (1976)

    Article MathSciNet  Google Scholar 

  17. Barsi, F., Maestrini, P.: Improved Decoding Algorithms for Arithmetic Residues Codes. IEEE Transactions on Information Theory IT-24, 640–643 (1978)

    Article MathSciNet  Google Scholar 

  18. Sun, J.D., Krishna, H.: A coding theory approach to error control in redundant residue number systems. II. Multiple Error detection and correction. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 39(1), 18–34 (1992)

    Article MATH  Google Scholar 

  19. Soderstrand, M., Jenkins, W.K., Jullien, G.A., Taylor, F.J.: Residue Number Arithmetic: Modern Applications in Digital Signal Processing. IEEE Press, NY (1986)

    MATH  Google Scholar 

  20. Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)

    Google Scholar 

  21. Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: MOBICOM 2001, Rome, Italy, pp. 180–189 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Dipartimento di Informatica, Università di Pisa, via Buonarroti 2, 56127, Pisa, Italy

    S. Chessa & P. Maestrini

  2. Area della Ricerca CNR, Istituto di Scienza e Tecnologie dell’Informazione “A. Faedo”, via Moruzzi 1, 56124, Pisa, Italy

    S. Chessa & P. Maestrini

  3. Dipartimento di Informatica, Università di Roma “La Sapienza”, via Salaria, 113, 00198, Roma, Italy

    R. Di Pietro

Authors
  1. S. Chessa

    You can also search for this author inPubMed Google Scholar

  2. R. Di Pietro

    You can also search for this author inPubMed Google Scholar

  3. P. Maestrini

    You can also search for this author inPubMed Google Scholar

Editor information

Editors and Affiliations

  1. Università degli Studi di Trento, Trento, Italy

    Roberto Battiti

  2. Institute for Informatics and Telematics (IIT) , Via G. Moruzzi, 1, 56124, Pisa, Italy

    Marco Conti

  3. Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive, 14, 38050, Povo, Trento, Italy

    Renato Lo Cigno

Rights and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chessa, S., Di Pietro, R., Maestrini, P. (2004). Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2 . In: Battiti, R., Conti, M., Cigno, R.L. (eds) Wireless On-Demand Network Systems. WONS 2004. Lecture Notes in Computer Science, vol 2928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24614-5_14

Download citation

Publish with us


[8]ページ先頭

©2009-2025 Movatter.jp