Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 2928))
Included in the following conference series:
735Accesses
Abstract
DS2 is a dependable and secure data storage for mobile, wireless networks based on a peer-to-peer paradigm. DS2 provides support to create and share files under a write-once model, and ensures data confidentiality and dependability by encoding files in a Redundant Residue Number System. The paper analyzes the code efficiency of DS2 using a set of moduli allowing for efficient encoding and decoding procedures based on single precision arithmetic, and discusses the security issues. The comparison of DS2 with the Information Dispersal Algorithm approach (IDA) shows that DS2 features security features which are not provided by IDA, while the two approaches are comparable from the viewpoint of code efficiency and encoding/decoding complexity.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, ch. 5, pp. 153–181. Kluwer Academic Publishers, Dordrecht (1996)
Perkins, C.E., Royer, E.M.: Ad-hoc on-demand distance vector routing. In: Proc. IEEE 2nd Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90–100 (1999)
Feeney, L.M., Nilsson, M.: Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment. In: Proc. IEEE 20th INFOCOM, Anchorage, AK, vol. 3, pp. 1548–1557 (2001)
Thekkath, C.A., Mann, T., Lee, E.K.: Frangipani: A Scalable Distributed File System. In: Proc. ACM 17th Symposium on Operating Systems Principles, pp. 224–237 (1997)
Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M.E., Siegel, E.H.: Steere: Coda: a highly available file system for a distributed workstation environment. IEEE Transactions on Computers 39(4), 447–459 (1990)
Anderson, T.E., Dahlin, M., Neefe, J., Patterson, D., Roselli, D., Wang, R.: Serverless Network File System. In: Proc. ACM 15th Symposium on Operating System Principles, Copper Mountain Resort, Colorado, pp. 109–126 (1995)
Fabre, J.C., Deswarte, Y., Randell, B.: Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. In: Proc. 1st European Dependable Computing Conference, Berlin, Germany, pp. 21–38 (1994)
Chen, Y., Edler, J., Goldberg, A., Gottlieb, A., Sobti, S., Yianilos, P.: A Prototype Implementation of Archival Intermemory. In: Proc. ACM 4th Conference on Digital libraries, Berkeley, CA, pp. 28–37 (1999)
Kubiatowicz, J., et al.: OceanStore: An Architecture for Global-Scale Persistent Storage. In: Proc. ACM 9th Conference on Architectural Support for Programming Languages and Operating Systems, Cambridge, MA, pp. 190–201 (2000)
Rabin, M.O.: Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM 36(2), 335–348 (1989)
Rizzo, L.: Effective Erasure Codes for Reliable Computer Communication Protocols. ACM Computer Communication Review 27(2), 24–36 (1997)
Chessa, S., Maestrini, P.: Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks. In: Proc. IEEE DSN 2003, International Conference on Dependable System and Networks, San Francisco, USA (2003)
Barsi, F., Maestrini, P.: Error Correcting Properties of Redundant Residue Number Systems. IEEE Transactions on Computers C-22(3), 307–315 (1973)
Mandelbaum, D.: Error Correction in Residue Arithmetic. IEEE Transactions on Computers C-21(6), 538–545 (1972)
Szabo, N.S., Tanaka, R.I.: Residue Arithmetic and its Applications to Computer Technology. Mc Graw-Hill, New York (1967)
Mandelbaum, D.: On a Class of Arithmetic Codes and Decoding Algorithm. IEEE Transactions on Information Theory IT-21, 85–88 (1976)
Barsi, F., Maestrini, P.: Improved Decoding Algorithms for Arithmetic Residues Codes. IEEE Transactions on Information Theory IT-24, 640–643 (1978)
Sun, J.D., Krishna, H.: A coding theory approach to error control in redundant residue number systems. II. Multiple Error detection and correction. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing 39(1), 18–34 (1992)
Soderstrand, M., Jenkins, W.K., Jullien, G.A., Taylor, F.J.: Residue Number Arithmetic: Modern Applications in Digital Signal Processing. IEEE Press, NY (1986)
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
Borisov, N., Goldberg, I., Wagner, D.: Intercepting mobile communications: the insecurity of 802.11. In: MOBICOM 2001, Rome, Italy, pp. 180–189 (2001)
Author information
Authors and Affiliations
Dipartimento di Informatica, Università di Pisa, via Buonarroti 2, 56127, Pisa, Italy
S. Chessa & P. Maestrini
Area della Ricerca CNR, Istituto di Scienza e Tecnologie dell’Informazione “A. Faedo”, via Moruzzi 1, 56124, Pisa, Italy
S. Chessa & P. Maestrini
Dipartimento di Informatica, Università di Roma “La Sapienza”, via Salaria, 113, 00198, Roma, Italy
R. Di Pietro
- S. Chessa
You can also search for this author inPubMed Google Scholar
- R. Di Pietro
You can also search for this author inPubMed Google Scholar
- P. Maestrini
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Università degli Studi di Trento, Trento, Italy
Roberto Battiti
Institute for Informatics and Telematics (IIT) , Via G. Moruzzi, 1, 56124, Pisa, Italy
Marco Conti
Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive, 14, 38050, Povo, Trento, Italy
Renato Lo Cigno
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chessa, S., Di Pietro, R., Maestrini, P. (2004). Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2 . In: Battiti, R., Conti, M., Cigno, R.L. (eds) Wireless On-Demand Network Systems. WONS 2004. Lecture Notes in Computer Science, vol 2928. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24614-5_14
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-540-20790-0
Online ISBN:978-3-540-24614-5
eBook Packages:Springer Book Archive
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative