Advertisement

A Distributed Storage System Based on Blockchain and Pipelined Code

  • Xuewei LiEmail author
  • Yue Chen
  • Yang Ba
  • Shuai Li
  • Huaiyu Zhu
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1122)

Abstract

To achieve data reliability and security in distributed storage systems, different coding schemes have been proposed. Encoded data would be stored in different nodes which are called hosts. However, the knowledge of hosts is learned by each other, and all of it must be known by the central server that stores meta-data, so that users and hosts cannot keep anonymity which reduces the difficulty of eavesdropping attack. The central server is a bottleneck due to single point of failure or low performance. These problems reduce the stability and the security of the storage system. To address these problems, we proposed a decentralized secure distributed storage system based on pipelined code and blockchain. In our scheme, we use blockchain to realize decentralization to solve the single point of failure problem and anonymity to data breach. An explicit pipelined code process combined with blockchain is presented to construct the storage function basis. Furthermore, a time-based replica storage mechanism is used in our scheme to achieve better trade-off between storage overhead and decode computation overhead.

Keywords

Security Anonymity Decentralized storage Blockchain Pipelined code 

Notes

Acknowledgements

This work is supported by the Key Technologies R & D Program of Henan Province (172102210017).

References

  1. 1.
    You, P., Huang, Z., Peng, Y., et al.: Towards a delivery scheme for speedup of data backup in distributed storage systems using erasure codes. J. Supercomput. 75(1), 50–64 (2019)CrossRefGoogle Scholar
  2. 2.
    Ghemawat, S., Gobioff, H., Leung, S.T.: The Google file system. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) (2003)Google Scholar
  3. 3.
    Li, J., Li, B., Li, B.: Mist: efficient dissemination of erasure-coded data in data centers. IEEE Trans. Emerg. Top. Comput. 7, 468–480 (2018)CrossRefGoogle Scholar
  4. 4.
    Hou, H., Shum, K.W., Chen, M., et al.: BASIC codes: low-complexity regenerating codes for distributed storage systems. IEEE Trans. Inf. Theory 62(6), 3053–3069 (2016)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Rawat, A.S., Koyluoglu, O.O., Silberstein, N., et al.: Optimal locally repairable and secure codes for distributed storage systems. IEEE Trans. Inf. Theory 60(1), 212–236 (2013)CrossRefGoogle Scholar
  6. 6.
    Koyluoglu, O.O., Rawat, A.S., Vishwanath, S.: Secure cooperative regenerating codes for distributed storage systems. IEEE Trans. Inf. Theory 60(9), 5228–5244 (2014)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Shah, N.B., Rashmi, K.V., Kumar, P.V.: Information-theoretically secure regenerating codes for distributed storage. In: 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, pp. 1–5. IEEE (2011)Google Scholar
  8. 8.
    Pawar, S., El Rouayheb, S., Ramchandran, K.: Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans. Inf. Theory 57(10), 6734–6753 (2011)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Tandon, R., Amuru, S.D., Clancy, T.C., et al.: On secure distributed storage systems with exact repair. In: 2014 IEEE International Conference on Communications (ICC), pp. 3908–3912. IEEE (2014)Google Scholar
  10. 10.
    Tandon, R., Amuru, S.D., Clancy, T.C., et al.: Distributed storage systems with secure and exact repair—new results. In: 2014 Information Theory and Applications Workshop (ITA), pp. 1–6. IEEE (2014)Google Scholar
  11. 11.
    Tandon, R., Amuru, S.D., Clancy, T.C., et al.: Toward optimal secure distributed storage systems with exact repair. IEEE Trans. Inf. Theory 62(6), 3477–3492 (2016)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Lin, H.Y., Tzeng, W.G.: A secure decentralized erasure code for distributed networked storage. IEEE Trans. Parallel Distrib. Syst. 21(11), 1586–1594 (2010)CrossRefGoogle Scholar
  13. 13.
    Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. ACM SIGOPS Oper. Syst. Rev. 44(2), 35–40 (2010)CrossRefGoogle Scholar
  14. 14.
    Pamies-Juarez, L., Oggier, F., Datta, A.: Decentralized erasure coding for efficient data archival in distributed storage systems. In: Frey, D., Raynal, M., Sarkar, S., Shyamasundar, Rudrapatna K., Sinha, P. (eds.) ICDCN 2013. LNCS, vol. 7730, pp. 42–56. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-35668-1_4CrossRefGoogle Scholar
  15. 15.
    Crosby, M., Pattanayak, P., Verma, S., et al.: Blockchain technology: beyond bitcoin. Appl. Innov. 2(6–10), 71 (2016)Google Scholar
  16. 16.
    Wilkinson, S., Lowry, J., Boshevski, T.: Metadisk a blockchain-based decentralized file storage application. Technical report, hal, pp. 1–11, Storj Labs Inc. (2014)Google Scholar
  17. 17.
    Ali, M., Nelson, J., Shea, R., et al.: Blockstack: a global naming and storage system secured by blockchains. In: 2016 USENIX Annual Technical Conference (USENIX ATC 2016), pp. 181–194 (2016)Google Scholar
  18. 18.
    Fukumitsu, M., Hasegawa, S., Iwazaki, J., et al.: A proposal of a secure P2P-type storage scheme by using the secret sharing and the blockchain. In: 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA), pp. 803–810. IEEE (2017)Google Scholar
  19. 19.
    Chen, Y., Li, H., Li, K., et al.: An improved P2P file system scheme based on IPFS and Blockchain. In: 2017 IEEE International Conference on Big Data (Big Data), pp. 2652–2657. IEEE (2017)Google Scholar
  20. 20.
    Pamies-Juarez, L., Datta, A., Oggier, F.: RapidRAID: pipelined erasure codes for fast data archival in distributed storage systems. In: 2013 Proceedings IEEE INFOCOM, pp. 1294–1302. IEEE (2013)Google Scholar
  21. 21.
    Li, C., Li, P., Xu, W., et al.: Scaling Nakamoto consensus to thousands of transactions per second. arXiv preprint arXiv:1805.03870 (2018)
  22. 22.
    Aniello, L., Baldoni, R., Gaetani, E., et al.: A prototype evaluation of a tamper-resistant high performance blockchain-based transaction log for a distributed database. In: 2017 13th European Dependable Computing Conference (EDCC), pp. 151–154. IEEE (2017)Google Scholar
  23. 23.
    Shen, J., Gu, J., Zhou, Y., et al.: Bandwidth-aware delayed repair in distributed storage systems. In: 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), pp. 1–10. IEEE (2016)Google Scholar
  24. 24.
    Chen, F., Xiang, T., Yang, Y., et al.: Secure cloud storage meets with secure network coding. IEEE Trans. Comput. 65(6), 1936–1948 (2015)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Amazon.com, “Amazon S3”. http://aws.amazon.com/s3
  26. 26.
    Apache.org, “HDFS”. http://hadoop.apache.org/hdfs
  27. 27.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Xuewei Li
    • 1
    Email author
  • Yue Chen
    • 1
  • Yang Ba
    • 1
  • Shuai Li
    • 1
  • Huaiyu Zhu
    • 2
  1. 1.PLA Information Engineering UniversityZhengzhouChina
  2. 2.95937 Unit of PLAFuxinChina

Personalised recommendations