Close
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
Close
Publizieren
Besondere Sammlungen
Digitalisierungsservice
Hilfe
Impressum
Datenschutz
jump to main content
Search Details
Quicksearch:
OK
Result-List
Title
Title
Content
Content
Page
Page
Search Book
Insider-resistant distributed storage systems / Martina Eikel ; [Reviewers: Prof. Dr. Christian Scheideler, University of Paderborn, Prof. Dr. Friedhelm Meyer auf der Heide, University of Paderborn]. Paderborn, 2016
Content
1 Introduction
1.1 Thesis Overview
1.2 Related work
1.2.1 Distributed Hash Tables
1.2.2 Erasure Codes & Byzantine Fault-Tolerant Storage Systems
1.2.3 Authenticated Data Structures
2 Model and Preliminaries
2.1 Model
2.2 Preliminaries
3 Basic IRIS
3.1 Butterfly Coding Strategy
3.2 Storage Strategy
3.2.1 Internal Distributed Error Correcting Code
3.2.2 Redundancy Analysis
3.3 Lookup Protocol
3.3.1 Preprocessing Stage
3.3.2 Probing Stage
3.3.3 Decoding Stage
3.3.4 Differences and Similarities to Previous Works
3.4 Correctness Analysis of the Lookup Protocol
3.4.1 Robust Hash Functions
3.4.2 Analysis of the Probing Stage
3.4.3 Analysis of the Decoding Stage
4 Enhanced IRIS
4.1 Preliminaries
4.2 Storage Strategy
4.3 Lookup Protocol
4.3.1 Preprocessing Stage
4.3.2 Probing Stage
4.3.3 Decoding Stage
5 RoBuSt
5.1 Preliminaries
5.2 Storage Strategy
5.3 Write Protocol
5.3.1 Preprocessing Stage
5.3.2 Outline of the Writing Stage
5.3.3 Details on the Decoding of a Bucket (Step 1)
5.3.4 Details on the Encoding of a Bucket (Step 2, Step 3b)
5.3.5 Details on Counting and Selecting (Step 3, Step 3a)
5.4 Lookup Protocol
5.4.1 Preprocessing Stage
5.4.2 Zone Examination Stage
5.5 Correctness Analysis of the Lookup Protocol
5.5.1 Analysis of the Probing Stage
5.5.2 Analysis of the Decoding Stage
6 OSIRIS
6.1 Preliminaries
6.2 Storage Strategy
6.2.1 Internal Distributed Error Detecting and Correcting Code
6.2.2 Storage Strategy of a Single Bucket
6.3 Lookup Protocol
6.3.1 Outline of the Lookup Protocol
6.3.2 Probing Stage
6.3.3 Recovery Stage
6.4 Write Protocol
6.5 Correctness Analysis of the Lookup Protocol
6.5.1 Analysis of the Probing Stage
6.5.2 Analysis of the Recovery Stage
7 Conclusion and Outlook
7.1 Conclusion
7.2 Outlook
The search-operation requires javascript to be activated.