Insider-resistant distributed storage systems / Martina Eikel ; [Reviewers: Prof. Dr. Christian Scheideler, University of Paderborn, Prof. Dr. Friedhelm Meyer auf der Heide, University of Paderborn]. Paderborn, 2016
Inhalt
- 1 Introduction
- 2 Model and Preliminaries
- 3 Basic IRIS
- 3.1 Butterfly Coding Strategy
- 3.2 Storage Strategy
- 3.3 Lookup Protocol
- 3.3.1 Preprocessing Stage
- 3.3.2 Probing Stage
- 3.3.3 Decoding Stage
- 3.3.4 Differences and Similarities to Previous Works
- 3.4 Correctness Analysis of the Lookup Protocol
- 4 Enhanced IRIS
- 5 RoBuSt
- 5.1 Preliminaries
- 5.2 Storage Strategy
- 5.3 Write Protocol
- 5.3.1 Preprocessing Stage
- 5.3.2 Outline of the Writing Stage
- 5.3.3 Details on the Decoding of a Bucket (Step 1)
- 5.3.4 Details on the Encoding of a Bucket (Step 2, Step 3b)
- 5.3.5 Details on Counting and Selecting (Step 3, Step 3a)
- 5.4 Lookup Protocol
- 5.5 Correctness Analysis of the Lookup Protocol
- 6 OSIRIS
- 6.1 Preliminaries
- 6.2 Storage Strategy
- 6.2.1 Internal Distributed Error Detecting and Correcting Code
- 6.2.2 Storage Strategy of a Single Bucket
- 6.3 Lookup Protocol
- 6.4 Write Protocol
- 6.5 Correctness Analysis of the Lookup Protocol
- 7 Conclusion and Outlook
