CSDL Home IEEE Transactions on Dependable and Secure Computing 2010 vol.7 Issue No.01 - January-March
Issue No.01 - January-March (2010 vol.7)
Manghui Tu , UT Dallas, Richardson
Peng Li , UT Dallas, Richardson
I-Ling Yen , UT Dallas, Richardson
Bhavani Thuraisingham , UT Dallas, Richardson
Latifur Khan , UT Dallas, Richardson
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.19
Secret sharing and erasure coding-based approaches have been used in distributed storage systems to ensure the confidentiality, integrity, and availability of critical information. To achieve performance goals in data accesses, these data fragmentation approaches can be combined with dynamic replication. In this paper, we consider data partitioning (both secret sharing and erasure coding) and dynamic replication in data grids, in which security and data access performance are critical issues. More specifically, we investigate the problem of optimal allocation of sensitive data objects that are partitioned by using secret sharing scheme or erasure coding scheme and/or replicated. The grid topology we consider consists of two layers. In the upper layer, multiple clusters form a network topology that can be represented by a general graph. The topology within each cluster is represented by a tree graph. We decompose the share replica allocation problem into two subproblems: the Optimal Intercluster Resident Set Problem (OIRSP) that determines which clusters need share replicas and the Optimal Intracluster Share Allocation Problem (OISAP) that determines the number of share replicas needed in a cluster and their placements. We develop two heuristic algorithms for the two subproblems. Experimental studies show that the heuristic algorithms achieve good performance in reducing communication cost and are close to optimal solutions.
Secure data, secret sharing, erasure coding, replication, data grids.
Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham, Latifur Khan, "Secure Data Objects Replication in Data Grid", IEEE Transactions on Dependable and Secure Computing, vol.7, no. 1, pp. 50-64, January-March 2010, doi:10.1109/TDSC.2008.19