On Algebraic Manipulation Detection codes from linear codes and their application to storage systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Algebraic Manipulation Detection (AMD) codes form a cryptographic primitive designed to detect data corruption of the form of an additive operation in an Abelian group. In this paper, we discuss the applicability of AMD codes to protect erasure code based storage systems from a Byzantine adversary injecting fake data in the distributed storage system. We study a special class of AMD codes which relies on classical linear codes for its construction. We explore the design aspects of such AMD codes namely, (i) understanding its design criteria, (ii) studying the fundamental limits of such codes, to facilitate data integrity, and (iii) present some examples.

Original languageEnglish
Title of host publicationITW 2015 - 2015 IEEE Information Theory Workshop
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages64-68
Number of pages5
ISBN (Electronic)9781467378529
DOIs
Publication statusPublished - 17 Dec 2015
EventIEEE Information Theory Workshop, ITW 2015 - Jeju Island, Korea, Republic of
Duration: 11 Oct 201515 Oct 2015

Publication series

NameITW 2015 - 2015 IEEE Information Theory Workshop

Conference

ConferenceIEEE Information Theory Workshop, ITW 2015
Country/TerritoryKorea, Republic of
CityJeju Island
Period11/10/1515/10/15

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'On Algebraic Manipulation Detection codes from linear codes and their application to storage systems'. Together they form a unique fingerprint.

Cite this