Abstract
Algebraic Manipulation Detection (AMD) codes form a cryptographic primitive designed to detect data corruption of the form of an additive operation in an Abelian group. In this paper, we discuss the applicability of AMD codes to protect erasure code based storage systems from a Byzantine adversary injecting fake data in the distributed storage system. We study a special class of AMD codes which relies on classical linear codes for its construction. We explore the design aspects of such AMD codes namely, (i) understanding its design criteria, (ii) studying the fundamental limits of such codes, to facilitate data integrity, and (iii) present some examples.
| Original language | English |
|---|---|
| Title of host publication | ITW 2015 - 2015 IEEE Information Theory Workshop |
| Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
| Pages | 64-68 |
| Number of pages | 5 |
| ISBN (Electronic) | 9781467378529 |
| DOIs | |
| Publication status | Published - 17 Dec 2015 |
| Event | IEEE Information Theory Workshop, ITW 2015 - Jeju Island, Korea, Republic of Duration: 11 Oct 2015 → 15 Oct 2015 |
Publication series
| Name | ITW 2015 - 2015 IEEE Information Theory Workshop |
|---|
Conference
| Conference | IEEE Information Theory Workshop, ITW 2015 |
|---|---|
| Country/Territory | Korea, Republic of |
| City | Jeju Island |
| Period | 11/10/15 → 15/10/15 |
Bibliographical note
Publisher Copyright:© 2015 IEEE.
ASJC Scopus subject areas
- Information Systems