Please use this identifier to cite or link to this item:
|Title:||AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security|
|Authors:||Chervyakov, N. I.|
Червяков, Н. И.
Babenko, M. G.
Бабенко, М. Г.
Kucherov, N. N.
Кучеров, Н. Н.
|Keywords:||Big data storage;Internet of Things;Multi-cloud;Reliability;Residue number system (RNS);Resource management;Safety;Security|
|Citation:||Chervyakov, N., Babenko, M., Tchernykh, A., Kucherov, N., Miranda-López, V., Cortés-Mendoza, J.M. AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security // Future Generation Computer Systems. - 2019. - Volume 92. - Pages 1080-1092|
|Series/Report no.:||Future Generation Computer Systems|
|Abstract:||Benefits of Internet of Things and cloud–fog-edge computing are associated with the risks of confidentiality, integrity, and availability related with the loss of information, denial of access for a long time, information leakage, conspiracy and technical failures. In this article, we propose a configurable, reliable, and confidential distributed data storage scheme with the ability to process encrypted data and control results of computations. Our system utilizes Redundant Residue Number System (RRNS) with new method of error correction codes and secret sharing schemes. We introduce the concept of an approximate value of a rank of a number (AR), which allows us to reduce the computational complexity of the decoding from RNS to binary representation, and size of the coefficients. Based on the properties of the approximate value and arithmetic properties of RNS, we introduce AR-RRNS method for error detection, correction, and controlling computational results. We provide a theoretical basis to configure probability of information loss, data redundancy, speed of encoding and decoding to cope with different objective preferences, workloads, and storage properties. Theoretical analysis shows that by appropriate selection of RRNS parameters, the proposed scheme allows not only increasing safety, reliability, and reducing an overhead of data storage, but also processing of encrypted data|
|Appears in Collections:||Статьи, проиндексированные в SCOPUS, WOS|
Files in This Item:
|scopusresults 740 .pdf||64.79 kB||Adobe PDF|
|WoS 474 .pdf||105.71 kB||Adobe PDF|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.