2016 International Symposium on Wireless Communication Systems (ISWCS) 2016
DOI: 10.1109/iswcs.2016.7600898
|View full text |Cite
|
Sign up to set email alerts
|

On network coded distributed storage: How to repair in a fog of unreliable peers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…As described in Figure 7, there are 11 papers in our study which introduce tools and methods for threat detection. Some examples are: heart beat protocol [16], self checker [32], genetic algorithm [26] and machine learning [13]. • Threat Response methods: the most common approach for responding to threats is redundancy.…”
Section: Threat Detection and Response Methodsmentioning
confidence: 99%
“…As described in Figure 7, there are 11 papers in our study which introduce tools and methods for threat detection. Some examples are: heart beat protocol [16], self checker [32], genetic algorithm [26] and machine learning [13]. • Threat Response methods: the most common approach for responding to threats is redundancy.…”
Section: Threat Detection and Response Methodsmentioning
confidence: 99%
“…However, all the information needs to be transferred over the network to recover the lost information, thus leading to a storage-repair traffic tradeoff. To this end, network coding can enable the operation of the system at the optimal points by balancing the storage-repair traffic tradeoff [195]. The re-coding capability of network coding enhances the information reliability as well as balances the storage-repair tradeoff without the need of costly investments in the network architecture [139].…”
Section: C: Network Codingmentioning
confidence: 99%
“…However, it is not applied to any real nor simulated scenario. Based on the previous mathematical characterization, authors in [21,53] study the storage problem, particularly when data should be repaired with the remaining nodes in a fog deployment without newcomer nodes. They also design a practical implementation using a NC implementation and Raspberry Pi devices.…”
Section: Related Workmentioning
confidence: 99%
“…The system must be highly-reliable, tolerant to service interruptions, while ensuring a continuous data availability. NC, in contrast to Maximum Distance Separable (MDS) codes, as Reed Solomon [21], allows to move over an optimal trade-off curve, which gathers the relationship between the amount of information that each cloud needs to store and the data required to transmit over the system in case a cloud fails [22].…”
Section: Introductionmentioning
confidence: 99%