topology aware cooperative data protection in blockchain
play

Topology-Aware Cooperative Data Protection in Blockchain-Based - PowerPoint PPT Presentation

ISIT 2020 Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks Siyi Yang 1 , Ahmed Hareedy 2 , Robert Calderbank 2 , Lara Dolecek 1 1 Electrical and Computer Engineering Department, UCLA 2 Electrical and


  1. ISIT 2020 Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks Siyi Yang 1 , Ahmed Hareedy 2 , Robert Calderbank 2 , Lara Dolecek 1 1 Electrical and Computer Engineering Department, UCLA 2 Electrical and Computer Engineering Department, Duke University 06/2020

  2. Outline w Introduction Ø Decentralized storage networks Ø Existing work w Cooperative Data Protection Ø Preliminaries Ø ECC hierarchy Ø Single-level cooperation w Multi-level cooperation Ø Cooperation graphs and compatible graphs Ø Construction over compatible graphs w Conclusion

  3. Outline w Introduction Ø Decentralized storage networks Ø Existing work w Cooperative Data Protection Ø Preliminaries Ø ECC hierarchy Ø Single-level cooperation w Multi-level cooperation Ø Cooperation graphs and compatible graphs Ø Construction over compatible graphs w Conclusion

  4. Decentralized Storage Networks w Invention of Blockchain technology makes the concept of “decentralization” a popular term Ø Higher privacy Ø Better scalability and flexibility w Decentralization has potential to universally revolutionize various applications Ø Blockchain-based decentralized storage networks (DSNs) Ø Masterless coded distributed computation Ø Federated learning Ø Wireless sensor networks 1

  5. Decentralized Storage Networks w Invention of Blockchain technology makes the concept of “decentralization” a popular term Ø Higher privacy Ø Better scalability and flexibility w Decentralization has potential to universally revolutionize various applications Ø Blockchain-based decentralized storage networks (DSNs) Ø Masterless coded distributed computation Ø Federated learning Ø Wireless sensor networks 1

  6. Decentralized Storage Networks w Typical Structures Ø Nodes form multiple clusters (clouds), each of which has a representative (master) node Ø Master nodes form a distributed network Ø Nodes in each cluster form a centralized network around the representative master node Messages are encoded and stored distributively among non-master nodes in each cloud Ce Centralized Storage De Decentralized Storage Di Distributed St Storage 2

  7. Practical Concerns in DSNs w Hierarchical erasure correction Ø Each node provides different levels of robustness for codeword stored at it through accessing different set of nodes ● Failures in reading nodes result in erased symbols ● Extra information improves the reliability, at a cost of higher latency w Topology-awareness Ø Scheme optimized for DSNs with a specific topology can result in bad performance in DSNs with other topologies ● Different reading frequencies (hot/cold) and reliabilities among nodes ● Inter-cloud transmission is much slower than intra-cloud transmission Our goal is to construct topology-aware coding schemes that also provide hierarchical erasure correction at each node 3

  8. Existing Literature w Distributed storage [1] Ø No explicit consideration of clustering nature of network nodes w Multi-rack storage [2-8] Ø Network topologies are typically not considered to be general Ø Capacities of the communication links are typically considered to be homogeneous [1] A. G. Dimakis et al., “ Network coding for distributed storage systems ”, IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539-4551, 2010 [2] Z. Kong et al., “ Decentralized coding algorithms for distributed storage in wireless sensor networks ”, IEEE JSAC, vol. 28, no. 2, pp. 261- 267, 2010 [3] M. Ye et al., “ Cooperative repair: Constructions of optimal MDS codes for all admissible parameters ”, IEEE Trans. Inf. Theory, vol. 65, no. 3, pp. 1639-1656, 2018 [4] N. Prakash et al., “ The storage versus repair-bandwidth trade-off for clustered storage systems ”, IEEE Trans. Inf. Theory, vol. 64, no. 8, pp. 5783-5805, 2018 [5] J. Li et al., “ Tree-structured data regeneration in distributed storage systems with regenerating codes ”, IEEE INFOCOM, 2010 [6] Y. Wang et al., “ Non-homogeneous two-rack model for distributed storage systems ”, IEEE INFOCOM, 2014 [7] H. Hou et al., “ Rack-aware regenerating codes for data centers ”, IEEE Trans. Inf. Theory, 2019 [8] Z. Chen et al., “ Explicit constructions of MSR codes for clustered distributed storage: the rack-aware storage model ”, [Online]. Available: https://arxiv.org/abs/1901.04419, 2019 4

  9. Outline w Introduction Ø Decentralized storage networks Ø Existing work w Cooperative Data Protection Ø Preliminaries Ø ECC hierarchy Ø Single-level cooperation w Multi-level cooperation Ø Cooperation graphs and compatible graphs Ø Construction over compatible graphs w Conclusion

  10. Notation w A DSN is modeled as a graph 𝐻(𝑊, 𝐹) Ø Sets of master nodes and edges between them: 𝑊 , 𝐹 The set consisting of all neighbors (master nodes) of a node 𝑤 ( is called the neighborhood of this node, and is denoted by 𝒪 ( Ø Neighborhood of 𝑤 ( : 𝒪 ( = 𝑤 + , , 𝑤 + - , 𝑤 + . Ø Codeword stored at 𝑤 ( : 𝐝 ( Ø Message stored at 𝑤 ( : 𝐧 ( Ø Number of nodes: 𝑞 Ø 𝐧 = 𝐧 2 ,𝐧 3 , ⋯ , 𝐧 5 ( m j 2 , c j 2 ) v j 3 ( m j 3 , c j 3 ) e i,j 3 e i,j 2 v j 2 Ø 𝐝 = 𝐝 2 , 𝐝 3 , ⋯, 𝐝 5 ( m i , c i ) Ø Length of 𝐧 ( , 𝐝 ( : 𝑙 ( , 𝑜 ( e i,j 1 Ø Redundancy of 𝐝 ( : 𝑠 ( = 𝑜 ( − 𝑙 ( v j 1 ( m j 1 , c j 1 ) 5

  11. ECC Hierarchy ECC hierarchy describes the erasure correction (EC) capabilities of nodes while cooperating with different sets of other nodes λ i, 3; B 3 d i, 3 i λ i, 2; B 2 d i, 2 i λ i, 1; B 1 d i, 1 λ i, 3; ∅ i d i, 0 λ i, 2; ∅ λ i, 1; ∅ 6

  12. ECC Hierarchy ECC hierarchy describes the erasure correction (EC) capabilities of nodes while cooperating with different sets of other nodes w Cooperation at each node Ø Sets associated with nodes utilizing 𝑚 -th level cooperation 2 ⊂ 𝒝 ( B = ∅ > ? ⊆ 𝑊, ℬ ( 3 ⊂ ⋯ ⊂ 𝒝 ( B 2 ∩ ℬ ( ● ∅ ⊂ 𝒝 ( 2CBC> ? ,𝒝 ( λ i, 3; B 3 d i, 3 i λ i, 2; B 2 d i, 2 i λ i, 1; B 1 d i, 1 λ i, 3; ∅ i d i, 0 λ i, 2; ∅ λ i, 1; ∅ 6

  13. ECC Hierarchy ECC hierarchy describes the erasure correction (EC) capabilities of nodes while cooperating with different sets of other nodes w Cooperation at each node Ø Sets associated with nodes utilizing 𝑚 -th level cooperation 2 ⊂ 𝒝 ( B = ∅ > ? ⊆ 𝑊, ℬ ( 3 ⊂ ⋯ ⊂ 𝒝 ( B 2 ∩ ℬ ( ● ∅ ⊂ 𝒝 ( 2CBC> ? ,𝒝 ( Ø ECC hierarchy at 𝑤 ( : 𝐞 ( = 𝑒 (,G ,𝑒 (,2 ,⋯ , 𝑒 (,> ? ; depth of 𝐞 ( : 𝑀 ( B are recovered and involved in the decoding process ● Nodes in 𝒝 ( ● 𝑒 (,B : EC capability with the 𝑚 -th level cooperation at 𝑤 ( λ i, 3; B 3 d i, 3 i λ i, 2; B 2 d i, 2 i λ i, 1; B 1 d i, 1 λ i, 3; ∅ i d i, 0 λ i, 2; ∅ λ i, 1; ∅ 6

  14. ECC Hierarchy ECC hierarchy describes the erasure correction (EC) capabilities of nodes while cooperating with different sets of other nodes w Cooperation at each node Ø Sets associated with nodes utilizing 𝑚 -th level cooperation 2 ⊂ 𝒝 ( B = ∅ > ? ⊆ 𝑊, ℬ ( 3 ⊂ ⋯ ⊂ 𝒝 ( B 2 ∩ ℬ ( ● ∅ ⊂ 𝒝 ( 2CBC> ? ,𝒝 ( Ø ECC hierarchy at 𝑤 ( : 𝐞 ( = 𝑒 (,G ,𝑒 (,2 ,⋯ , 𝑒 (,> ? ; depth of 𝐞 ( : 𝑀 ( B are recovered and involved in the decoding process ● Nodes in 𝒝 ( ● 𝑒 (,B : EC capability with the 𝑚 -th level cooperation at 𝑤 ( λ i, 3; B 3 d i, 3 Ø Elaborated EC capability: 𝑒 (,B = 𝜇 (,B;𝒳 ∅⊆𝒳⊆ℬ ? i M ● 𝜇 (,B;𝒳 : EC capability while nodes in 𝒳 are λ i, 2; B 2 d i, 2 also recovered and involved in the i 𝑚 -th level cooperation at 𝑤 ( λ i, 1; B 1 d i, 1 λ i, 3; ∅ i d i, 0 λ i, 2; ∅ λ i, 1; ∅ 6

  15. ECC Hierarchy w Example 2 are neighbors of 𝑤 3 and are required to be locally- Ø Nodes in 𝒝 3 recoverable to remove cross parities from the parity part of 𝐝 3 ● 𝑤 3 tolerates 𝑠 3 erasures in this scenario v 1 v 5 v 9 v 2 v 8 A 1 2 v 3 v 10 B 1 v 12 2 v 4 v 7 v 6 v 11 7

  16. ECC Hierarchy w Example 2 are neighbors of 𝑤 3 and are required to be locally- Ø Nodes in 𝒝 3 recoverable to remove cross parities from the parity part of 𝐝 3 ● 𝑤 3 tolerates 𝑠 3 erasures in this scenario 2 are neighbors of nodes in 𝒝 3 2 except for 𝑤 3 and Ø Nodes in ℬ 3 2 themselves nodes in 𝒝 3 ● 𝑤 3 obtains extra parities from 𝑤 N if 𝑤 O is also recovered, i.e., 𝑤 O ⊆ 𝒳 ● 𝑤 3 obtains extra parities from 𝑤 P if 𝑤 O ,𝑤 Q ,𝑤 R ⊆ 𝒳 ● 𝑤 3 obtains extra parities from 𝑤 2 v 1 v 5 v 9 v 2 v 8 A 1 2 v 3 v 10 B 1 v 12 2 v 4 v 7 v 6 v 11 7

  17. ECC Hierarchy w Example 2 are neighbors of 𝑤 3 and are required to be locally- Ø Nodes in 𝒝 3 recoverable to remove cross parities from the parity part of 𝐝 3 ● 𝑤 3 tolerates 𝑠 3 erasures in this scenario 2 are neighbors of nodes in 𝒝 3 2 except for 𝑤 3 and Ø Nodes in ℬ 3 2 themselves nodes in 𝒝 3 ● 𝑤 3 obtains extra parities from 𝑤 N if 𝑤 O is also recovered, i.e., 𝑤 O ⊆ 𝒳 ● 𝑤 3 obtains extra parities from 𝑤 P if 𝑤 O ,𝑤 Q ,𝑤 R ⊆ 𝒳 ● 𝑤 3 obtains extra parities from 𝑤 2 v 1 Ø All possible 𝜇 3,2;𝒳 v 5 v 9 v 2 ● 𝜇 3,2;𝒳 = 𝜇 3,2;∅ ,𝒳 ⊆ 𝑤 Q ,𝑤 R v 8 A 1 ● 𝜇 3,2;𝒳 = 𝜇 3,2; S T , 2 v 3 v 10 𝑤 O ⊆ 𝒳 ⊂ 𝑤 O ,𝑤 Q ,𝑤 R B 1 l v 12 2 ● 𝜇 3,2;𝒳 = 𝜇 3,2; S T ,S U ,S V = 𝑒 3,2 , v 4 v 7 v 6 l 𝒳 = 𝑤 O ,𝑤 Q ,𝑤 R v 11 7

  18. Example: Single-Level Cooperation w Parity part of the generator matrix of a single-level accessible code based on CRS codes v 1 v 5 v 9 v 2 v 8 v 3 v 10 v 12 v 4 v 7 v 6 v 11 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend