skip to main content
article
Free Access

Efficient dispersal of information for security, load balancing, and fault tolerance

Published:01 April 1989Publication History
Skip Abstract Section

Abstract

An Information Dispersal Algorithm (IDA) is developed that breaks a file F of length L = ↿ F↾ into n pieces Fi, l ≤ in, each of length ↿Fi↾ = L/m, so that every m pieces suffice for reconstructing F. Dispersal and reconstruction are computationally efficient. The sum of the lengths ↿Fi↾ is (n/m) · L. Since n/m can be chosen to be close to l, the IDA is space efficient. IDA has numerous applications to secure and reliable storage of information in computer networks and even on single disks, to fault-tolerant and efficient transmission of information in networks, and to communications between processors in parallel computers. For the latter problem provably time-efficient and highly fault-tolerant routing on the n-cube is achieved, using just constant size buffers.

References

  1. 1 ASMUTH, C. A., BLAKLEY, G.R. Pooling splitting and restituting information to overcome total failure of some channels of communication. In Proceedings of the 1982 Symposium on Security and Privacy. IEEE Society, New York, 1982, pp. 156-169.Google ScholarGoogle Scholar
  2. 2 BERLEKAMP, E.R. Algebraic coding theory. McGraw-Hill, New York, 1968.Google ScholarGoogle Scholar
  3. 3 HALL, M. Combinatorial Theory. Wiley, New York, 1980.Google ScholarGoogle Scholar
  4. 4 HILLIS, W.D. The Connection Machine. MIT Press, Cambridge, Mass., 1985. Google ScholarGoogle Scholar
  5. 5 MIRSKY, L. An Introduction to Linear Algebra. Dover, New York, 1982.Google ScholarGoogle Scholar
  6. 6 PIPPENGER, N. Parallel communication with limited buffers. In Proceedings of the IEEE 25th Symposium on Foundations of Computer Science. IEEE, New York, 1984, pp. 127-136.Google ScholarGoogle Scholar
  7. 7 RABIN, M.O. Probabilistic algorithms in finite fields. SIAM J. Comput. 9, 1980, 273-280.Google ScholarGoogle Scholar
  8. 8 RABIN, i.O. Fingerprinting by random polynomials. Tech. Rep. TR-15-81. Center for Research in Computing Technology. Harvard Univ., Cambridge, Mass., i 98 i.Google ScholarGoogle Scholar
  9. 9 RAGHAVAN, P. Probabilistic construction of deterministic algorithms: Approximating packing integer programs. In Proceedings of the IEEE 27th Symposium on Foundations of Computer Science. lt:t:l:., r~ew York, i 986, pp. i 0- i 8. Google ScholarGoogle Scholar
  10. 10 SEITZ, C.L. The cosmic cube. Commun. ACM 28, 1 (Jan. 1985), 22-33. Google ScholarGoogle Scholar
  11. 11 SHAMIR, A. How to share a secret. Commun. ACM 22, 11 (Nov. 1979), 612-613. Google ScholarGoogle Scholar
  12. 12 llzlilZL, 11. 3. /-~ rnotael Ol )IIVIL; macn}nes anu a companson of various interconnection networks. IEEE Trans. Comput. 28, 12 (1979), 907-917.Google ScholarGoogle Scholar
  13. 13 VALIANT, L. G. A scheme for fast parallel communication. SlAM J. Comput. 11, 2 (1982), 3g/-~ -lt-Google ScholarGoogle Scholar

Index Terms

  1. Efficient dispersal of information for security, load balancing, and fault tolerance

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in

                    Full Access

                    • Published in

                      cover image Journal of the ACM
                      Journal of the ACM  Volume 36, Issue 2
                      April 1989
                      225 pages
                      ISSN:0004-5411
                      EISSN:1557-735X
                      DOI:10.1145/62044
                      Issue’s Table of Contents

                      Copyright © 1989 ACM

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 April 1989
                      Published in jacm Volume 36, Issue 2

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • article

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader