{"id":"https://openalex.org/W3045604633","doi":"https://doi.org/10.1109/icc40277.2020.9149183","title":"Storage and Computation: A Tradeoff in Secure Distributed Computing","display_name":"Storage and Computation: A Tradeoff in Secure Distributed Computing","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3045604633","doi":"https://doi.org/10.1109/icc40277.2020.9149183","mag":"3045604633"},"language":"en","primary_location":{"id":"doi:10.1109/icc40277.2020.9149183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100427076","display_name":"Jiajun Chen","orcid":"https://orcid.org/0000-0001-5618-3932"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Jiajun Chen","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047626052","display_name":"Chi Wan Sung","orcid":"https://orcid.org/0000-0001-7468-9793"},"institutions":[{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chi Wan Sung","raw_affiliation_strings":["Department of Electrical Engineering, City University of Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, City University of Hong Kong","institution_ids":["https://openalex.org/I168719708"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010336848","display_name":"Terence Chan","orcid":"https://orcid.org/0000-0002-6550-7203"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Terence H. Chan","raw_affiliation_strings":["Institute for Telecommunications Research, University of South Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Telecommunications Research, University of South Australia","institution_ids":["https://openalex.org/I170239107"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100427076"],"corresponding_institution_ids":["https://openalex.org/I168719708"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62703525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11612","display_name":"Stochastic Gradient Optimization Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7942843437194824},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7576448917388916},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.6291762590408325},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6017181277275085},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.46956706047058105},{"id":"https://openalex.org/keywords/distributed-data-store","display_name":"Distributed data store","score":0.4566690921783447},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.3609115183353424},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19496193528175354},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09086939692497253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7942843437194824},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7576448917388916},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.6291762590408325},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6017181277275085},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.46956706047058105},{"id":"https://openalex.org/C24885549","wikidata":"https://www.wikidata.org/wiki/Q339678","display_name":"Distributed data store","level":2,"score":0.4566690921783447},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.3609115183353424},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19496193528175354},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09086939692497253},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc40277.2020.9149183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc40277.2020.9149183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1679128752","https://openalex.org/W2104348420","https://openalex.org/W2118925326","https://openalex.org/W2195720612","https://openalex.org/W2268702383","https://openalex.org/W2591677828","https://openalex.org/W2757498728","https://openalex.org/W2808580034","https://openalex.org/W2922342388","https://openalex.org/W2963041503","https://openalex.org/W2964120628","https://openalex.org/W2964352239","https://openalex.org/W3100515187","https://openalex.org/W3126092023","https://openalex.org/W6761222027"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W1997222214","https://openalex.org/W2802581102","https://openalex.org/W4205786897"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,41,74,174],"provides":[2],"a":[3,16,24,28,44,105,127,140],"flexible":[4],"and":[5,39,53,86,97,114,120,155],"cost-effective":[6],"solution":[7],"to":[8,23,66,83,93,125],"big":[9],"data":[10,35,65,84],"applications.":[11],"Data":[12],"privacy,":[13],"however,":[14],"is":[15,76,91,103,117,123],"main":[17],"concern.":[18],"To":[19],"avoid":[20],"information":[21],"leakage":[22],"cloud":[25],"service":[26],"provider,":[27],"user":[29],"may":[30],"store":[31],"portions":[32],"of":[33,56,63,131,151,176],"encoded":[34,64],"in":[36,43,69],"multiple":[37],"clouds":[38,71,178],"perform":[40],"tasks":[42],"distributed":[45],"way.":[46],"In":[47],"this":[48],"work,":[49],"nested":[50],"MDS":[51],"codes":[52],"the":[54,100,121,132,135,143,165,173],"criterion":[55],"perfect":[57],"secrecy":[58],"are":[59,159],"adopted.":[60],"The":[61,89,108],"allocation":[62,158,167,170],"be":[67,94,126],"stored":[68],"heterogeneous":[70],"with":[72],"different":[73,177],"capability":[75],"formulated":[77],"as":[78],"an":[79],"optimization":[80],"problem,":[81],"subject":[82],"reliability":[85],"security":[87],"constraints.":[88],"problem":[90],"shown":[92],"feasible":[95],"if":[96,99,172],"only":[98],"storage":[101,115,136,157],"budget":[102,116,137],"above":[104],"certain":[106,141],"level.":[107],"tradeoff":[109],"between":[110],"minimum":[111,152],"computation":[112,145,153],"time":[113,146,154],"analytically":[118],"characterized,":[119],"former":[122],"proved":[124],"piecewise-linear":[128],"decreasing":[129],"function":[130],"latter.":[133],"When":[134],"increases":[138],"beyond":[139],"threshold,":[142],"optimal":[144,156],"levels":[147],"off.":[148],"Closed-form":[149],"expressions":[150],"obtained.":[160],"Numerical":[161],"results":[162],"show":[163],"that":[164],"optimized":[166],"outperforms":[168],"equal":[169],"significantly":[171],"rates":[175],"have":[179],"large":[180],"variation.":[181]},"counts_by_year":[{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
