Next Article in Journal
Zipf’s, Heaps’ and Taylor’s Laws are Determined by the Expansion into the Adjacent Possible
Next Article in Special Issue
Distributed Joint Source-Channel Coding Using Quasi-Uniform Systematic Polar Codes
Previous Article in Journal
Entropy Power, Autoregressive Models, and Mutual Information
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point

1
Department of Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
2
Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843, USA
3
Department of Electronic Engineering and Information Science, University of Science and Technology of China, Hefei 230026, China
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(10), 751; https://doi.org/10.3390/e20100751
Submission received: 14 August 2018 / Revised: 21 September 2018 / Accepted: 29 September 2018 / Published: 30 September 2018
(This article belongs to the Special Issue Multiuser Information Theory II)

Abstract

:
The problem of multilevel diversity coding with secure regeneration (MDC-SR) is considered, which includes the problems of multilevel diversity coding with regeneration (MDC-R) and secure regenerating code (SRC) as special cases. Two outer bounds are established, showing that separate coding can achieve the minimum-bandwidth-regeneration (MBR) point of the achievable normalized storage-capacity repair-bandwidth trade-off regions for the general MDC-SR problem. The core of the new converse results is an exchange lemma, which can be established using Han’s subset inequality.

1. Introduction

Diversity coding and node repair are two fundamental ingredients of reliable distributed storage systems. While the study of diversity coding has been in the literature for decades [1,2,3,4,5,6], systematic studies of node repair mechanisms were started only recently by Dimakis et al. in their pioneering work [7]. A particular model, which was first introduced in [7] and has since received a significant amount of attention in the literature [8,9,10,11,12,13,14,15,16,17,18,19,20], is the so-called (exact-repair) regenerating code (RC) problem.
More specifically, in an ( n , k , d ) RC problem, a file M of size B is to be encoded in a total of n distributed storage nodes, each of capacity α . The encoding needs to ensure that the file M can be perfectly recovered by having full access to any k out of the total n storage nodes. In addition, when node failures occur and there are only d remaining nodes in the system, it is required that the data originally stored in any failed node can be recovered by downloading data of size β from each one of the d remaining nodes. An interesting technical challenge is to characterize the optimal trade-offs between the node capacity α and the download bandwidth β in satisfying both the file-recovery and node-repair requirements, which was studied in [8,9,10,11,12,13,14,15,16,17,18,19,20]. However, despite intensive research efforts that have yielded many interesting and highly non-trivial partial results including a precise characterization of the minimum-storage-regenerating (MSR) and the minimum-bandwidth-regenerating (MBR) rate points, the optimal trade-offs between the node capacity α and the download bandwidth β have not been fully understood for the general RC problem.
More recently, two extensions of the RC problem, namely multilevel diversity coding with regeneration (MDC-R) and secure regenerating code (SRC), have also been studied in the literature. The problem of MDC-R was first introduced by Tian and Liu [21]. In an ( n , d ) MDC-R problem, a total of d independent files M 1 , , M d of size B 1 , , B d , respectively, are to be stored in n distributed storage nodes, each of capacity α . The encoding needs to ensure that the file M j can be perfectly recovered by having full access to any j out of the total n storage nodes for any j { 1 , , d } . In addition, when node failures occur and there are only d remaining nodes in the system, it is required that the data originally stored in any failed node can be recovered by downloading data of size β from each one of the d remaining nodes.
Clearly, an ( n , k , d ) RC problem can be viewed as an ( n , d ) MDC-R problem with degenerate messages ( M j : j k ) (i.e., B j = 0 for all j k ). Therefore, from the code construction perspective, it is natural to consider the so-called separate coding scheme, i.e., to construct a code for the ( n , d ) MDC-R problem, we can simply use an ( n , j , d ) RC to encode the file M j for each j { 1 , , d } , and the coded messages for each file remain separate when stored in the storage nodes and during the repair processes. However, despite being a natural scheme, it was shown in [21] that separate coding is in general suboptimal in achieving the optimal trade-offs between the normalized storage-capacity and repair-bandwidth. On the other hand, it has been shown that separate coding can, in fact, achieve both the MSR [21] and the MBR [22] points of the achievable normalized storage-capacity and repair-bandwidth trade-off region for the general MDC-R problem.
The problem of SRC is an extension of the RC problem that further requires security guarantees during the repair processes. More specifically, the ( n , k , d , ) SRC problem that we consider is the ( n , k , d ) RC problem [7,8,9,10,11,12,13,14,15,16], with the additional constraint that the file M needs to be kept information-theoretically secure against an eavesdropper, which can access the data downloaded to regenerate a total of different failed nodes under all possible repair groups. Obviously, this is only possible when < k . Furthermore, when = 0 , the secrecy requirement degenerates, and the ( n , k , d , ) SRC problem reduces to the ( n , k , d ) RC problem without any repair secrecy requirement.
Under the additional require secrecy requirement ( 1 ), the optimal trade-offs between the node capacity α and repair bandwidth β have been studied in [23,24,25,26,27,28,29,30]. In particular, Shah, Rashmi and Kumar [25] showed that a particular trade-off point (referred to as the SRK point as the three first letters of the authors’ names) can be achieved by extending an MBR code based on the product-matrix construction proposed in [8]. Later, it was shown [30] that, for any given ( k , d ) pair, there is a lower bound on , denoted by * ( k , d ) , such that, when * ( k , d ) , the SRK point is the only corner point of the trade-off region for the ( n , k , d , ) SRC problem. On the other hand, when 1 < * ( k , d ) , it is possible that the trade-off region features multiple corner points, even though a precise characterization of the trade-off region, including both the MSR and the MBR points, remains missing in general.
In this paper, we introduce the problem of multilevel diversity coding with secure regeneration (MDC-SR) (The problem of secure multilevel diversity coding without any node regeneration requirement has been considered in [6,31].), which includes the problems of MDC-R and SRC as two special cases. In this model, multiple files are to be stored distributed in several storage nodes, like what in the Multilevel Diversity Coding problem. The system requires that, if a user can fully access some of the nodes, then the user can recover the corresponding part of the original files. Meanwhile, if any storage node failed, it can be regenerated by downloading messages from other nodes within a certain bandwidth limit. Additionally, if some nodes and repairing messages are leaked to an eavesdropper, the original files can still be information that is theoretically secure. The detailed definition of this model can be found in the next section. Similar to the MDC-R problem, it is natural to consider the separate coding scheme for the MDC-SR problem as well. Our main contribution consisted of three parts. Firstly, we established two nontrivial outer bounds for the MDC-SR problem. The secrecy constraint in the MDC-SR problem makes the outer bounding its trade-off region, not a simple extension of the bounding technic of the MDC-R problem in [22]. Secondly, we addressed a coding scheme with a separate coding structure that can achieve the intersection of the two outer bounds that we established, hence we can show that the optimality of separate coding in terms of achieving the MBR point of the achievable normalized storage-capacity and repair-bandwidth trade-off region extends more generally from the MDC-R problem to the MDC-SR problem. Last but not the least, during the process of establishing the two outer bounds, we proposed a lemma called Exchange Lemma, which we believe can be used widely in other similar or even more generalized problems. We need to mention that our system model and main results can be degenerated to some unknown results. For example, when specialized to the SRC problem, our result shows that the SRK point [25] is, in fact, the MBR point of the achievable normalized storage-capacity and repair-bandwidth trade-off region, regardless of the number of corner points of the trade-off region.
From the technical viewpoint, this is mainly accomplished by establishing two outer bounds (one of them must be “horizontal”, i.e., on the normalized repair-bandwidth only) on the achievable normalized storage-capacity and repair-bandwidth trade-off region, which intersect precisely at the superposition of the SRK points. The core of the new converse results is an exchange lemma, which we establish by exploiting the built-in symmetry of the problem via Han’s subset inequality [32]. The meaning of “exchange” will be clear from the statement of the lemma. The lemma only relies on the functional dependencies for the repair processes and might be useful for solving some other related problems as well.
The rest of the paper is organized as follows. In Section 2, we formally introduce the problem of MDC-SR and the separate coding scheme. The main results of the paper are then presented in Section 3. In Section 4, we introduce the exchange lemma and use it to establish the main results of the paper. Finally, we conclude the paper in Section 5.
Notation and Remarks. Sets and random variables will be written in calligraphic and sans-serif fonts respectively, to differentiate from the real numbers written in normal math fonts. For any two integers t t , we shall denote the set of consecutive integers { t , t + 1 , , t } by [ t : t ] . The use of the brackets will be supressed otherwise.
Though many remarkable previous works are mentioned in this introduction, some of them, in fact, are more related to our work, such as [15,25,29]. We list them for the best convenience of our readers.

2. The MDC-SR Problem

Let ( n , d , N 1 , , N d , K , T , S ) be a tuple of positive integers such that d < n . Formally, an ( n , d , N 1 , , N d , K , T , S ) code consists of:
  • for each i [ 1 : n ] , a message-encoding function f i : j = 1 d [ 1 : N j ] × [ 1 : K ] [ 1 : T ] ;
  • for each A [ 1 : n ] : | A | [ 1 : d ] , a message-decoding function g A : [ 1 : T ] | A | [ 1 : N | A | ] ;
  • for each B [ 1 : n ] : | B | = d , i B , and i [ 1 : n ] B , a repair-encoding function f i i B : [ 1 : T ] [ 1 : S ] ;
  • for each B [ 1 : n ] : | B | = d and i [ 1 : n ] B , a repair-decoding function g i B : [ 1 : S ] d [ 1 : T ] .
For each j [ 1 : d ] , let M j be a message that is uniformly distributed over [ 1 : N j ] . The messages M 1 , , M d are assumed to be mutually independent. Let K be a random key that is uniformly distributed over [ 1 : K ] and independent of the messages ( M 1 , , M d ) . For each i [ 1 : n ] , let W i = f i ( M 1 , , M d , K ) be the data stored at the ith storage node, and for each B [ 1 : n ] : | B | = d , i B , and i [ 1 : n ] B , let S i i B = f i i B ( W i ) be the data downloaded from the i th storage node in order to regenerate the data originally stored at the ith storage node under the context of repair group B . Obviously,
( B j = log N j : j [ 1 : d ] ) , α = log T , and β = log S
represent the message sizes, storage capacity, and repair bandwidth, respectively.
A normalized message-rate storage-capacity repair-bandwidth tuple ( B ¯ + 1 , , B ¯ d , α ¯ , β ¯ ) is said to be achievable for the ( n , d , ) MDC-SR problem if an ( n , d , 1 , , 1 , N + 1 , , N d , K , T , S ) code (i.e., N j = 1 for all j [ 1 : ] ) can be found such that:
  • (rate normalization)
    α t = + 1 d B t = α ¯ , β t = + 1 d B t = β ¯ , B j t = + 1 d B t = B ¯ j
    for any j [ + 1 : d ] ;
  • (message recovery)
    M | A | = g A ( W i : i A )
    for any A [ 1 : n ] : | A | [ + 1 : d ] ;
  • (node regeneration)
    W i = g i B ( S i i B : i B )
    for any B [ 1 : n ] : | B | = d and i [ 1 : n ] B ;
  • (repair secrecy)
    I ( ( M + 1 , , M d ) ; ( S i : i E ) ) = 0
    for any E [ 1 : n ] such that | E | = , where S i : = ( S i i B : B [ 1 : n ] , | B | = d , B i , i B ) is the collection of data that can be downloaded from the other nodes to regenerate node i.
The closure of all achievable ( B ¯ + 1 , , B ¯ d , α ¯ , β ¯ ) tuples is the achievable normalized message-rate storage-capacity repair-bandwidth trade-off region R n , d , for the ( n , d , ) MDC-SR problem. For a fixed normalized message-rate tuple ( B ¯ + 1 , , B ¯ d ) , the achievable normalized storage-capacity repair-bandwidth trade-off region is the collection of all normalized storage-capacity repair-bandwidth pairs ( α ¯ , β ¯ ) such that ( B ¯ + 1 , , B ¯ d , α ¯ , β ¯ ) R n , d , and is denoted by R n , d , ( B ¯ + 1 , , B ¯ d ) .
Based on the above problem formulation, it should be clear that the MDC-SR problem includes several open problems of recent interest:
(1)
the achievable normalized storage-capacity repair-bandwidth trade-off region R n , d ( B ¯ 1 , , B ¯ d ) of the ( n , d ) MDC-R problem is simply R n , d , 0 ( B ¯ 1 , , B ¯ d ) for any given normalized message-rate tuple ( B ¯ 1 , , B ¯ d ) ,
(2)
the achievable normalized storage-capacity repair-bandwidth trade-off region R n , k , d , of the ( n , k , d , ) SRC problem is simply R n , d , ( 0 , , 0 , B ¯ k = 1 , 0 , , 0 ) ,
(3)
the achievable normalized storage-capacity repair-bandwidth trade-off region R n , k , d of the ( n , k , d ) RC problem is simply R n , d ( 0 , , 0 , B ¯ k = 1 , 0 , , 0 ) or, equivalently, R n , k , d , 0 .
Given these connections, our problem formulation can be viewed as providing a unified framework to investigate these closely-related problems.
A simple and natural strategy for constructing a code for the ( n , d , ) MDC-SR problem is to use to an ( n , j , d , ) SRC to encode the message M j separately for each j [ + 1 : d ] . Since the coded data are kept separate during the encoding, decoding and repair processes, we have
K = j = + 1 d K j , T = j = + 1 d T j , and S = j = + 1 d S j .
Thus, for the general MDC-SR problem, the separate coding normalized storage-capacity repair-bandwidth trade-off region R ^ n , d , ( B ¯ + 1 , , B ¯ d ) for a fixed normalized message-rate tuple ( B ¯ + 1 , , B ¯ d ) is given by:
j = + 1 d α ¯ j B ¯ j , j = + 1 d β ¯ j B ¯ j : ( α ¯ j , β ¯ j ) R n , j , d , .
As mentioned previously, when = 0 , the repair secrecy requirement (4) degenerates, and the ( n , d , ) MDC-SR problem reduces to the ( n , d ) MDC-R problem. In this case, it was shown in [22] that any achievable normalized message-rate storage-capacity repair-bandwidth tuple ( B ¯ 1 , , B ¯ d , α ¯ , β ¯ ) R n , d must satisfy:
β ¯ j = 1 d T d , j 1 B ¯ j ,
and α ¯ + d ( d 1 ) 2 β ¯ d ( d + 1 ) 2 j = 1 d T d , j 1 B ¯ j ,
where T d , j : = t = 1 j ( d + 1 t ) . When set as equalities, the intersection of (6) and (7) is given by:
α ¯ , β ¯ = d j = 1 d T d , j 1 B ¯ j , j = 1 d T d , j 1 B ¯ j .
For any j [ 1 : d ] , the MBR point for the ( n , j , d ) RC problem can be written as [8]
d T d , j 1 , T d , j 1 R n , j , d .
We may thus conclude immediately from (5) (with = 0 ) that separate coding can achieve the MBR point for the general MDC-R problem.
Figure 1 shows the optimal trade-off curve between the normalized storage-capacity and repair-bandwidth and the best possible trade-offs that can be achieved by separate coding for the ( 4 , 3 ) MDC-R problem with ( B ¯ 1 , B ¯ 2 , B ¯ 3 ) = ( 0 , 1 / 3 , 2 / 3 ) [21]. Clearly, for this example, separate coding is strictly suboptimal when α ¯ ( 5 / 12 , 1 / 2 ) . On the other hand, when α ¯ 5 / 12 or α ¯ 1 / 2 , separate coding can, in fact, achieve the optimal trade-offs. In particular, separate encoding can achieve the MSR point ( 7 / 18 , 11 / 36 ) and the MBR point ( 8 / 15 , 8 / 45 ) . In the same figure, the outer bounds (6) and (7) have also been plotted. As illustrated, they intersect precisely at the MBR point ( 8 / 15 , 8 / 45 ) . Notice that, for this example at least, the outer bound (7) is tight only at the MBR point.

3. Main Results

Our main result of the paper is to show that the optimality of separate coding in terms of achieving the MBR point of the normalized storage-capacity repair-bandwidth trade-off region extends more generally from the MDC-R problem to the MDC-SR problem. The results are summarized in the following theorem.
Theorem 1.
For the general MDC-SR problem, any achievable normalized message-rate storage-capacity repair-bandwidth tuple ( B ¯ + 1 , , B ¯ d , α ¯ , β ¯ ) R n , d , must satisfy:
β ¯ j = + 1 d T d , j , 1 B ¯ j ,
a n d α ¯ + ( d ( d ) ) β ¯ ( d ) ( d + 1 ) j = + 1 d T d , j , 1 B ¯ j ,
where T d , k , : = t = + 1 k ( d + 1 t ) . When set as equalities, the intersection of (9) and (10) is given by:
α ¯ , β ¯ = d j = + 1 d T d , j , 1 B ¯ j , j = + 1 d T d , j , 1 B ¯ j .
For any j [ + 1 : d ] , the SRK point for the ( n , j , d , ) SRC problem can be written as [25]:
( d T d , j , 1 , T d , j , 1 ) R n , j , d , .
We may thus conclude immediately from (5) that separate coding can achieve the MBR point for the general MDC-SR problem.
The following corollary follows immediately from Theorem 1 by setting B ¯ j = 0 for all j k .
Corollary 1.
For the general SRC problem, any achievable normalized storage-capacity repair-bandwidth tuple ( α ¯ , β ¯ ) R n , k , d , must satisfy:
β ¯ T d , k , 1 ,
a n d α ¯ + ( d ( d ) ) β ¯ ( d ) ( d + 1 ) T d , k , 1 .
When set as equalities, the intersection of (12) and (13) is precisely the SRK point (11) (with j = k ), showing that the SRK point is, in fact, the MBR point of the achievable normalized storage-capacity repair-bandwidth trade-off region for the general SRC problem.
While the outer bound (12) is known [23,24,30], the outer bound (13) is new. Figure 2 shows the optimal trade-off curve between the normalized storage-capacity and repair-bandwidth for the ( 7 , 6 , 6 , 1 ) SRC problem. Notice that, for this example, the SRK point ( 2 / 5 , 1 / 15 ) is, in fact, the MBR point even though the trade-off region has two corner points. In the same figure, the outer bunds (12) and (13) have also been plotted. As illustrated, when set as equalities, they intersect precisely at the MBR/SRK point ( 2 / 5 , 1 / 15 ) . Notice that for this example at least, the outer bound (13) is tight only at the MBR/SRK point.
As a final remark, we mention here that when = 0 , the outer bound (9) is reduced to (6) for the ( n , d ) MDC-R problem by the fact that T n , d , 0 = T n , d . However, when = 0 , the outer bound (10) is reduced to:
α ¯ + d 2 β ¯ d ( d + 1 ) j = 1 d T d , j 1 B ¯ j ,
which is weaker than the outer bound (7) by the fact that d 2 > d ( d 1 ) 2 . Figure 1 shows the outer bound (14) for the ( 4 , 3 ) MDC-R problem with ( B ¯ 1 , B ¯ 2 , B ¯ 3 ) = ( 0 , 1 / 3 , 2 / 3 ) . As illustrated, (14) is weaker than (7), and both are only tight at the MBR point ( 8 / 15 , 8 / 45 ) .

4. Proof of the Main Results

Let us first outline the main ingredients for proving the outer bounds (9) and (10).
(1)
Total number of nodes. To prove the outer bounds (9) and (10), let us first note that these bounds are independent of the total number of storage nodes n in the system. Therefore, in our proof, we only need to consider the cases where n = d + 1 —for the cases where n > d + 1 , since any subsystem consisting of d + 1 out of the total n storage nodes must give rise to a ( d + 1 , d , ) MDC-SR problem. Therefore, these outer bounds must apply as well. When n = d + 1 , any repair group B of size d is uniquely determined by the node j to be repaired, i.e., B = [ 1 : n ] { j } , and hence can be dropped from the notation S i j B without causing any confusion.
(2)
Code symmetry. Due to the built-in symmetry of the problem, to prove the outer bounds (9) and (10), we only need to consider the so-called symmetrical codes [10] for which the joint entropy of any subset of random variables from
( M 1 , , M d ) , K , ( W i : i [ 1 : n ] ) , ( S i j : i , j [ 1 : n ] , i j )
remains unchanged under any permutation over the storage-node indices.
(3)
Key collections of random variables. Focusing on the symmetrical ( n = d + 1 , d , N 1 , , N d , K , T , S ) codes, the following collections of random variables play a key role in our proof:
M A : = ( M i : i A ) , A [ 1 : d ] , M ( m ) : = M [ 1 : m ] , m [ 1 : d ] , W A : = W i : i A , A [ 1 : n ] , S i B : = S i j : j B , i [ 1 : n ] , B [ 1 : n ] { i } , S B j : = S i j : i B , j [ 1 : n ] , B [ 1 : n ] { j } , S j : = S [ 1 : j 1 ] [ j + 1 : n ] j , j [ 1 : n ] , S B : = S j : j B , B [ 1 : n ] , S ̲ j : = S [ 1 : j 1 ] j , j [ 1 : n ] , S ̲ B : = ( S ̲ j : j B ) , B [ 1 : n ] , S ¯ j : = S [ j + 1 : n ] j , j [ 1 : n ] , S ¯ B : = ( S ¯ j : j B ) , B [ 1 : n ] , U ( t , s ) : = ( W [ 1 : t ] , S ¯ [ t + 1 : s ] ) , s [ 1 : n ] , t [ 0 : s ] , U ( s ) : = U ( 0 , s ) .
These collections of random variables have also been used in [22,30].
An important part of the proof is to understand the relations between the collections of random variables defined above, and to use them to derive the desired converse results. We shall discuss this next.

4.1. Technical Lemmas

Lemma 1.
For any ( n = d + 1 , d , N 1 , , N d , K , T , S ) code that satisfies the node regeneration requirement (3), ( S ̲ [ t + 1 : s ] , W [ t + 1 : s ] ) is a function of U ( t , s ) for any s [ 1 : n ] and t [ 0 : s 1 ] .
Proof of Lemma 1.
Fix s [ 1 : n ] and t [ 0 : s 1 ] . Let us first note that S ̲ t + 1 is a function of W [ 1 : t ] . As a result, S t + 1 = ( S ̲ t + 1 , S ¯ t + 1 ) is a function of U ( t , s ) . It thus follows immediately from the node regeneration requirement (3) that W t + 1 is a function of U ( t , s ) . Similarly and inductively, it can be shown that ( S ̲ j , W j ) is a function of U ( t , s ) for all j [ t + 2 : s ] . This completes the proof of the lemma. ☐
The above lemma demonstrates the “compactness” of U ( t , s ) and has a number of direct consequences. For example, for any fixed s [ 1 : n ] , it is clear from Lemma 1 that U ( t 2 , s ) is a function of U ( t 1 , s ) and hence H ( U ( t 2 , s ) ) H ( U ( t 1 , s ) ) for any 0 t 1 t 2 s 1 .
The following lemma plays the key role in proving the outer bounds (6) and (7). The proof is rather long and is deferred to the Appendix to enhance the flow of the paper.
Lemma 2 (Exchange lemma).
For any symmetrical ( n = d + 1 , d , N 1 , , N d , K , T , S ) code that satisfies the node regeneration requirement (3), we have
d + 1 j d m H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) d + 1 j d m H ( U ( i , m + 1 ) | M ( m ) ) + H ( U ( i , j 1 ) | M ( m ) )
for any m [ 1 : d 1 ] , i [ 0 : m 1 ] , i [ 0 : i ] , and j [ i + 1 : m i + i + 1 ] .
Corollary 2.
For any symmetrical ( n = d + 1 , d , N 1 , , N d , K , T , S ) code that satisfies the node regeneration requirement (3), we have
T d , m , 1 H ( U ( m ) | M ( m ) ) T d , m + 1 , 1 H ( U ( m + 1 ) | M ( m ) ) + ( T d , m , 1 T d , m + 1 , 1 ) H ( U ( ) | M ( m ) )
for any [ 0 : d 1 ] and m [ + 1 : d 1 ] .
Proof of Corollary 2.
Fix [ 0 : d 1 ] and m [ + 1 : d 1 ] . Setting i = i = 0 in (15), we have
d + 1 j d m H ( U ( m ) | M ( m ) ) + H ( U ( j ) | M ( m ) ) d + 1 j d m H ( U ( m + 1 ) | M ( m ) ) + H ( U ( j 1 ) | M ( m ) )
for any j [ 1 : m + 1 ] . Add the inequalities (17) for j [ + 1 : m ] and cancel the common term j = + 1 m 1 H ( U ( j ) | M ( m ) ) from both sides. We have
T d , m , d m H ( U ( m ) | M ( m ) ) + H ( U ( m ) | M ( m ) ) T d , m , d m H ( U ( m + 1 ) | M ( m ) ) + H ( U ( ) | M ( m ) ) ,
which can be equivalently written as
T d , m + 1 , d m H ( U ( m ) | M ( m ) ) T d , m , d m H ( U ( m + 1 ) | M ( m ) ) + H ( U ( ) | M ( m ) )
by the fact that T d , m , + ( d m ) = T d , m + 1 , . Multiplying both sides of (18) by
d m T d , m + 1 , T d , m , = T d , m , 1 T d , m + 1 , 1
completes the proof of (16). ☐
Corollary 3.
For any symmetrical ( n = d + 1 , d , N 1 , , N d , K , T , S ) code that satisfies the node regeneration requirement (3), we have
H ( U ( 1 , m ) | M ( m ) ) + ( d m ) T d , m , 1 H ( U ( m ) | M ( m ) ) H ( U ( 1 , m + 1 ) | M ( m ) ) + ( d m ) T d , m , 1 H ( U ( ) | M ( m ) )
for any [ 0 : d 1 ] and m [ + 1 : d 1 ] .
Proof of Corollary 3.
Fix [ 0 : d 1 ] and m [ + 1 : d 1 ] . Set i = 1 and i = 0 in (15). We have
d + 1 j d m H ( U ( 1 , m ) | M ( m ) ) + H ( U ( j ) | M ( m ) ) d + 1 j d m H ( U ( 1 , m + 1 ) | M ( m ) ) + H ( U ( j 1 ) | M ( m ) )
for any j [ 1 : m ] . Add the inequalities (20) for j [ + 1 : m ] and cancel the common term j = + 1 m 1 H ( U ( j ) | M ( m ) ) from both sides. We have
T d , m , d m H ( U ( 1 , m ) | M ( m ) ) + H ( U ( m ) | M ( m ) ) T d , m , d m H ( U ( 1 , m + 1 ) | M ( m ) ) + H ( U ( ) | M ( m ) ) .
Multiplying both sides of (21) by ( d m ) T d , m , 1 completes the proof of (19). ☐

4.2. The Proof

Consider a symmetrical ( n = d + 1 , d , 1 , , 1 , N + 1 , , N d , K , T , S ) regenerating code that satisfies the rate normalization requirement (1), the message recovery requirement (2), the node regeneration requirement (3), and the repair secrecy requirement (4). Let us first prove a few intermediate results. The outer bounds (9) and (10) will then follow immediately.
Proposition 1.
1 d H ( U ( + 1 ) ) j = + 1 m T d , j , 1 B j + T d , m , 1 H ( U ( m ) | M [ + 1 : m ] ) + 1 d T d , m , 1 H ( U ( ) )
for any m [ + 1 : d ] . Consequently,
1 d H ( U ( + 1 ) ) j = + 1 d T d , j , 1 B j + 1 d H ( U ( ) ) .
Proof of Proposition 1.
To see (22), consider proof by induction. For the base case with m = + 1 , we have
1 d H ( U ( + 1 ) ) = ( a ) 1 d H ( U ( + 1 ) , M + 1 ) = ( b ) 1 d H ( M + 1 ) + H ( U ( + 1 ) | M + 1 ) = ( c ) 1 d B + 1 + H ( U ( + 1 ) | M + 1 ) = ( d ) T d , + 1 , 1 B + 1 + T d , + 1 , 1 H ( U ( + 1 ) | M + 1 ) ,
where ( a ) follows from the fact that M + 1 is a function of W [ 1 : + 1 ] , which is a function of U ( + 1 ) by Lemma 1; ( b ) follows from the chain rule for entropy; ( c ) follows from the fact that H ( M + 1 ) = B + 1 ; and ( d ) follows from the fact that T d , + 1 , = d . Assuming that (22) holds for some m [ + 1 : d 1 ] , we have
1 d H ( U ( + 1 ) ) ( a ) j = + 1 m T d , j , 1 B j + T d , m , 1 H ( U ( m ) | M [ + 1 : m ] ) + 1 d T d , m , 1 H ( U ( ) ) ( b ) j = + 1 m T d , j , 1 B j + T d , m + 1 , 1 H ( U ( m + 1 ) | M [ + 1 : m ] ) + 1 d T d , m + 1 , 1 H ( U ( ) ) ( c ) j = + 1 m T d , j , 1 B j + T d , m + 1 , 1 H ( U ( m + 1 ) , M m + 1 | M [ + 1 : m ] ) + 1 d T d , m + 1 , 1 H ( U ( ) ) = ( d ) j = + 1 m T d , j , 1 B j + T d , m + 1 , 1 H ( M m + 1 | M [ + 1 : m ] ) + T d , m + 1 , 1 H ( U ( m + 1 ) | M [ + 1 : m + 1 ] ) + 1 d T d , m + 1 , 1 H ( U ( ) ) = ( e ) j = + 1 m T d , j , 1 B j + T d , m + 1 , 1 B m + 1 + T d , m + 1 , 1 H ( U ( m + 1 ) | M [ + 1 : m + 1 ] ) + 1 d T d , m + 1 , 1 H ( U ( ) ) = j = + 1 m + 1 T d , j , 1 + T d , m + 1 , 1 H ( U ( m + 1 ) | M [ + 1 : m + 1 ] ) + 1 d T d , m + 1 , 1 H ( U ( ) ) ,
where ( a ) follows from the induction assumption; ( b ) follows from Corollary 2; ( c ) follows from the fact that M m + 1 is a function of W [ 1 : m + 1 ] , which is a function of U ( m + 1 ) by Lemma 1; ( d ) follows from the chain rule for entropy; and ( e ) follows from the facts that M m + 1 is independent of M [ + 1 : m ] and that H ( M m + 1 ) = B m + 1 . This completes the induction step and hence the proof of (22).
To see (23), simply set m = d in (22). We have
1 d H ( U ( + 1 ) ) j = + 1 d T d , j , 1 B j + T d , d , 1 H ( U ( d ) | M [ + 1 : d ] ) + 1 d T d , d , 1 H ( U ( ) ) .
Note that
H ( U ( d ) | M [ + 1 : d ] ) H ( U ( ) | M [ + 1 : d ] ) = H ( U ( ) )
where the last equality follows from the fact that I ( U ( ) ; M [ + 1 : d ] ) = 0 by the repair secrecy requirement (4). Substituting (25) into (24) completes the proof of (23). ☐
Proposition 2.
H ( S d + 1 [ 1 : ] ) + ( d ( d ) ) β + d H ( U ( ) ) d H ( U ( + 1 ) ) .
Proof of Proposition 2.
First note that, for any m [ 1 : ] , we have
H ( S d + 1 [ 1 : m ] ) + H ( U ( ) ) = ( a ) H ( S d + 1 [ 1 : m 1 ] { + 1 } ) + H ( U ( ) ) ( b ) H ( S d + 1 [ 1 : m 1 ] ) + H ( U ( ) , S d + 1 + 1 ) ,
where ( a ) follows from the fact that H ( S d + 1 [ 1 : m ] ) = H ( S d + 1 [ 1 : m 1 ] { + 1 } ) due to the symmetrical code that we consider, and ( b ) follows from the submodularity of the entropy function. Add (27) over m [ 1 : ] and cancel m = 1 1 H ( S d + 1 [ 1 : m ] ) from both sides. We have
H ( S d + 1 [ 1 : ] ) + H ( U ( ) ) H ( U ( ) , S d + 1 + 1 ) .
It follows that
H ( S d + 1 [ 1 : ] ) + ( d ( d ) ) β + d H ( U ( ) ) = H ( S d + 1 [ 1 : ] ) + H ( U ( ) ) + ( d ( d ) ) β + ( d ) H ( U ( ) ) ( a ) H ( U ( ) , S d + 1 + 1 ) + ( d ( d ) ) β + ( d ) H ( U ( ) ) = ( d 1 ) β + H ( U ( ) , S d + 1 + 1 ) + ( d ) ( d ) β + H ( U ( ) ) ( b ) H ( S [ + 2 : d ] + 1 ) + H ( U ( ) , S d + 1 + 1 ) + ( d ) H ( S ¯ + 1 ) + H ( U ( ) ) ( c ) H ( U ( + 1 ) ) + ( d ) H ( U ( + 1 ) ) = d H ( U ( + 1 ) ) ,
where ( a ) follows from (28); ( b ) follows from the fact that H ( S [ + 2 : d ] + 1 ) ( d 1 ) β and that H ( S ¯ + 1 ) ( d ) β ; and ( c ) follows from the fact that H ( S [ + 2 : d ] + 1 ) + H ( U ( ) , S d + 1 + 1 ) H ( U ( + 1 ) ) and that H ( S ¯ + 1 ) + H ( U ( ) ) H ( U ( + 1 ) ) by the union bound on entropy. This completes the proof of the proposition. ☐
Proposition 3.
H ( U ( 1 , m ) ) + d m d H ( U ( + 1 ) ) ( d m ) j = + 1 m T d , j , 1 B j + H ( U ( 1 , m + 1 ) ) + d m d H ( U ( ) )
for any m [ + 1 , d 1 ] . Consequently,
H ( U ( 1 , + 1 ) ) + T d , d , + 1 d H ( U ( + 1 ) ) T d , d , j = + 1 d T d , j , 1 B j + T d , d , d H ( U ( ) ) .
Proof of Proposition 3.
To see (29), note that, for any m [ + 1 , d 1 ] , we have
H ( U ( 1 , m ) | M [ + 1 : m ] ) + d m d H ( U ( + 1 ) ) ( a ) H ( U ( 1 , m ) | M [ + 1 : m ] ) + ( d m ) j = + 1 m T d , j , 1 B j + T d , m , 1 H ( U ( m ) | M [ + 1 : m ] ) + 1 d T d , m , 1 H ( U ( ) ) = H ( U ( 1 , m ) | M [ + 1 : m ] ) + ( d m ) T d , m , 1 H ( U ( m ) | M [ + 1 : m ] ) + ( d m ) j = + 1 m T d , j , 1 B j + 1 d T d , m , 1 H ( U ( ) ) ( b ) H ( U ( 1 , m + 1 ) | M [ + 1 : m ] ) + ( d m ) T d , m , 1 H ( U ( ) | M [ + 1 : m ] ) + ( d m ) j = + 1 m T d , j , 1 B j + 1 d T d , m , 1 H ( U ( ) ) = ( c ) H ( U ( 1 , m + 1 ) | M [ + 1 : m ] ) + ( d m ) T d , m , 1 H ( U ( ) ) + ( d m ) j = + 1 m T d , j , 1 B j + 1 d T d , m , 1 H ( U ( ) ) = H ( U ( 1 , m + 1 ) | M [ + 1 : m ] ) + ( d m ) j = + 1 m T d , j , 1 B j + d m d H ( U ( ) ) ,
where ( a ) follows from (22) of Proposition 1; ( b ) follows from Corollary 3; and ( c ) follows from the fact that I ( U ( ) ; M [ + 1 : m ] ) = 0 due to the repair secrecy requirement (4). Adding H ( M [ + 1 : m ] ) to both sides and using the facts that
H ( U ( 1 , m ) | M [ + 1 : m ] ) + H ( M [ + 1 : m ] ) = H ( U ( 1 , m ) , M [ + 1 : m ] ) = ( a ) H ( U ( 1 , m ) )
and that
H ( U ( 1 , m + 1 ) | M [ + 1 : m ] ) + H ( M [ + 1 : m ] ) =   H ( U ( 1 , m + 1 ) , M [ + 1 : m ] ) = ( b ) H ( U ( 1 , m + 1 ) )
complete the proof of (29). Here, ( a ) and ( b ) are due to the facts that M [ + 1 : m ] is a function of W [ 1 : m ] , which is a function of both U ( 1 , m ) and U ( 1 , m + 1 ) by Lemma 1.
To see (30), add (29) over m [ + 1 : d 1 ] and cancel m = + 2 d 1 H ( U ( 1 , m ) ) from both sides of the inequality. We have
H ( U ( 1 , + 1 ) ) + T d , d , + 1 d H ( U ( + 1 ) ) m = + 1 d 1 ( d m ) j = + 1 m T d , j , 1 B j + H ( U ( 1 , d ) ) + T d , d , + 1 d H ( U ( ) ) .
Note that
m = + 1 d 1 ( d m ) j = + 1 m T d , j , 1 B j = j = + 1 d 1 T d , j , 1 B j m = j d 1 ( d m ) = j = + 1 d 1 T d , j , 1 T d , d , j B j .
Furthermore,
H ( U ( 1 , d ) ) = ( a ) H ( U ( 1 , d ) , M [ + 1 : d ] ) = ( b ) H ( U ( 1 , d ) | M [ + 1 : d ] ) + H ( M [ + 1 : d ] ) = ( c ) H ( U ( 1 , d ) | M [ + 1 : d ] ) + j = + 1 d B j = ( d ) H ( U ( 1 , d ) , S 1 [ 2 : d 1 ] | M [ + 1 : d ] ) + j = + 1 d B j = ( e ) H ( U ( d 1 ) , W d + 1 | M [ + 1 : d ] ) + j = + 1 d B j H ( U ( ) | M [ + 1 : d ] ) + j = + 1 d B j = ( f ) H ( U ( ) ) + j = + 1 d B j ,
where ( a ) follows from the fact that M [ + 1 : d ] is a function of W [ 1 : d ] , which is a function of U ( 1 , d ) by Lemma 1; ( b ) follows from the chain rule for entropy; ( c ) follows from the fact that H ( M [ + 1 : d ] ) = j = + 1 d B j ; ( d ) follows from the fact that S 1 [ 2 : d 1 ] is a function of W 1 and hence a function of U ( 1 , d ) ; ( e ) follows from the fact that H ( U ( 1 , d ) , S 1 [ 2 : d 1 ] | M [ + 1 : d ] ) = H ( U ( d 1 ) , W d + 1 | M [ + 1 : d ] ) due to the symmetrical code that we consider; and ( f ) follows from the fact that I ( U ( ) ; M [ + 1 : d ] ) = 0 due to the repair secrecy requirement (4).
Substituting (32) and (33) into (31) gives:
H ( U ( 1 , + 1 ) ) + T d , d , + 1 d H ( U ( + 1 ) ) j = + 1 d 1 T d , j , 1 T d , d , j B j + j = + 1 d B j + 1 + T d , d , + 1 d H ( U ( ) ) = j = + 1 d 1 T d , j , 1 ( T d , d , j + T d , j , ) B j + B d + T d , d , d H ( U ( ) ) = ( a ) T d , d , j = + 1 d 1 T d , j , 1 B j + B d + T d , d , d H ( U ( ) ) = T d , d , j = + 1 d T d , j , 1 B j + T d , d , d H ( U ( ) ) ,
where ( a ) follows from the fact that T d , d , j + T d , j , = T d , d , . This completes the proof of the proposition. ☐
Proof of Theorem 1.
We are now ready to prove the outer bounds (9) and (10). To prove (9), note that
β + 1 d H ( U ) ( a ) 1 d H ( S ¯ + 1 ) + H ( U ( ) ) ( b ) 1 d H ( U ( + 1 ) ) ( c ) j = + 1 d T d , j , 1 B j + 1 d H ( U ( ) ) ,
where ( a ) follows from the fact that H ( S ¯ + 1 ) ( d ) β ; ( b ) follows from the union bound on entropy; and ( c ) follows from (23) of Proposition 1. Cancelling 1 d H ( U ) from both sides of the inequality and normalizing both sides by t = + 1 d B t complete the proof of (9).
To prove (10), note that
α + ( d ( d ) ) β + ( d + 1 ) H ( U ( ) ) ( a ) H ( W d + 1 ) + H ( U ( ) ) + ( d ( d ) ) β + d H ( U ( ) ) = ( b ) H ( W d + 1 , S d + 1 [ 1 : ] ) + H ( U ( ) ) + ( d ( d ) ) β + d H ( U ( ) ) ( c ) H ( W d + 1 , U ( ) ) + H ( S d + 1 [ 1 : ] ) + ( d ( d ) ) β + d H ( U ( ) ) ( d ) H ( W d + 1 , U ( ) ) + d H ( U ( + 1 ) ) = ( e ) H ( U ( 1 , + 1 ) , S 1 [ 2 : + 1 ] ) + d H ( U ( + 1 ) ) H ( U ( 1 , + 1 ) ) + d H ( U ( + 1 ) ) = H ( U ( 1 , + 1 ) ) + T d , d , + 1 d H ( U ( + 1 ) ) + d T d , d , + 1 d H ( U ( + 1 ) ) ( f ) T d , d , j = + 1 d T d , j , 1 B j + H ( U ( ) ) d + d T d , d , + 1 d ( d ) j = + 1 d T d , j , 1 B j + H ( U ( ) ) = T d , d , + d ( d ) T d , d , + 1 j = + 1 d T d , j , 1 B j + T d , d , d + d T d , d , + 1 d H ( U ( ) ) = ( g ) ( d + 1 ) ( d ) j = + 1 d T d , j , 1 B j + ( d + 1 ) H ( U ( ) ) ,
where ( a ) follows from the fact that H ( W d + 1 ) α ; ( b ) follows from the fact that S d + 1 [ 1 : ] is a function of W d + 1 ; ( c ) follows from the fact that H ( W d + 1 , S d + 1 [ 1 : ] ) + H ( U ( ) ) H ( W d + 1 , U ( ) ) + H ( S d + 1 [ 1 : ] ) due to the submodularity of the entropy function; ( d ) follows from Proposition 2; ( e ) follows from the fact that H ( W d + 1 , U ( ) ) = H ( U ( 1 , + 1 ) , S 1 [ 2 : + 1 ] ) due to the symmetrical code that we consider; ( f ) follows from (23) of Proposition 1 and (30) of Proposition 3; and ( g ) follows from the fact that T d , d , T d , d , + 1 = d . Cancelling ( d + 1 ) H ( U ) from both sides of the inequality and normalizing both sides by t = + 1 d B t complete the proof of (10). ☐

5. Conclusions

This paper considered the problem of MDC-SR, which includes the problems of MDC-R and SRC as special cases. Two outer bounds were established, showing that separate coding can achieve the MBR point of the achievable normalized storage-capacity repair-bandwidth trade-off regions for the general MDC-SR problem. When specialized to the SRC problem, it was shown that the SRK point [25] is the MBR point of the achievable normalized storage-capacity repair-bandwidth trade-off regions for the general SRC problem. The core of the new converse results is an exchange lemma, which we established by using Han’s subset inequality [32]. The exchange lemma only relies on the functional dependencies for the repair processes and might be useful for solving some other related problems as well.
Note that separate encoding can also achieve the MSR point of the achievable normalized storage-capacity repair-bandwidth trade-off regions for the general MDC-R problem [22]. We suspect that this also generalizes to the MDC-SR problem. To prove such this result, however, we shall need new converse results as well as new code constructions for the general SRC problem, both of which are currently under our investigations.

Author Contributions

T.L. and C.T. proposed the idea of this paper, S.S. was responsible for the technical proof of the paper and all for authors worked on writing, revising and editing this manuscript.

Funding

The work of T.L. was supported in part by the National Science Foundation under Grants CCF-17-19017; the work of C.T. was supported in part by CCF-18-32309; and the work of C.S. was supported in part by the National Natural Science Foundation of China under Grant 61631017.

Acknowledgments

S.S. is grateful to Fangwei Ye for giving opinions to our early version on Arxiv.

Conflicts of Interest

The authors declare no conflict of interest. The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results.

Appendix A. Proof of the Exchange Lemma

Proof of the Exchange Lemma.
This lemma is proved in an iterative way. The to be “exchanged” random variable sets are partitioned in a designed way, and every time after a small partition of the set is exchanged, we can establish an inequality. In our proof, we use not only the submodularity of the entropy function but also the properties of regeneration code, namely Lemma 1 as well.
Fix m [ 1 : d 1 ] , i [ 0 : m 1 ] , i [ 0 : i ] , and j [ i + 1 : m i + i + 1 ] . Let us first note that, if j = m + 1 , we must have i = i , and in this case the inequality (15) holds trivially with an equality. Therefore, for the remaining proof, we shall assume that j m . Now that d + 1 j > d m , we may write d + 1 j = s ( d m ) + r for some integer s 1 and r [ 1 : d m ] . Furthermore, let
a t : = t + i , t [ 1 : i i ] , t + j 1 , t [ i i + 1 : m j + 1 ] , t + j , t [ m j + 2 : d + 1 j ] .
As illustrated in Figure A1, a t is monotonically increasing with t. Finally, let τ 0 : = { a t : t [ 1 : r ] } and
τ q : = { a t : t [ r + 1 + ( q 1 ) ( d m ) : r + q ( d m ) ] }
for any q [ 1 : s ] . It is straightforward to verify that:
  • τ q τ q = for any q q ,
  • q = 0 s 1 τ q = [ i + 1 : i ] [ i + j i : m ] ,
  • τ s = [ m + 2 : d + 1 ] .
Figure A1. a t as a function of t. The sets ( τ q : q [ 0 : s ] ) form a partition of the set [ i + 1 : i ] [ i + j i : m ] [ m + 2 : d + 1 ] .
Figure A1. a t as a function of t. The sets ( τ q : q [ 0 : s ] ) form a partition of the set [ i + 1 : i ] [ i + j i : m ] [ m + 2 : d + 1 ] .
Entropy 20 00751 g0a1
Consider a symmetrical ( n = d + 1 , d , N 1 , , N d , T , S ) code that satisfies the node regeneration requirement (3). Let us show by induction that for any p [ 1 : s ] , we have
p H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) p H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s p τ q m + 1 | M ( m ) ) .
To prove the base case of p = 1 , first note that
H ( U ( i , m ) | M ( m ) ) = ( a ) H ( U ( i , m ) , W [ i + 1 , m ] , S ̲ [ i + 1 : m ] | M ( m ) ) = H ( W [ 1 : m ] , S [ i + 1 : m ] | M ( m ) ) = ( b ) H ( W [ 1 : m ] , S [ i + 1 : m ] , S [ 1 : m ] m + 1 | M ( m ) ) ) H ( W [ 1 : i ] , S [ i + 1 : m ] , S [ 1 : m ] m + 1 | M ( m ) ) ) ,
where ( a ) follows from the fact that ( W [ i + 1 , m ] , S ̲ [ i + 1 : m ] ) is a function of U ( i , m ) by Lemma 1, and ( b ) follows from the fact that S [ 1 : m ] m + 1 is a function of W [ 1 : m ] . Furthermore,
H ( U ( i , j ) | M ( m ) ) = ( a ) H ( U ( i , j ) , S ̲ [ i + 1 : j ] | M ( m ) ) = H ( W [ 1 : i ] , S [ i + 1 : j ] | M ( m ) ) = ( b ) H ( W [ 1 : i ] , S [ i + 1 : i + j i ] | M ( m ) ) = H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S i + j i | M ( m ) ) H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S [ i + 1 : i ] i + j i , S [ i + j i + 1 : d + 1 ] i + j i | M ( m ) ) = ( c ) H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S [ i + 1 : i ] m + 1 , S [ i + j i : m ] m + 1 , S [ m + 2 : d + 1 ] m + 1 | M ( m ) ) ,
where ( a ) follows from the fact that S ̲ [ i + 1 : j ] is a function of U ( i , j ) by Lemma 1, and ( b ) and ( c ) follow from the symmetrical code that we consider. It follows that
H ( U ( i , m ) | M ( m ) ) + H ( U i , j | M ( m ) ) H ( W [ 1 : i ] , S [ i + 1 : m ] , S [ 1 : m ] m + 1 | M ( m ) ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S [ i + 1 : i ] m + 1 , S [ i + j i : m ] m + 1 , S [ m + 2 : d + 1 ] m + 1 | M ( m ) ) ( a ) H ( W [ 1 : i ] , S [ i + 1 : m ] , S [ 1 : m ] m + 1 , S [ m + 2 : d + 1 ] m + 1 | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S [ i + 1 : i ] m + 1 , S [ i + j i : m ] m + 1 | M ( m ) ) = H ( U ( i , m + 1 ) , S ̲ [ i + 1 : m + 1 ] | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s 1 τ q m + 1 | M ( m ) ) H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s 1 τ q m + 1 | M ( m ) ) ,
where ( a ) follows from the submodularity of the entropy function. This completes the proof of the base case of p = 1 .
Assume that (A1) holds for some p [ 1 : s 1 ] . We have
( p + 1 ) H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) = H ( U ( i , m ) | M ( m ) ) + p H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) H ( U ( i , m ) | M ( m ) ) + p H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s p τ q m + 1 | M ( m ) ) .
Note that both S ̲ [ i + 1 , i + j i 1 ] and S q = 0 s ( p + 1 ) τ q m + 1 are functions of W [ 1 : m ] , which is in turn a function of U ( i , m ) by Lemma 1. We thus have
H ( U ( i , m ) | M ( m ) ) = H ( U ( i , m ) , S ̲ [ i + 1 , i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 | M ( m ) ) .
Furthermore, by the symmetrical code that we consider, we have
H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s p τ q m + 1 | M ( m ) ) = H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 , S [ m + 2 : d + 1 ] m + 1 | M ( m ) ) .
It follows that
H ( U ( i , m ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s p τ q m + 1 | M ( m ) ) = H ( U ( i , m ) , S ̲ [ i + 1 , i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 , S [ m + 2 : d + 1 ] m + 1 | M ( m ) ) ( a ) H ( U ( i , m ) , S ̲ [ i + 1 , i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 , S [ m + 2 : d + 1 ] m + 1 | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 | M ( m ) ) H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 | M ( m ) ) ,
where ( a ) follows from the submodularity of the entropy function. Substituting (A3) into (A2) gives
( p + 1 ) H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) ( p + 1 ) H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S q = 0 s ( p + 1 ) τ q m + 1 | M ( m ) ) ,
which completes the induction step and hence the proof of (A1).
Setting p = s in (A1), we have
s H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) s H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , S τ 0 m + 1 | M ( m ) ) = s H ( U ( i , m + 1 ) | M ( m ) ) + H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] | M ( m ) ) + H ( S τ 0 m + 1 | W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , M ( m ) ) .
By the symmetrical codes that we consider, we have
H ( W [ 1 : i ] , S [ i + 1 : i + j i 1 ] | M ( m ) ) = H ( W [ 1 : i ] , S [ i + 1 : j 1 ] | M ( m ) ) = H ( U ( i , j 1 ) , S ̲ [ i + 1 : j 1 ] | M ( m ) ) H ( U ( i , j 1 ) | M ( m ) )
and
H ( S τ 0 m + 1 | W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , M ( m ) ) = H ( S τ m + 1 | W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , M ( m )
for any subset τ [ m + 2 : d + 1 ] such that | τ | = r . By Han’s subset inequality [32], we have
H ( S τ 0 m + 1 | W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , M ( m ) ) r d m H ( S [ m + 2 : d + 1 ] m + 1 | W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , M ( m ) ) r d m H ( S [ m + 2 : d + 1 ] m + 1 | W [ 1 : i ] , S [ i + 1 : i + j i 1 ] , U ( i , m ) , M ( m ) ) = ( a ) r d m H ( S [ m + 2 : d + 1 ] m + 1 | U ( i , m ) , M ( m ) ) = r d m H ( S [ m + 2 : d + 1 ] m + 1 , U ( i , m ) | M ( m ) ) H ( U ( i , m ) | M ( m ) ) = r d m H ( U ( i , m + 1 ) | M ( m ) ) H ( U ( i , m ) | M ( m ) ) ,
where ( a ) follows from the fact that ( W [ 1 : i ] , S ̲ [ i + 1 : i + j i 1 ] ) is a function of U ( i , m ) by Lemma 1. Substituting (A5) and (A6) into (A4) gives:
s + r d m H ( U ( i , m ) | M ( m ) ) + H ( U ( i , j ) | M ( m ) ) s + r d m H ( U ( i , m + 1 ) | M ( m ) ) + H ( U ( i , j 1 ) | M ( m ) ) ,
which is equivalent to (15) by noting that
s + r d m = s ( d m ) + r d m = d + 1 j d m .
This completes the proof of the exchange lemma. ☐

References

  1. Singleton, R.C. Maximum distance q-nary codes. IEEE Trans. Inf. Theory 1964, 10, 116–118. [Google Scholar] [CrossRef]
  2. Roche, J.R. Distributed Information Storage. Ph.D. Dissertation, Stanford University, Stanford, CA, USA, 1992. [Google Scholar]
  3. Roche, J.R.; Yeung, R.W.; Hau, K.P. Symmetrical multilevel diversity coding. IEEE Trans. Inf. Theory 1997, 43, 1059–1064. [Google Scholar] [CrossRef]
  4. Yeung, R.W.; Zhang, Z. On symmetrical multilevel diversity coding. IEEE Trans. Inf. Theory 1999, 45, 609–621. [Google Scholar] [CrossRef]
  5. Mohajer, S.; Tian, C.; Diggavi, S.N. Asymmetric multilevel diversity coding and asymmetric Gaussian multiple descriptions. IEEE Trans. Inf. Theory 2010, 56, 4367–4387. [Google Scholar] [CrossRef]
  6. Jiang, J.; Marukala, N.; Liu, T. Symmetrical multilevel diversity coding and subset entropy inequalities. IEEE Trans. Inf. Theory 2014, 60, 84–103. [Google Scholar] [CrossRef]
  7. Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.; Ramchandran, K. Network coding for distributed storage systems. IEEE Trans. Inf. Theory 2010, 56, 4539–4551. [Google Scholar] [CrossRef]
  8. Rashmi, K.V.; Shah, N.B.; Kumar, P.V. Optimal exact-regenerating codes for distributed storage at the MSR and MBR points via a product-matrix construction. IEEE Trans. Inf. Theory 2011, 57, 5227–5239. [Google Scholar] [CrossRef]
  9. Cadambe, V.R.; Jafar, S.A.; Maleki, H.; Ramchandran, K.; Suh, C. Asymptotic interference alignment for optimal repair of MDS codes in distributed storage. IEEE Trans. Inf. Theory 2013, 59, 2974–2987. [Google Scholar] [CrossRef]
  10. Tian, C. Characterizing the rate region of the (4,3,3) exact-repair regenerating codes. IEEE J. Sel. Areas Commun. 2014, 32, 967–975. [Google Scholar] [CrossRef]
  11. Goparaju, S.; El Rouayheb, S.; Calderbank, R. New codes and inner bounds for exact repair in distributed storage systems. In Proceedings of the 2014 IEEE International Symposium on Information Theory (ISIT), Honolulu, HI, USA, 29 June–4 July 2014; pp. 1036–1040. [Google Scholar]
  12. Duursma, I.M. Outer bounds for exact repair codes. Arxiv, 2014; arXiv:1406.4852. [Google Scholar]
  13. Prakash, N.; Krishnan, M.N. The storage-repair-bandwidth trade-off of exact repair linear regenerating codes for the case d = k = n − 1. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 859–863. [Google Scholar]
  14. Elyasi, M.; Mohajer, S.; Tandon, R. Linear exact repair rate region of (k + 1,k,k) distributed storage systems: A new approach. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 2061–2065. [Google Scholar]
  15. Tian, C.; Sasidharan, B.; Aggarwal, V.; Vaishampayan, V.A.; Kumar, P.V. Layered exact-repair regenerating codes via embedded error correction and block designs. IEEE Trans. Inf. Theory 2015, 61, 1933–1947. [Google Scholar] [CrossRef]
  16. Ye, M.; Barg, A. Explicit constructions of high-rate MDS array codes with optimal repair bandwidth. IEEE Trans. Inf. Theory 2017, 63, 2001–2014. [Google Scholar] [CrossRef]
  17. Kralevska, K.; Gligoroski, D. An Explicit Construction of Systematic MDS Codes with Small Sub-packetization for All-Node Repair. Arxiv, 2018; arXiv:1806.03103. [Google Scholar]
  18. Goparaju, S.; Fazeli, A.; Vardy, A. Minimum storage regenerating codes for all parameters. IEEE Trans. Inf. Theory 2017, 63, 6318–6328. [Google Scholar] [CrossRef]
  19. Kralevska, K.; Gligoroski, D.; Jensen, R.E.; Overby, H. Hashtag erasure codes: From theory to practice. IEEE Trans. Big Data 2017, 1. [Google Scholar] [CrossRef]
  20. Kralevska, K.; Gligoroski, D.; Øverby, H. General Sub-packetized Access Optimal Regenerating Codes. IEEE Commun. Lett. 2016, 20, 1281–1284. [Google Scholar] [CrossRef]
  21. Tian, C.; Liu, T. Multilevel diversity coding with regeneration. IEEE Trans. Inf. Theory 2016, 62, 4833–4847. [Google Scholar] [CrossRef]
  22. Shao, S.; Liu, T.; Tian, C. Multilevel diversity coding with regeneration: Separate coding achieves the MBR point. In Proceedings of the 2016 Annual Conference on Information Science and Systems (CISS), Princeton, NJ, USA, 16–18 March 2016; pp. 602–607. [Google Scholar]
  23. Pawar, S.; El Rouayheb, S.; Ramchandran, K. On secure distributed data storage under repair dynamics. In Proceedings of the 2010 IEEE International Symposium on Information Theory (ISIT), Austin, TX, USA, 13–18 June 2010; pp. 2543–2547. [Google Scholar]
  24. Pawar, S.; El Rouayheb, S.; Ramchandran, K. Securing dynamic distributed storage systems against eavesdropping and adversarial Attacks. IEEE Trans. Inf. Theory 2011, 57, 6734–6753. [Google Scholar] [CrossRef]
  25. Shah, N.B.; Rashmi, K.V.; Kumar, P.V. Information-theoretically secure regenerating codes for distributed storage. In Proceedings of the 2011 IEEE Global Telecommunications Conference (GLOBECOM), Kathmandu, Nepal, 5–9 December 2011; pp. 1–5. [Google Scholar]
  26. Goparaju, S.; El Rouayheb, S.; Calderbank, R.; Poor, H.V. Data secrecy in distributed storage systems under exact repair. In Proceedings of the 2013 International Symposium on Network Coding (NetCod), Calgary, AB, Canada, 7–9 June 2013; pp. 1–6. [Google Scholar]
  27. Rawat, A.S.; Koyluoglu, O.O.; Silberstein, N.; Vishwanath, S. Optimal locally repairable and secure codes for distributed storage systems. IEEE Trans. Inf. Theory 2014, 60, 212–236. [Google Scholar] [CrossRef]
  28. Tandon, R.; Amuru, S.; Clancy, T.C.; Buehrer, R.M. Towards optimal secure distributed storage systems with exact repair. IEEE Trans. Inf. Theory 2016, 62, 3477–3492. [Google Scholar] [CrossRef]
  29. Ye, F.; Shum, K.W.; Yeung, R.W. The rate region of secure exact-repair regenerating codes for 5 nodes. In Proceedings of the 2016 IEEE International Symposium on Information Theory (ISIT), Barcelona, Spain, 10–15 July 2016; pp. 1406–1410. [Google Scholar]
  30. Shao, S.; Liu, T.; Tian, C.; Shen, C. On the trade-off region of secure exact-repair regenerating codes. IEEE Trans. Inf. Theory 2017, 63, 7253–7266. [Google Scholar] [CrossRef]
  31. Balasubramanian, A.; Ly, H.D.; Li, S.; Liu, T.; Miller, S.L. Secure symmetrical multilevel diversity coding. IEEE Trans. Inf. Theory 2013, 59, 3572–3581. [Google Scholar] [CrossRef]
  32. Han, T.S. Nonnegative entropy measures of multivariate symmetric correlations. Inf. Control 1978, 36, 133–156. [Google Scholar] [CrossRef]
Figure 1. The optimal trade-off curve between the normalized storage-capacity α ¯ and repair-bandwidth β ¯ (the solid line) and the best possible trade-offs that can be achieved by separate coding (dashed line) for the ( 4 , 3 ) multilevel diversity coding with regeneration (MDC-R) problem with ( B ¯ 1 , B ¯ 2 , B ¯ 3 ) = ( 0 , 1 / 3 , 2 / 3 ) (adapted from [21]). The outer bounds (6), (7) and (14) are evaluated as β ¯ 8 / 45 , α ¯ + 3 β ¯ 16 / 15 , and α ¯ + 9 β ¯ 32 / 15 , respectively. When set as equalities, they intersect precisely at the MBR point ( 8 / 15 , 8 / 45 ) .
Figure 1. The optimal trade-off curve between the normalized storage-capacity α ¯ and repair-bandwidth β ¯ (the solid line) and the best possible trade-offs that can be achieved by separate coding (dashed line) for the ( 4 , 3 ) multilevel diversity coding with regeneration (MDC-R) problem with ( B ¯ 1 , B ¯ 2 , B ¯ 3 ) = ( 0 , 1 / 3 , 2 / 3 ) (adapted from [21]). The outer bounds (6), (7) and (14) are evaluated as β ¯ 8 / 45 , α ¯ + 3 β ¯ 16 / 15 , and α ¯ + 9 β ¯ 32 / 15 , respectively. When set as equalities, they intersect precisely at the MBR point ( 8 / 15 , 8 / 45 ) .
Entropy 20 00751 g001
Figure 2. The optimal trade-off curve between the normalized storage-capacity α ¯ and repair-bandwidth β ¯ for the ( 7 , 6 , 6 , 1 ) secure regenerating code (SRC) problem [30]. The outer bounds (12) and (13) are evaluated as β ¯ 1 / 15 and α ¯ + 29 β ¯ 7 / 3 , respectively. When set as equalities, they intersect precisely at the MBR/SRK point ( 2 / 5 , 1 / 15 ) .
Figure 2. The optimal trade-off curve between the normalized storage-capacity α ¯ and repair-bandwidth β ¯ for the ( 7 , 6 , 6 , 1 ) secure regenerating code (SRC) problem [30]. The outer bounds (12) and (13) are evaluated as β ¯ 1 / 15 and α ¯ + 29 β ¯ 7 / 3 , respectively. When set as equalities, they intersect precisely at the MBR/SRK point ( 2 / 5 , 1 / 15 ) .
Entropy 20 00751 g002

Share and Cite

MDPI and ACS Style

Shao, S.; Liu, T.; Tian, C.; Shen, C. Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point. Entropy 2018, 20, 751. https://doi.org/10.3390/e20100751

AMA Style

Shao S, Liu T, Tian C, Shen C. Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point. Entropy. 2018; 20(10):751. https://doi.org/10.3390/e20100751

Chicago/Turabian Style

Shao, Shuo, Tie Liu, Chao Tian, and Cong Shen. 2018. "Multilevel Diversity Coding with Secure Regeneration: Separate Coding Achieves the MBR Point" Entropy 20, no. 10: 751. https://doi.org/10.3390/e20100751

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop