IDEAS home Printed from https://ideas.repec.org/a/sae/risrel/v234y2020i2p303-321.html
   My bibliography  Save this article

Reliability analysis of distributed storage systems considering data loss and theft

Author

Listed:
  • Heping Jia
  • Rui Peng
  • Yi Ding
  • Changzheng Shao

Abstract

With the advancement of cloud computing and internet of things, data are usually stored on distributed computers and these data may risk being lost or stolen. In this article, we consider a common case where the entirety of the data is partitioned into several parts and each data part can be allocated to one or more computers. In the case where a computer fails, all the data parts on it are lost. Before the failure of any computer, the data parts may also be stolen by hackers. The basic model of computer failure and computer intrusion resulting in the theft of all the data parts on the computer is considered first. Then, the case is extended to a general model where computer failure, as well as data part corruption and theft caused by hacking are embedded. It is essential to study the reliability of distributed storage systems considering both data loss and data theft, which can be a basis for decision making on system structure optimization. In this article, a multi-valued decision diagram–based approach is developed to quantitatively evaluate system reliability for both models considering the time-dependence property of sequential events. The proposed method is applicable to systems where the random time to failure, theft, or corruption follows arbitrary distributions including the commonly used exponential distributions. Illustrative examples are provided to validate the proposed method.

Suggested Citation

  • Heping Jia & Rui Peng & Yi Ding & Changzheng Shao, 2020. "Reliability analysis of distributed storage systems considering data loss and theft," Journal of Risk and Reliability, , vol. 234(2), pages 303-321, April.
  • Handle: RePEc:sae:risrel:v:234:y:2020:i:2:p:303-321
    DOI: 10.1177/1748006X19885508
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/1748006X19885508
    Download Restriction: no

    File URL: https://libkey.io/10.1177/1748006X19885508?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Xing, Liudong & Levitin, Gregory, 2017. "Balancing theft and corruption threats by data partition in cloud system with independent server protection," Reliability Engineering and System Safety, Elsevier, vol. 167(C), pages 248-254.
    2. Peng, Rui & Zhai, Qingqing & Xing, Liudong & Yang, Jun, 2014. "Reliability of demand-based phased-mission systems subject to fault level coverage," Reliability Engineering and System Safety, Elsevier, vol. 121(C), pages 18-25.
    3. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2018. "Co-residence based data vulnerability vs. security in cloud computing system with random server assignment," European Journal of Operational Research, Elsevier, vol. 267(2), pages 676-686.
    4. repec:dar:wpaper:70422 is not listed on IDEAS
    5. Sürücü, Barış & Sazak, Hakan S., 2009. "Monitoring reliability for a three-parameter Weibull distribution," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 503-508.
    6. Levitin, Gregory & Hausken, Kjell & Taboada, Heidi A. & Coit, David W., 2012. "Data survivability vs. security in information systems," Reliability Engineering and System Safety, Elsevier, vol. 100(C), pages 19-27.
    7. Hinz, Oliver & Nofer, Michael & Schiereck, D. & Trillig, J., 2015. "The Influence of Data Theft on Share Prices and Systematic Risk of Consumer Electronics Companies," Publications of Darmstadt Technical University, Institute for Business Studies (BWL) 76072, Darmstadt Technical University, Department of Business Administration, Economics and Law, Institute for Business Studies (BWL).
    8. Wang, Chaonan & Xing, Liudong & Levitin, Gregory, 2013. "Reliability analysis of multi-trigger binary systems subject to competing failures," Reliability Engineering and System Safety, Elsevier, vol. 111(C), pages 9-17.
    9. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Xian Zhao & Rong Li & Yu Fan & Qingan Qiu, 2022. "Reliability modeling for multi-state systems with a protective device considering multiple triggering mechanism," Journal of Risk and Reliability, , vol. 236(1), pages 173-193, February.
    2. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Zhang, Xiaoyu & Xu, Maochao & Da, Gaofeng & Zhao, Peng, 2021. "Ensuring confidentiality and availability of sensitive data over a network system under cyber threats," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    2. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimization of time constrained N-version programming service components with competing task execution and version corruption processes," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    3. Levitin, Gregory & Xing, Liudong & Dai, Yanshun, 2021. "Security and reliability of N-version cloud-based task solvers with individual version cancellation under data theft attacks," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    4. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Optimal defense of a distributed data storage system against hackers’ attacks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    5. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2020. "Optimal early warning defense of N-version programming service against co-resident attacks in cloud system," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    6. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2022. "Co-residence based data theft game in cloud system with virtual machine replication and cancellation," Reliability Engineering and System Safety, Elsevier, vol. 222(C).
    7. Luo, Liang & Xing, Liudong & Levitin, Gregory, 2019. "Optimizing dynamic survivability and security of replicated data in cloud systems under co-residence attacks," Reliability Engineering and System Safety, Elsevier, vol. 192(C).
    8. Gregory Levitin & Liudong Xing & Hong‐Zhong Huang, 2019. "Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes," Risk Analysis, John Wiley & Sons, vol. 39(4), pages 846-858, April.
    9. Levitin, Gregory & Xing, Liudong & Xiang, Yanping, 2021. "Minimization of Expected User Losses Considering Co-resident Attacks in Cloud System with Task Replication and Cancellation," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    10. Levitin, Gregory & Xing, Liudong & Dai, Yuanshun, 2018. "Co-residence based data vulnerability vs. security in cloud computing system with random server assignment," European Journal of Operational Research, Elsevier, vol. 267(2), pages 676-686.
    11. Wang, Yujie & Xing, Liudong & Levitin, Gregory & Huang, Ning, 2018. "Probabilistic competing failure analysis in phased-mission systems," Reliability Engineering and System Safety, Elsevier, vol. 176(C), pages 37-51.
    12. Zhao, Xian & Sun, Jinglei & Qiu, Qingan & Chen, Ke, 2021. "Optimal inspection and mission abort policies for systems subject to degradation," European Journal of Operational Research, Elsevier, vol. 292(2), pages 610-621.
    13. Levitin, Gregory & Finkelstein, Maxim & Dai, Yuanshun, 2020. "Mission abort policy optimization for series systems with overlapping primary and rescue subsystems operating in a random environment," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    14. Han, Zhong & Tian, Liting & Cheng, Lin, 2021. "A deducing-based reliability optimization for electrical equipment with constant failure rate components duration their mission profile," Reliability Engineering and System Safety, Elsevier, vol. 212(C).
    15. Peng, Rui & Wu, Di & Xiao, Hui & Xing, Liudong & Gao, Kaiye, 2019. "Redundancy versus protection for a non-reparable phased-mission system subject to external impacts," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    16. Michael McShane & Trung Nguyen, 2020. "Time-varying effects of cyberattacks on firm value," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 45(4), pages 580-615, October.
    17. Levitin, Gregory & Finkelstein, Maxim, 2018. "Optimal mission abort policy for systems in a random environment with variable shock rate," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 11-17.
    18. Guizhou Wang & Jonathan W. Welburn & Kjell Hausken, 2020. "A Two-Period Game Theoretic Model of Zero-Day Attacks with Stockpiling," Games, MDPI, vol. 11(4), pages 1-26, December.
    19. Fang, Jiayue & Kang, Rui & Chen, Ying, 2021. "Reliability evaluation of non-repairable systems with failure mechanism trigger effect," Reliability Engineering and System Safety, Elsevier, vol. 210(C).
    20. Jia, Heping & Ding, Yi & Peng, Rui & Liu, Hanlin & Song, Yonghua, 2020. "Reliability assessment and activation sequence optimization of non-repairable multi-state generation systems considering warm standby," Reliability Engineering and System Safety, Elsevier, vol. 195(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:risrel:v:234:y:2020:i:2:p:303-321. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.