메뉴 건너뛰기




Volumn , Issue , 2011, Pages 501-514

How to tell if your cloud files are vulnerable to drive crashes

Author keywords

Auditing; Cloud storage systems; Erasure codes; Fault tolerance

Indexed keywords

AUDITING; ERASURE CODES; EXPERIMENTAL EVIDENCE; FAULT-TOLERANT; HARD DRIVES; KEY TECHNIQUES; REMOTE ASSESSMENT; REMOTE SERVERS; THEORETICAL FRAMEWORK;

EID: 80755144004     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046766     Document Type: Conference Paper
Times cited : (76)

References (32)
  • 3
    • 84947906522 scopus 로고
    • The exact security of digital signatures: How to sign with RSA and rabin
    • U. Maurer, editor Springer-Verlag
    • M. Bellare and P. Rogaway. The exact security of digital signatures: How to sign with RSA and Rabin. In U. Maurer, editor, Proc. EUROCRYPT '96, volume 1070 of LNCS, pages 399-416. Springer-Verlag, 1989.
    • (1989) Proc. EUROCRYPT '96, Volume 1070 of LNCS , pp. 399-416
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 74049144464 scopus 로고    scopus 로고
    • HAIL: A high-availability and integrity layer for cloud storage
    • K. Bowers, A. Juels, and A. Oprea. HAIL: A high-availability and integrity layer for cloud storage. In Proc. ACM CCS '09, pages 187-198, 2009.
    • (2009) Proc. ACM CCS '09 , pp. 187-198
    • Bowers, K.1    Juels, A.2    Oprea, A.3
  • 6
    • 84976295016 scopus 로고
    • Distance-bounding protocols (extended abstract)
    • Springer LNCS
    • S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In Proc. EUROCRYPT '93, pages 344-359. Springer, 1993. LNCS vol. 765.
    • (1993) Proc. EUROCRYPT '93 , vol.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 8
    • 80755159954 scopus 로고    scopus 로고
    • T-mobile, microsoft tell sidekick users we 'continue to do all we can' to restore data
    • October 13
    • J. Cox. T-Mobile, Microsoft tell Sidekick users we 'continue to do all we can' to restore data. Network World, October 13, 2009.
    • (2009) Network World
    • Cox, J.1
  • 10
    • 78650345904 scopus 로고    scopus 로고
    • Proofs of retrievability via hardness amplification
    • Y. Dodis, S. Vadhan, and D. Wichs. Proofs of retrievability via hardness amplification. In Proc. TCC, 2009.
    • (2009) Proc. TCC
    • Dodis, Y.1    Vadhan, S.2    Wichs, D.3
  • 11
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • E.F. Brickell, editor Springer LNCS
    • C. Dwork and M. Naor. Pricing via processing or combatting junk mail. In E.F. Brickell, editor, Proc. CRYPTO '92, pages 139-147. Springer, 1992. LNCS vol. 740.
    • (1992) Proc. CRYPTO '92 , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 12
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. CRYPTO'86, volume 263 of LNCS, pages 186-194. Springer, 1986.
    • (1986) Proc. CRYPTO'86, Volume 263 of LNCS , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 13
    • 21644455412 scopus 로고    scopus 로고
    • Terra: A virtual machine-based platform for trusted computing
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Proc. ACM SOSP, pages 193-206, 2003. (Pubitemid 40929697)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 193-206
    • Garfinkel, T.1    Pfaff, B.2    Chow, J.3    Rosenblum, M.4    Boneh, D.5
  • 14
    • 21644437974 scopus 로고    scopus 로고
    • The google file system
    • SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • S. Ghemawat, H. Gobioff, and S.T. Leung. The Google file system. In Proc. ACM SOSP, pages 29-43, 2003. (Pubitemid 40929686)
    • (2003) Operating Systems Review (ACM) , vol.37 , Issue.5 , pp. 29-43
    • Ghemawat, S.1    Gobioff, H.2    Leung, S.-T.3
  • 15
    • 84919877604 scopus 로고    scopus 로고
    • Cryptographic Primitives Enforcing Communication and Storage Complexity
    • Financial Cryptography
    • P. Golle, S. Jarecki, and I. Mironov. Cryptographic primitives enforcing communication and storage complexity. In Proc. Financial Cryptography, pages 120-135. Springer, 2002. LNCS vol. 2357. (Pubitemid 36316775)
    • (2003) Lecture Notes in Computer Science , Issue.2357 , pp. 120-135
    • Golle, P.1    Jarecki, S.2    Mironov, I.3
  • 17
    • 80755172977 scopus 로고    scopus 로고
    • The Hadoop distributed file system. http://hadoop.apache.org/hdfs.
  • 19
    • 80755173897 scopus 로고    scopus 로고
    • Mozy CTO J. Herlocker. Personal Communication, 2011
    • Mozy CTO J. Herlocker. Personal Communication, 2011.
  • 20
    • 0002459783 scopus 로고    scopus 로고
    • Client puzzles: A cryptographic countermeasure against connection depletion attacks
    • A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proc. ISOC NDSS, pages 151-165, 1999.
    • (1999) Proc. ISOC NDSS , pp. 151-165
    • Juels, A.1    Brainard, J.2
  • 21
    • 74049103479 scopus 로고    scopus 로고
    • PORs-proofs of retrievability for large files
    • A. Juels and B. Kaliski. PORs-proofs of retrievability for large files. In Proc. ACM CCS 2007, pages 584-597, 2007.
    • (2007) Proc. ACM CCS 2007 , pp. 584-597
    • Juels, A.1    Kaliski, B.2
  • 22
    • 0033720713 scopus 로고    scopus 로고
    • On the efficiency of local decoding procedures for error-correcting codes
    • J. Katz and L. Trevisan. On the efficiency of local decoding procedures for error-correcting codes. In Proc. STOC, pages 80-86, 2000.
    • (2000) Proc. STOC , pp. 80-86
    • Katz, J.1    Trevisan, L.2
  • 23
    • 84920746689 scopus 로고    scopus 로고
    • Safestore: A durable and practical storage system
    • Berkeley, CA, USA USENIX Association
    • R. Kotla, L. Alvisi, and M. Dahlin. Safestore: a durable and practical storage system. In Proc. USENIX'07, pages 10:1-10:14, Berkeley, CA, USA, 2007. USENIX Association.
    • (2007) Proc. USENIX'07 , pp. 101-1014
    • Kotla, R.1    Alvisi, L.2    Dahlin, M.3
  • 25
    • 84969346266 scopus 로고
    • A certified digital signature
    • Springer-Verlag
    • R. Merkle. A certified digital signature. In Proc. Crypto 1989, volume 435 of LNCS, pages 218-238. Springer-Verlag, 1989.
    • (1989) Proc. Crypto 1989, Volume 435 of LNCS , pp. 218-238
    • Merkle, R.1
  • 27
    • 33748605569 scopus 로고    scopus 로고
    • The complexity of online memory checking
    • M. Naor and G. N. Rothblum. The complexity of online memory checking. In Proc. 46th IEEE FOCS, pages 573-584, 2005.
    • (2005) Proc. 46th IEEE FOCS , pp. 573-584
    • Naor, M.1    Rothblum, G.N.2
  • 30
    • 0028387091 scopus 로고
    • An introduction to disk drive modeling
    • C. Ruemmler and J. Wilkes. An introduction to disk drive modeling. IEEE Computer, 27(3):17-29, 1994.
    • (1994) IEEE Computer , vol.27 , Issue.3 , pp. 17-29
    • Ruemmler, C.1    Wilkes, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.