-
1
-
-
79951957726
-
A survey on network codes for distributed storage
-
Mar.
-
A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Sun, "A Survey on Network Codes for Distributed Storage" Proc. of the IEEE, vol. 99, no. 3, pp. 476-489, Mar. 2011.
-
(2011)
Proc. of the IEEE
, vol.99
, Issue.3
, pp. 476-489
-
-
Dimakis, A.G.1
Ramchandran, K.2
Wu, Y.3
Sun, C.4
-
2
-
-
77955726417
-
Network coding for distributed storage systems
-
A. Dimakis, B. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," IEEE Tran. Info. Theory, vol. 56, no. 9, 2010.
-
(2010)
IEEE Tran. Info. Theory
, vol.56
, Issue.9
-
-
Dimakis, A.1
Godfrey, B.2
Wu, Y.3
Wainwright, M.4
Ramchandran, K.5
-
3
-
-
85090989484
-
Parity lost and parity regained
-
San Jose, CA, Feb.
-
A. Krioukov, L. N. Bairavasundaram, G. R. Goodson, K. Srinivasan, R. Thelen, A. C. Arpaci-dusseau, and R. H. Arpaci-dusseau, "Parity Lost and Parity Regained," in USENIX FAST, San Jose, CA, Feb. 2008, pp. 127-141.
-
(2008)
USENIX FAST
, pp. 127-141
-
-
Krioukov, A.1
Bairavasundaram, L.N.2
Goodson, G.R.3
Srinivasan, K.4
Thelen, R.5
Arpaci-dusseau, A.C.6
Arpaci-dusseau, R.H.7
-
4
-
-
79960034808
-
Understanding latent sector errors and how to protect against them
-
San Jose, CA, Sep.
-
B. Schroeder, S. Damouras, and P. Gill, "Understanding latent sector errors and how to protect against them," in USENIX FAST, San Jose, CA, Sep. 2010, pp. 1-23.
-
(2010)
USENIX FAST
, pp. 1-23
-
-
Schroeder, B.1
Damouras, S.2
Gill, P.3
-
5
-
-
74049102823
-
Provable data possession at untrusted stores
-
Oct.
-
G. Ateniese, R. Burns, R Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores," in ACM CCS, Oct. 2007, pp. 598-609.
-
(2007)
ACM CCS
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
58349083629
-
Privacy-preserving audit and extraction of digital contents
-
Report 2008/186
-
M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-Preserving Audit and Extraction of Digital Contents," in Cryptology ePrint Archive, Report 2008/186, 2008.
-
(2008)
Cryptology EPrint Archive
-
-
Shah, M.A.1
Swaminathan, R.2
Baker, M.3
-
7
-
-
70449569012
-
Ensuring data storage security in cloud computing
-
Charleston, SC, Jul.
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Ensuring Data Storage Security in Cloud Computing," in IEEE Workshop on QoS, Charleston, SC, Jul. 2009, pp. 1-9.
-
(2009)
IEEE Workshop on QoS
, pp. 1-9
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
9
-
-
58349118819
-
Compact proofs of retrievability
-
Melbourne, Dec.
-
H. Shacham and B. Waters, "Compact Proofs of Retrievability," in Asiacrypt, Melbourne, Dec. 2008, pp. 90-107.
-
(2008)
Asiacrypt
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
10
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
Alexandria, VA, Oct.
-
[101 A. Juels and B. S. Kaliski, "PORs: Proofs of Retrievability for Large Files," in ACM CCS, Alexandria, VA, Oct. 2007, pp. 584-597.
-
(2007)
ACM CCS
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
11
-
-
77953295132
-
Privacy-preserving public auditing for data storage security in cloud computing
-
San Diego
-
C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing," in IEEE INFOCOM, San Diego, 2010.
-
(2010)
IEEE INFOCOM
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Lou, W.4
-
12
-
-
70249129465
-
-
SecureComm, Istanbul, Sep.
-
G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession," in SecureComm, Istanbul, Sep. 2008, pp. 1-10.
-
(2008)
Scalable and Efficient Provable Data Possession
, pp. 1-10
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
13
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
Chicago, IL, Nov.
-
K. D. Bowers, A. Juels, and A. Oprea, "Proofs of Retrievability: Theory and Implementation," in ACM CCSW, Chicago, IL, Nov. 2009, pp. 43-54.
-
(2009)
ACM CCSW
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
14
-
-
74049121230
-
Dynamic provable data possession
-
Chicago, IL, Nov.
-
C. Erway, A. Kupcu, C. Papamanthou, and R. Tamassia, "Dynamic Provable Data Possession," in ACM CCS, Chicago, IL, Nov. 2009, pp. 213-222.
-
(2009)
ACM CCS
, pp. 213-222
-
-
Erway, C.1
Kupcu, A.2
Papamanthou, C.3
Tamassia, R.4
-
15
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," in ESORICS, 2009.
-
(2009)
ESORICS
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
16
-
-
77953310709
-
Achieving secure, scalable, and fine-grained data access control in cloud computing
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing," in IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
17
-
-
84861957968
-
Towards secure and dependable storage services in cloud computing
-
C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Towards Secure and Dependable Storage Services in Cloud Computing," (to appear) IEEE Tran. Ser. Comp., 2011.
-
(2011)
IEEE Tran. Ser. Comp.
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
18
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
Oct.
-
B. Chen, R. Curtmola, G. Ateniese, and R. Burns, "Remote Data Checking for Network Coding-based Distributed Storage Systems," in ACM CCSW, Oct. 2010, pp. 31-42.
-
(2010)
ACM CCSW
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
19
-
-
77955682500
-
Security in distributed storage systems by communicating a logarithmic number of bits
-
Austin, TX, Jun.
-
T. K. Dikaliotis, A. G. Dimakis, and T. Ho, "Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits," in IEEE ISIT, Austin, TX, Jun. 2010, pp. 1948-1952.
-
(2010)
IEEE ISIT
, pp. 1948-1952
-
-
Dikaliotis, T.K.1
Dimakis, A.G.2
Ho, T.3
-
20
-
-
84866682636
-
Cooperative defense against pollution attacks in network coding using spacemac
-
to appear
-
A. Le and A. Markopoulou, "Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac," (to appear) IEEE JSAC, 2011.
-
(2011)
IEEE JSAC
-
-
Le, A.1
Markopoulou, A.2
-
21
-
-
85077127142
-
NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
-
San Jose, CA, Feb.
-
Y Hu, H. C. H. Chen, P. P. C. Lee, and Y Tang, "NCCloud: Applying Network Coding for the Storage Repair in a Cloud-of-Clouds," in USENIX FAST, San Jose, CA, Feb. 2012, pp. 265-272.
-
(2012)
USENIX FAST
, pp. 265-272
-
-
Hu, Y.1
Chen, H.C.H.2
Lee, P.P.C.3
Tang, Y.4
-
22
-
-
84866708422
-
-
Online. Available
-
A. Dimakis, "Distributed Storage Wiki," 2012. [Online]. Available: http://csi.usc.edu/dimakis/StorageWiki
-
(2012)
Distributed Storage Wiki
-
-
Dimakis, A.1
-
23
-
-
77955667642
-
On secure distributed data storage under repair dynamics
-
Austin, TX, Jun.
-
S. Pawar, S. E. Rouayheb, and K. Ramchandran, "On Secure Distributed Data Storage Under Repair Dynamics," in IEEE ISIT, Austin, TX, Jun. 2010, pp. 2543-2547.
-
(2010)
IEEE ISIT
, pp. 2543-2547
-
-
Pawar, S.1
Rouayheb, S.E.2
Ramchandran, K.3
-
24
-
-
77955685770
-
Secure distributive storage of decentralized source data: Can interaction help?
-
Austin, TX, Jun.
-
S. E. Rouayheb, V. Prabhakaran, and K. Ramchandran, "Secure Distributive Storage of Decentralized Source Data: Can Interaction Help?" in IEEE ISIT, Austin, TX, Jun. 2010, pp. 1953-1957.
-
(2010)
IEEE ISIT
, pp. 1953-1957
-
-
Rouayheb, S.E.1
Prabhakaran, V.2
Ramchandran, K.3
-
25
-
-
80054812722
-
Securing dynamic distributed storage systems from malicious nodes
-
Saint Petersburg, Jul.
-
S. Pawar, S. E. Rouayheb, and K. Ramchandran, "Securing Dynamic Distributed Storage Systems from Malicious Nodes," in IEEE ISIT, Saint Petersburg, Jul. 2011, pp. 1452-1456.
-
(2011)
IEEE ISIT
, pp. 1452-1456
-
-
Pawar, S.1
Rouayheb, S.E.2
Ramchandran, K.3
-
26
-
-
80053951920
-
Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
-
Sep.
-
-, "Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks," Tran. Info. Theory, vol. 57, no. 9, pp. 1-19, Sep. 2011.
-
(2011)
Tran. Info. Theory
, vol.57
, Issue.9
, pp. 1-19
-
-
Pawar, S.1
Rouayheb, S.E.2
Ramchandran, K.3
-
27
-
-
77958529104
-
Pollution attack defense for coding based sensor storage
-
Newport Beach, CA, Jun.
-
L. Buttyan, L. Czap, and I. Vajda, "Pollution Attack Defense for Coding Based Sensor Storage," in IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), Newport Beach, CA, Jun. 2010, pp. 66-73.
-
(2010)
IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)
, pp. 66-73
-
-
Buttyan, L.1
Czap, L.2
Vajda, I.3
-
28
-
-
80053034503
-
TESLA-Based defense against pollution attacks in P2P systems with network coding
-
Beijing, Jul.
-
A. Le and A. Markopoulou, "TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding," in IEEE NetCod, Beijing, Jul. 2011, pp. 1-7.
-
(2011)
IEEE NetCod
, pp. 1-7
-
-
Le, A.1
Markopoulou, A.2
-
29
-
-
77955674519
-
Locating byzantine attackers in intra-session network coding using spacemac
-
Toronto, Jun.
-
-, "Locating Byzantine Attackers in Intra-Session Network Coding using SpaceMac," in IEEE NetCod, Toronto, Jun. 2010, pp. 1-6.
-
(2010)
IEEE NetCod
, pp. 1-6
-
-
Le, A.1
Markopoulou, A.2
-
30
-
-
84861595495
-
On detecting pollution attacks in inter-session network coding
-
Orlando, FL, Mar.
-
-, "On Detecting Pollution Attacks in Inter-Session Network Coding," in IEEE INFOCOM, Orlando, FL, Mar. 2012, pp. 343-351.
-
(2012)
IEEE INFOCOM
, pp. 343-351
-
-
Le, A.1
Markopoulou, A.2
-
31
-
-
84866682637
-
NC-audit: Auditing for network coding storage
-
Online. Available
-
-, "NC-Audit: Auditing for Network Coding Storage," Technical Report. [Online]. Available: http://arxiv.org/abs/1203.1730
-
Technical Report
-
-
Le, A.1
Markopoulou, A.2
|