-
1
-
-
84885573531
-
-
Amazon EC2. http://aws.amazon.com/ec2/.
-
Amazon EC2
-
-
-
2
-
-
84885207638
-
-
Amazon Glacier. http://aws.amazon.com/glacier/.
-
Amazon Glacier
-
-
-
3
-
-
84885877149
-
-
Amazon S3. http://aws.amazon.com/s3/.
-
Amazon S3
-
-
-
5
-
-
84899712498
-
-
AWS Cloud HSM. http://aws.amazon.com/cloudhsm/.
-
AWS Cloud HSM
-
-
-
6
-
-
84899737644
-
-
Dropbox. http://www.dropbox.com.
-
Dropbox
-
-
-
7
-
-
84871079275
-
-
Google Drive. http://drive.google.com/.
-
Google Drive
-
-
-
10
-
-
84899752298
-
-
Luna SA HSM. http://bit.ly/17CDPm1.
-
Luna SA HSM
-
-
-
11
-
-
84899713207
-
-
Opendedup. http://opendedup.org/.
-
Opendedup
-
-
-
12
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
Atul Adya, William J Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R Douceur, Jon Howell, Jacob R Lorch, Marvin Theimer, and Roger P Wattenhofer. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. ACM SIGOPS Operating Systems Review, 36(SI):1-14, 2002.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
16
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
CCS ?09 New York, NY, USA ACM
-
Kevin D. Bowers, Ari Juels, and Alina Oprea. Hail: A high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, CCS ?09, pages 187-198, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Alina, O.3
-
17
-
-
84978437474
-
Pastiche: Making backup cheap and easy
-
Landon P Cox, Christopher D Murray, and Brian D Noble. Pastiche: Making backup cheap and easy. ACM SIGOPS Operating Systems Review, 36(SI):285-298, 2002.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 285-298
-
-
Cox, L.P.1
Murray, C.D.2
Noble, B.D.3
-
18
-
-
0036373715
-
Reclaiming space from duplicate files in a serverless distributed file system
-
IEEE
-
John R Douceur, Atul Adya, William J Bolosky, P Simon, and Marvin Theimer. Reclaiming space from duplicate files in a serverless distributed file system. In Distributed Computing Systems, 2002. Proceedings. 22nd International Conference on, pages 617-624. IEEE, 2002.
-
(2002)
Distributed Computing Systems 2002. Proceedings. 22nd International Conference on
, pp. 617-624
-
-
Douceur, J.R.1
Adya, A.2
Bolosky, W.J.3
Simon, P.4
Marvin, T.5
-
19
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
Danny Harnik, Benny Pinkas, and Alexandra Shulman-Peleg. Side channels in cloud services: Deduplication in cloud storage. Security & Privacy, IEEE, 8(6):40-47, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
20
-
-
74049103479
-
Pors: Proofs of retrievability for large files
-
New York, NY, USA ACM
-
Ari Juels and Burton S. Kaliski, Jr. Pors: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security, CCS ?07, pages 584-597, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS ?07
, pp. 584-597
-
-
Juels, A.1
Burton Kaliski Jr., S.2
-
21
-
-
84880804902
-
Policy-based de-duplication in secure cloud storage
-
Springer
-
Chuanyi Liu, Xiaojian Liu, and Lei Wan. Policy-based de-duplication in secure cloud storage. In Trustworthy Computing and Services, pages 250-262. Springer, 2013.
-
(2013)
Trustworthy Computing and Services
, pp. 250-262
-
-
Liu, C.1
Liu, X.2
Lei, W.3
-
26
-
-
84899753351
-
The freenet project
-
The Freenet Project. Freenet. https://freenetproject.org/.
-
Freenet
-
-
-
27
-
-
0003676885
-
-
Center for Research in Computing Techn., Aiken Computation Laboratory, Univ.
-
Michael O Rabin. Fingerprinting by random polynomials. Center for Research in Computing Techn., Aiken Computation Laboratory, Univ., 1981.
-
(1981)
Fingerprinting by Random Polynomials
-
-
Rabin, M.O.1
-
28
-
-
70349237760
-
Secure data deduplication
-
ACM
-
Mark W Storer, Kevin Greenan, Darrell DE Long, and Ethan L Miller. Secure data deduplication. In Proceedings of the 4th ACM international workshop on Storage security and survivability, pages 1-10. ACM, 2008.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, E.D.D.3
Miller, E.L.4
-
30
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
ACM
-
Jia Xu, Ee-Chien Chang, and Jianying Zhou. Weak leakage-resilient client-side deduplication of encrypted data in cloud storage. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, pages 195-206. ACM, 2013.
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
, pp. 195-206
-
-
Xu, J.1
Chang, E.2
Jianying, Z.3
|