-
1
-
-
74349083399
-
The method and tool of cost analysis for cloud computing
-
X. Li, Y. Li, T. Liu, J. Qiu, and F. Wang, "The method and tool of cost analysis for cloud computing, " in Cloud Computing, 2009. CLOUD '09. IEEE International Conference on, 2009, pp. 93-100.
-
(2009)
Cloud Computing, 2009. CLOUD '09. IEEE International Conference on
, pp. 93-100
-
-
Li, X.1
Li, Y.2
Liu, T.3
Qiu, J.4
Wang, F.5
-
4
-
-
84866168915
-
Estimation of deduplication ratios in large data sets
-
MSST 2012, April 16-20, 2012, Asilomar Conference Grounds, Pacific Grove, CA, USA
-
D. Harnik, O. Margalit, D. Naor, D. Sotnikov, and G. Vernik, "Estimation of deduplication ratios in large data sets, " in IEEE 28th Symposium on Mass Storage Systems and Technologies, MSST 2012, April 16-20, 2012, Asilomar Conference Grounds, Pacific Grove, CA, USA, 2012, pp. 1-11.
-
(2012)
IEEE 28th Symposium on Mass Storage Systems and Technologies
, pp. 1-11
-
-
Harnik, D.1
Margalit, O.2
Naor, D.3
Sotnikov, D.4
Vernik, G.5
-
5
-
-
85019514248
-
Green cloud computing: Balancing energy in processing, storage, and transport
-
J. Baliga, R. W. Ayre, K. Hinton, and R. S. Tucker, "Green cloud computing: Balancing energy in processing, storage, and transport, " Proceedings of the IEEE, vol. 99, no. 1, pp. 149-167, 2011.
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.1
, pp. 149-167
-
-
Baliga, J.1
Ayre, R.W.2
Hinton, K.3
Tucker, R.S.4
-
6
-
-
78650053109
-
Side channels in cloud services: Deduplication in cloud storage
-
D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Side channels in cloud services: Deduplication in cloud storage, " Security & Privacy, IEEE, vol. 8, no. 6, pp. 40-47, 2010.
-
(2010)
Security & Privacy, IEEE
, vol.8
, Issue.6
, pp. 40-47
-
-
Harnik, D.1
Pinkas, B.2
Shulman-Peleg, A.3
-
7
-
-
84921446817
-
-
W. V. der Laan, "Dropship, " https://github.com/driverdan/dropship, 2013.
-
(2013)
Dropship
-
-
Der Laan, W.V.1
-
8
-
-
80755168326
-
Proofs of ownership in remote storage systems
-
S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, "Proofs of ownership in remote storage systems, " in Proceedings of the 18th ACM conference on Computer and communications security. ACM, 2011, pp. 491-500.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM
, pp. 491-500
-
-
Halevi, S.1
Harnik, D.2
Pinkas, B.3
Shulman-Peleg, A.4
-
10
-
-
84888008692
-
Bloom filter applications in network security: A state-of-the-art survey
-
In Press [Online]
-
S. Geravand and M. Ahmadi, "Bloom filter applications in network security: A state-of-the-art survey, " Computer Networks, vol. In Press, no. 0, pp.-, 2013. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1389128613003083
-
(2013)
Computer Networks
, Issue.0
-
-
Geravand, S.1
Ahmadi, M.2
-
13
-
-
84863584951
-
Private data deduplication protocols in cloud storage
-
W. K. Ng, Y. Wen, and H. Zhu, "Private data deduplication protocols in cloud storage, " in SAC, 2012, pp. 441-446.
-
(2012)
SAC
, pp. 441-446
-
-
Ng, W.K.1
Wen, Y.2
Zhu, H.3
-
14
-
-
84858201794
-
Secure and efficient proof of storage with deduplication
-
New York, NY, USA: ACM [Online]
-
Q. Zheng and S. Xu, "Secure and efficient proof of storage with deduplication, " in Proceedings of the second ACM conference on Data and Application Security and Privacy, ser. CODASPY '12. New York, NY, USA: ACM, 2012, pp. 1-12. [Online]. Available: http://doi.acm.org/10.1145/2133601.2133603
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, Ser. CODASPY '12
, pp. 1-12
-
-
Zheng, Q.1
Xu, S.2
-
15
-
-
84877968673
-
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage
-
New York, NY, USA: ACM [Online]
-
J. Xu, E.-C. Chang, and J. Zhou, "Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, " in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ser. ASIA CCS '13. New York, NY, USA: ACM, 2013, pp. 195-206. [Online]. Available: http://doi.acm.org/10.1145/2484313.2484340
-
(2013)
Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Ser. ASIA CCS '13
, pp. 195-206
-
-
Xu, J.1
Chang, E.-C.2
Zhou, J.3
-
16
-
-
84939445947
-
Provable ownership of files in deduplication cloud storage
-
[Online]
-
C. Yang, J. Ren, and J. Ma, "Provable ownership of files in deduplication cloud storage, " Security and Communication Networks, pp. n/a-n/a, 2013. [Online]. Available: http://dx.doi.org/10.1002/sec.784
-
(2013)
Security and Communication Networks
, pp. n/a-n/a
-
-
Yang, C.1
Ren, J.2
Ma, J.3
-
17
-
-
70349237760
-
Secure data deduplication
-
ACM
-
M. W. Storer, K. Greenan, D. D. Long, and E. L. Miller, "Secure data deduplication, " in Proceedings of the 4th ACM international workshop on Storage security and survivability. ACM, 2008, pp. 1-10.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 1-10
-
-
Storer, M.W.1
Greenan, K.2
Long, D.D.3
Miller, E.L.4
-
18
-
-
84877996375
-
Message-locked encryption and secure deduplication
-
M. Bellare, S. Keelveedhi, and T. Ristenpart, "Message-locked encryption and secure deduplication, " Cryptology ePrint Archive, Report 2012/631, 2012, http://eprint.iacr.org/.
-
(2012)
Cryptology EPrint Archive, Report 2012/631
-
-
Bellare, M.1
Keelveedhi, S.2
Ristenpart, T.3
-
19
-
-
74049102823
-
Provable data possession at untrusted stores
-
New York, NY, USA: ACM [Online]
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable data possession at untrusted stores, " in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 598-609. [Online]. Available: http://doi.acm.org/10. 1145/1315245.1315318
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Ser. CCS '07
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
20
-
-
70249129465
-
Scalable and efficient provable data possession
-
New York, NY, USA: ACM [Online]
-
G. Ateniese, R. Di Pietro, L. V. Mancini, and G. Tsudik, "Scalable and efficient provable data possession, " in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, ser. SecureComm '08. New York, NY, USA: ACM, 2008, pp. 9:1-9:10. [Online]. Available: http://doi.acm.org/10.1145/1460877.1460889
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, Ser. SecureComm '08
, pp. 91-910
-
-
Ateniese, G.1
Di Pietro, R.2
Mancini, L.V.3
Tsudik, G.4
-
21
-
-
74049103479
-
PoRs: Proofs of retrievability for large files
-
New York, NY, USA: ACM [Online]
-
A. Juels and B. S. Kaliski, Jr., "PoRs: proofs of retrievability for large files, " in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 584-597. [Online]. Available: http://doi.acm.org/10.1145/1315245.1315317
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, Ser. CCS '07
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.S.2
-
22
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
|