메뉴 건너뛰기




Volumn 26, Issue 5, 2015, Pages 1313-1322

Exploiting Rateless Codes in Cloud Storage Systems

Author keywords

availability; Cloud storage; confidentiality; integrity; performance; rateless codes

Indexed keywords

AVAILABILITY; CODES (SYMBOLS); DISCRETE EVENT SIMULATION; VIRTUAL STORAGE;

EID: 84927589445     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2014.2321745     Document Type: Article
Times cited : (38)

References (35)
  • 4
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. S. Reed and S. Gustave, "Polynomial codes over certain finite fields," J. Soc. Ind. Appl. Math., vol. 8, no. 2, pp. 300-304, 1960.
    • (1960) J. Soc. Ind. Appl. Math. , vol.8 , Issue.2 , pp. 300-304
    • Reed, I.S.1    Gustave, S.2
  • 5
    • 79951957726 scopus 로고    scopus 로고
    • A survey on network codes for distributed storage
    • Mar.
    • A. G. Dimakis, K. Ramchandran, Y. Wu, and C. Suh, "A survey on network codes for distributed storage," in Proc. IEEE, vol. 99, no. 3, pp. 476-489, Mar. 2011.
    • (2011) Proc. IEEE , vol.99 , Issue.3 , pp. 476-489
    • Dimakis, A.G.1    Ramchandran, K.2    Wu, Y.3    Suh, C.4
  • 16
    • 85066385479 scopus 로고    scopus 로고
    • Int. Data Corp. (IDC), Framingham, MA, USA, White Paper, Available Feb.
    • K. Bailey, "Addressing the growth and complexity of information security concerns," Int. Data Corp. (IDC), Framingham, MA, USA, White Paper, Available: http://media.kaspersky.com/business-security/growth-and-complexity-of-information-security.pdf, Feb. 2013.
    • (2013) Addressing the Growth and Complexity of Information Security Concerns
    • Bailey, K.1
  • 18
    • 33745166587 scopus 로고    scopus 로고
    • Raptor codes
    • Jun.
    • A. Shokrollahi, "Raptor codes," IEEE Trans. Inf. Theory, vol. 52, no. 6, pp. 2551-2567, Jun. 2006.
    • (2006) IEEE Trans. Inf. Theory , vol.52 , Issue.6 , pp. 2551-2567
    • Shokrollahi, A.1
  • 20
    • 73449141839 scopus 로고    scopus 로고
    • On the fly gaussian elimination for lt codes
    • Dec.
    • V. Bioglio, R. Gaeta, M. Grangetto, and M. Sereno, "On the fly gaussian elimination for lt codes," IEEE Commun. Lett., vol. 13, no. 12, pp. 953-955, Dec. 2009.
    • (2009) IEEE Commun. Lett. , vol.13 , Issue.12 , pp. 953-955
    • Bioglio, V.1    Gaeta, R.2    Grangetto, M.3    Sereno, M.4
  • 22
    • 84862586177 scopus 로고    scopus 로고
    • Distributed storage allocations
    • Jul.
    • D. Leong, A. Dimakis, and T. Ho, "Distributed storage allocations," IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4733-4752, Jul. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.7 , pp. 4733-4752
    • Leong, D.1    Dimakis, A.2    Ho, T.3
  • 23
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, 1989.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 24
    • 67651039764 scopus 로고    scopus 로고
    • Potshards a secure, recoverable, long-term archival storage system
    • M. W. Storer, K. M. Greenan, E. L. Miller, and K. Voruganti, "Potshards a secure, recoverable, long-term archival storage system," Trans. Storage, vol. 5, no. 2, pp. 1-35, 2009.
    • (2009) Trans. Storage , vol.5 , Issue.2 , pp. 1-35
    • Storer, M.W.1    Greenan, K.M.2    Miller, E.L.3    Voruganti, K.4
  • 27
    • 84883400280 scopus 로고    scopus 로고
    • Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique
    • Oct.
    • R. Gaeta and M. Grangetto, "Identification of malicious nodes in peer-to-peer streaming: A belief propagation based technique," IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 10, pp. 1994-2003, Oct. 2013.
    • (2013) IEEE Trans. Parallel Distrib. Syst. , vol.24 , Issue.10 , pp. 1994-2003
    • Gaeta, R.1    Grangetto, M.2
  • 33
  • 34
    • 77249133687 scopus 로고    scopus 로고
    • Measurement-based analysis, modeling, and synthesis of the Internet delay space
    • Feb.
    • B. Zhang, T. S. E. Ng, A. Nandi, R. H. Riedi, P. Druschel, and G. Wang, "Measurement-based analysis, modeling, and synthesis of the Internet delay space," IEEE/ACM Trans. Netw., vol. 18, no. 1, pp. 229-242, Feb. 2010.
    • (2010) IEEE/ACM Trans.Netw. , vol.18 , Issue.1 , pp. 229-242
    • Zhang, B.1    Ng, T.S.E.2    Nandi, A.3    Riedi, R.H.4    Druschel, P.5    Wang, G.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.