-
1
-
-
84878341131
-
Cloud monitoring: A survey
-
2013
-
Giuseppe Aceto, Alessio Botta, Walter de Donato, and Antonio Pescap. 2013. Cloud monitoring: A survey. Computer Networks 57, 9(2013), 2093-2115.
-
(2013)
Computer Networks
, vol.57
, Issue.9
, pp. 2093-2115
-
-
Aceto, G.1
Botta, A.2
De Donato, W.3
Pescap, A.4
-
2
-
-
84978405320
-
Farsite: Federated, available, and reliable storage for an incompletely trusted environment
-
2002
-
Atul Adya, William J. Bolosky, Miguel Castro, Gerald Cermak, Ronnie Chaiken, John R. Douceur, Jon Howell, Jacob R. Lorch, Marvin Theimer, and Roger P. Wattenhofer. 2002. Farsite: Federated, available, and reliable storage for an incompletely trusted environment. SIGOPS Operating Systems Review 36, SI (2002), 1-14.
-
(2002)
SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
5
-
-
3042527986
-
-
ETH, Eidgenössische Technische Hochschule Zürich, Department of Computer Science
-
Keno Albrecht, Ruedi Arnold, Roger Wattenhofer, Roger Wattenhofer, and Roger Wattenhofer. 2003. Clippee: A Large-Scale Client/Peer System. ETH, Eidgenössische Technische Hochschule Zürich, Department of Computer Science.
-
(2003)
Clippee: A Large-scale Client/Peer System
-
-
Albrecht, K.1
Arnold, R.2
Wattenhofer, R.3
Wattenhofer, R.4
Wattenhofer, R.5
-
6
-
-
0030083168
-
Serverless network file systems
-
1996, 41-79
-
Thomas E. Anderson, Michael D. Dahlin, Jeanna M. Neefe, David A. Patterson, Drew S. Roselli, and Randolph Y. Wang. 1996. Serverless network file systems. ACM Transactions on Computer Systems 14, 1(1996), 41-79.
-
(1996)
ACM Transactions on Computer Systems
, vol.14
, pp. 1
-
-
Anderson, T.E.1
Dahlin, M.D.2
Neefe, J.M.3
Patterson, D.A.4
Roselli, D.S.5
Wang, R.Y.6
-
8
-
-
77950347409
-
A view of cloud computing
-
2010
-
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, Ariel Rabkin, and Ion Stoica. 2010. A view of cloud computing. Communications of the ACM 53, 4(2010), 50-58.
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
-
10
-
-
79959823910
-
Remote data checking using provable data possession
-
2011
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song. 2011. Remote data checking using provable data possession. ACM Transactions on Information Systems Security 14, 1(2011), 1-34.
-
(2011)
ACM Transactions on Information Systems Security
, vol.14
, Issue.1
, pp. 1-34
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Khan, O.5
Kissner, L.6
Peterson, Z.7
Song, D.8
-
11
-
-
74049102823
-
Provable data possession at untrusted stores
-
ACM, Alexandria, Virginia, USA
-
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable data possession at untrusted stores. In Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, Alexandria, Virginia, USA, 598-609.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
12
-
-
70249129465
-
Scalable and efficient provable data possession
-
ACM, Istanbul, Turkey
-
Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, and Gene Tsudik. 2008. Scalable and efficient provable data possession. In Proceedings of the 4th International Conference on Security and Privacy in Communication Network. ACM, Istanbul, Turkey, 1-10.
-
(2008)
Proceedings of the 4th International Conference on Security and Privacy in Communication Network
, pp. 1-10
-
-
Ateniese, G.1
Pietro, R.D.2
Mancini, L.V.3
Tsudik, G.4
-
13
-
-
78650878673
-
The client and the cloud: Democratizing research computing
-
2011
-
Roger Barga, Dennis Gannon, and Daniel Reed. 2011. The client and the cloud: Democratizing research computing. IEEE Internet Computing 15, 1(2011), 72-75.
-
(2011)
IEEE Internet Computing
, vol.15
, Issue.1
, pp. 72-75
-
-
Barga, R.1
Gannon, D.2
Reed, D.3
-
14
-
-
84863642638
-
Provable possession and replication of data over cloud servers
-
University of Waterloo, 2010
-
Ayad F. Barsoum and M. Anwar Hasan. 2010. Provable Possession and Replication of Data over Cloud Servers. Centre for Applied Cryptographic Research (CACR) Report 32, University of Waterloo, (2010), 1-36.
-
(2010)
Centre for Applied Cryptographic Research (CACR)
, pp. 1-36
-
-
Barsoum, A.F.1
Anwar Hasan, M.2
-
15
-
-
84874296531
-
On verifying dynamic multiple data copies over cloud servers
-
Ayad F. Barsoum and M. Anwar Hasan. 2011. On verifying dynamic multiple data copies over cloud servers. IACR Cryptology ePrint Archive 2011(2011), 447-476.
-
(2011)
IACR Cryptology EPrint Archive
, vol.2011
, Issue.2011
, pp. 447-476
-
-
Barsoum, A.F.1
Anwar Hasan, M.2
-
16
-
-
0029254192
-
EVENODD: An efficient scheme for tolerating double disk failures in RAID architectures
-
1995, 192-202
-
Mario Blaum, Jim Brady, Jehoshua Bruck, and Jai Menon. 1995. EVENODD: An efficient scheme for tolerating double disk failures in RAID architectures. IEEE Transactions on Computing 44, 2(1995), 192-202.
-
(1995)
IEEE Transactions on Computing
, vol.44
, pp. 2
-
-
Blaum, M.1
Brady, J.2
Bruck, J.3
Menon, J.4
-
17
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Springer, Book section 26
-
Dan Boneh, Craig Gentry, Ben Lynn, and Hovav Shacham. 2003. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. Lecture Notes in Computer Science, Vol. 2656. Springer, Book section 26, 416-432.
-
(2003)
Lecture Notes in Computer Science
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
18
-
-
74049144464
-
HAIL: A high-availability and integrity layer for cloud storage
-
ACM, Chicago, Illinois, USA
-
Kevin D. Bowers, Ari Juels, and Alina Oprea. 2009a. HAIL: a high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, Chicago, Illinois, USA, 187-198.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
19
-
-
74049136395
-
Proofs of retrievability: Theory and implementation
-
ACM, Chicago, Illinois, USA
-
Kevin D. Bowers, Ari Juels, and Alina Oprea. 2009b. Proofs of retrievability: theory and implementation. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security. ACM, Chicago, Illinois, USA, 43-54.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 43-54
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
20
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
2009
-
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, and Ivona Brandic. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Computer Systems 25, 6(2009), 599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
21
-
-
84858158703
-
The Aneka platform and QoS-driven resource provisioning for elastic applications on hybrid Clouds
-
2012
-
Rodrigo N. Calheiros, Christian Vecchiola, Dileban Karunamoorthy, and Rajkumar Buyya. 2012. The Aneka platform and QoS-driven resource provisioning for elastic applications on hybrid Clouds. Future Generation Computer Systems 28, 6(2012), 861-870.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.6
, pp. 861-870
-
-
Calheiros, R.N.1
Vecchiola, C.2
Karunamoorthy, D.3
Buyya, R.4
-
22
-
-
4243180376
-
The random oracle methodology, revisited
-
2004
-
Ran Canetti, Oded Goldreich, and Shai Halevi. 2004. The random oracle methodology, revisited. Journal of the ACM 51, 4(2004), 557-594.
-
(2004)
Journal of the ACM
, vol.51
, Issue.4
, pp. 557-594
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
25
-
-
84930686345
-
-
The Sidekick Cloud Disaster. Retrieved from http://www.bbc.co.uk/blogs/technology/2009/10/the-sidekick-cloud-disaster.html.
-
-
-
The Sidekick Cloud Disaster1
-
27
-
-
78650081896
-
Remote data checking for network coding-based distributed storage systems
-
ACM, Chicago, Illinois, USA
-
Bo Chen, Reza Curtmola, Giuseppe Ateniese, and Randal Burns. 2010. Remote data checking for network coding-based distributed storage systems. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM, Chicago, Illinois, USA, 2010, 31-42.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, vol.2010
, pp. 31-42
-
-
Chen, B.1
Curtmola, R.2
Ateniese, G.3
Burns, R.4
-
28
-
-
84897713013
-
Enabling data integrity protection in regenerating-codingbased cloud storage: Theory and implementation
-
Henry C. H. Chen and Patrick P. C. Lee. 2013. Enabling data integrity protection in regenerating-codingbased cloud storage: Theory and implementation. IEEE Transactions on Parallel and Distributed Systems 99(2013), 1-1.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.99
, Issue.2013
, pp. 1-1
-
-
Chen, H.C.H.1
Lee, P.P.C.2
-
29
-
-
84885645897
-
Using algebraic signatures to check data possession in cloud storage
-
2013
-
Lanxiang Chen. 2013. Using algebraic signatures to check data possession in cloud storage. Future Generation Computer Systems 29, 7(2013), 1709-1715.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.7
, pp. 1709-1715
-
-
Chen, L.1
-
30
-
-
84885662348
-
Data dynamics for remote data possession checking in cloud storage
-
2013
-
Lanxiang Chen, Shuming Zhou, Xinyi Huang, and Li Xu. 2013. Data dynamics for remote data possession checking in cloud storage. Computers & Electrical Engineering 39, 7(2013), 2413-2424.
-
(2013)
Computers & Electrical Engineering
, vol.39
, Issue.7
, pp. 2413-2424
-
-
Chen, L.1
Zhou, S.2
Huang, X.3
Xu, L.4
-
31
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Book section 4
-
Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2001. Freenet: ADistributed Anonymous Information Storage and Retrieval System. Lecture Notes in Computer Science, Vol. 2009. Book section 4, 46-66.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
32
-
-
70349245590
-
Robust remote data checking
-
ACM, Alexandria, Virginia, USA
-
Reza Curtmola, Osama Khan, and Randal Burns. 2008a. Robust remote data checking. In Proceedings of the 4th ACM International Workshop on Storage Security and Survivability. ACM, Alexandria, Virginia, USA, 63-68.
-
(2008)
Proceedings of the 4th ACM International Workshop on Storage Security and Survivability
, pp. 63-68
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
-
33
-
-
51849117195
-
MR-PDP: Multiple-replica provable data possession
-
Purdue Univ., West Lafayette
-
Reza Curtmola, Osama Khan, Randal Burns, and Giuseppe Ateniese. 2008b. MR-PDP: Multiple-replica provable data possession. In Proceedings of the 28th International Conference on Distributed Computing Systems. Purdue Univ., West Lafayette, 411-420.
-
(2008)
Proceedings of the 28th International Conference on Distributed Computing Systems
, pp. 411-420
-
-
Curtmola, R.1
Khan, O.2
Burns, R.3
Ateniese, G.4
-
34
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
2001
-
Frank Dabek, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica. 2001. Wide-area cooperative storage with CFS. SIGOPS Operating Systems Review 35, 5(2001), 202-215.
-
(2001)
SIGOPS Operating Systems Review
, vol.35
, Issue.5
, pp. 202-215
-
-
Dabek, F.1
Frans Kaashoek, M.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
35
-
-
77955726417
-
Network coding for distributed storage systems
-
2010
-
Alexandros G. Dimakis, P. Brighten Godfrey, Yunnan Wu, Martin J. Wainwright, and Kannan Ramchandran. 2010. Network coding for distributed storage systems. IEEE Transactions on Information Theory 56, 9(2010), 4539-4551.
-
(2010)
IEEE Transactions on Information Theory
, vol.56
, Issue.9
, pp. 4539-4551
-
-
Dimakis, A.G.1
Brighten Godfrey, P.2
Wu, Y.3
Wainwright, M.J.4
Ramchandran, K.5
-
36
-
-
79951957726
-
A survey on network codes for distributed storage
-
2011
-
Alexandros G. Dimakis, Kannan Ramchandran, Yunnan Wu, and Suh Changho. 2011. A survey on network codes for distributed storage. Proceedings of the IEEE 99, 3(2011), 476-489.
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.3
, pp. 476-489
-
-
Dimakis, A.G.1
Ramchandran, K.2
Wu, Y.3
Changho, S.4
-
37
-
-
36349001007
-
Peer-to-peer networks for content sharing
-
Idea Group Publishing, Hershey, PA, USA
-
Choon Hoong Ding, Sarana Nutanong, and Rajkumar Buyya. 2005. Peer-to-peer networks for content sharing. In Peer-to-Peer Computing: The Evolution of a Disruptive Technology. Idea Group Publishing, Hershey, PA, USA, 28-65.
-
(2005)
Peer-to-peer Computing: The Evolution of a Disruptive Technology
, pp. 28-65
-
-
Ding, C.H.1
Nutanong, S.2
Buyya, R.3
-
38
-
-
33645240198
-
The free haven project: Distributed anonymous storage service
-
Springer, Book section 5
-
Roger Dingledine, Michael J. Freedman, and David Molnar. 2001. The Free Haven Project: Distributed Anonymous Storage Service. Lecture Notes in Computer Science, Vol. 2009. Springer, Book section 5, 67-95.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 67-95
-
-
Dingledine, R.1
Freedman, M.J.2
Molnar, D.3
-
40
-
-
74049121230
-
Dynamic provable data possession
-
ACM 1653688
-
Chris Erway, Alptekin Küpçü, Charalampos Papamanthou, and Roberto Tamassia. 2009. Dynamic provable data possession. In Proceedings of the 16th ACM Conference on Computer and Communications Security. ACM, 1653688, 213-222.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 213-222
-
-
Erway, C.1
Küpçü, A.2
Papamanthou, C.3
Tamassia, R.4
-
41
-
-
84879849228
-
Transparent, distributed, and replicated dynamic provable data possession
-
Mohammad Etemad and Alptekin Küpçü. 2013. Transparent, distributed, and replicated dynamic provable data possession. IACR Cryptology ePrint Archive 2013(2013), 225.
-
(2013)
IACR Cryptology EPrint Archive
, vol.2013
, Issue.2013
, pp. 225
-
-
Etemad, M.1
Küpçü, A.2
-
42
-
-
84862998994
-
Mobile cloud computing: A survey
-
2013
-
Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu. 2013. Mobile cloud computing: A survey. Future Generation Computer Systems 29, 1(2013), 84-106.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.1
, pp. 84-106
-
-
Fernando, N.1
Loke, S.W.2
Rahayu, W.3
-
43
-
-
68249129760
-
Above the clouds: A Berkeley view of cloud computing
-
University of California, Berkeley, Technical Report UCB/EECS 28 2009
-
Armando Fox, Rean Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, and I. Stoica. 2009. Above the Clouds: A Berkeley View of Cloud Computing. Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, Technical Report UCB/EECS 28 (2009).
-
(2009)
Department of Electrical Engineering and Computer Sciences
-
-
Fox, A.1
Griffith, R.2
Joseph, A.3
Katz, R.4
Konwinski, A.5
Lee, G.6
Patterson, D.7
Rabkin, A.8
Stoica, I.9
-
44
-
-
21644437974
-
The Google file system
-
2003
-
Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung. 2003. The Google file system. SIGOPS Operating Systems Review 37, 5(2003), 29-43.
-
(2003)
SIGOPS Operating Systems Review
, vol.37
, Issue.5
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.-T.3
-
46
-
-
80052277144
-
Adding value to the network: Mobile operators experiments with Software-as - A-Service and Platform-as - A - Service models
-
2011
-
Vânia Gonçalves and Pieter Ballon. 2011. Adding value to the network: Mobile operators experiments with Software-as-a-Service and Platform-as-a-Service models. Telematics and Informatics 28, 1(2011), 12-21.
-
(2011)
Telematics and Informatics
, vol.28
, Issue.1
, pp. 12-21
-
-
Gonçalves, V.1
Ballon, P.2
-
47
-
-
84901627921
-
Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves
-
2013
-
Christian Hanser and Daniel Slamanig. 2013. Efficient simultaneous privately and publicly verifiable robust provable data possession from elliptic curves. IACR Cryptology ePrint Archive (2013), 392-406.
-
(2013)
IACR Cryptology EPrint Archive
, pp. 392-406
-
-
Hanser, C.1
Slamanig, D.2
-
49
-
-
24744433101
-
A survey of peerto-peer storage techniques for distributed file systems
-
Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, and Roy Campbell. 2005. A survey of peerto-peer storage techniques for distributed file systems. In Proceedings of the International Conference on Information Technology: Coding and Computing, Vol. 2, 205-213.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing
, vol.2
, pp. 205-213
-
-
Hasan, R.1
Anwar, Z.2
Yurcik, W.3
Brumbaugh, L.4
Campbell, R.5
-
50
-
-
84901933057
-
Security on distributed systems: Cloud security versus traditional IT
-
2014
-
M. Azua Himmel and F. Grossman. 2014. Security on distributed systems: Cloud security versus traditional IT. IBM Journal of Research and Development 58, 1(2014), 31-313.
-
(2014)
IBM Journal of Research and Development
, vol.58
, Issue.1
, pp. 31-313
-
-
Azua Himmel, M.1
Grossman, F.2
-
52
-
-
85077127142
-
NCCloud: Applying network coding for the storage repair in a cloud-of-clouds
-
USENIX Association, San Jose, CA
-
Yuchong Hu, Henry C. H. Chen, Patrick P. C. Lee, and Yang Tang. 2012. NCCloud: applying network coding for the storage repair in a cloud-of-clouds. In Proceedings of the 10th USENIX Conference on File and Storage Technologies. USENIX Association, San Jose, CA, 21-29.
-
(2012)
Proceedings of the 10th USENIX Conference on File and Storage Technologies
, pp. 21-29
-
-
Hu, Y.1
Chen, H.C.H.2
Lee, P.P.C.3
Tang, Y.4
-
53
-
-
0029194453
-
PPFS: A high performance portable parallel file system
-
ACM
-
James V. Huber Jr, Andrew A. Chien, Christopher L. Elford, David S. Blumenthal, and Daniel A. Reed. 1995. PPFS: A high performance portable parallel file system. In Proceedings of the 9th International Conference on Supercomputing. ACM, 385-394.
-
(1995)
Proceedings of the 9th International Conference on Supercomputing
, pp. 385-394
-
-
James, V.H.1
Chien, A.A.2
Elford, C.L.3
Blumenthal, D.S.4
Reed, D.A.5
-
55
-
-
84878887163
-
State-of - The-art research study for green cloud computing
-
2013
-
Si-Yuan Jing, Shahzad Ali, Kun She, and Yi Zhong. 2013. State-of-the-art research study for green cloud computing. Journal of Supercomputing 65, 1(2013), 445-468.
-
(2013)
Journal of Supercomputing
, vol.65
, Issue.1
, pp. 445-468
-
-
Jing, S.-Y.1
Ali, S.2
She, K.3
Zhong, Y.4
-
56
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
ACM, Alexandria, Virginia, USA
-
Ari Juels Jr. and Burton S. Kaliski. 2007. PORs: proofs of retrievability for large files. In Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM, Alexandria, Virginia, USA, 584-597.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 584-597
-
-
Ari, J.1
Kaliski, B.S.2
-
57
-
-
84874109689
-
Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage
-
2013, 34-46
-
Dongyoung Koo, Junbeom Hur, and Hyunsoo Yoon. 2013. Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Computers & Electrical Engineering 39, 1(2013), 34-46.
-
(2013)
Computers & Electrical Engineering
, vol.39
, pp. 1
-
-
Koo, D.1
Hur, J.2
Yoon, H.3
-
59
-
-
17544377746
-
OceanStore: An architecture for global-scale persistent storage
-
2000
-
John Kubiatowicz, David Bindel, Yan Chen, Steven Czerwinski, Patrick Eaton, Dennis Geels, Ramakrishan Gummadi, Sean Rhea, Hakim Weatherspoon, Westley Weimer, Chris Wells, and Ben Zhao. 2000. OceanStore: An architecture for global-scale persistent storage. SIGPLAN Notes 35, 11(2000), 190-201.
-
(2000)
SIGPLAN Notes
, vol.35
, Issue.11
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
60
-
-
84883356637
-
Efficient cryptography for the next generation secure cloud
-
Retrieved from home.ku.edu.tr/~akupcu/papers/kupcu-phd.pdf
-
Alptekin Küpçü. 2010. Efficient Cryptography for the Next Generation Secure Cloud. Thesis. Retrieved from home.ku.edu.tr/~akupcu/papers/kupcu-phd.pdf.
-
(2010)
Thesis
-
-
Küpçü, A.1
-
61
-
-
84900377088
-
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
-
Chang Liu, Jinjun Chen, Laurence T. Yang, Xuyun Zhang, Chi Yang, Rajiv Ranjan, and Ramamohanarao Kotagiri. 2013. Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates. IEEE Transactions on Parallel and Distributed Systems 99(2013), 1-1.
-
(2013)
IEEE Transactions on Parallel and Distributed Systems
, vol.99
, Issue.2013
, pp. 1-1
-
-
Liu, C.1
Chen, J.2
Yang, L.T.3
Zhang, X.4
Yang, C.5
Ranjan, R.6
Kotagiri, R.7
-
62
-
-
0025430451
-
Scalable, secure, and highly available distributed file access
-
1990
-
Satyanarayanan Mahadev. 1990. Scalable, secure, and highly available distributed file access. Computer 23, 5(1990), 9-18. DOI: http://dx.doi.org/10.1109/2.53351
-
(1990)
Computer
, vol.23
, Issue.5
, pp. 9-18
-
-
Mahadev, S.1
-
63
-
-
84994675427
-
Demystifying data deduplication
-
Leuven, Belgium
-
Nagapramod Mandagere, Pin Zhou, Mark A Smith, and Sandeep Uttamchandani. 2008. Demystifying data deduplication. In Proceedings of the ACM/IFIP/USENIX Middleware'08 Conference Companion. Leuven, Belgium, 12-17.
-
(2008)
Proceedings of the ACM/IFIP/USENIX Middleware'08 Conference Companion
, pp. 12-17
-
-
Mandagere, N.1
Zhou, P.2
Smith, M.A.3
Uttamchandani, S.4
-
64
-
-
16644392046
-
The LOCKSS peer-to-peer digital preservation system
-
2005
-
Petros Maniatis, Mema Roussopoulos, T. J. Giuli, David S. H. Rosenthal, and Mary Baker. 2005. The LOCKSS peer-to-peer digital preservation system. ACM Transactions on Computer Systems 23, 1(2005), 2-50. DOI: http://dx.doi.org/10.1145/1047915.1047917
-
(2005)
ACM Transactions on Computer Systems
, vol.23
, Issue.1
, pp. 2-50
-
-
Maniatis, P.1
Roussopoulos, M.2
Giuli, T.J.3
Rosenthal, D.S.H.4
Baker, M.5
-
65
-
-
84861307113
-
The NIST definition of cloud computing (draft)
-
Peter Mell and Timothy Grance. 2011. The NIST definition of cloud computing (draft). NIST Special Publication 800(2011), 145.
-
(2011)
NIST Special Publication
, vol.800
, Issue.2011
, pp. 145
-
-
Mell, P.1
Grance, T.2
-
66
-
-
84920380941
-
Protocols for public key cryptosystems
-
Oakland, CA, USA
-
R. C. Merkle. 1980. Protocols for public key cryptosystems. In IEEE Symposium on Security and Privacy. Oakland, CA, USA, 122-134.
-
(1980)
IEEE Symposium on Security and Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
67
-
-
84857732276
-
A study of practical deduplication
-
2012
-
Dutch T. Meyer and William J. Bolosky. 2012. A study of practical deduplication. Transactions on Storage 7, 4(2012), 1-20. DOI: http://dx.doi.org/10.1145/2078861.2078864
-
(2012)
Transactions on Storage
, vol.7
, Issue.4
, pp. 1-20
-
-
Meyer, D.T.1
Bolosky, W.J.2
-
68
-
-
84879747636
-
-
Rich Miller. 2010. Amazon Addresses EC2 Power Outages. Retrieved from http://www.datacenterknowledge.com/archives/2010/05/10/amazon-addresses-ec2-power-outages/.
-
(2010)
Amazon Addresses EC2 Power Outages
-
-
Miller, R.1
-
69
-
-
77956243270
-
DACO: A high-performance disk architecture designed specially for large-scale erasure-coded storage systems
-
2010
-
Li Mingqiang and Shu Jiwu. 2010. DACO: A high-performance disk architecture designed specially for large-scale erasure-coded storage systems. IEEE Transations on Computers 59, 10(2010), 1350-1362.
-
(2010)
IEEE Transations on Computers
, vol.59
, Issue.10
, pp. 1350-1362
-
-
Mingqiang, L.1
Jiwu, S.2
-
71
-
-
84978427421
-
Ivy: A read/write peer-topeer file system
-
2002
-
Athicha Muthitacharoen, Robert Morris, Thomer M. Gil, and Benjie Chen. 2002. Ivy: A read/write peer-topeer file system. SIGOPS Operating Systems Review 36, SI (2002), 31-44.
-
(2002)
SIGOPS Operating Systems Review
, vol.36
, Issue.SI
, pp. 31-44
-
-
Muthitacharoen, A.1
Morris, R.2
Gil, T.M.3
Chen, B.4
-
73
-
-
84870261636
-
Coding for trusted storage in untrusted networks
-
2012
-
Paulo F. Oliveira, Luísa Lima, Tiago T. V. Vinhoza, João Barros, and Muriel Médard. 2012. Coding for trusted storage in untrusted networks. IEEE Transactions on Information Forensics and Security 7, 6(2012), 1890-1899.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.6
, pp. 1890-1899
-
-
Oliveira, P.F.1
Lima, L.2
Vinhoza, T.T.V.3
Barros, J.4
Médard, M.5
-
78
-
-
13244269971
-
Note: Correction to the 1997 tutorial on Reed-Solomon coding
-
2005
-
James S. Plank and Ying Ding. 2005. Note: Correction to the 1997 tutorial on Reed-Solomon coding. Software: Practice and Experience 35, 2(2005), 189-194. DOI: http://dx.doi.org/10.1002/spe.631
-
(2005)
Software: Practice and Experience
, vol.35
, Issue.2
, pp. 189-194
-
-
Plank, J.S.1
Ding, Y.2
-
79
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
1989
-
Michael O. Rabin. 1989. Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of the ACM 36, 2(1989), 335-348.
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
80
-
-
0005301490
-
On data banks and privacy homomorphisms
-
1978
-
Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation 32, 4(1978), 169-178.
-
(1978)
Foundations of Secure Computation
, vol.32
, Issue.4
, pp. 169-178
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
-
81
-
-
84874108116
-
Beyond lightning: A survey on security challenges in cloud computing
-
2013
-
Chunming Rong, Son T. Nguyen, and Martin Gilje Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering 39, 1(2013), 47-54.
-
(2013)
Computers & Electrical Engineering
, vol.39
, Issue.1
, pp. 47-54
-
-
Rong, C.1
Nguyen, S.T.2
Jaatun, M.G.3
-
83
-
-
77954749319
-
Token-based cloud computing
-
Springer, Book section 30
-
Ahmad-Reza Sadeghi, Thomas Schneider, and Marcel Winandy. 2010. Token-Based Cloud Computing. Lecture Notes in Computer Science, Vol. 6101. Springer, Book section 30, 417-429.
-
(2010)
Lecture Notes in Computer Science
, vol.6101
, pp. 417-429
-
-
Sadeghi, A.1
Schneider, T.2
Winandy, M.3
-
84
-
-
84887447695
-
The family of Mapreduce and large-scale data processing systems
-
2013
-
Sherif Sakr, Anna Liu, and Ayman G. Fayoumi. 2013. The family of Mapreduce and large-scale data processing systems. ACM Computer Surveys 46, 1(2013), 1-44.
-
(2013)
ACM Computer Surveys
, vol.46
, Issue.1
, pp. 1-44
-
-
Sakr, S.1
Liu, A.2
Fayoumi, A.G.3
-
85
-
-
0000432429
-
Design and implementation of the Sun network filesystem
-
Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, and Bob Lyon. 1985. Design and implementation of the Sun network filesystem. In Proceedings of the Summer USENIX Conference. 119-130.
-
(1985)
Proceedings of the Summer USENIX Conference
, pp. 119-130
-
-
Sandberg, R.1
Goldberg, D.2
Kleiman, S.3
Walsh, D.4
Lyon, B.5
-
89
-
-
58349118819
-
Compact Proofs of Retrievability
-
Springer, Book section 7
-
Hovav Shacham and Brent Waters. 2008. Compact Proofs of Retrievability. Lecture Notes in Computer Science, Vol. 5350. Springer, Book section 7, 90-107.
-
(2008)
Lecture Notes in Computer Science
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
92
-
-
84867509247
-
A combined approach to ensure data security in cloud computing
-
2012
-
Sandeep K. Sood. 2012. A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications 35, 6(2012), 1831-1838.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.6
, pp. 1831-1838
-
-
Sood, S.K.1
-
93
-
-
84904635972
-
Towards dynamic remote data auditing in computational clouds
-
Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, and Nor Badrul Anuar. 2014a. Towards dynamic remote data auditing in computational clouds. Scientific World Journal 2014(2014), 12. DOI: http://dx.doi.org/10.1155/2014/269357
-
(2014)
Scientific World Journal
, vol.2014
, Issue.2014
, pp. 12
-
-
Sookhak, M.1
Akhunzada, A.2
Gani, A.3
Khan, M.K.4
Anuar, N.B.5
-
94
-
-
84901607854
-
A review on remote data auditing in single cloud server: Taxonomy and open issues
-
Mehdi Sookhak, Hamid Talebian, Ejaz Ahmed, Abdullah Gani, and Muhammad Khurram Khan. 2014b. A review on remote data auditing in single cloud server: Taxonomy and open issues. Journal of Network and Computer Applications 43(2014), 121-141. DOI: http://dx.doi.org/10.1016/j.jnca.2014.04.011
-
(2014)
Journal of Network and Computer Applications
, vol.43
, Issue.2014
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
97
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
2011
-
S. Subashini and V. Kavitha. 2011. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34, 1(2011), 1-11. DOI: http://dx.doi.org/10.1016/j.jnca.2010.07.006
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
98
-
-
0031540744
-
Frangipani: A scalable distributed file system
-
1997
-
Chandramohan A. Thekkath, Timothy Mann, and Edward K. Lee. 1997. Frangipani: A scalable distributed file system. SIGOPS Operating Systems Review 31, 5(1997), 224-237.
-
(1997)
SIGOPS Operating Systems Review
, vol.31
, Issue.5
, pp. 224-237
-
-
Thekkath, C.A.1
Mann, T.2
Lee, E.K.3
-
99
-
-
35048847465
-
A measurement-based traffic profile of the eDonkey filesharing service
-
Springer, Book section 2
-
Kurt Tutschku. 2004. A Measurement-Based Traffic Profile of the eDonkey Filesharing Service. Lecture Notes in Computer Science, Vol. 3015. Springer, Book section 2, 12-21. DOI: http://dx.doi.org/10.1007/978-3-540-24668-8-2
-
(2004)
Lecture Notes in Computer Science
, vol.3015
, pp. 12-21
-
-
Tutschku, K.1
-
100
-
-
79751493181
-
Locking the sky: A survey on IaaS cloud security
-
2011
-
Luism Vaquero, Luis Rodero-Merino, and Daniel Morán. 2011. Locking the sky: A survey on IaaS cloud security. Computing 91, 1(2011), 93-118.
-
(2011)
Computing
, vol.91
, Issue.1
, pp. 93-118
-
-
Vaquero, L.1
Rodero-Merino, L.2
Morán, D.3
-
101
-
-
33845399711
-
FreeLoader: Scavenging desktop storage resources for scientific data
-
Washington, DC, USA
-
Sudharshan S. Vazhkudai, Xiaosong Ma, Vincent W. Freeh, Jonathan W. Strickland, Nandan Tammineedi, and Stephen L. Scott. 2005. FreeLoader: Scavenging desktop storage resources for scientific data. In Proceedings of the ACM/IEEE Supercomputing Conference. Washington, DC, USA, 56-56.
-
(2005)
Proceedings of the ACM/IEEE Supercomputing Conference
, pp. 56-56
-
-
Vazhkudai, S.S.1
Ma, X.2
Freeh, V.W.3
Strickland, J.W.4
Tammineedi, N.5
Scott, S.L.6
-
102
-
-
33745767064
-
A taxonomy of data grids for distributed data sharing, management, and processing
-
2006
-
Srikumar Venugopal, Rajkumar Buyya, and Kotagiri Ramamohanarao. 2006. A taxonomy of data grids for distributed data sharing, management, and processing. ACM Computer Surveys 38, 1(2006), 3.
-
(2006)
ACM Computer Surveys
, vol.38
, Issue.1
, pp. 3
-
-
Venugopal, S.1
Buyya, R.2
Ramamohanarao, K.3
-
103
-
-
73849139655
-
Cumulus: Filesystem backup to the cloud
-
2009
-
Michael Vrable, Stefan Savage, and Geoffrey M. Voelker. 2009. Cumulus: Filesystem backup to the cloud. Transactions on Storage 5, 4(2009), 1-28.
-
(2009)
Transactions on Storage
, vol.5
, Issue.4
, pp. 1-28
-
-
Vrable, M.1
Savage, S.2
Voelker, G.M.3
-
105
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
2013
-
Cong Wang, S. S. M. Chow, Qian Wang, Kui Ren, and Wenjing Lou. 2013. Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers 62, 2(2013), 362-375.
-
(2013)
IEEE Transactions on Computers
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
106
-
-
77954843911
-
Toward publicly auditable secure cloud data storage services
-
2010
-
Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. 2010. Toward publicly auditable secure cloud data storage services. IEEE Network 24, 4(2010), 19-24.
-
(2010)
IEEE Network
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
107
-
-
84861957968
-
Toward secure and dependable storage services in cloud computing
-
2012
-
Cong Wang, Qian Wang, Kui Ren, Ning Cao, and Wenjing Lou. 2012. Toward secure and dependable storage services in cloud computing. IEEE Transactions on Services Computing, 5, 2(2012), 220-232.
-
(2012)
IEEE Transactions on Services Computing
, vol.5
, Issue.2
, pp. 220-232
-
-
Wang, C.1
Wang, Q.2
Ren, K.3
Cao, N.4
Lou, W.5
-
108
-
-
84891798354
-
Proxy provable data possession in public clouds
-
Huaqun Wang. 2012. Proxy provable data possession in public clouds. IEEE Transactions on Services Computing, 99(2012), 1-1.
-
(2012)
IEEE Transactions on Services Computing
, vol.99
, Issue.2012
, pp. 1-1
-
-
Wang, H.1
-
109
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Qian Wang, Cong Wang, Jin Li, Kui Ren, and Wenjing Lou. 2009. Enabling public verifiability and data dynamics for storage security in cloud computing. Proceedings of Computer Security 5789(2009), 355-370.
-
(2009)
Proceedings of Computer Security
, vol.5789
, Issue.2009
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
110
-
-
79953294892
-
Enabling public auditability and data dynamics for storage security in cloud computing
-
2011
-
Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, and Jin Li. 2011. Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed Systems 22, 5(2011), 847-859.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.5
, pp. 847-859
-
-
Wang, Q.1
Wang, C.2
Ren, K.3
Lou, W.4
Li, J.5
-
111
-
-
74049154660
-
Secure and efficient access to outsourced data
-
ACM 1655016
-
Weichao Wang, Zhiwei Li, Rodney Owens, and Bharat Bhargava. 2009. Secure and efficient access to outsourced data. In Proceedings of the ACM Workshop on Cloud Computing Security. ACM, 1655016, 55-66.
-
(2009)
Proceedings of the ACM Workshop on Cloud Computing Security
, pp. 55-66
-
-
Wang, W.1
Li, Z.2
Owens, R.3
Bhargava, B.4
-
112
-
-
84947278873
-
Erasure coding vs. Replication: A quantitative comparison
-
Springer, Book section 31
-
Hakim Weatherspoon and John D. Kubiatowicz. 2002. Erasure Coding Vs. Replication: A Quantitative Comparison. Lecture Notes in Computer Science, Vol. 2429. Springer, Book section 31, 328-337.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 328-337
-
-
Weatherspoon, H.1
Kubiatowicz, J.D.2
-
113
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
Lifei Wei, Haojin Zhu, Zhenfu Cao, Xiaolei Dong, Weiwei Jia, Yunlu Chen, and Athanasios V. Vasilakos. 2014. Security and privacy for storage and computation in cloud computing. Information Sciences 258(2014), 371-386.
-
(2014)
Information Sciences
, vol.258
, Issue.2014
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
114
-
-
84877686015
-
-
Chun Wesley. 2011. What Is Google App Engine? Retrieved from https://ep2012.europython. eu/conference/talks/google-app-engine-best-practices-latest-features.
-
(2011)
What Is Google App Engine?
-
-
Wesley, C.1
-
115
-
-
84896317870
-
A survey on vehicular cloud computing
-
Md Whaiduzzaman, Mehdi Sookhak, Abdullah Gani, and Rajkumar Buyya. 2014. A survey on vehicular cloud computing. Journal of Network and Computer Applications 40(2014), 325-344.
-
(2014)
Journal of Network and Computer Applications
, vol.40
, Issue.2014
, pp. 325-344
-
-
Whaiduzzaman, M.1
Sookhak, M.2
Gani, A.3
Buyya, R.4
-
117
-
-
84857361398
-
Multiple-file remote data checking for cloud storage
-
2012
-
Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, and Yixian Yang. 2012. Multiple-file remote data checking for cloud storage. Computers & Security 31, 2(2012), 192-205. DOI: http://dx.doi.org/10.1016/j.cose.2011.12.005
-
(2012)
Computers & Security
, vol.31
, Issue.2
, pp. 192-205
-
-
Xiao, D.1
Yang, Y.2
Yao, W.3
Wu, C.4
Liu, J.5
Yang, Y.6
-
118
-
-
84997556980
-
Integrity auditing of outsourced data
-
VLDB Endowment 1325940
-
Min Xie, Haixun Wang, Jian Yin, and Xiaofeng Meng. 2007. Integrity auditing of outsourced data. In Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB Endowment, 1325940, 782-793.
-
(2007)
Proceedings of the 33rd International Conference on Very Large Data Bases
, pp. 782-793
-
-
Xie, M.1
Wang, H.2
Yin, J.3
Meng, X.4
-
119
-
-
84869466694
-
Cooperative provable data possession for integrity verification in multicloud storage
-
2012
-
Zhu Yan, Hu Hongxin, Ahn Gail-Joon, and Yu Mengyang. 2012. Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems 23, 12(2012), 2231-2244.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.12
, pp. 2231-2244
-
-
Yan, Z.1
Hongxin, H.2
Gail-Joon, A.3
Mengyang, Y.4
-
120
-
-
84881080693
-
An efficient and secure dynamic auditing protocol for data storage in cloud computing
-
Kan Yang and Xiaohua Jia. 2012. An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Transactions on Parallel and Distributed Systems PP, 99(2012), 1717-1726.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems PP
, vol.99
, Issue.2012
, pp. 1717-1726
-
-
Yang, K.1
Jia, X.2
-
122
-
-
84884004936
-
Data security in cloud computing
-
Shucheng Yu, Wnjing Lou, and Kui Ren. 2012. Data Security in Cloud Computing. Morgan Kaufmann/Elsevier, Book section 15, 389-410.
-
(2012)
Morgan Kaufmann/Elsevier, Book Section
, vol.15
, pp. 389-410
-
-
Yu, S.1
Lou, W.2
Ren, K.3
-
123
-
-
84878475706
-
Proofs of retrievability with public verifiability and constant communication cost in cloud
-
ACM, Hangzhou, China
-
Jiawei Yuan and Shucheng Yu. 2013a. Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the International Workshop on Security in Cloud Computing. ACM, Hangzhou, China, 19-26.
-
(2013)
Proceedings of the International Workshop on Security in Cloud Computing
, pp. 19-26
-
-
Yuan, J.1
Yu, S.2
-
124
-
-
84901643136
-
Secure and constant cost public cloud storage auditing with deduplication
-
Jiawei Yuan and Shucheng Yu. 2013b. Secure and constant cost public cloud storage auditing with deduplication. IACR Cryptology ePrint Archive 2013(2013), 149.
-
(2013)
IACR Cryptology EPrint Archive
, vol.2013
, Issue.2013
, pp. 149
-
-
Yuan, J.1
Yu, S.2
-
125
-
-
78649302229
-
Cloud computing: State-of - The-art and research challenges
-
2010
-
Qi Zhang, Lu Cheng, and Raouf Boutaba. 2010. Cloud computing: State-of-the-art and research challenges. Journal of Internet Services and Applications 1, 1(2010), 7-18.
-
(2010)
Journal of Internet Services and Applications
, vol.1
, Issue.1
, pp. 7-18
-
-
Zhang, Q.1
Cheng, L.2
Boutaba, R.3
-
128
-
-
84858201794
-
Secure and efficient proof of storage with deduplication
-
ACM, San Antonio, Texas, USA
-
Qingji Zheng and Shouhuai Xu. 2012. Secure and efficient proof of storage with deduplication. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy. ACM, San Antonio, Texas, USA, 1-12. DOI: http://dx.doi.org/10.1145/2133601.2133603
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy
, pp. 1-12
-
-
Zheng, Q.1
Xu, S.2
-
131
-
-
78650008717
-
Efficient provable data possession for hybrid clouds
-
ACM, New York, NY
-
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, and Stephen S. Yau. 2010. Efficient provable data possession for hybrid clouds. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). ACM, New York, NY, 756-758.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
, pp. 756-758
-
-
Zhu, Y.1
Wang, H.2
Hu, Z.3
Ahn, G.-J.4
Hu, H.5
Yau, S.S.6
-
132
-
-
79959557055
-
Addressing cloud computing security issues
-
2012
-
Dimitrios Zissis and Dimitrios Lekkas. 2012. Addressing cloud computing security issues. Future Generation Computer Systems 28, 3(2012), 583-592.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|