메뉴 건너뛰기




Volumn , Issue , 2013, Pages

An untold story of redundant clouds: Making your service deployment truly reliable

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROVIDERS; BEST-EFFORT; CLOUD PROVIDERS; CLOUD SERVICES; INTERNET ROUTERS; POWER SOURCES; SERVICE DEPLOYMENT; SOURCE ROUTER; THIRD PARTIES; WEIGHTED NUMBER;

EID: 85165462476     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2524224.2524231     Document Type: Conference Paper
Times cited : (9)

References (39)
  • 2
    • 85165481426 scopus 로고    scopus 로고
    • Netflix. https://signup.netflix.com/.
  • 3
    • 36949029788 scopus 로고    scopus 로고
    • Towards Highly Reliable Enterprise Network Services Via Inference of Multi-level Dependencies
    • P. Bahl, R. Chandra, A. G. Greenberg, S. Kandula, D. A. Maltz, and M. Zhang. Towards Highly Reliable Enterprise Network Services Via Inference of Multi-level Dependencies. In SIGCOMM, pages 13-24, 2007.
    • (2007) SIGCOMM , pp. 13-24
    • Bahl, P.1    Chandra, R.2    Greenberg, A.G.3    Kandula, S.4    Maltz, D.A.5    Zhang, M.6
  • 6
    • 77954911824 scopus 로고    scopus 로고
    • A Self-organized, Fault-tolerant and Scalable Replication Scheme for Cloud Storage
    • N. Bonvin, T. G. Papaioannou, and K. Aberer. A Self-organized, Fault-tolerant and Scalable Replication Scheme for Cloud Storage. In SoCC, 2010.
    • (2010) SoCC
    • Bonvin, N.1    Papaioannou, T.G.2    Aberer, K.3
  • 7
    • 80052176388 scopus 로고    scopus 로고
    • Technical Report RZ3783, IBM Research, Zurich, Available at
    • C. Cachin, R. Haas, and M. Vukolic. Dependable Storage in the Intercloud. Technical Report RZ3783, IBM Research, Zurich, 2010. Available at http://domino.research.ibm.com/library/cyberdig.nsf/papers/ 630549C46339936C852577C200291E78/$File/rz3783.pdf.
    • (2010) Dependable Storage in the Intercloud
    • Cachin, C.1    Haas, R.2    Vukolic, M.3
  • 8
    • 84883271186 scopus 로고    scopus 로고
    • SplitX: High-Performance Private Analytics
    • R. Chen, I. E. Akkus, and P. Francis. SplitX: High-Performance Private Analytics. In SIGCOMM, pages 315-326, 2013.
    • (2013) SIGCOMM , pp. 315-326
    • Chen, R.1    Akkus, I.E.2    Francis, P.3
  • 9
    • 85076921594 scopus 로고    scopus 로고
    • Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions
    • X. Chen, M. Zhang, Z. M. Mao, and P. Bahl. Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. In OSDI, pages 117-130, 2008.
    • (2008) OSDI , pp. 117-130
    • Chen, X.1    Zhang, M.2    Mao, Z.M.3    Bahl, P.4
  • 11
    • 85088776320 scopus 로고    scopus 로고
    • Icebergs in the Clouds: The Other Risks of Cloud Computing
    • B. Ford. Icebergs in the Clouds: the Other Risks of Cloud Computing. In HotCloud, 2012.
    • (2012) HotCloud
    • Ford, B.1
  • 13
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. In EUROCRYPT, pages 1-19, 2004.
    • (2004) EUROCRYPT , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 16
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • L. Kissner and D. X. Song. Privacy-Preserving Set Operations. In CRYPTO, pages 241-257, 2005.
    • (2005) CRYPTO , pp. 241-257
    • Kissner, L.1    Song, D.X.2
  • 17
    • 78650877494 scopus 로고    scopus 로고
    • CloudCmp: Comparing Public Cloud Providers
    • A. Li, X. Yang, S. Kandula, and M. Zhang. CloudCmp: Comparing Public Cloud Providers. In IMC, pages 1-14, 2010.
    • (2010) IMC , pp. 1-14
    • Li, A.1    Yang, X.2    Kandula, S.3    Zhang, M.4
  • 19
    • 85101166294 scopus 로고    scopus 로고
    • Emergent (Mis)behavior vs. Complex Software Systems
    • J. C. Mogul. Emergent (Mis)behavior vs. Complex Software Systems. In EuroSys, pages 293-304, 2006.
    • (2006) EuroSys , pp. 293-304
    • Mogul, J.C.1
  • 20
    • 84961845240 scopus 로고    scopus 로고
    • DJoin: Differentially Private Join Queries over Distributed Databases
    • A. Narayan and A. Haeberlen. DJoin: Differentially Private Join Queries over Distributed Databases. In OSDI, 2012.
    • (2012) OSDI
    • Narayan, A.1    Haeberlen, A.2
  • 21
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT, pages 223-238, 1999.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 23
    • 84869436864 scopus 로고    scopus 로고
    • Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
    • N. Santos, R. Rodrigues, K. P. Gummadi, and S. Saroiu. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Santos, N.1    Rodrigues, R.2    Gummadi, K.P.3    Saroiu, S.4
  • 24
    • 85017487069 scopus 로고    scopus 로고
    • The Seven Deadly Sins of Cloud Computing Research
    • M. Schwarzkopf, D. G. Murray, and S. Hand. The Seven Deadly Sins of Cloud Computing Research. In HotCloud, 2012.
    • (2012) HotCloud
    • Schwarzkopf, M.1    Murray, D.G.2    Hand, S.3
  • 27
    • 80051900624 scopus 로고    scopus 로고
    • A Cost-Aware Elasticity Provisioning System for the Cloud
    • U. Sharma, P. Shenoy, S. Sahu, and A. Shaikh. A Cost-Aware Elasticity Provisioning System for the Cloud. In ICDCS, pages 559-570, 2011.
    • (2011) ICDCS , pp. 559-570
    • Sharma, U.1    Shenoy, P.2    Sahu, S.3    Shaikh, A.4
  • 29
    • 70349753672 scopus 로고    scopus 로고
    • Benchmarking Amazon EC2 for High-Performance Scientific Computing
    • E. Walker. Benchmarking Amazon EC2 for High-Performance Scientific Computing. USENIX Login, 33(5):18-23, 2008.
    • (2008) USENIX Login , vol.33 , Issue.5 , pp. 18-23
    • Walker, E.1
  • 30
    • 84861959172 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Secure Cloud Storage
    • C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers, 62(2):362-375, 2013.
    • (2013) IEEE Trans. Computers , vol.62 , Issue.2 , pp. 362-375
    • Wang, C.1    Chow, S.S.M.2    Wang, Q.3    Ren, K.4    Lou, W.5
  • 31
    • 77954843911 scopus 로고    scopus 로고
    • Toward Publicly Auditable Secure Cloud Data Storage Services
    • C. Wang, K. Ren, W. Lou, and J. Li. Toward Publicly Auditable Secure Cloud Data Storage Services. IEEE Network, 24(4):19-24, 2010.
    • (2010) IEEE Network , vol.24 , Issue.4 , pp. 19-24
    • Wang, C.1    Ren, K.2    Lou, W.3    Li, J.4
  • 32
    • 77953295132 scopus 로고    scopus 로고
    • Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    • C. Wang, Q. Wang, K. Ren, and W. Lou. Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing. In INFOCOM, pages 525-533, 2010.
    • (2010) INFOCOM , pp. 525-533
    • Wang, C.1    Wang, Q.2    Ren, K.3    Lou, W.4
  • 33
    • 79953294892 scopus 로고    scopus 로고
    • Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing
    • Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing. IEEE Trans. Parallel Distrib. Syst., 22(5):847-859, 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst. , vol.22 , Issue.5 , pp. 847-859
    • Wang, Q.1    Wang, C.2    Ren, K.3    Lou, W.4    Li, J.5
  • 34
    • 85072781406 scopus 로고    scopus 로고
    • Orchestrating the Deployment of Computations in the Cloud with Conductor
    • A. Wieder, P. Bhatotia, A. Post, and R. Rodrigues. Orchestrating the Deployment of Computations in the Cloud with Conductor. In NSDI, 2012.
    • (2012) NSDI
    • Wieder, A.1    Bhatotia, P.2    Post, A.3    Rodrigues, R.4
  • 36
    • 84889073577 scopus 로고    scopus 로고
    • Structural Cloud Audits that Protect Private Information
    • H. Xiao, B. Ford, and J. Feigenbaum. Structural Cloud Audits that Protect Private Information. In CCSW, 2013.
    • (2013) CCSW
    • Xiao, H.1    Ford, B.2    Feigenbaum, J.3
  • 37
    • 84858284080 scopus 로고    scopus 로고
    • Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities
    • K. Yang and X. Jia. Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities. World Wide Web, 15(4):409-428, 2012.
    • (2012) World Wide Web , vol.15 , Issue.4 , pp. 409-428
    • Yang, K.1    Jia, X.2
  • 38
    • 0020312165 scopus 로고
    • Protocols for Secure Computations (Extended Abstract)
    • A. C.-C. Yao. Protocols for Secure Computations (Extended Abstract). In FOCS, pages 160-164, 1982.
    • (1982) FOCS , pp. 160-164
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.