- P. Mell and T. Grance, âÃâ¬ÃÅThe NIST Definition of CloudComputing,âÃâ¬ÃÂtechnical report, NatâÃâ¬Ãâ¢l Inst. of Standards andTechnology,2009.
- M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz,A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, âÃâ¬ÃÅA View of Cloud Computing,âÃâ¬Ã Comm. ACM, vol. 53, no. 4,pp. 50-58, 2010.
- T. Velte, A. Velte, and R. Elsenpeter, Cloud Computing: A PracticalApproach, first ed., ch. 7. McGraw-Hill, 2010.
- [4] J. Li, M.N. Krohn, D. Mazie`res, and D. Shasha, âÃâ¬ÃÅSecure UntrustedData Repository (SUNDR),âÃâ¬Ã Operating Systems Design Implementation,pp. 121-136, 2004.
- G.R. Goodson, J.J. Wylie, G.R. Ganger, and M.K. Reiter, âÃâ¬ÃÅEfficientByzantine-Tolerant Erasure-Coded Storage,âÃâ¬Ã Proc. IntâÃâ¬Ãâ¢l Conf.Dependable Systems and Networks, pp. 135-144, 2004.
- V. Kher and Y. Kim, âÃâ¬ÃÅSecuring Distributed Storage: Challenges,Techniques, and Systems,âÃâ¬Ã Proc. ACM Workshop Storage Securityand Survivability (StorageSS), V. Atluri, P. Samarati, W. Yurcik, L.Brumbaugh, and Y. Zhou, eds., pp. 9-25, 2005.
- L.N. Bairavasundaram, G.R. Goodson, S. Pasupathy, and J.Schindler, âÃâ¬ÃÅAn Analysis of Latent Sector Errors in Disk Drives,âÃâ¬Ã Proc.ACM SIGMETRICS IntâÃâ¬Ãâ¢l Conf. Measurement and Modeling ofComputer Systems, L. Golubchik, M.H. Ammar, and M. Harchol-Balter, eds., pp. 289-300, 2007.
- B. Schroeder and G.A. Gibson, âÃâ¬ÃÅDisk Failures in the Real World:What Does an MTTF of 1,000,000 Hours Mean to You?âÃâ¬Ã Proc. USENIXConf. File and Storage Technologies, pp. 1-16, 2007.
- M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard,âÃâ¬ÃÅA Cooperative Internet Backup Scheme,âÃâ¬Ã Proc. USENIX Ann.Technical Conf., pp. 29-41, 2003.
- Y. Deswarte, J. Quisquater, and A. Saidane, âÃâ¬ÃÅRemote IntegrityChecking,âÃâ¬Ã Proc. Sixth Working Conf. Integrity and Internal Controlin Information Systems (IICIS), Nov. 2004.
- M. Naor and G.N. Rothblum, âÃâ¬ÃÅThe Complexity of Online MemoryChecking,âÃâ¬Ã J. ACM, vol. 56, no. 1, article 2, 2009.
- A. Juels and B.S. Kaliski Jr., âÃâ¬ÃÅPors: Proofs of Retrievability forLarge Files,âÃâ¬Ã Proc. ACM Conf. Computer and Comm. Security, P. Ning,S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 584-597, 2007.
- T.J.E. Schwarz and E.L. Miller, âÃâ¬ÃÅStore, Forget, and Check: UsingAlgebraic Signatures to Check Remotely Administered Storage,âÃâ¬Ã Proc.26th IEEE IntâÃâ¬Ãâ¢l Conf. Distributed Computing Systems, p. 12, 2006.
- D.L.G. Filho and P.S.L.M. Barreto, âÃâ¬ÃÅDemonstrating DataPossession and Uncheatable Data Transfer,âÃâ¬Ã IACR Cryptology ePrintArchive, vol. 2006, p. 150, 2006.
- F. SebeÃâô, J. Domingo-Ferrer, A. MartiÃâônez-BallesteÃâô, Y. Deswarte,and J.-J. Quisquater, âÃâ¬ÃÅEfficient Remote Data Possession Checking inCritical Information Infrastructures,âÃâ¬Ã IEEE Trans. Knowledge Data Eng.,vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
- G. Yamamoto, S. Oda, and K. Aoki, âÃâ¬ÃÅFast Integrity for Large Data,âÃâ¬ÃÂProc. ECRYPT Workshop Software Performance Enhancement forEncryption and Decryption, pp. 21-32, June 2007.
- M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, âÃâ¬ÃÅAuditingto Keep Online Storage Services Honest,âÃâ¬Ã G.C. Hunt, ed., 2007.
- C. Wang, K. Ren, W. Lou, and J. Li, âÃâ¬ÃÅToward PubliclyAuditableecure Cloud Data Storage Services,âÃâ¬Ã IEEE Network, vol. 24,no. 4, pp. 19-24, July/Aug. 2010.
- K. Yang and X. Jia, âÃâ¬ÃÅData Storage Auditing Service in CloudComputing: Challenges, Methods and Opportunities,âÃâ¬Ã World WideWeb, vol. 15, no. 4, pp. 409-428, 2012.
- G. Ateniese, R.C. Burns, R. Curtmola, J. Herring, L. Kissner, Z.N.J.Peterson, and D.X. Song, âÃâ¬ÃÅProvable Data Possession at UntrustedStores,âÃâ¬Ã P.F. Syverson, eds., pp. 598-609, 2007.
- H. Shacham and B. Waters, âÃâ¬ÃÅCompact Proofs of Retrievability,âÃâ¬ÃÂProc. 14th IntâÃâ¬Ãâ¢l Conf. Theory and Application of Cryptology andInformation Security: Advances in Cryptology, J. Pieprzyk, ed., pp. 90-107, 2008.
- C.C. Erway, A. KuÃâè pcÃâøuÃâè , C. Papamanthou, and R. Tamassia,âÃâ¬ÃÅDynamic Provable Data Possession,âÃâ¬Ã Proc. ACM Conf. Computerand Comm. Security, A.D. Keromytis, eds., pp. 213-222, 2009.
- Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, âÃâ¬ÃÅEnabling PublicAuditability and Data Dynamics for Storage Security in CloudComputing,âÃâ¬Ã IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5,pp. 847-859, May 2011.
- C. Wang, Q. Wang, K. Ren, and W. Lou, âÃâ¬ÃÅPrivacy-PreservingPublic Auditing for Data Storage Security in Cloud Computing,âÃâ¬Ã Proc.IEEE INFOCOM, pp. 525-533, 2010.
- Y. Zhu, H. Hu, G. Ahn, and M. Yu, âÃâ¬ÃÅCooperative Provable DataPossession for Integrity Verification in Multi-Cloud Storage,âÃâ¬Ã IEEETrans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244,Dec. 2012.
- Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau,âÃâ¬ÃÅDynamic Audit Services for Integrity Verification of OutsourcedStorages in Clouds,âÃâ¬Ã Proc. ACM Symp. Applied Computing, W.C. Chu,W.E. Wong, M.J. Palakal, and C.-C. Hung, eds., pp. 1550-1557, 2011.
- K. Zeng, âÃâ¬ÃÅPublicly Verifiable Remote Data Integrity,âÃâ¬Ã Proc. 10thIntâÃâ¬Ãâ¢l Conf. Information and Comm. Security, L. Chen, M.D. Ryan, andG. Wang, eds., pp. 419-434, 2008.
- G. Ateniese, S. Kamara, and J. Katz, âÃâ¬ÃÅProofs of Storage fromHomomorphic Identification Protocols,âÃâ¬Ã Proc. IntâÃâ¬Ãâ¢l Conf. Theory andApplication of Cryptology and Information Security: Advances inCryptology, M. Matsui, ed., pp. 319-333, 2009.
|