- P. Mell and T. Grance, âÂÂThe NIST Definition of CloudComputing,âÂÂtechnical report, NatâÂÂl Inst. of Standards andTechnology,2009.
- M. Armbrust, A. Fox, R. Griffith, A.D. Joseph, R.H. Katz,A.Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M.Zaharia, âÂÂA View of Cloud Computing,â Comm. ACM, vol. 53, no. 4,pp. 50-58, 2010.
- T. Velte, A. Velte, and R. Elsenpeter, Cloud Computing: A PracticalApproach, first ed., ch. 7. McGraw-Hill, 2010.
- [4] J. Li, M.N. Krohn, D. Mazie`res, and D. Shasha, âÂÂSecure UntrustedData Repository (SUNDR),â Operating Systems Design Implementation,pp. 121-136, 2004.
- G.R. Goodson, J.J. Wylie, G.R. Ganger, and M.K. Reiter, âÂÂEfficientByzantine-Tolerant Erasure-Coded Storage,â Proc. IntâÂÂl Conf.Dependable Systems and Networks, pp. 135-144, 2004.
- V. Kher and Y. Kim, âÂÂSecuring Distributed Storage: Challenges,Techniques, and Systems,â Proc. ACM Workshop Storage Securityand Survivability (StorageSS), V. Atluri, P. Samarati, W. Yurcik, L.Brumbaugh, and Y. Zhou, eds., pp. 9-25, 2005.
- L.N. Bairavasundaram, G.R. Goodson, S. Pasupathy, and J.Schindler, âÂÂAn Analysis of Latent Sector Errors in Disk Drives,â Proc.ACM SIGMETRICS IntâÂÂl Conf. Measurement and Modeling ofComputer Systems, L. Golubchik, M.H. Ammar, and M. Harchol-Balter, eds., pp. 289-300, 2007.
- B. Schroeder and G.A. Gibson, âÂÂDisk Failures in the Real World:What Does an MTTF of 1,000,000 Hours Mean to You?â Proc. USENIXConf. File and Storage Technologies, pp. 1-16, 2007.
- M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard,âÂÂA Cooperative Internet Backup Scheme,â Proc. USENIX Ann.Technical Conf., pp. 29-41, 2003.
- Y. Deswarte, J. Quisquater, and A. Saidane, âÂÂRemote IntegrityChecking,â Proc. Sixth Working Conf. Integrity and Internal Controlin Information Systems (IICIS), Nov. 2004.
- M. Naor and G.N. Rothblum, âÂÂThe Complexity of Online MemoryChecking,â J. ACM, vol. 56, no. 1, article 2, 2009.
- A. Juels and B.S. Kaliski Jr., âÂÂPors: Proofs of Retrievability forLarge Files,â Proc. ACM Conf. Computer and Comm. Security, P. Ning,S.D.C. di Vimercati, and P.F. Syverson, eds., pp. 584-597, 2007.
- T.J.E. Schwarz and E.L. Miller, âÂÂStore, Forget, and Check: UsingAlgebraic Signatures to Check Remotely Administered Storage,â Proc.26th IEEE IntâÂÂl Conf. Distributed Computing Systems, p. 12, 2006.
- D.L.G. Filho and P.S.L.M. Barreto, âÂÂDemonstrating DataPossession and Uncheatable Data Transfer,â IACR Cryptology ePrintArchive, vol. 2006, p. 150, 2006.
- F. Sebeô, J. Domingo-Ferrer, A. Martiônez-Ballesteô, Y. Deswarte,and J.-J. Quisquater, âÂÂEfficient Remote Data Possession Checking inCritical Information Infrastructures,â IEEE Trans. Knowledge Data Eng.,vol. 20, no. 8, pp. 1034-1038, Aug. 2008.
- G. Yamamoto, S. Oda, and K. Aoki, âÂÂFast Integrity for Large Data,âÂÂProc. ECRYPT Workshop Software Performance Enhancement forEncryption and Decryption, pp. 21-32, June 2007.
- M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, âÂÂAuditingto Keep Online Storage Services Honest,â G.C. Hunt, ed., 2007.
- C. Wang, K. Ren, W. Lou, and J. Li, âÂÂToward PubliclyAuditableecure Cloud Data Storage Services,â IEEE Network, vol. 24,no. 4, pp. 19-24, July/Aug. 2010.
- K. Yang and X. Jia, âÂÂData Storage Auditing Service in CloudComputing: Challenges, Methods and Opportunities,â World WideWeb, vol. 15, no. 4, pp. 409-428, 2012.
- G. Ateniese, R.C. Burns, R. Curtmola, J. Herring, L. Kissner, Z.N.J.Peterson, and D.X. Song, âÂÂProvable Data Possession at UntrustedStores,â P.F. Syverson, eds., pp. 598-609, 2007.
- H. Shacham and B. Waters, âÂÂCompact Proofs of Retrievability,âÂÂProc. 14th IntâÂÂl Conf. Theory and Application of Cryptology andInformation Security: Advances in Cryptology, J. Pieprzyk, ed., pp. 90-107, 2008.
- C.C. Erway, A. Kuè pcøuè , C. Papamanthou, and R. Tamassia,âÂÂDynamic Provable Data Possession,â Proc. ACM Conf. Computerand Comm. Security, A.D. Keromytis, eds., pp. 213-222, 2009.
- Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, âÂÂEnabling PublicAuditability and Data Dynamics for Storage Security in CloudComputing,â IEEE Trans. Parallel Distributed Systems, vol. 22, no. 5,pp. 847-859, May 2011.
- C. Wang, Q. Wang, K. Ren, and W. Lou, âÂÂPrivacy-PreservingPublic Auditing for Data Storage Security in Cloud Computing,â Proc.IEEE INFOCOM, pp. 525-533, 2010.
- Y. Zhu, H. Hu, G. Ahn, and M. Yu, âÂÂCooperative Provable DataPossession for Integrity Verification in Multi-Cloud Storage,â IEEETrans. Parallel and Distributed Systems, vol. 23, no. 12, pp. 2231-2244,Dec. 2012.
- Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S.S. Yau,âÂÂDynamic Audit Services for Integrity Verification of OutsourcedStorages in Clouds,â Proc. ACM Symp. Applied Computing, W.C. Chu,W.E. Wong, M.J. Palakal, and C.-C. Hung, eds., pp. 1550-1557, 2011.
- K. Zeng, âÂÂPublicly Verifiable Remote Data Integrity,â Proc. 10thIntâÂÂl Conf. Information and Comm. Security, L. Chen, M.D. Ryan, andG. Wang, eds., pp. 419-434, 2008.
- G. Ateniese, S. Kamara, and J. Katz, âÂÂProofs of Storage fromHomomorphic Identification Protocols,â Proc. IntâÂÂl Conf. Theory andApplication of Cryptology and Information Security: Advances inCryptology, M. Matsui, ed., pp. 319-333, 2009.
|