Accesso libero

Overview of current techniques in remote data auditing

 e    | 28 gen 2016
INFORMAZIONI SU QUESTO ARTICOLO

Cita

P. Mell and T. Grance. (2009), Draft nist working definition of cloud computing, Referenced on June.3rd, http://csrc.nist.gov/groups/SNS/cloud-computing/index.html.MellP.GranceT.2009Draft nist working definition of cloud computing, Referenced on June.3rdhttp://csrc.nist.gov/groups/SNS/cloud-computing/index.htmlSearch in Google Scholar

R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic. (2009), Cloud computing and emerging IT platforms: vision, hype, reality for delivering computing as the 5th utility, Future Gen. Comput. Syst., 25(6), 599-616. 10.1016/j.future.2008.12.001BuyyaR.YeoC.S.VenugopalS.BrobergJ.BrandicI.2009Cloud computing and emerging IT platforms: vision, hype, reality for delivering computing as the 5th utilityFuture Gen. Comput. Syst25659961610.1016/j.future.2008.12.001Open DOISearch in Google Scholar

C. Wang, Q. Wang, K. Ren, and W. Lou. (2010), Privacy-preserving public auditing for data storage security in cloud computing, Proc.IEEE INFOCOM’10, Mar., 2010, San Diego, CA, Publisher: IEEE, pp: 1-9. 10.1109/INFCOM.2010.5462173WangC.WangQ.RenK.LouW.2010Privacy-preserving public auditing for data storage security in cloud computingProc.IEEE INFOCOM’10Mar2010San Diego, CAPublisher: IEEE1910.1109/INFCOM.2010.5462173Open DOISearch in Google Scholar

Cloud security alliance, Top threats to cloud computing, http://www.cloudsecurityalliance.org, 2010.Cloud security alliance, Top threats to cloud computinghttp://www.cloudsecurityalliance.org2010Search in Google Scholar

P. Mell and T. Grance. (2010), The NIST definition of cloud computing, Version 15, 10-7-09, http://www.wheresmyserver.co.nz/storage/media/faq-files/cloud-def-v15.pdf.MellP.GranceT.2010The NIST definition of cloud computing, Version 15, 10-7-09http://www.wheresmyserver.co.nz/storage/media/faq-files/cloud-def-v15.pdfSearch in Google Scholar

Gartner: Seven cloud-computing security risks. InfoWorld. 2008-07-02. http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputing-security-risks-853.Gartner: Seven cloud-computing security risks. InfoWorld. 2008-07-02http://www.infoworld.com/d/security-central/gartner-seven-cloudcomputing-security-risks-853Search in Google Scholar

Cloud security alliance. http://www.cloudsecurityalliance.orgCloud security alliancehttp://www.cloudsecurityalliance.orgSearch in Google Scholar

S. Subashini, V. Kavitha. (2011), A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 34, 1-11. 10.1016/j.jnca.2010.07.006SubashiniS.KavithaV.2011A survey on security issues in service delivery models of cloud computingJournal of Network and Computer Applications3411110.1016/j.jnca.2010.07.006Open DOISearch in Google Scholar

Amazon.com, Amazon s3 Availability Event: July 20, 2008; http:/status.aws.amazon.com/s3-20080720.htmlAmazon.comAmazon s3 Availability EventJuly 20, 2008http:/status.aws.amazon.com/s3-20080720.htmlSearch in Google Scholar

M. Arrington, G. Disaster. (2006), Reports of mass email deletions, Dec. 2006, http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-massemail-deletions/ArringtonM.DisasterG.2006Reports of mass email deletionsDec2006http://www.techcrunch.com/2006/12/28/gmail-disaster-reports-of-massemail-deletions/Search in Google Scholar

M. Krigsman. (2008), Apple’s MobileMe Experiences Post-Launch Pain, July 2008; http://blogs.zdnet.com/projectfailures/?p=908KrigsmanM.2008Apple’s MobileMe Experiences Post-Launch PainJuly2008http://blogs.zdnet.com/projectfailures/?p=908Search in Google Scholar

A. Juels, J. Burton, and S.Kaliski. (2007), PROs: proofs of retrievability for large files, Proc. ACM CCS 07, Oct. 2007, pp. 584-597.JuelsA.BurtonJ.KaliskiS.2007PROs: proofs of retrievability for large filesProc. ACM CCS 07Oct2007584597Search in Google Scholar

G. Ateniese, R. Burns, R. Curtmola, J, Herring, L. Kissner, Z. Peterson, D. Song, Provable data possession at untrusted stores, CCS’07, October 29-November 2, 2007, Alexandria, Virginia, USA. 2007, pp. 598-609.AtenieseG.BurnsR.CurtmolaR.HerringJ.KissnerL.PetersonZ.SongD.Provable data possession at untrusted stores, CCS’07October 29-November 2, 2007AlexandriaVirginia, USA200759860910.1145/1315245.1315318Search in Google Scholar

M. Lynch. (2008), The cloud wars: 100+ billion at stake, Merrill Lynch.LynchM.2008The cloud wars: 100+ billion at stakeMerrill LynchSearch in Google Scholar

G. Ateniese, R. Burns, R. Curtmola, J. Herring, O. Khan, L. Kissner, Z. Peterson, and D. Song. (2011), Remote data checking using provable data possession, ACM Trans. Inf. Syst. Secur., 14(1)(2011)1-34, 10.1145/1952982.1952994AtenieseG.BurnsR.CurtmolaR.HerringJ.KhanO.KissnerL.PetersonZ.SongD.2011Remote data checking using provable data possession, ACM TransInf. Syst. Secur141201113410.1145/1952982.1952994Open DOISearch in Google Scholar

J. Kincaid. (2008), MediaMax/TheLinkup closes its doors, http://www.techcrunch.com/2008/07/10/mediamaxthelinkupclosesits-doorsKincaidJ.2008MediaMax/TheLinkup closes its doorshttp://www.techcrunch.com/2008/07/10/mediamaxthelinkupclosesits-doorsSearch in Google Scholar

M. Sookhak, A. Akhunzada, A. Gani, M.K. Khan, and N.B. Anuar. (2014), Towards dynamic remote data auditing in computational clouds, The Scientific World Journal, Volume 2014, Article ID 269357, 12 pages http://dx.doi.org/10.1155/2014/269357SookhakM.AkhunzadaA.GaniA.KhanM.K.AnuarN.B.2014Towards dynamic remote data auditing in computational cloudsThe Scientific World Journal, Volume 2014, Article ID 269357, 12 pageshttp://dx.doi.org/10.1155/2014/26935710.1155/2014/269357412100525121114Open DOISearch in Google Scholar

C. Wang, K. Wang, W. Ren, and J. Li. (2011), Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Transactions on Parallel and Distributed Systems, 22(5), 847-859. 10.1109/TPDS.2010.183WangC.WangK.RenW.LiJ.2011Enabling public auditability and data dynamics for storage security in cloud computingIEEE Transactions on Parallel and Distributed Systems22584785910.1109/TPDS.2010.183Open DOISearch in Google Scholar

G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z.Peterson, and D. Song. (2007), Provable Data Possession at Untrusted Stores, Proc. 14th ACM Conf. Computer and Comm. Security (CCS 07), 598-609, 10.1145/1315245.1315318AtenieseBurnsR.CurtmolaR.HerringJ.KissnerL.PetersonZ.SongD.2007Provable Data Possession at Untrusted StoresProc. 14th ACM Conf. Computer and Comm. Security (CCS 07)59860910.1145/1315245.1315318Open DOISearch in Google Scholar

M.A. Shah, R. Swaminathan, and M. Baker. (2008), Privacy-preserving audit and extraction of digital contents, Cryptology ePrint Archive, Report 2008/186.ShahM.A.SwaminathanR.BakerM.2008Privacy-preserving audit and extraction of digital contentsCryptology ePrint Archive, Report 2008/186Search in Google Scholar

Y. Liu and V. Vlassov. (2013), Replication in distributed storage systems: state of the art, possible directions, and open issues, In International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE, 2013, pp. 225-232, 10.1109/CyberC.2013.44LiuY.VlassovV.2013Replication in distributed storage systems: state of the art, possible directions, and open issuesIn International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery. IEEE201322523210.1109/CyberC.2013.44Open DOISearch in Google Scholar

G. Agrawal and P. Jalote. (1995), Coding-based replication schemes for distributed systems, IEEE Transactions on Parallel and Distributed Systems, 6(3), 240-251, 10.1109/71.372774AgrawalG.JaloteP.1995Coding-based replication schemes for distributed systemsIEEE Transactions on Parallel and Distributed Systems6324025110.1109/71.372774Open DOISearch in Google Scholar

B. Chen, R. Curtmola, G. Ateniese, and R. Burns. (2010), Remote data checking for network coding-based distributed storage systems, CCSW’10, October 8, 2010, Chicago, Illinois, USA, pp. 31-42. 10.1145/1866835.1866842ChenB.CurtmolaR.AtenieseG.BurnsR.2010Remote data checking for network coding-based distributed storage systemsCCSW’10October 8, 2010ChicagoIllinois, USA314210.1145/1866835.1866842Open DOISearch in Google Scholar

Osipkov, P. Wang, and N. Hopper. (2006), Robust accounting in decentralized P2P storage systems, In IEEE International Conference on Distributed Computing Systems, 14 pages. 10.1109/ICDCS.2006.71OsipkovP. WangHopperN.2006Robust accounting in decentralized P2P storage systemsIn IEEE International Conference on Distributed Computing Systems, 14 pages10.1109/ICDCS.2006.71Open DOISearch in Google Scholar

A.F. Barsoum and M.A. Hasan. (2010), Provable possession and replication of data over cloud servers, Centre For Applied Cryptographic Research (CACR), University of Waterloo, Report, 32, 1-36.BarsoumA.F.HasanM.A.2010Provable possession and replication of data over cloud serversCentre For Applied Cryptographic Research (CACR)University of Waterloo32136Search in Google Scholar

R. Mukundan, S. Madria, M. Linderman, and N.Y. Rome. (2012), Replicated data integrity verification in cloud, The Bulletin of the Technical Committee on Data Engineering, pp. 55-65.MukundanR.MadriaS.LindermanM.RomeN.Y.2012Replicated data integrity verification in cloudThe Bulletin of the Technical Committee on Data Engineering5565Search in Google Scholar

D. Xiao, Y. Yang, W.B. Yao, C.H. Wu, J.Y. Liu, and Y.X. Yang. (2012), Multiple-file remote data checking for cloud storage, Computers Security, 31(2), 192-205, 10.1016/j.cose.2011.12.005XiaoD.YangY.YaoW.B.WuC.H.LiuJ.Y.YangY.X.2012Multiple-file remote data checking for cloud storageComputers Security31219220510.1016/j.cose.2011.12.005Open DOISearch in Google Scholar

J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. (2000), OceanStore: an architecture for global-scale persistent storage, SIGPLAN Not., 35(11), 190-201.KubiatowiczJ.BindelD.ChenY.CzerwinskiS.EatonP.GeelsD.GummadiR.RheaS.WeatherspoonH.WeimerW.WellsC.ZhaoB.2000OceanStore: an architecture for global-scale persistent storageSIGPLAN Not351119020110.1145/378993.379239Search in Google Scholar

S. Changho and K. Ramchandran. (2010), Exact-repair MDS codes for distributed storage using interference alignment, In IEEE International Symposium on Information Theory Proceedings, pp. 161-165, 10.1109/ISIT.2010.5513263ChanghoS.RamchandranK.2010Exact-repair MDS codes for distributed storage using interference alignmentIn IEEE International Symposium on Information Theory Proceedings16116510.1109/ISIT.2010.5513263Open DOISearch in Google Scholar

M.Q. Li and J.W. Shu, (2010), DACO: A high-performance disk architecture designed specially for large-scale erasure-coded storage systems, IEEE Trans. Comput., 59(10),1350-1362, 10.1109/TC.2010.22LiM.Q.ShuJ.W.2010DACO: A high-performance disk architecture designed specially for large-scale erasure-coded storage systemsIEEE Trans. Comput59101350136210.1109/TC.2010.22Open DOISearch in Google Scholar

H. Wang. (2013), Proxy provable data possession in public clouds, IEEE Transactions on Services Computing, 6, 551-559. 10.1109/TSC.2012.35WangH.2013Proxy provable data possession in public cloudsIEEE Transactions on Services Computing655155910.1109/TSC.2012.35Open DOISearch in Google Scholar

A.G. Dimakis, P. B. Godfrey, Y. Wu, M.J. Wainwright, and K. Ramchandran. (2010), Network coding for distributed storage systems. IEEE Transactions on Information Theory, 56(9), 4539-4551, 10.1109/INFCOM.2007.232DimakisA.G.GodfreyP. B.WuY.WainwrightM.J.RamchandranK.2010Network coding for distributed storage systemsIEEE Transactions on Information Theory5694539455110.1109/INFCOM.2007.232Open DOISearch in Google Scholar

A.G. Dimakis, K. Ramchandran, Y. Wu, and S. Changho. (2011), A survey on network codes for distributed storage, Proc. IEEE, 99(3), 476-489. 10.1109/JPROC.2010.2096170DimakisA.G.RamchandranK.WuY.ChanghoS.2011A survey on network codes for distributed storageProc. IEEE99347648910.1109/JPROC.2010.2096170Open DOISearch in Google Scholar

X.L. Zhang, G. Neglia, and J. Kurose. (2012), Chapter 10-Network coding in disruption tolerant networks, Academic Press, Boston, 2012, pp. 267-308, 10.1016/B978-0-12-380918-6.00010-XZhangX.L.NegliaG.KuroseJ.2012Chapter 10-Network coding in disruption tolerant networksAcademic PressBoston201226730810.1016/B978-0-12-380918-6.00010-XOpen DOISearch in Google Scholar

P. F. Oliveira, L. Lima, T. T. V. Vinhoza, J. Barros, and M. Medard. (2012), Coding for trusted storage in untrusted networks, IEEE Transactions on Information Forensics and Security, 7(6), 1890-1899, 10.1109/TIFS.2012.2217331OliveiraP. F.LimaL.VinhozaT. T. V.BarrosJ.MedardM.2012Coding for trusted storage in untrusted networksIEEE Transactions on Information Forensics and Security761890189910.1109/TIFS.2012.2217331Open DOISearch in Google Scholar

L. Anh and A. Markopoulou. (2012), NC-Audit: Auditing for network coding storage, In International Symposium on Network Coding (NetCod), pp. 155-160. 10.1109/NETCOD.2012.6261901AnhL.MarkopoulouA.2012NC-Audit: Auditing for network coding storageIn International Symposium on Network Coding (NetCod)15516010.1109/NETCOD.2012.6261901Open DOISearch in Google Scholar

D. Cash, A. Kupcu, and D. Wichs. (2012), Dynamic proofs of retrievability via oblivious RAM, IACR Cryptology ePrint Archive, 2012, pp. 550-550, 10.1007/978-3-642-38348-9_17CashD.KupcuA.WichsD.2012Dynamic proofs of retrievability via oblivious RAMIACR Cryptology ePrint Archive201255055010.1007/978-3-642-38348-9_17Open DOISearch in Google Scholar

S. Agrawal and D. Boneh. (2009), Homomorphic MACs: MAC-based integrity for network coding, In 7th International Conference on Applied Cryptography and Network Security (Lecture Notes in Computer Science), Publisher: Springer, 5536, 292-305, 10.1007/978-3-642-01957-9_18AgrawalS.BonehD.2009Homomorphic MACs: MAC-based integrity for network codingIn 7th International Conference on Applied Cryptography and Network Security (Lecture Notes in Computer Science), PublisherSpringer553629230510.1007/978-3-642-01957-9_18Open DOISearch in Google Scholar

N. Mandagere, P. Zhou, M.A Smith, and S. Uttamchandani. (2008), Demystifying data deduplication, Demystifying Data Deduplication, 4, 1-9.MandagereN.ZhouP.SmithM.AUttamchandaniS.2008Demystifying data deduplication, Demystifying Data Deduplication41910.1145/1462735.1462739Search in Google Scholar

D.T. Meyer and W.J. Bolosky. (2012), A study of practical deduplication, Trans. Storage, 7(4), 1-20, 10.1145/2078861.2078864MeyerD.T.BoloskyW.J.2012A study of practical deduplicationTrans. Storage7412010.1145/2078861.2078864Open DOISearch in Google Scholar

S. Sakr, A. Liu, and A.G. Fayoumi. (2013), The family of mapreduce and large-scale data processing systems, ACM Comput. Surv., 46(1), 1-44, 10.1145/2522968.2522979SakrS.LiuA.FayoumiA.G.2013The family of mapreduce and large-scale data processing systemsACM Comput. Surv46114410.1145/2522968.2522979Open DOISearch in Google Scholar

E. Naone. (2010), What twitter learns from all those tweets, http://www. technologyreview.com/view/420968/what-twitter-learns-from-all-those-tweets/.NaoneE.2010What twitter learns from all those tweetshttp://www.technologyreview.com/view/420968/what-twitter-learns-from-all-those-tweets/Search in Google Scholar

eISSN:
2444-8656
Lingua:
Inglese
Frequenza di pubblicazione:
2 volte all'anno
Argomenti della rivista:
Life Sciences, other, Mathematics, Applied Mathematics, General Mathematics, Physics