Main Article Content
Abstract
Keywords
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
References
- M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M.
- Isard, “A Cooperative Internet Backup Scheme,†Proc. of the 2003 USENIX Annual Technical Conference (General Track), 29–41, 2003.
- K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,†Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
- L. Carter and M. Wegman, “Universal Hash Functions,†Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979. DOI: https://doi.org/10.1016/0022-0000(79)90044-8
- J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasure coded Data,†Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007. DOI: https://doi.org/10.1145/1281100.1281122
- B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster, “Virtual infrastructure management in private and hybrid clouds,†IEEE Internet omputing, vol. 13, no. 5, pp.14–22, 2009. DOI: https://doi.org/10.1109/MIC.2009.119
- G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,†in Proceedings of the 4th international conference on Security and privacy in communication networks, Secure Comm., 2008, pp. 1–10. DOI: https://doi.org/10.1145/1460877.1460889
- Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal “Market- Oriented Cloud Computing:Vision, Hype, and Reality for Delivering IT Services as Computing
- Utilities†The 10th IEEE International Conference on HighPerformance Computing and Communications , pp.10 Table 1
- Christopher Moretti, Jared Bulosan, Douglas Thain, and Patrick J.Flynn, “All-Pairs: An Abstraction for Data-Intensive CloudComputingâ€, Parallel and Distributed Processing, 2008. IEEE International Symposium DOI: https://doi.org/10.1109/IPDPS.2008.4536311
References
M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M.
Isard, “A Cooperative Internet Backup Scheme,†Proc. of the 2003 USENIX Annual Technical Conference (General Track), 29–41, 2003.
K. D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,†Cryptology ePrint Archive, Report 2008/489, 2008, http://eprint.iacr.org/.
L. Carter and M. Wegman, “Universal Hash Functions,†Journal of Computer and System Sciences, vol. 18, no. 2, pp. 143–154, 1979. DOI: https://doi.org/10.1016/0022-0000(79)90044-8
J. Hendricks, G. Ganger, and M. Reiter, “Verifying Distributed Erasure coded Data,†Proc. 26th ACM Symposium on Principles of Distributed Computing, pp. 139–146, 2007. DOI: https://doi.org/10.1145/1281100.1281122
B. Sotomayor, R. S. Montero, I. M. Llorente, and I. T. Foster, “Virtual infrastructure management in private and hybrid clouds,†IEEE Internet omputing, vol. 13, no. 5, pp.14–22, 2009. DOI: https://doi.org/10.1109/MIC.2009.119
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,†in Proceedings of the 4th international conference on Security and privacy in communication networks, Secure Comm., 2008, pp. 1–10. DOI: https://doi.org/10.1145/1460877.1460889
Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal “Market- Oriented Cloud Computing:Vision, Hype, and Reality for Delivering IT Services as Computing
Utilities†The 10th IEEE International Conference on HighPerformance Computing and Communications , pp.10 Table 1
Christopher Moretti, Jared Bulosan, Douglas Thain, and Patrick J.Flynn, “All-Pairs: An Abstraction for Data-Intensive CloudComputingâ€, Parallel and Distributed Processing, 2008. IEEE International Symposium DOI: https://doi.org/10.1109/IPDPS.2008.4536311