Access the full text.
Sign up today, get DeepDyve free for 14 days.
Jean-Philippe Martin, L. Alvisi, M. Dahlin (2002)
Minimal Byzantine Storage
Hussam Abu-Libdeh, L. Princehouse, Hakim Weatherspoon (2010)
RACS: a case for cloud storage diversity
Melvin Greer (2010)
Survivability and information assurance in the cloud2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)
Dalia Malki, M. Reiter (1997)
Byzantine quorum systemsDistributed Computing, 11
James Hamilton (2007)
On Designing and Deploying Internet-Scale Services
M. Brantner, D. Florescu, David Graf, Donald Kossmann, Tim Kraska (2008)
Building a database on S3
A. Shraer, C. Cachin, Asaf Cidon, I. Keidar, Yan Michalevsky, Dani Shaket (2010)
Venus: verification for untrusted cloud storage
A. Shamir (1979)
How to share a secretCommun. ACM, 22
M. Hanley, Tyler Dean, Will Schroeder, Matt Houy, Randall Trzeciak, J. Montelibano (2011)
An Analysis of Technical Observations in Insider Theft of Intellectual Property Cases
S. Weil, S. Brandt, E. Miller, D. Long, C. Maltzahn (2006)
Ceph: a scalable, high-performance distributed file system
M. Herlihy, Jeannette Wing (1990)
Linearizability: a correctness condition for concurrent objectsACM Trans. Program. Lang. Syst., 12
(2012)
Received March
(2011)
The 10 worst cloud outages (and what we can learn from them). Infoworld. Available at http://www.infoworld.com/d/cloud-computing/ the-10-worst-cloud-outages-and-what-we-can-learn-them-902
Ariel Feldman, W. Zeller, M. Freedman, E. Felten (2010)
SPORC: Group Collaboration using Untrusted Cloud Resources
(2001)
Digital Object Identifier (DOI) 10.1007/s00446-002-0070-8 c ○ Springer-Verlag 2003 Disk Paxos
Ittai Abraham, G. Chockler, I. Keidar, Dalia Malki (2004)
Byzantine disk paxos: optimal resilience with byzantine shared memoryDistributed Computing, 18
D. Terry, A. Demers, K. Petersen, M. Spreitzer, M. Theimer, B. Welch (1994)
Session guarantees for weakly consistent replicated dataProceedings of 3rd International Conference on Parallel and Distributed Information Systems
D. Patterson, Garth Gibson, R. Katz (1988)
A case for redundant arrays of inexpensive disks (RAID)
M. Dahlin, Bharat Chandra, L. Gao, A. Nayate (2001)
End-to-end WAN service availabilityIEEE/ACM Trans. Netw., 11
M. Herlihy, Victor Luchangco, Mark Moir (2003)
Obstruction-free synchronization: double-ended queues as an example23rd International Conference on Distributed Computing Systems, 2003. Proceedings.
(2009)
Microsoft says lost sidekick data will be restored to users
Garth Goodson, Jay Wylie, G. Ganger, M. Reiter (2004)
Efficient Byzantine-tolerant erasure-coded storageInternational Conference on Dependable Systems and Networks, 2004
B. Liskov, R. Rodrigues (2006)
Tolerating Byzantine Faulty Clients in a Quorum System26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
M. Storer, K. Greenan, E. Miller, K. Voruganti (2007)
POTSHARDS: Secure Long-Term Storage Without Encryption
J. McCullough, John Dunagan, A. Wolman, A. Snoeren (2010)
Stout: An Adaptive Interface to Scalable Cloud Storage
S. Ghemawat, H. Gobioff, Shun-Tak Leung (2003)
The Google file systemOperating Systems Review
A. Bessani, E. Alchieri, M. Correia, J. Fraga (2008)
DepSpace: a byzantine fault-tolerant coordination service
Michael Vrable, S. Savage, G. Voelker (2012)
BlueSky: a cloud-backed file system for the enterprise
Leslie Lamport (1986)
On interprocess communicationDistributed Computing, 1
G. Chockler, R. Guerraoui, I. Keidar, M. Vukolic (2009)
Reliable Distributed StorageComputer, 42
P. Jayanti, T. Chandra, S. Toueg (1992)
Fault-tolerant wait-free shared objectsProceedings., 33rd Annual Symposium on Foundations of Computer Science
M. Dekker (2013)
Critical Cloud Computing. A CIIP perspective on cloud computing services
M. Vukolic (2010)
The byzantine empire in the intercloudSIGACT News, 41
Kevin Bowers, A. Juels, Alina Oprea (2009)
HAIL: a high-availability and integrity layer for cloud storage
M. May (2010)
Forecast calls for clouds over biological computingNature Medicine, 16
H. Attiya, Amir Bar-Or (2003)
Sharing memory with semi-Byzantine clients and faulty storage servers22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings.
Michael Vrable, S. Savage, G. Voelker (2009)
Cumulus: Filesystem backup to the cloud
R. Kotla, L. Alvisi, M. Dahlin (2007)
SafeStore: A Durable and Practical Storage System
(2013)
ACM Transactions on Storage
C. Cachin, Stefano Tessaro (2005)
Optimal Resilience for Erasure-Coded Byzantine Distributed StorageInternational Conference on Dependable Systems and Networks (DSN'06)
H. Krawczyk (1994)
Secret Sharing Made Short
Prince Mahajan, Srinath Setty, Sangmin Lee, Allen Clement, L. Alvisi, M. Dahlin, Michael Walfish (2010)
Depot: Cloud Storage with Minimal TrustACM Trans. Comput. Syst., 29
T. Schwarz, E. Miller (2006)
Peer Reviewed Title: Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage
(2013)
Article 00, Publication date
M. Rabin (1989)
Efficient dispersal of information for security, load balancing, and fault toleranceJ. ACM, 36
D. Mills (1992)
Network Time Protocol (Version 3) Specification, Implementation and AnalysisRFC, 1305
L. Lamport, R. Shostak, M. Pease (1982)
The Byzantine Generals ProblemACM Trans. Program. Lang. Syst., 4
Cristina Basescu, C. Cachin, Ittay Eyal, R. Haas, A. Sorniotti, M. Vukolic, Ido Zachevsky (2011)
Robust data sharing with key-value storesIEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012)
(2010)
Amazon S3 FAQ: What data consistency model does amazon S3 employ? http://aws.amazon.com/s3/ faqs
(2011)
Amazon simple storage service faqs
Alyssa Henry (2009)
Keynote Address: Cloud Storage {FUD} (Failure, Uncertainty, and Durability)
(2009)
DDoS attack rains down on Amazon cloud
W. Vogels (2008)
Eventually consistentCommun. ACM, 52
Berry Schoenmakers (1999)
A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic
(2010)
Project TCLOUDS – trustworthy clouds -privacy and resilience for Internet-scale critical infrastructure. http:// www.tclouds-project
D. Mills (1992)
Network Time Protocol (Version 3) Specification, Implementation
G. Chockler, Dalia Malki (2002)
Active Disk Paxos with infinitely many processesDistributed Computing, 18
Dalia Malki, M. Reiter (1998)
Secure and scalable replication in PhalanxProceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)
E. Alchieri, A. Bessani, J. Fraga (2008)
A Dependable Infrastructure for Cooperative Web Services Coordination2008 IEEE International Conference on Web Services
Kiran-Kumar Muniswamy-Reddy, P. Macko, M. Seltzer (2010)
Provenance for the Cloud
(2007)
Jerasure : A library in C / C + + facilitating erasure coding for storage applications
(2009)
Are we safeguarding social data?
James Hendricks, G. Ganger, M. Reiter (2007)
Low-overhead byzantine fault-tolerant storage
R. Buyya, Toni Cortes, Hai Jin (2002)
A CostEffective, HighBandwidth Storage Architecture
P. Hunt, M. Konar, F. Junqueira, B. Reed (2010)
ZooKeeper: Wait-free Coordination for Internet-scale Systems
D EP S KY: Dependable and Secure Storage in a Cloud-of-Clouds ´ ALYSSON BESSANI, MIGUEL CORREIA, BRUNO QUARESMA, FERNANDO ANDRE, and PAULO SOUSA, University of Lisbon, Faculty of Sciences The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databases, large biomedical datasets, historical information about power systems and financial data are some examples of critical data that could be moved to the cloud. However, the reliability and security of data stored in the cloud still remain major concerns. In this work we present DepSky, a system that improves the availability, integrity, and confidentiality of information stored in the cloud through the encryption, encoding, and replication of the data on diverse clouds that form a cloud-of-clouds. We deployed our system using four commercial clouds and used PlanetLab to run clients accessing the service from different countries. We observed that our protocols improved the perceived availability, and in most cases, the access latency, when compared with cloud providers individually. Moreover, the monetary costs of using DepSky in this scenario is at most twice the cost of using a single cloud, which is optimal
ACM Transactions on Storage (TOS) – Association for Computing Machinery
Published: Nov 1, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.