Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds
نویسندگان
چکیده
منابع مشابه
Distributed data possession checking for securing multiple replicas in geographically-dispersed clouds
Article history: Received 25 August 2010 Received in revised form 20 May 2011 Accepted 8 December 2011 Available online 29 December 2011
متن کاملIdentity-based remote data possession checking in public clouds
Checking remote data possession is of crucial importance in public cloud storage. It enables the users to check that their outsourced data have been kept intact without downloading the original data. The existing remote data possession checking (RDPC) protocols have been designed in the PKI (public key infrastructure) setting. The cloud server has to validate the users’ certificates before stor...
متن کاملEfficient Management of Geographically Distributed Big Data on Clouds
Nowadays cloud infrastructures allow storing and processing increasing amounts of scientific data. However, most of the existing large scale data management frameworks are based on the assumption that users deploy their data-intensive applications in single data center, few of them focus on the inter data centers data flows. Managing data across geographically distributed data centers is not tr...
متن کاملProviding Geo-Elasticity in Geographically Distributed Clouds
Geographically distributed cloud platforms are well suited for serving a geographically diverse user base. However traditional cloud provisioning mechanisms that make local scaling decisions are not adequate for delivering best possible performance for modern web applications that observe both temporal and spatial workload fluctuations. In this paper, we propose GeoScale, a system that provides...
متن کاملDelegable Provable Data Possession for Remote Data in the Clouds
Many storage systems need to do authorized verification for data integrity. For example, a user stores his data into cloud storage servers and shares his data with his friends. They check data integrity periodically to ensure data intact. However, they don’t want a stranger to check data integrity on their data. Therefore, public verification is undesired in this situation. The user can share h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and System Sciences
سال: 2012
ISSN: 0022-0000
DOI: 10.1016/j.jcss.2011.12.018