Managing Multi-Cloud Data Dependability Faults

[1]  Fred B. Schneider,et al.  Implementing fault-tolerant services using the state machine approach: a tutorial , 1990, CSUR.

[2]  Simson L. Garfinkel,et al.  An Evaluation of Amazon's Grid Computing Services: EC2, S3, and SQS , 2007 .

[3]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[4]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[5]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[6]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[7]  Eric Pardede,et al.  A Byzantine Fault Tolerance Model for a Multi-cloud Computing , 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering.

[8]  Priya Narasimhan,et al.  Thema: Byzantine-fault-tolerant middleware for Web-service applications , 2005, 24th IEEE Symposium on Reliable Distributed Systems (SRDS'05).

[9]  Eric Pardede,et al.  A New approach using redundancy technique to improve security in cloud computing , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[10]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.

[11]  Marko Vukolic,et al.  The byzantine empire in the intercloud , 2010, SIGA.

[12]  Douglas R. Stinson,et al.  An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..

[13]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[14]  Sandeep Joshi,et al.  A Comprehensive Report on Security and Privacy Challenges in Software as a Service , 2018 .

[15]  Divyakant Agrawal,et al.  Database Management as a Service: Challenges and Opportunities , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[16]  Eric Pardede,et al.  Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes , 2015, Int. J. Cloud Appl. Comput..

[17]  Arun Venkataramani,et al.  Separating agreement from execution for byzantine fault tolerant services , 2003, SOSP '03.

[18]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[19]  Wei Li,et al.  A framework to support survivable Web services , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[20]  Ramakrishna Kotla,et al.  Zyzzyva: speculative byzantine fault tolerance , 2007, TOCS.

[21]  Mehedi Masud,et al.  Byzantine Fault-Tolerant Architecture in Cloud Data Management , 2016, Int. J. Knowl. Soc. Res..

[22]  K.Y.B. Williams,et al.  Better Security and Encryption Within Cloud Computing Systems , 2018 .

[23]  Simson L. Garfinkel,et al.  Email-Based Identification and Authentication: An Alternative to PKI? , 2003, IEEE Secur. Priv..

[24]  DahlinMike,et al.  Separating agreement from execution for byzantine fault tolerant services , 2003 .

[25]  Eric Pardede,et al.  A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds , 2013, J. Softw..

[26]  Wenbing Zhao,et al.  BFT-WS: A Byzantine Fault Tolerance Framework for Web Services , 2007, 2007 Eleventh International IEEE EDOC Conference Workshop.

[27]  Eric Pardede,et al.  MCDB: Using Multi-clouds to Ensure Security in Cloud Computing , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[28]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[29]  Petr Kuznetsov,et al.  BFTW3: why? when? where? workshop on the theory and practice of byzantine fault tolerance , 2010, SIGA.