Cloud Storage and its Secure Overlay Techniques

[1]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM 2002.

[2]  Amit A. Levy,et al.  Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.

[3]  M. Hemalatha,et al.  Cloud Computing for Academic Environment , 2012 .

[4]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.

[5]  Greg Schulz Cloud and Virtual Data Storage Networking , 2011 .

[6]  Yang Tang,et al.  A Secure Cloud Backup System with Assured Deletion and Version Control , 2011, 2011 40th International Conference on Parallel Processing Workshops.

[7]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[8]  Ya Wang,et al.  Cloud Storage as the Infrastructure of Cloud Computing , 2010, 2010 International Conference on Intelligent Computing and Cognitive Informatics.

[9]  Zhijie Lin,et al.  Recent Advances in Cloud Storage , 2010 .

[10]  Xiaodi Huang,et al.  Cloud Computing for Higher Education: A roadmap , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[11]  Qian Wang,et al.  Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.

[12]  Toby Velte,et al.  Cloud Computing, A Practical Approach , 2009 .

[13]  Yang Tang,et al.  FADE: Secure Overlay Cloud Storage with File Assured Deletion , 2010, SecureComm.

[14]  Ian Lumb,et al.  A Taxonomy and Survey of Cloud Computing Systems , 2009, 2009 Fifth International Joint Conference on INC, IMS and IDC.

[15]  Brent Waters,et al.  Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.