Moving Target with Load Balancing in P2P Cloud
暂无分享,去创建一个
Hong Liu | Johnson P. Thomas | Praveen Khethavath | Johnson P. Thomas | Praveen Khethavath | Hong Liu
[1] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[2] Antonio F. Gómez-Skarmeta,et al. Cyclone: a novel design schema for hierarchical DHTs , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[3] RenKui,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013 .
[4] Jeffrey Considine,et al. Simple Load Balancing for Distributed Hash Tables , 2003, IPTPS.
[5] Sawan Kumar,et al. Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.
[6] Zoe L. Jiang,et al. Privacy-Preserving Public Auditing for Secure Cloud Storage , 2013, IEEE Transactions on Computers.
[7] Joseph M. Hellerstein,et al. Induced Churn as Shelter from Routing-Table Poisoning , 2006, NDSS.
[8] Marten van Dijk,et al. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.
[9] Ke Zeng,et al. Publicly Verifiable Remote Data Integrity , 2008, ICICS.
[10] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[11] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[12] Karl Aberer,et al. Multifaceted Simultaneous Load Balancing in DHT-Based P2P Systems: A New Game with Old Balls and Bins , 2005, Self-star Properties in Complex Information Systems.
[13] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[14] Klaus Wehrle,et al. A thermal-dissipation-based approach for balancing data load in distributed hash tables , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[15] Wolfgang Kellerer,et al. Load balancing in a hierarchical DHT-based P2P system , 2007, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007).
[16] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[17] Guillaume Urvoy-Keller,et al. Hierarchical Peer-To-Peer Systems , 2003, Parallel Process. Lett..