Distributed Deduplication System with Improved Reliability and Access Efficiency
暂无分享,去创建一个
R VenugopalK | M Bhavya | N Shravani | J Thriveni | R. VenugopalK. | J. Thriveni | M. Bhavya | N. Shravani
[1] Lihao Xu,et al. Optimizing Cauchy Reed-Solomon Codes for Fault-Tolerant Network Storage Applications , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[2] Yonggang Wen,et al. Private data deduplication protocols in cloud storage , 2012, SAC '12.
[3] Zhanhuai Li,et al. Data deduplication techniques , 2010, 2010 International Conference on Future Information Technology and Management Engineering.
[4] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[5] Benny Pinkas,et al. Proofs of ownership in remote storage systems , 2011, CCS '11.
[6] Moni Naor,et al. How to Share a Secret, Infinitely , 2016, IEEE Transactions on Information Theory.
[7] Marcos K. Aguilera,et al. Using erasure codes efficiently for storage in a distributed system , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[8] Ari Juels,et al. Pors: proofs of retrievability for large files , 2007, CCS '07.
[9] James S. Plank,et al. Erasure Codes for Storage Systems: A Brief Primer , 2013, login Usenix Mag..