Author:
Sekaran Kaushik,Seetharamulu B.,Kalaivani J.,Handaragall Vijayalaxmi C.,Venkatesh B.
Publisher
Springer Nature Singapore
Reference20 articles.
1. Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50–58 (2010)
2. Weatherspoon, H., Kubiatowicz, J.D.: Erasure coding vs. replication: a quantitative comparison. In: Proceedings of IPTPS (2002)
3. Huang, C., Simitci, H., Xu, Y., Ogus, A., Calder, B., Gopalan, P., Li, J., Yekhanin, S.: Erasure coding in windows azure storage. In: USENIX Annual Technical Conference (2012)
4. Jules, A., Kaliski, B.S.: PORs: proofs of retrievability for large files. In: Proceedings of 14th ACM Conference on Computer and Communication Security (2007)
5. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissiner, L., Peterson, Z., Song, D.: Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14, Article 12 (2011)