• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 76
Next 10 →

Antiquity: Exploiting a secure log for wide-area distributed storage

by Hakim Weatherspoon, Patrick Eaton, Byung-gon Chun, John Kubiatowicz - In EuroSys , 2007
"... Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually fail and attempts to maintain data despite those failures. Antiquity uses a secure log to maintain data inte ..."
Abstract - Cited by 19 (5 self) - Add to MetaCart
Antiquity is a wide-area distributed storage system designed to provide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually fail and attempts to maintain data despite those failures. Antiquity uses a secure log to maintain data

Exploitation of Vulnerabilities in Cloud Storage

by Narendran Calluru Rajasekar, Chris Imafidon
"... Abstract- The paper presents the vulnerabilities of cloud storage and various possible attacks exploiting these vulnerabilities that relate to cloud security, which is one of the challenging features of cloud computing. The attacks are classified into three broad categories of which the social netwo ..."
Abstract - Add to MetaCart
networking based attacks are the recent attacks which are evolving out of existing technologies such as P2P file sharing. The study is extended to available defence mechanisms and current research areas of cloud storage. Based on the study, simple cloud storage is implemented and the major aspects

USENIX Association 11th USENIX Conference on File and Storage Technologies (FAST ’13) 215 Getting Real: Lessons in Transitioning Research Simulations into Hardware Systems

by Mohit Saxena, Yiying Zhang, Michael M. Swift, Andrea C. Arpaci-dusseau, Remzi H. Arpaci-dusseau
"... Flash-based solid-state drives have revolutionized stor-age with their high performance. Their sophisticated in-ternal mechanisms have led to a plethora of research on how to optimize applications, file systems, and internal SSD designs. Due to the closed nature of commercial de-vices though, most r ..."
Abstract - Add to MetaCart
Flash-based solid-state drives have revolutionized stor-age with their high performance. Their sophisticated in-ternal mechanisms have led to a plethora of research on how to optimize applications, file systems, and internal SSD designs. Due to the closed nature of commercial de-vices though, most

Antiquity: Exploiting a Secure Log for Wide-AreaDistributed Storage Hakim Weatherspoon*Cornell University

by unknown authors
"... ABSTRACT Antiquity is a wide-area distributed storage system designed toprovide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually failand attempts to maintain data despite those failures. Antiquity uses a secure log to maintain da ..."
Abstract - Add to MetaCart
ABSTRACT Antiquity is a wide-area distributed storage system designed toprovide a simple storage service for applications like file systems and back-up. The design assumes that all servers eventually failand attempts to maintain data despite those failures. Antiquity uses a secure log to maintain

Dynamic Provable Data Possession

by C. Chris Erway , Alptekin Küpçü , Charalampos Papamanthou, Roberto Tamassia , 2009
"... As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends it to ..."
Abstract - Cited by 123 (8 self) - Add to MetaCart
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has received increased attention. In the provable data possession (PDP) model, the client preprocesses the data and then sends

Exploiting traces in program analysis

by Alex Groce, Rajeev Joshi - In Proc. Tools and Algorithms for the Construction and Analysis of Systems , 2006
"... Abstract. From operating systems and web browsers to spacecraft, many software systems maintain a log of events that provides a partial history of execution, supporting post-mortem (or post-reboot) analysis. Unfortunately, bandwidth, storage limitations, and privacy concerns limit the information co ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
requires no additional history variables to track log events, and it can slice away code that does not execute in a given trace. We describe initial experiences with implementing our ideas by extending the CBMC bounded model checker for C programs. Applying our technique to a small, 400-line file system

Earth System Science Workbench: A Data Management Infrastructure for Earth Science Products

by James Frew, Rajendra Bose - In Proceedings of the 13th International Conference on Scientific and Statistical Database Management , 2001
"... The Earth System Science Workbench (ESSW) is a nonintrusive data management infrastructure for researchers who must also be data publishers. An implementation of ESSW to track the processing of locally received satellite imagery is presented, demonstrating the Workbench’s transparent and robust supp ..."
Abstract - Cited by 70 (5 self) - Add to MetaCart
support for archiving and publishing data products. ESSW features a Lab Notebook metadata service, a No Duplicate-Write Once Read Many (ND-WORM) storage service, and Web user interface tools. The Lab Notebook logs processes (experiments) and their relationships via a custom API to XML documents stored

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

Improved Read Performance in a Cost-Effective, Fault-Tolerant Parallel Virtual File System (CEFT-PVFS)

by Yifeng Zhu, Hong Jiang, Xiao Qin, Dan Feng, David Swanson - in Proceeding of IEEE/ACM Workshop on Parallel I/O in Cluster Computing and Computational Grids, in conjunction with IEEE International Symposium on Cluster Computing and the Grid (CCGRID , 2003
"... Due to the ever-widening performance gap between processors and disks, I/0 operations tend to become the major performance bottleneck of data-intensive applications on modern clusters. If all the existing disks on the nodes of a cluster are connected together to establish high performance parallel s ..."
Abstract - Cited by 13 (12 self) - Add to MetaCart
storage systems, the cluster's overall performance can be boosted at no additional cost. CEFT-PVFS (a RAID 10 style parallel file system that extends the original PVFS), as one such system, divides the cluster nodes into two groups, stripes the data across one group in a round-robin fashion

Symposium on Reliable Distributed Systems An Incremental File System Consistency Checker for Block-Level CDP Systems

by Maohua Lu, Tzi-cker Chiueh, Shibiao Lin
"... A block-level continuous data protection (CDP) system logs every disk block update from an application server (e.g., a file or DBMS server) to a storage system so that any disk updates within a time window are undoable, and thus is able to provide a more flexible and efficient data protection servic ..."
Abstract - Add to MetaCart
A block-level continuous data protection (CDP) system logs every disk block update from an application server (e.g., a file or DBMS server) to a storage system so that any disk updates within a time window are undoable, and thus is able to provide a more flexible and efficient data protection
Next 10 →
Results 1 - 10 of 76
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University