Verifying remote data integrity in peer-to-peer data storage: A comprehensive survey of protocols

N Oualha, J Leneutre, Y Roudier - Peer-to-Peer Networking and …, 2012 - Springer
This paper surveys protocols that verify remote data possession. These protocols have been
proposed as a primitive for ensuring the long-term integrity and availability of data stored at …

Energy trade-offs among content delivery architectures

A Feldmann, A Gladisch, M Kind… - 2010 9th Conference …, 2010 - ieeexplore.ieee.org
It is envogue to consider how to incorporate various home devices such as set-top boxes
into content delivery architectures using the Peer-to-Peer (P2P) paradigm. The hope is to …

Secondary job scheduling in the cloud with deadlines

S Chen, T He, HYS Wong, KW Lee… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
The highly dynamic nature of the cloud environment leads to a time-varying resource
utilization and the cloud provider can potentially accommodate secondary jobs with the …

Dynamic semantic data replication for k-random search in peer-to-peer networks

X Cao, M Klusch - 2012 IEEE 11th International Symposium on …, 2012 - ieeexplore.ieee.org
We present a dynamic semantic data replication scheme called DSDR for classic k-random
search in unstructured peer-to-peer (P2P) networks. During its k-random search each peer …

Protecting the iTrust information retrieval network against malicious attacks

YT Chuang, PM Melliar-Smith, LE Moser… - Journal of Computing …, 2012 - koreascience.kr
This paper presents novel statistical algorithms for protecting the iTrust information retrieval
network against malicious attacks. In iTrust, metadata describing documents, and requests …

BubbleStorm: replication, updates, and consistency in rendezvous information systems

C Leng - 2012 - tuprints.ulb.tu-darmstadt.de
As distributed systems are getting more and more complex, search facilities for finding
services and data within the system become crucial. Users expect search engines to deal …

[PDF][PDF] Detecting and defending against malicious attacks in the iTrust information retrieval network.

YT Chuang, IM Lombera, PM Melliar-Smith, LE Moser - ICOIN, 2012 - itrust.ece.ucsb.edu
This paper presents novel statistical algorithms for detecting and defending against
malicious attacks in the iTrust information retrieval network. The novel detection algorithm …

Social tagging recommendation system for smart city environments

MF Alhamid - … IEEE International Conference on Multimedia & …, 2016 - ieeexplore.ieee.org
The increasing use of social network resources has increased the users demands through
these networks. Analyzing social media enables us to benefit from the rich source of …

Secure P2P data storage and maintenance

N Oualha, M Önen, Y Roudier - International Journal of Digital …, 2010 - Wiley Online Library
P2P data storage requires strong reliability and security assurances. Existing data storage
solutions have been designed for centralized as well as distributed settings; yet they do not …

[PDF][PDF] Discovering joining nodes and detecting leaving nodes in the iTrust membership protocol

YT Chuang, PM Melliar-Smith, LE Moser… - Proc. Int. MultiConf. Eng …, 2013 - iaeng.org
We present a membership protocol for the iTrust search and retrieval network. In iTrust, a
source node distributes metadata together with the URL for a document to a subset of …