Cloud computing security: from single to multi-clouds

MA AlZain, E Pardede, B Soh… - 2012 45th Hawaii …, 2012 - ieeexplore.ieee.org
The use of cloud computing has increased rapidly in many organizations. Cloud computing
provides many benefits in terms of low cost and accessibility of data. Ensuring the security of …

BEAT: Asynchronous BFT made practical

S Duan, MK Reiter, H Zhang - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
We present BEAT, a set of practical Byzantine fault-tolerant (BFT) protocols for completely
asynchronous environments. BEAT is flexible, versatile, and extensible, consisting of five …

An efficient and secure dynamic auditing protocol for data storage in cloud computing

K Yang, X Jia - IEEE transactions on parallel and distributed …, 2012 - ieeexplore.ieee.org
In cloud computing, data owners host their data on cloud servers and users (data
consumers) can access the data from cloud servers. Due to the data outsourcing, however …

{DispersedLedger}:{High-Throughput} byzantine consensus on variable bandwidth networks

L Yang, SJ Park, M Alizadeh, S Kannan… - 19th USENIX Symposium …, 2022 - usenix.org
The success of blockchains has sparked interest in large-scale deployments of Byzantine
fault tolerant (BFT) consensus protocols over wide area networks. A central feature of such …

DepSky: dependable and secure storage in a cloud-of-clouds

A Bessani, M Correia, B Quaresma, F André… - Acm transactions on …, 2013 - dl.acm.org
The increasing popularity of cloud storage services has lead companies that handle critical
data to think about using these services for their storage needs. Medical record databases …

Scalable and efficient provable data possession

G Ateniese, R Di Pietro, LV Mancini… - Proceedings of the 4th …, 2008 - dl.acm.org
Storage outsourcing is a rising trend which prompts a number of interesting security issues,
many of which have been extensively investigated in the past. However, Provable Data …

HAIL: A high-availability and integrity layer for cloud storage

KD Bowers, A Juels, A Oprea - Proceedings of the 16th ACM conference …, 2009 - dl.acm.org
We introduce HAIL (High-Availability and Integrity Layer), a distributed cryptographic system
that allows a set of servers to prove to a client that a stored file is intact and retrievable. HAIL …

Secure data deduplication

MW Storer, K Greenan, DDE Long… - Proceedings of the 4th …, 2008 - dl.acm.org
As the world moves to digital storage for archival purposes, there is an increasing demand
for systems that can provide secure data storage in a cost-effective manner. By identifying …

Data storage auditing service in cloud computing: challenges, methods and opportunities

K Yang, X Jia - World Wide Web, 2012 - Springer
Cloud computing is a promising computing model that enables convenient and on-demand
network access to a shared pool of configurable computing resources. The first offered cloud …

Store, forget, and check: Using algebraic signatures to check remotely administered storage

TSJ Schwarz, EL Miller - 26th IEEE International Conference on …, 2006 - ieeexplore.ieee.org
The emerging use of the Internet for remote storage and backup has led to the problem of
verifying that storage sites in a distributed system indeed store the data; this must often be …