|
[1] Amazon s3, 2015. http://aws.amazon.com/s3/?nc2=h_ls. [2] Availability in amazon s3, 2015. http://aws.amazon.com/tw/s3/sla/. [3] Availability in microsoft azure, 2015. http://azure.microsoft.com/en-us/ support/legal/sla/. [4] Microsoft azure, 2015. http://azure.microsoft.com/en-us/. [5] Pricing in amazon s3, 2015. http://aws.amazon.com/govcloud-us/pricing/ s3/. [6] Pricing in microsoft azure, 2015. http://azure.microsoft.com/en-us/ pricing/details/storage/. [7] A. Andreeva, D. Howorth, J.-M. Chandonia, S. E. Brenner, T. J. Hubbard, C. Chothia, and A. G. Murzin. Data growth and its impact on the scop database: new developments. Nucleic acids research, 36(suppl 1):D419{D425, 2008. [8] B. Battles, C. Belleville, S. Grabau, and J. Maurier. Reducing data center power consumption through ecient storage. Network Appliance, Inc, 2007. [9] K. D. Bowers, A. Juels, and A. Oprea. Hail: a high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM conference on Computer and communications security, pages 187{198. ACM, 2009. [10] D. Chen and H. Zhao. Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on, volume 1, pages 647{651. IEEE, 2012. [11] T. Dillon, C. Wu, and E. Chang. Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on, pages 27{33. Ieee, 2010. [12] D. Dobre, P. Viotti, and M. Vukolic. Hybris: Robust hybrid cloud storage. In Proceedings of the ACM Symposium on Cloud Computing, pages 1{14. ACM, 2014. [13] J. Gantz and D. Reinsel. The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. IDC iView: IDC Analyze the Future, 2007:1{16, 2012. [14] H.-Y. Lin and W.-G. Tzeng. A secure erasure code-based cloud storage system with secure data forwarding. Parallel and Distributed Systems, IEEE Transac- tions on, 23(6):995{1003, 2012. [15] M. Naldi and L. Mastroeni. Economic decision criteria for the migration to cloud storage. European Journal of Information Systems, 2014. [16] S. Nepal, C. Friedrich, L. Henry, and S. Chen. A secure storage service in the hybrid cloud. In Utility and Cloud Computing (UCC), 2011 Fourth IEEE International Conference on, pages 334{335. IEEE, 2011. [17] M. Pitkanen, R. Moussa, M. Swany, and T. Niemi. Erasure codes for increasing the availability of grid data storage. In Telecommunications, 2006. AICT- ICIW'06. International Conference on Internet and Web Applications and Ser- vices/Advanced International Conference on, pages 185{185. IEEE, 2006. [18] K. Ren, C. Wang, and Q. Wang. Security challenges for the public cloud. IEEE Internet Computing, (1):69{73, 2012. [19] H. Weatherspoon and J. D. Kubiatowicz. Erasure coding vs. replication: A quantitative comparison. In Peer-to-Peer Systems, pages 328{337. Springer, 2002. [20] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. S. Yau. Ecient provable data possession for hybrid clouds. In Proceedings of the 17th ACM conference on Computer and communications security, pages 756{758. ACM, 2010.
|