F. Id and . Id, Intra-user deduplication). C id has already stored the file corresponding to F id

J. Daniel and . Abadi, Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story, Computer, vol.45, issue.33, pp.37-42

H. Abu-libdeh, L. Princehouse, and H. Weatherspoon, RACS, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.229-240, 2010.
DOI : 10.1145/1807128.1807165

T. Acar, M. Belenkiy, L. Nguyen, and C. Ellison, Key management in distributed systems, p.28, 2010.

A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken et al., Farsite: federated, available, and reliable storage for an incompletely trusted environment, Proceedings of the 5th ACM Symposium on Operating Systems Design and Implementation (OSDI), p.63, 2002.

M. K. Aguilera, K. Keeton, A. Merchant, M. Kiran-kumar-muniswamy-reddy, and . Uysal, Improving Recoverability in Multi-tier Storage Systems, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), p.81, 2007.
DOI : 10.1109/DSN.2007.57

A. Peter, J. D. Alsberg, and . Day, A principle for resilient sharing of distributed resources, Procs of the 2nd international conference on Software engineering (ICSE), p.37, 1976.

S. Annapureddy, M. J. Freedman, and D. Mazières, Shark: scaling file servers via cooperative caching, Proceedings of the 2nd USENIX Conference on Symposium on Networked Systems Design & Implementation (NSDI), p.63, 2005.

M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz et al., A view of cloud computing, Ion Stoica, and Matei Zaharia. A view of cloud computing, pp.50-58, 2002.
DOI : 10.1145/1721654.1721672

A. Avizienis, J. Laprie, B. Randell, and C. Landwehr, Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, vol.1, issue.1, pp.11-33, 2004.

M. Bellare, S. Keelveedhi, and T. Ristenpart, Dupless: Server-aided encryption for deduplicated storage, Proceedings of the 22nd USENIX Conference on Security (SEC), 2013. 65, pp.70-83

M. Bellare, S. Keelveedhi, and T. Ristenpart, Message-Locked Encryption and Secure Deduplication, Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.67-89, 2013.
DOI : 10.1007/978-3-642-38348-9_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.252.8386

D. Bermbach, M. Klems, S. Tai, and M. Menzel, MetaStorage: A Federated Cloud Storage System to Manage Consistency-Latency Tradeoffs, 2011 IEEE 4th International Conference on Cloud Computing, pp.452-459, 2011.
DOI : 10.1109/CLOUD.2011.62

A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, Depsky: dependable and secure storage in a cloud-of-clouds, ACM Transactions on Storage (TOS), vol.9, issue.4, pp.12-95, 2013.

A. Bessani, R. Mendes, T. Oliveira, N. Neves, M. Correia et al., Scfs: a shared cloud-backed file system, Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference, pp.169-180, 2014.

C. Blake and R. Rodrigues, High availability, scalable storage, dynamic peer networks: pick two, Procs of the 9th conference on Hot Topics in Operating Systems (HOTOS), p.44, 2003.

W. J. Bolosky, S. Corbin, D. Goebel, and J. R. Douceur, Single instance storage in Windows, Proceedings of the 4th Conference on USENIX Windows Systems Symposium (WSS), p.63, 2000.

J. Peter and . Braam, The lustre storage architecture, p.24, 2004.

E. Brewer, CAP twelve years later: How the "rules" have changed, Computer, vol.45, issue.2, pp.23-29, 2012.
DOI : 10.1109/MC.2012.37

D. Brumley and D. Boneh, Remote timing attacks are practical, Computer Networks, vol.48, issue.5, pp.701-716, 2005.
DOI : 10.1016/j.comnet.2005.01.010

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.2615

M. Cha, H. Kwak, and P. Rodriguez, Yong-Yeol Ahn, and Sue Moon. I tube, you tube, everybody tubes: Analyzing the world's largest user generated content video system, Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC '07, pp.1-14, 2007.

T. Deepak, C. , and S. Toueg, Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.19, pp.225-267, 1996.

A. Chawla, B. Reed, K. Juhnke, and G. Syed, Semantics of caching with spoca: a stateless, proportional, optimally-consistent addressing algorithm, Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIX ATC'11. USENIX Association, pp.22-48, 2011.

F. Byung-gon-chun, A. Dabek, E. Haeberlen, H. Sit, M. F. Weatherspoon et al., Efficient replica maintenance for distributed storage systems, Procs of the International Conference on Networked Systems Design & Implementation (NSDI), p.81, 2006.

K. Church, A. Greenberg, and J. Hamilton, On Delivering Embarrassingly Distributed Cloud Services, HotNets, p.44, 2008.

B. F. Cooper, R. Ramakrishnan, U. Srivastava, A. Silberstein, P. Bohannon et al., PNUTS, Procs of the VLDB Journal, pp.1277-1288, 2008.
DOI : 10.14778/1454159.1454167

F. Peter, . Corbett, G. Dror, and . Feitelson, The vesta parallel file system, ACM Transactions on Computer Systems (TOCS), vol.14, issue.22, pp.225-264, 1996.

C. Frank-dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek et al., Designing a dht for low latency and high throughput, Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, NSDI'04. USENIX Association, pp.95-127, 2004.

J. Daemen and V. Rijmen, The Design of Rijndael, p.27, 2002.
DOI : 10.1007/978-3-662-04722-4

J. Chris, H. Date, and . Darwen, A guide to the SQL Standard: a user's guide to the standard relational language SQL, 1993.

T. Daugherty, M. S. Eastin, and L. Bright, Exploring Consumer Motivations for Creating User-Generated Content, Journal of Interactive Advertising, vol.11, issue.4, pp.16-25, 2008.
DOI : 10.1080/15252019.2008.10722139

G. Decandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman et al., Swaminathan Sivasubramanian, Peter Vosshall, and Werner Vogels . Dynamo: amazon's highly available key-value store, Procs of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP), p.45, 2007.

S. Defrance, A. Kermarrec, E. Le-merrer, N. L. Scouarnec, G. Straub et al., Efficient peer-to-peer backup services through buffering at the edge, 2011 IEEE International Conference on Peer-to-Peer Computing, p.32, 2011.
DOI : 10.1109/P2P.2011.6038671

URL : https://hal.archives-ouvertes.fr/hal-00646768

J. Dhem, F. Koeune, P. Leroux, P. Mestré, J. Quisquater et al., A Practical Implementation of the Timing Attack, Proceedings of the The International Conference on Smart Card Research and Applications, CARDIS '98, pp.167-182, 2000.
DOI : 10.1007/10721064_15

R. Di, P. , and A. Sorniotti, Boosting efficiency and security in proof of ownership for deduplication, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp.2012-67

J. Dilley, B. Maggs, J. Parikh, H. Prokop, R. Sitaraman et al., Globally distributed content delivery, IEEE Internet Computing, vol.6, issue.5, pp.50-58, 2002.
DOI : 10.1109/MIC.2002.1036038

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.3792

D. Dobre, P. Viotti, and M. Vukoli?, Hybris, Proceedings of the ACM Symposium on Cloud Computing, SOCC '14, pp.1-14, 2014.
DOI : 10.1145/2670979.2670991

J. R. Douceur, A. Adya, W. J. Bolosky, D. Simon, and M. Theimer, Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems, p.89, 2002.
DOI : 10.1109/ICDCS.2002.1022312

. Driverdan, Dropship-dropbox api utilities. https://github.com/driverdan, p.64

A. Duminuco, E. Biersack, and T. En-najjary, Proactive replication in distributed storage systems using machine availability estimation, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, pp.1-2712, 2007.
DOI : 10.1145/1364654.1364689

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.3947

M. Dutch, Understanding data deduplication ratios. SNIA Data Management Forum, p.62, 2008.

A. El-shimi, R. Kalach, A. Kumar, A. Oltean, J. Li et al., Primary data deduplication-large scale study and system design, Proceedings of the USENIX conference on Annual Technical Conference (ATC), p.63, 2012.

W. Edward, M. A. Felten, and . Schneider, Timing attacks on web privacy, Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS), pp.25-32

P. Francois, C. Filsfils, J. Evans, and O. Bonaventure, Achieving sub-second IGP convergence in large IP networks, ACM SIGCOMM Computer Communication Review, vol.35, issue.3, pp.35-44, 2005.
DOI : 10.1145/1070873.1070877

J. Gantz and D. Reinsel, The digital universe decade. are you ready? IDC iView: IDC Analyze the future, p.61, 2010.

J. Gantz and D. Reinsel, The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, IDC iView: IDC Analyze the future, 2012.

S. Ghemawat, H. Gobioff, and S. Leung, The google file system, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03, pp.29-43, 2003.

S. Gilbert and N. Lynch, Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services, ACM SIGACT News, vol.33, issue.2, pp.51-59, 2002.
DOI : 10.1145/564585.564601

P. Gill, N. Jain, and N. Nagappan, Understanding network failures in data centers, ACM SIGCOMM Computer Communication Review, vol.41, issue.4, pp.350-361, 2011.
DOI : 10.1145/2043164.2018477

P. Gill, N. Jain, and N. Nagappan, Understanding network failures in data centers: measurement, analysis, and implications, Procs of the ACM SIGCOMM Conference, p.38, 2011.

R. Gracia-tinedo, M. Sanchez-artigas, A. Moreno-martinez, and P. Garcia-lopez, Friend- Box: A hybrid F2F personal storage application, Procs of the IEEE International Conference onCloud Computing (CLOUD), p.44, 2012.
DOI : 10.1109/cloud.2012.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.469.1359

C. Gray and D. Cheriton, Leases: an efficient fault-tolerant mechanism for distributed file cache consistency, Procs of the ACM Symposium on Operating Systems Principles (SOSP), p.37, 1989.

S. Haryadi, N. Gunawi, A. C. Agrawal, R. H. Arpaci-dusseau, J. Arpaci-dusseau et al., Deconstructing commodity storage clusters, ACM SIGARCH Computer Architecture News, vol.33, issue.62, p.63, 2005.

S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-peleg, Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.62-67, 2011.
DOI : 10.1145/2046707.2046765

J. Hall, J. Hartline, R. Anna, J. Karlin, J. Saia et al., On algorithms for efficient data migration, Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, pp.620-629, 2001.

D. Harnik, B. Pinkas, and A. Shulman-peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.65-67, 2010.
DOI : 10.1109/MSP.2010.187

O. Heen, C. Neumann, L. Montalvo, and S. Defrance, Improving the resistance to sidechannel attacks on cloud storage services, Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), pp.2012-67

Y. Hu, C. Henry, . Chen, P. Patrick, Y. Lee et al., Nccloud: applying network coding for the storage repair in a cloud-of-clouds, Proceedings of the 10th USENIX conference on File and Storage Technologies, pp.21-21, 2012.

C. Huang, A. Wang, J. Li, and K. W. Ross, Understanding hybrid CDN-P2P, Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV '08, p.80, 2008.
DOI : 10.1145/1496046.1496064

J. J. Hunt, K. Vo, and W. F. Tichy, Delta algorithms: an empirical analysis, ACM Transactions on Software Engineering and Methodology, vol.7, issue.2, pp.192-214, 1998.
DOI : 10.1145/279310.279321

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.8864

K. Ichiro and I. , Asura: Scalable and uniform data distribution algorithm for storage clusters. CoRR, abs/1309, pp.24-48, 2013.

K. Jin and E. L. Miller, The effectiveness of deduplication on virtual machine disk images, Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference on, SYSTOR '09, p.62, 2009.
DOI : 10.1145/1534530.1534540

J. Jonsson and B. Kaliski, Public-key cryptography standards (pkcs) #1: Rsa cryptography specifications version 2, p.28, 2003.
DOI : 10.17487/rfc3447

B. Kaliski, A survey of encryption standards, IEEE Micro, vol.13, issue.6, pp.74-81, 1927.
DOI : 10.1109/40.248057

S. Kamara and K. Lauter, Cryptographic Cloud Storage, Proceedings of the 14th International Conference on Financial Cryptography and Data Security (FC), p.88, 2010.
DOI : 10.1007/978-3-642-14992-4_13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794

D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine et al., Consistent hashing and random trees, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.654-663, 1997.
DOI : 10.1145/258533.258660

C. Paul and . Kocher, Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '96, pp.104-113, 1996.

A. Lakshman and P. Malik, Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010.
DOI : 10.1145/1773912.1773922

L. Lamport, Concurrent reading and writing, Communications of the ACM, vol.20, issue.11, pp.806-811, 1977.
DOI : 10.1145/359863.359878

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.6657

Y. Lee, Y. Kim, and H. Choi, Conflict Resolution of Data Synchronization in Mobile Environment, Computational Science and Its Applications â?? ICCSA 2004, pp.196-205, 2004.
DOI : 10.1007/978-3-540-24709-8_21

A. Debra, D. S. Lelewer, and . Hirschberg, Data compression, ACM Comput. Surv, vol.19, issue.80, pp.261-296, 1987.

B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, Timing attacks in low-latency mix systems (extended abstract), Proceedings of the 8th International Financial Cryptography conference (FC), pp.251-265, 2004.
DOI : 10.1007/978-3-540-27809-2_25

W. Li, P. Svard, J. Tordsson, and E. Elmroth, A General Approach to Service Deployment in Cloud Environments, 2012 Second International Conference on Cloud and Green Computing, pp.17-24, 2012.
DOI : 10.1109/CGC.2012.90

M. Lillibridge, K. Eshghi, D. Bhagwat, V. Deolalikar, G. Trezise et al., Sparse indexing: large scale, inline deduplication using sampling and locality, Proccedings of the 7th USENIX Conference on File and Storage Technologies, p.64, 2009.

W. K. Lin, D. M. Chiu, and Y. B. Lee, Erasure code replication revisited, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., p.49, 2004.
DOI : 10.1109/PTP.2004.1334935

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.2034

C. Liu, X. Liu, and L. Wan, Policy-Based De-duplication in Secure Cloud Storage, Trustworthy Computing and Services, pp.250-262, 2013.
DOI : 10.1007/978-3-642-35795-4_32

J. Eng-keong-lua, M. Crowcroft, R. Pias, S. Sharma, and . Lim, A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, vol.7, issue.2, pp.72-93, 2005.
DOI : 10.1109/COMST.2005.1610546

J. Eng-keong-lua, M. Crowcroft, R. Pias, S. Sharma, and . Lim, A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, vol.7, issue.2, pp.72-93
DOI : 10.1109/COMST.2005.1610546

P. Mell and T. Grance, The nist definition of cloud computing, 2011.
DOI : 10.6028/NIST.SP.800-145

M. Mesnier, R. Gregory, E. Ganger, and . Riedel, Object-based storage, Communications Magazine IEEE, vol.9, issue.8, pp.4184-90, 2003.

P. Meye and P. Raïpin, Frédéric Tronel, and Emmanuelle Anceaume Toward a distributed storage system leveraging the DSL infrastructure of an ISP, Proceedings of the 11th IEEE Consumer Communications and Networking Conference (CCNC), p.80, 2014.

T. Dutch, W. J. Meyer, and . Bolosky, A study of practical deduplication, Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST), p.63, 2011.

A. Miranda, S. Effert, Y. Kang, E. L. Miller, A. Brinkmann et al., Reliable and randomized data distribution strategies for large scale storage systems, 2011 18th International Conference on High Performance Computing, pp.1-10, 2011.
DOI : 10.1109/HiPC.2011.6152745

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.5609

C. Jeffrey, F. Mogul, A. Douglis, B. Feldmann, and . Krishnamurthy, Potential benefits of delta encoding and data compression for http, SIGCOMM Comput. Commun. Rev, vol.27, issue.4, pp.181-194, 1997.

A. Mohaisen, X. Zhang, M. Schuchard, H. Xie, and Y. Kim, Protecting access privacy of cached contents in information centric networks, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13, pp.173-178, 2013.

M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, Dark clouds on the horizon: using cloud storage as attack vector and online slack space, Proceedings of the 20th USENIX Conference on Security (SEC), pp.62-83, 2011.

A. Muthitacharoen, B. Chen, and D. Mazières, A low-bandwidth network file system, ACM SIGOPS Operating Systems Review, vol.35, p.63, 2001.
DOI : 10.1145/502051.502052

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8444

Y. Wee-keong-ng, H. Wen, and . Zhu, Private data deduplication protocols in cloud storage, Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), pp.67-84, 2012.

E. Nygren, R. K. Sitaraman, and J. Sun, The Akamai network, ACM SIGOPS Operating Systems Review, vol.44, issue.3, pp.2-19, 2010.
DOI : 10.1145/1842733.1842736

G. Pallis and A. Vakali, Insight and perspectives for content delivery networks, Communications of the ACM, vol.49, issue.1, pp.33-80, 2006.
DOI : 10.1145/1107458.1107462

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.6750

A. Passarella, A survey on content-centric technologies for the current Internet: CDN and P2P solutions, Computer Communications, vol.35, issue.1, pp.1-32, 2012.
DOI : 10.1016/j.comcom.2011.10.005

D. A. Patterson, G. Gibson, and R. H. Katz, A case for redundant arrays of inexpensive disks (raid), Proceedings of the 1988 ACM SIGMOD International Conference on Management of Data, SIGMOD '88, pp.109-116, 1988.

S. Patterson, A. J. Elmore, and F. Nawab, Serializability, not serial, Divyakant Agrawal, and Amr El Abbadi Procs of the VLDB Endowment Journal, pp.1459-1470, 2012.
DOI : 10.14778/2350229.2350261

M. Pilato, Version Control With Subversion, p.82, 2004.

N. Preguica, J. M. Marques, M. Shapiro, and M. Letia, A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009.
DOI : 10.1109/ICDCS.2009.20

URL : https://hal.archives-ouvertes.fr/inria-00445975

S. Quinlan and S. Dorward, Venti: A new approach to archival storage, Proceedings of USENIX the Conference on File and Storage Technologies (FAST), p.63, 2002.

M. Raynal and A. Schiper, A suite of formal definitions for consistency criteria in distributed shared memories, Procs of the International Conference on Parallel and Distributed Computing Systems (PDCS), p.34, 1996.

K. Ren, C. Wang, and Q. Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, vol.16, issue.1, p.88, 2012.
DOI : 10.1109/MIC.2012.14

S. C. Rhea, K. Liang, and E. Brewer, Value-based web caching, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.619-628, 2003.
DOI : 10.1145/775152.775239

F. Rocha, S. Abreu, and M. Correia, The Final Frontier: Confidentiality and Privacy in the Cloud, Computer, vol.44, issue.9, pp.44-50, 2011.
DOI : 10.1109/MC.2011.223

R. Rodrigues and B. Liskov, High Availability in DHTs: Erasure Coding vs. Replication, Procs of the International Workshop on Peer-to-Peer Systems (IPTPS), p.49, 2005.
DOI : 10.1007/11558989_21

K. Rose, S. Eldridge, and L. Chapin, The internet of things: An overview, p.2015

D. Russel, Data deduplication will be even bigger in 2010, Gartner, p.62, 2010.

D. Salomon and G. Motta, Handbook of Data Compression (5, p.82, 2010.
DOI : 10.1007/978-1-84882-903-9

W. Schindler, A Timing Attack against RSA with the Chinese Remainder Theorem, Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES '00, pp.109-124, 2000.
DOI : 10.1007/3-540-44499-8_8

B. Schroeder and G. A. Gibson, Disk failures in the real world: What does an mttf of 1,000,000 hours mean to you?, Proceedings of the 5th USENIX Conference on File and Storage Technologies, FAST '07. USENIX Association, p.18, 2007.

B. Seo, Survey on data placement and migration algorithms in distributed disk systems, Proceedings of 2004 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), p.23, 2004.

K. Shvachko, H. Kuang, S. Radia, and R. Chansler, The Hadoop Distributed File System, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-10, 2010.
DOI : 10.1109/MSST.2010.5496972

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.989

G. J. Simmons, Symmetric and Asymmetric Encryption, ACM Computing Surveys, vol.11, issue.4, pp.305-330, 1927.
DOI : 10.1145/356789.356793

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.6953

E. Sit, A. Haeberlen, F. Dabek, H. Byung-gon-chun, R. Weatherspoon et al., Proactive replication for data durability, Proceedings of the 5th Intâ??l Workshop on Peer-to-Peer Systems (IPTPS, p.20, 2006.

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001.
DOI : 10.1145/964723.383071

W. Mark, K. Storer, D. D. Greenan, E. L. Long, and . Miller, Secure data deduplication, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS), pp.62-67, 2008.

Y. Sun, F. Liu, B. Li, B. Li, and X. Zhang, FS2You: Peer-assisted semipersistent online storage at a large scale, Procs of the International IEEE INFOCOM Conference, p.44, 2009.
DOI : 10.1109/infcom.2009.5061997

K. Suzaki, K. Iijima, T. Yagi, and C. Artho, Memory deduplication as a threat to the guest OS, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, p.88, 2011.
DOI : 10.1145/1972551.1972552

A. Sweeney, D. Doucette, W. Hu, C. Anderson, M. Nishimoto et al., Scalability in the xfs file system, USENIX Annual Technical Conference, p.22, 1996.

D. Teodosiu, N. Bjorner, J. Porkka, M. Manasse, and Y. Gurevich, Optimizing file replication over limited-bandwidth networks using remote differential compression, p.82, 2006.

D. Terry, Replicated data consistency explained through baseball, Communications of the ACM, vol.56, issue.12, pp.82-89, 1926.
DOI : 10.1145/2500500

F. Walter and . Tichy, Rcs ? a system for version control, Softw. Pract. Exper, vol.15, issue.7, pp.637-654, 1982.

L. Toka, M. Dell-'amico, and P. Michiardi, Online Data Backup: A Peer-Assisted Approach, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), p.44, 2010.
DOI : 10.1109/P2P.2010.5570003

A. Nadjaran-toosi, R. N. Calheiros, and R. Buyya, Interconnected cloud computing environments: Challenges, taxonomy, and survey, ACM Comput. Surv, vol.47, issue.1 4, p.7, 2014.

A. Tridgell and P. Mackerras, The rsync algorithm, p.82, 1996.

V. Valancius, N. Laoutaris, L. Massoulié, C. Diot, and P. Rodriguez, Greening the internet with nano data centers, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, p.44, 2009.
DOI : 10.1145/1658939.1658944

W. Vogels, Eventually consistent, Communications of the ACM, vol.52, issue.1, pp.40-44, 2009.
DOI : 10.1145/1435417.1435432

H. Weatherspoon and J. D. Kubiatowicz, Erasure Coding Vs. Replication: A Quantitative Comparison, Procs of the International Workshop on Peer-to-Peer Systems (IPTPS), p.49, 2002.
DOI : 10.1007/3-540-45748-8_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9064

A. Sage, S. A. Weil, E. L. Brandt, D. D. Miller, C. Long et al., Ceph: a scalable, high-performance distributed file system, Proceedings of the 7th symposium on Operating systems design and implementation, OSDI '06, pp.307-320, 2006.

A. Sage, S. A. Weil, E. L. Brandt, C. Miller, and . Maltzahn, Crush: controlled, scalable, decentralized placement of replicated data, Proceedings of the 2006 ACM/IEEE conference on Supercomputing, SC '06, pp.48-52, 2006.

J. Xiao, Z. Xu, H. Huang, and H. Wang, Security implications of memory deduplication in a virtualized environment, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-12, 2013.
DOI : 10.1109/DSN.2013.6575349

J. Xu, E. Chang, and J. Zhou, Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.67-83, 2013.
DOI : 10.1145/2484313.2484340

L. L. You, K. T. Pollack, and D. D. Long, Deep Store: An Archival Storage System Architecture, 21st International Conference on Data Engineering (ICDE'05), p.63, 2005.
DOI : 10.1109/ICDE.2005.47

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.554.1172

J. Zhang, P. Shang, and J. Wang, A scalable reverse lookup scheme using groupbased shifted declustering layout, Parallel & Distributed Processing Symposium (IPDPS), 2011 IEEE International, pp.604-615, 2011.

Q. Zheng and S. Xu, Secure and efficient proof of storage with deduplication, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.67-84, 2012.
DOI : 10.1145/2133601.2133603

B. Zhu, K. Li, and H. Patterson, Avoiding the disk bottleneck in the data domain deduplication file system, Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), p.63, 2008.

H. Zhu, P. Gu, and J. Wang, Shifted declustering, Proceedings of the 22nd annual international conference on Supercomputing , ICS '08, pp.134-144, 2008.
DOI : 10.1145/1375527.1375549