Intra-user deduplication). C id has already stored the file corresponding to F id ,
Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story, Computer, vol.45, issue.33, pp.37-42 ,
RACS, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.229-240, 2010. ,
DOI : 10.1145/1807128.1807165
Key management in distributed systems, p.28, 2010. ,
Farsite: federated, available, and reliable storage for an incompletely trusted environment, Proceedings of the 5th ACM Symposium on Operating Systems Design and Implementation (OSDI), p.63, 2002. ,
Improving Recoverability in Multi-tier Storage Systems, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07), p.81, 2007. ,
DOI : 10.1109/DSN.2007.57
A principle for resilient sharing of distributed resources, Procs of the 2nd international conference on Software engineering (ICSE), p.37, 1976. ,
Shark: scaling file servers via cooperative caching, Proceedings of the 2nd USENIX Conference on Symposium on Networked Systems Design & Implementation (NSDI), p.63, 2005. ,
A view of cloud computing, Ion Stoica, and Matei Zaharia. A view of cloud computing, pp.50-58, 2002. ,
DOI : 10.1145/1721654.1721672
Basic concepts and taxonomy of dependable and secure computing. Dependable and Secure Computing, IEEE Transactions on, vol.1, issue.1, pp.11-33, 2004. ,
Dupless: Server-aided encryption for deduplicated storage, Proceedings of the 22nd USENIX Conference on Security (SEC), 2013. 65, pp.70-83 ,
Message-Locked Encryption and Secure Deduplication, Proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pp.67-89, 2013. ,
DOI : 10.1007/978-3-642-38348-9_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.252.8386
MetaStorage: A Federated Cloud Storage System to Manage Consistency-Latency Tradeoffs, 2011 IEEE 4th International Conference on Cloud Computing, pp.452-459, 2011. ,
DOI : 10.1109/CLOUD.2011.62
Depsky: dependable and secure storage in a cloud-of-clouds, ACM Transactions on Storage (TOS), vol.9, issue.4, pp.12-95, 2013. ,
Scfs: a shared cloud-backed file system, Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference, pp.169-180, 2014. ,
High availability, scalable storage, dynamic peer networks: pick two, Procs of the 9th conference on Hot Topics in Operating Systems (HOTOS), p.44, 2003. ,
Single instance storage in Windows, Proceedings of the 4th Conference on USENIX Windows Systems Symposium (WSS), p.63, 2000. ,
The lustre storage architecture, p.24, 2004. ,
CAP twelve years later: How the "rules" have changed, Computer, vol.45, issue.2, pp.23-29, 2012. ,
DOI : 10.1109/MC.2012.37
Remote timing attacks are practical, Computer Networks, vol.48, issue.5, pp.701-716, 2005. ,
DOI : 10.1016/j.comnet.2005.01.010
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.2615
Yong-Yeol Ahn, and Sue Moon. I tube, you tube, everybody tubes: Analyzing the world's largest user generated content video system, Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC '07, pp.1-14, 2007. ,
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.19, pp.225-267, 1996. ,
Semantics of caching with spoca: a stateless, proportional, optimally-consistent addressing algorithm, Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIX ATC'11. USENIX Association, pp.22-48, 2011. ,
Efficient replica maintenance for distributed storage systems, Procs of the International Conference on Networked Systems Design & Implementation (NSDI), p.81, 2006. ,
On Delivering Embarrassingly Distributed Cloud Services, HotNets, p.44, 2008. ,
PNUTS, Procs of the VLDB Journal, pp.1277-1288, 2008. ,
DOI : 10.14778/1454159.1454167
The vesta parallel file system, ACM Transactions on Computer Systems (TOCS), vol.14, issue.22, pp.225-264, 1996. ,
Designing a dht for low latency and high throughput, Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, NSDI'04. USENIX Association, pp.95-127, 2004. ,
The Design of Rijndael, p.27, 2002. ,
DOI : 10.1007/978-3-662-04722-4
A guide to the SQL Standard: a user's guide to the standard relational language SQL, 1993. ,
Exploring Consumer Motivations for Creating User-Generated Content, Journal of Interactive Advertising, vol.11, issue.4, pp.16-25, 2008. ,
DOI : 10.1080/15252019.2008.10722139
Swaminathan Sivasubramanian, Peter Vosshall, and Werner Vogels . Dynamo: amazon's highly available key-value store, Procs of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP), p.45, 2007. ,
Efficient peer-to-peer backup services through buffering at the edge, 2011 IEEE International Conference on Peer-to-Peer Computing, p.32, 2011. ,
DOI : 10.1109/P2P.2011.6038671
URL : https://hal.archives-ouvertes.fr/hal-00646768
A Practical Implementation of the Timing Attack, Proceedings of the The International Conference on Smart Card Research and Applications, CARDIS '98, pp.167-182, 2000. ,
DOI : 10.1007/10721064_15
Boosting efficiency and security in proof of ownership for deduplication, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp.2012-67 ,
Globally distributed content delivery, IEEE Internet Computing, vol.6, issue.5, pp.50-58, 2002. ,
DOI : 10.1109/MIC.2002.1036038
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.3792
Hybris, Proceedings of the ACM Symposium on Cloud Computing, SOCC '14, pp.1-14, 2014. ,
DOI : 10.1145/2670979.2670991
Reclaiming space from duplicate files in a serverless distributed file system, Proceedings 22nd International Conference on Distributed Computing Systems, p.89, 2002. ,
DOI : 10.1109/ICDCS.2002.1022312
Dropship-dropbox api utilities. https://github.com/driverdan, p.64 ,
Proactive replication in distributed storage systems using machine availability estimation, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, pp.1-2712, 2007. ,
DOI : 10.1145/1364654.1364689
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.3947
Understanding data deduplication ratios. SNIA Data Management Forum, p.62, 2008. ,
Primary data deduplication-large scale study and system design, Proceedings of the USENIX conference on Annual Technical Conference (ATC), p.63, 2012. ,
Timing attacks on web privacy, Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS), pp.25-32 ,
Achieving sub-second IGP convergence in large IP networks, ACM SIGCOMM Computer Communication Review, vol.35, issue.3, pp.35-44, 2005. ,
DOI : 10.1145/1070873.1070877
The digital universe decade. are you ready? IDC iView: IDC Analyze the future, p.61, 2010. ,
The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, IDC iView: IDC Analyze the future, 2012. ,
The google file system, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP '03, pp.29-43, 2003. ,
Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services, ACM SIGACT News, vol.33, issue.2, pp.51-59, 2002. ,
DOI : 10.1145/564585.564601
Understanding network failures in data centers, ACM SIGCOMM Computer Communication Review, vol.41, issue.4, pp.350-361, 2011. ,
DOI : 10.1145/2043164.2018477
Understanding network failures in data centers: measurement, analysis, and implications, Procs of the ACM SIGCOMM Conference, p.38, 2011. ,
Friend- Box: A hybrid F2F personal storage application, Procs of the IEEE International Conference onCloud Computing (CLOUD), p.44, 2012. ,
DOI : 10.1109/cloud.2012.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.469.1359
Leases: an efficient fault-tolerant mechanism for distributed file cache consistency, Procs of the ACM Symposium on Operating Systems Principles (SOSP), p.37, 1989. ,
Deconstructing commodity storage clusters, ACM SIGARCH Computer Architecture News, vol.33, issue.62, p.63, 2005. ,
Proofs of ownership in remote storage systems, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.62-67, 2011. ,
DOI : 10.1145/2046707.2046765
On algorithms for efficient data migration, Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, pp.620-629, 2001. ,
Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy Magazine, vol.8, issue.6, pp.65-67, 2010. ,
DOI : 10.1109/MSP.2010.187
Improving the resistance to sidechannel attacks on cloud storage services, Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), pp.2012-67 ,
Nccloud: applying network coding for the storage repair in a cloud-of-clouds, Proceedings of the 10th USENIX conference on File and Storage Technologies, pp.21-21, 2012. ,
Understanding hybrid CDN-P2P, Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video, NOSSDAV '08, p.80, 2008. ,
DOI : 10.1145/1496046.1496064
Delta algorithms: an empirical analysis, ACM Transactions on Software Engineering and Methodology, vol.7, issue.2, pp.192-214, 1998. ,
DOI : 10.1145/279310.279321
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.8864
Asura: Scalable and uniform data distribution algorithm for storage clusters. CoRR, abs/1309, pp.24-48, 2013. ,
The effectiveness of deduplication on virtual machine disk images, Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference on, SYSTOR '09, p.62, 2009. ,
DOI : 10.1145/1534530.1534540
Public-key cryptography standards (pkcs) #1: Rsa cryptography specifications version 2, p.28, 2003. ,
DOI : 10.17487/rfc3447
A survey of encryption standards, IEEE Micro, vol.13, issue.6, pp.74-81, 1927. ,
DOI : 10.1109/40.248057
Cryptographic Cloud Storage, Proceedings of the 14th International Conference on Financial Cryptography and Data Security (FC), p.88, 2010. ,
DOI : 10.1007/978-3-642-14992-4_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.159.4794
Consistent hashing and random trees, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.654-663, 1997. ,
DOI : 10.1145/258533.258660
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems, Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '96, pp.104-113, 1996. ,
Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010. ,
DOI : 10.1145/1773912.1773922
Concurrent reading and writing, Communications of the ACM, vol.20, issue.11, pp.806-811, 1977. ,
DOI : 10.1145/359863.359878
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.6657
Conflict Resolution of Data Synchronization in Mobile Environment, Computational Science and Its Applications â?? ICCSA 2004, pp.196-205, 2004. ,
DOI : 10.1007/978-3-540-24709-8_21
Data compression, ACM Comput. Surv, vol.19, issue.80, pp.261-296, 1987. ,
Timing attacks in low-latency mix systems (extended abstract), Proceedings of the 8th International Financial Cryptography conference (FC), pp.251-265, 2004. ,
DOI : 10.1007/978-3-540-27809-2_25
A General Approach to Service Deployment in Cloud Environments, 2012 Second International Conference on Cloud and Green Computing, pp.17-24, 2012. ,
DOI : 10.1109/CGC.2012.90
Sparse indexing: large scale, inline deduplication using sampling and locality, Proccedings of the 7th USENIX Conference on File and Storage Technologies, p.64, 2009. ,
Erasure code replication revisited, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., p.49, 2004. ,
DOI : 10.1109/PTP.2004.1334935
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.109.2034
Policy-Based De-duplication in Secure Cloud Storage, Trustworthy Computing and Services, pp.250-262, 2013. ,
DOI : 10.1007/978-3-642-35795-4_32
A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, vol.7, issue.2, pp.72-93, 2005. ,
DOI : 10.1109/COMST.2005.1610546
A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, vol.7, issue.2, pp.72-93 ,
DOI : 10.1109/COMST.2005.1610546
The nist definition of cloud computing, 2011. ,
DOI : 10.6028/NIST.SP.800-145
Object-based storage, Communications Magazine IEEE, vol.9, issue.8, pp.4184-90, 2003. ,
Frédéric Tronel, and Emmanuelle Anceaume Toward a distributed storage system leveraging the DSL infrastructure of an ISP, Proceedings of the 11th IEEE Consumer Communications and Networking Conference (CCNC), p.80, 2014. ,
A study of practical deduplication, Proceedings of the 9th USENIX Conference on File and Storage Technologies (FAST), p.63, 2011. ,
Reliable and randomized data distribution strategies for large scale storage systems, 2011 18th International Conference on High Performance Computing, pp.1-10, 2011. ,
DOI : 10.1109/HiPC.2011.6152745
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.226.5609
Potential benefits of delta encoding and data compression for http, SIGCOMM Comput. Commun. Rev, vol.27, issue.4, pp.181-194, 1997. ,
Protecting access privacy of cached contents in information centric networks, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS '13, pp.173-178, 2013. ,
Dark clouds on the horizon: using cloud storage as attack vector and online slack space, Proceedings of the 20th USENIX Conference on Security (SEC), pp.62-83, 2011. ,
A low-bandwidth network file system, ACM SIGOPS Operating Systems Review, vol.35, p.63, 2001. ,
DOI : 10.1145/502051.502052
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8444
Private data deduplication protocols in cloud storage, Proceedings of the 27th Annual ACM Symposium on Applied Computing (SAC), pp.67-84, 2012. ,
The Akamai network, ACM SIGOPS Operating Systems Review, vol.44, issue.3, pp.2-19, 2010. ,
DOI : 10.1145/1842733.1842736
Insight and perspectives for content delivery networks, Communications of the ACM, vol.49, issue.1, pp.33-80, 2006. ,
DOI : 10.1145/1107458.1107462
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.6750
A survey on content-centric technologies for the current Internet: CDN and P2P solutions, Computer Communications, vol.35, issue.1, pp.1-32, 2012. ,
DOI : 10.1016/j.comcom.2011.10.005
A case for redundant arrays of inexpensive disks (raid), Proceedings of the 1988 ACM SIGMOD International Conference on Management of Data, SIGMOD '88, pp.109-116, 1988. ,
Serializability, not serial, Divyakant Agrawal, and Amr El Abbadi Procs of the VLDB Endowment Journal, pp.1459-1470, 2012. ,
DOI : 10.14778/2350229.2350261
Version Control With Subversion, p.82, 2004. ,
A Commutative Replicated Data Type for Cooperative Editing, 2009 29th IEEE International Conference on Distributed Computing Systems, pp.395-403, 2009. ,
DOI : 10.1109/ICDCS.2009.20
URL : https://hal.archives-ouvertes.fr/inria-00445975
Venti: A new approach to archival storage, Proceedings of USENIX the Conference on File and Storage Technologies (FAST), p.63, 2002. ,
A suite of formal definitions for consistency criteria in distributed shared memories, Procs of the International Conference on Parallel and Distributed Computing Systems (PDCS), p.34, 1996. ,
Security Challenges for the Public Cloud, IEEE Internet Computing, vol.16, issue.1, p.88, 2012. ,
DOI : 10.1109/MIC.2012.14
Value-based web caching, Proceedings of the twelfth international conference on World Wide Web , WWW '03, pp.619-628, 2003. ,
DOI : 10.1145/775152.775239
The Final Frontier: Confidentiality and Privacy in the Cloud, Computer, vol.44, issue.9, pp.44-50, 2011. ,
DOI : 10.1109/MC.2011.223
High Availability in DHTs: Erasure Coding vs. Replication, Procs of the International Workshop on Peer-to-Peer Systems (IPTPS), p.49, 2005. ,
DOI : 10.1007/11558989_21
The internet of things: An overview, p.2015 ,
Data deduplication will be even bigger in 2010, Gartner, p.62, 2010. ,
Handbook of Data Compression (5, p.82, 2010. ,
DOI : 10.1007/978-1-84882-903-9
A Timing Attack against RSA with the Chinese Remainder Theorem, Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems, CHES '00, pp.109-124, 2000. ,
DOI : 10.1007/3-540-44499-8_8
Disk failures in the real world: What does an mttf of 1,000,000 hours mean to you?, Proceedings of the 5th USENIX Conference on File and Storage Technologies, FAST '07. USENIX Association, p.18, 2007. ,
Survey on data placement and migration algorithms in distributed disk systems, Proceedings of 2004 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA), p.23, 2004. ,
The Hadoop Distributed File System, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-10, 2010. ,
DOI : 10.1109/MSST.2010.5496972
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.989
Symmetric and Asymmetric Encryption, ACM Computing Surveys, vol.11, issue.4, pp.305-330, 1927. ,
DOI : 10.1145/356789.356793
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.6953
Proactive replication for data durability, Proceedings of the 5th Intâ??l Workshop on Peer-to-Peer Systems (IPTPS, p.20, 2006. ,
Chord, ACM SIGCOMM Computer Communication Review, vol.31, issue.4, pp.149-160, 2001. ,
DOI : 10.1145/964723.383071
Secure data deduplication, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability (StorageSS), pp.62-67, 2008. ,
FS2You: Peer-assisted semipersistent online storage at a large scale, Procs of the International IEEE INFOCOM Conference, p.44, 2009. ,
DOI : 10.1109/infcom.2009.5061997
Memory deduplication as a threat to the guest OS, Proceedings of the Fourth European Workshop on System Security, EUROSEC '11, p.88, 2011. ,
DOI : 10.1145/1972551.1972552
Scalability in the xfs file system, USENIX Annual Technical Conference, p.22, 1996. ,
Optimizing file replication over limited-bandwidth networks using remote differential compression, p.82, 2006. ,
Replicated data consistency explained through baseball, Communications of the ACM, vol.56, issue.12, pp.82-89, 1926. ,
DOI : 10.1145/2500500
Rcs ? a system for version control, Softw. Pract. Exper, vol.15, issue.7, pp.637-654, 1982. ,
Online Data Backup: A Peer-Assisted Approach, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), p.44, 2010. ,
DOI : 10.1109/P2P.2010.5570003
Interconnected cloud computing environments: Challenges, taxonomy, and survey, ACM Comput. Surv, vol.47, issue.1 4, p.7, 2014. ,
The rsync algorithm, p.82, 1996. ,
Greening the internet with nano data centers, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, p.44, 2009. ,
DOI : 10.1145/1658939.1658944
Eventually consistent, Communications of the ACM, vol.52, issue.1, pp.40-44, 2009. ,
DOI : 10.1145/1435417.1435432
Erasure Coding Vs. Replication: A Quantitative Comparison, Procs of the International Workshop on Peer-to-Peer Systems (IPTPS), p.49, 2002. ,
DOI : 10.1007/3-540-45748-8_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.9064
Ceph: a scalable, high-performance distributed file system, Proceedings of the 7th symposium on Operating systems design and implementation, OSDI '06, pp.307-320, 2006. ,
Crush: controlled, scalable, decentralized placement of replicated data, Proceedings of the 2006 ACM/IEEE conference on Supercomputing, SC '06, pp.48-52, 2006. ,
Security implications of memory deduplication in a virtualized environment, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.1-12, 2013. ,
DOI : 10.1109/DSN.2013.6575349
Weak leakage-resilient client-side deduplication of encrypted data in cloud storage, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.67-83, 2013. ,
DOI : 10.1145/2484313.2484340
Deep Store: An Archival Storage System Architecture, 21st International Conference on Data Engineering (ICDE'05), p.63, 2005. ,
DOI : 10.1109/ICDE.2005.47
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.554.1172
A scalable reverse lookup scheme using groupbased shifted declustering layout, Parallel & Distributed Processing Symposium (IPDPS), 2011 IEEE International, pp.604-615, 2011. ,
Secure and efficient proof of storage with deduplication, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.67-84, 2012. ,
DOI : 10.1145/2133601.2133603
Avoiding the disk bottleneck in the data domain deduplication file system, Proceedings of the 6th USENIX Conference on File and Storage Technologies (FAST), p.63, 2008. ,
Shifted declustering, Proceedings of the 22nd annual international conference on Supercomputing , ICS '08, pp.134-144, 2008. ,
DOI : 10.1145/1375527.1375549