• Li A, Chen Y, Yan Z, Zhou X and Shimizu S. A Survey on Integrity Auditing for Data Storage in the Cloud: From Single Copy to Multiple Replicas. IEEE Transactions on Big Data. 10.1109/TBDATA.2020.3029209. 8:5. (1428-1442).

    https://ieeexplore.ieee.org/document/9216493/

  • Arshinskiy L and Shurkhovetsky G. (2022). Methods of Information Security in Cloud Storages. Transportation Research Procedia. 10.1016/j.trpro.2022.01.074. 61. (455-461).

    https://linkinghub.elsevier.com/retrieve/pii/S2352146522000813

  • Prithi S, Sumathi D, Poongodi T and Suresh P. (2022). Trust Management Framework for Handling Security Issues in Multi-cloud Environment. Operationalizing Multi-Cloud Environments. 10.1007/978-3-030-74402-1_16. (287-306).

    https://link.springer.com/10.1007/978-3-030-74402-1_16

  • Kim B and Kim H. Rocky: Replicating Block Devices for Tamper and Failure Resistant Edge-based Virtualized Desktop Infrastructure. Proceedings of the 37th Annual Computer Security Applications Conference. (285-296).

    https://doi.org/10.1145/3485832.3485886

  • Kim B and Yoon Y. (2021). Cloud Storage Service Architecture Providing the Eventually Consistent Totally Ordered Commit History of Distributed Key-Value Stores for Data Consistency Verification. Electronics. 10.3390/electronics10212702. 10:21. (2702).

    https://www.mdpi.com/2079-9292/10/21/2702

  • Pachala S, Rupa C and Sumalatha L. (2021). An improved security and privacy management system for data in multi-cloud environments using a hybrid approach. Evolutionary Intelligence. 10.1007/s12065-020-00555-w. 14:2. (1117-1133). Online publication date: 1-Jun-2021.

    https://link.springer.com/10.1007/s12065-020-00555-w

  • Fan C, Huang J, Tseng S and Chen I. Dependable Data Outsourcing Scheme Based on Cloud-of-Clouds Approach with Fast Recovery. IEEE Transactions on Cloud Computing. 10.1109/TCC.2018.2871181. 9:2. (546-561).

    https://ieeexplore.ieee.org/document/8468122/

  • Kalpana P, Venugopal A and Sudha P. (2021). A Contemporary Framework Key Based Crypto Method to Enhance Security in Multi Cloud Ambience 2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). 10.1109/ICCCIS51004.2021.9397100. 978-1-7281-8529-3. (275-280).

    https://ieeexplore.ieee.org/document/9397100/

  • Chen Y, Wang L, Chen X, Ranjan R, Zomaya A, Zhou Y and Hu S. Stochastic Workload Scheduling for Uncoordinated Datacenter Clouds with Multiple QoS Constraints. IEEE Transactions on Cloud Computing. 10.1109/TCC.2016.2586048. 8:4. (1284-1295).

    https://ieeexplore.ieee.org/document/7501820/

  • Kushala M and Shylaja B. (2020). Recent Trends on Security Issues in Multi-Cloud Computing: A Survey 2020 International Conference on Smart Electronics and Communication (ICOSEC). 10.1109/ICOSEC49089.2020.9215303. 978-1-7281-5461-9. (777-781).

    https://ieeexplore.ieee.org/document/9215303/

  • Chung J, Joe‐Wong C and Ha S. (2020). A Highly Available Storage System for Elastic Fog. Fog and Fogonomics. 10.1002/9781119501121.ch12. (295-323). Online publication date: 4-Mar-2020.

    https://onlinelibrary.wiley.com/doi/10.1002/9781119501121.ch12

  • Dobre D, Karame G, Li W, Majuntke M, Suri N and Vukolic M. Proofs of Writing for Robust Storage. IEEE Transactions on Parallel and Distributed Systems. 10.1109/TPDS.2019.2919285. 30:11. (2547-2566).

    https://ieeexplore.ieee.org/document/8723148/

  • Esteves T, Macedo R, Faria A, Portela B, Paulo J, Pereira J and Harnik D. (2019). TrustFS: An SGX-Enabled Stackable File System Framework 2019 38th International Symposium on Reliable Distributed Systems Workshops (SRDSW). 10.1109/SRDSW49218.2019.00012. 978-1-7281-4255-5. (25-30).

    https://ieeexplore.ieee.org/document/8940012/

  • Framner E, Fischer-Hübner S, Lorünser T, Alaqra A and Pettersson J. (2019). Making secret sharing based cloud storage usable. Information & Computer Security. 10.1108/ICS-01-2019-0016. ahead-of-print:ahead-of-print. Online publication date: 18-Sep-2019.

    https://www.emerald.com/insight/content/doi/10.1108/ICS-01-2019-0016/full/html

  • Karame G, Soriente C, Lichota K and Capkun S. Securing Cloud Data Under Key Exposure. IEEE Transactions on Cloud Computing. 10.1109/TCC.2017.2670559. 7:3. (838-849).

    https://ieeexplore.ieee.org/document/7857724/

  • E J, Cui Y, Ruan M, Li Z and Zhai E. (2019). HyCloud: Tweaking Hybrid Cloud Storage Services for Cost-Efficient Filesystem Hosting IEEE INFOCOM 2019 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2019.8737399. 978-1-7281-0515-4. (2341-2349).

    https://ieeexplore.ieee.org/document/8737399/

  • Liu M, Pan L and Liua S. To Transfer or Not: An Online Cost Optimization Algorithm for Using Two-tier Storage-as-a-Service Clouds. IEEE Access. 10.1109/ACCESS.2019.2928844. (1-1).

    https://ieeexplore.ieee.org/document/8763963/

  • Du K and Swamy M. (2019). Big Data, Cloud Computing, and Internet of Things. Neural Networks and Statistical Learning. 10.1007/978-1-4471-7452-3_31. (905-932).

    http://link.springer.com/10.1007/978-1-4471-7452-3_31

  • Sell L, Pohls H and Lorunser T. (2018). C3S: Cryptographically Combine Cloud Storage for Cost-Efficient Availability and Confidentiality 2018 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 10.1109/CloudCom2018.2018.00052. 978-1-5386-7899-2. (230-238).

    https://ieeexplore.ieee.org/document/8591021/

  • Mansouri Y, Toosi A and Buyya R. (2017). Data Storage Management in Cloud Environments. ACM Computing Surveys. 50:6. (1-51). Online publication date: 30-Nov-2018.

    https://doi.org/10.1145/3136623

  • Matos D, Pardal M, Carle G and Correia M. RockFS. Proceedings of the 19th International Middleware Conference. (107-119).

    https://doi.org/10.1145/3274808.3274817

  • Gu Y, Hou D, Wu X, Tao J and Zhang Y. (2018). Decentralized Transaction Mechanism Based on Smart Contract in Distributed Data Storage. Information. 10.3390/info9110286. 9:11. (286).

    https://www.mdpi.com/2078-2489/9/11/286

  • karkouda K, Nabli A and Gargouri F. Privacy and availability in cloud data warehouse. Proceedings of the 10th International Conference on Education Technology and Computers. (388-391).

    https://doi.org/10.1145/3290511.3290580

  • Sakr A, Yaacoub E, Noura H, Al-Husseini M, Abualsaud K, Khattab T and Guizani M. (2018). A secure client-side framework for protecting the privacy of health data stored on the cloud 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM). 10.1109/MENACOMM.2018.8371017. 978-1-5386-1254-5. (1-6).

    https://ieeexplore.ieee.org/document/8371017/

  • Huang Q, He Y, Yue W, Yang Y and Wang W. (2018). Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption. Security and Communication Networks. 2018. Online publication date: 1-Jan-2018.

    https://doi.org/10.1155/2018/8932325

  • E J, Cui Y, Wang P, Li Z and Zhang C. (2018). CoCloud. IEEE Transactions on Parallel and Distributed Systems. 29:1. (56-69). Online publication date: 1-Jan-2018.

    https://doi.org/10.1109/TPDS.2017.2750161

  • Lee S and Shin Y. (2018). A Study of Service Quality in Multi Cloud Computing. Advances in Computer Science and Ubiquitous Computing. 10.1007/978-981-10-7605-3_129. (811-816).

    http://link.springer.com/10.1007/978-981-10-7605-3_129

  • Arora A, Rakesh N and Mishra K. (2018). Reliable Packet Delivery in Vehicular Networks Using WAVE for Communication Among High Speed Vehicles. Networking Communication and Data Knowledge Engineering. 10.1007/978-981-10-4585-1_6. (65-77).

    http://link.springer.com/10.1007/978-981-10-4585-1_6

  • Arora A, Rakesh N and Mishra K. (2018). Analysis of Safety Applications in VANET for LTE Based Network. Networking Communication and Data Knowledge Engineering. 10.1007/978-981-10-4585-1_12. (141-154).

    http://link.springer.com/10.1007/978-981-10-4585-1_12

  • Karkouda K, Nabli A and Gargouri F. (2018). A New Schema for Securing Data Warehouse Hosted in the Cloud. Research and Practical Issues of Enterprise Information Systems. 10.1007/978-3-319-99040-8_11. (134-145).

    https://link.springer.com/10.1007/978-3-319-99040-8_11

  • Miura Y, Wakabayashi N, Ueno S, Kanai A, Tanimoto S and Sato H. (2018). A Performance Evaluation of Data Storage Approach for High Availability and Confidentiality on Multi-cloud. Advances in Network-Based Information Systems. 10.1007/978-3-319-65521-5_80. (888-900).

    http://link.springer.com/10.1007/978-3-319-65521-5_80

  • Harn L and Hsu C. (2017). A Novel Threshold Cryptography with Membership Authentication and Key Establishment. Wireless Personal Communications: An International Journal. 97:3. (3943-3950). Online publication date: 1-Dec-2017.

    https://doi.org/10.1007/s11277-017-4708-z

  • Zhai E, Piskac R, Gu R, Lao X and Wang X. (2017). An auditing language for preventing correlated failures in the cloud. Proceedings of the ACM on Programming Languages. 1:OOPSLA. (1-28). Online publication date: 12-Oct-2017.

    https://doi.org/10.1145/3133921

  • Yang J, Zhu H, Zhu X, Liu Y, Liu L and Liu T. (2017). Resource allocation policy based on trust in the multi-cloud environment 2017 IEEE International Conference on Systems, Man and Cybernetics (SMC). 10.1109/SMC.2017.8123122. 978-1-5386-1645-1. (3207-3212).

    http://ieeexplore.ieee.org/document/8123122/

  • Marwan M, Kartit A and Ouahmane H. (2017). Using cloud solution for medical image processing: Issues and implementation efforts 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech). 10.1109/CloudTech.2017.8284703. 978-1-5386-1115-9. (1-7).

    http://ieeexplore.ieee.org/document/8284703/

  • Marwan M, Kartit A and Ouahmane H. (2017). Protecting medical images in cloud using visual cryptography scheme 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech). 10.1109/CloudTech.2017.8284702. 978-1-5386-1115-9. (1-6).

    http://ieeexplore.ieee.org/document/8284702/

  • Zhang L and Tang B. (2017). GrandStore: Towards Large-Scale Free Personal Cloud Storage 2017 International Conference on Computer Network, Electronic and Automation (ICCNEA). 10.1109/ICCNEA.2017.110. 978-1-5386-3981-8. (118-123).

    http://ieeexplore.ieee.org/document/8128541/

  • Wu S, Li K, Mao B and Liao M. (2017). DAC: Improving storage availability with Deduplication-Assisted Cloud-of-Clouds. Future Generation Computer Systems. 10.1016/j.future.2016.02.001. 74. (190-198). Online publication date: 1-Sep-2017.

    https://linkinghub.elsevier.com/retrieve/pii/S0167739X16300073

  • Nagesh S, Kumar K and Rajgopal K. (2017). Cloud architectures encountering data security and privacy concerns — A review 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). 10.1109/ICECDS.2017.8389745. 978-1-5386-1887-5. (1729-1735).

    https://ieeexplore.ieee.org/document/8389745/

  • SureshPatil D, Mane R and Ghorpade V. (2017). Improving the Availability and Reducing Redundancy using Deduplication of Cloud Storage System 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). 10.1109/ICCUBEA.2017.8463856. 978-1-5386-4008-1. (1-5).

    https://ieeexplore.ieee.org/document/8463856/

  • Marwan M, Kartit A and Ouahmane H. Protecting medical data in cloud storage using fault-tolerance mechanism. Proceedings of the 2017 International Conference on Smart Digital Environment. (214-219).

    https://doi.org/10.1145/3128128.3128161

  • Chen Y, Mu S, Li J, Huang C, Li J, Ogus A and Phillips D. Giza. Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference. (539-551).

    /doi/10.5555/3154690.3154742

  • Costa P, Ramos F and Correia M. On the Design of Resilient Multicloud MapReduce. IEEE Cloud Computing. 10.1109/MCC.2017.3791027. 4:4. (74-82).

    http://ieeexplore.ieee.org/document/8065997/

  • Shen Z, Jia Q, Sela G, Song W, Weatherspoon H and Van Renesse R. (2017). Supercloud. ACM Transactions on Computer Systems. 35:2. (1-33). Online publication date: 31-May-2017.

    https://doi.org/10.1145/3132038

  • Seo D, Kim S and Song G. Mutual exclusion method in client-side aggregation of cloud storage. IEEE Transactions on Consumer Electronics. 10.1109/TCE.2017.014838. 63:2. (185-190).

    http://ieeexplore.ieee.org/document/8013258/

  • Jinlong E , Cui Y, Wang P, Li Z and Zhang C. (2017). CoCloud: Enabling efficient cross-cloud file collaboration based on inefficient web APIs INFOCOM 2017 - IEEE Conference on Computer Communications. 10.1109/INFOCOM.2017.8056947. 978-1-5090-5336-0. (1-9).

    https://ieeexplore.ieee.org/document/8056947/

  • Barreto L, Scheunemann L, Fraga J and Siqueira F. Secure storage of user credentials and attributes in federation of clouds. Proceedings of the Symposium on Applied Computing. (364-369).

    https://doi.org/10.1145/3019612.3019627

  • OKI E, KANEKO R, KITSUWAN N, KURIMOTO T and URUSHIDANI S. (2017). Cloud Provider Selection Models for Cloud Storage Services to Satisfy Availability Requirements. IEICE Transactions on Communications. 10.1587/transcom.2016EBP3403. E100.B:8. (1406-1418).

    https://www.jstage.jst.go.jp/article/transcom/E100.B/8/E100.B_2016EBP3403/_article

  • Esteves-Verissimo P, Volp M, Decouchant J, Rahli V and Rocha F. (2017). Meeting the Challenges of Critical and Extreme Dependability and Security 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC). 10.1109/PRDC.2017.21. 978-1-5090-5652-1. (92-97).

    http://ieeexplore.ieee.org/document/7920601/

  • Seo D, Kim S and Song G. (2017). Mutual exclusion strategy in a Cloud-of-clouds 2017 IEEE International Conference on Consumer Electronics (ICCE). 10.1109/ICCE.2017.7889254. 978-1-5090-5544-9. (124-125).

    http://ieeexplore.ieee.org/document/7889254/

  • Arora A, Rakesh N and Mishra K. (2017). Scrutiny of VANET Protocols on the Basis of Communication Scenario and Implementation of WAVE 802.11p/1609.4 with NS3 Using SUMO. Advances in Computer and Computational Sciences. 10.1007/978-981-10-3770-2_33. (355-371).

    http://link.springer.com/10.1007/978-981-10-3770-2_33

  • Zeidler C and Asghar M. (2017). Towards a Framework for Privacy-Preserving Data Sharing in Portable Clouds. Cloud Computing and Services Science. 10.1007/978-3-319-62594-2_14. (273-293).

    http://link.springer.com/10.1007/978-3-319-62594-2_14

  • Contiu S, Leblond E and Réveillère L. (2017). Benchmarking Cryptographic Schemes for Securing Public Cloud Storages. Distributed Applications and Interoperable Systems. 10.1007/978-3-319-59665-5_12. (163-176).

    http://link.springer.com/10.1007/978-3-319-59665-5_12

  • Yuan X, Wu K and Wu C. (2016). Optimized Hybrid Redundant Multi-cloud Method with Deduplication Mechanism 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). 10.1109/HPCC-SmartCity-DSS.2016.0063. 978-1-5090-4297-5. (393-397).

    http://ieeexplore.ieee.org/document/7828404/

  • Junghanns P, Fabian B and Ermakova T. (2016). Engineering of secure multi-cloud storage. Computers in Industry. 83:C. (108-120). Online publication date: 1-Dec-2016.

    https://doi.org/10.1016/j.compind.2016.09.001

  • Hossain M, Noor S, Mukhapadhay D, Hasan R and Li L. (2016). CACROS: A Context-Aware Cloud Content Roaming Service 2016 IEEE International Conference on Smart Cloud (SmartCloud). 10.1109/SmartCloud.2016.48. 978-1-5090-5263-9. (57-68).

    http://ieeexplore.ieee.org/document/7796154/

  • Wu J, Xu H and Vassilev T. (2016). Design of 3D Rendering Platform Based on Cloud Computing 2016 4th International Conference on Enterprise Systems (ES). 10.1109/ES.2016.26. 978-1-5090-3790-2. (153-159).

    http://ieeexplore.ieee.org/document/7880485/

  • Mansouri Y and Buyya R. (2016). To move or not to move. Journal of Network and Computer Applications. 75:C. (223-235). Online publication date: 1-Nov-2016.

    https://doi.org/10.1016/j.jnca.2016.08.029

  • Sayler A, Andrews T, Monaco M and Grunwald D. Tutamen. Proceedings of the Seventh ACM Symposium on Cloud Computing. (251-264).

    https://doi.org/10.1145/2987550.2987581

  • Shen Z, Jia Q, Sela G, Rainero B, Song W, van Renesse R and Weatherspoon H. Follow the Sun through the Clouds. Proceedings of the Seventh ACM Symposium on Cloud Computing. (141-154).

    https://doi.org/10.1145/2987550.2987561

  • Schabhuser L, Demirel D and Buchmann J. (2016). An unconditionally hiding auditing procedure for computations over distributed data 2016 IEEE Conference on Communications and Network Security (CNS). 10.1109/CNS.2016.7860547. 978-1-5090-3065-1. (552-560).

    http://ieeexplore.ieee.org/document/7860547/

  • Kiraz M. (2016). A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. Journal of Ambient Intelligence and Humanized Computing. 10.1007/s12652-016-0385-0. 7:5. (731-760). Online publication date: 1-Oct-2016.

    http://link.springer.com/10.1007/s12652-016-0385-0

  • Brito T, Duarte N and Santos N. (2016). ARM TrustZone for Secure Image Processing on the Cloud 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW). 10.1109/SRDSW.2016.17. 978-1-5090-5259-2. (37-42).

    http://ieeexplore.ieee.org/document/7600151/

  • Pontes R, Maia F, Paulo J and Vilaca R. (2016). SafeRegions: Performance Evaluation of Multi-party Protocols on HBase 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW). 10.1109/SRDSW.2016.16. 978-1-5090-5259-2. (31-36).

    http://ieeexplore.ieee.org/document/7600150/

  • Burihabwa D, Pontes R, Felber P, Maia F, Mercier H, Oliveira R, Paulo J and Schiavoni V. (2016). On the Cost of Safe Storage for Public Clouds: An Experimental Evaluation 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS). 10.1109/SRDS.2016.028. 978-1-5090-3513-7. (157-166).

    http://ieeexplore.ieee.org/document/7794340/

  • Li P, Guo S, Miyazaki T, Xie M, Hu J and Zhuang W. Privacy-Preserving Access to Big Data in the Cloud. IEEE Cloud Computing. 10.1109/MCC.2016.107. 3:5. (34-42).

    http://ieeexplore.ieee.org/document/7742270/

  • Marwan M, Kartit A and Ouahmane H. (2016). Secure cloud-based medical image storage using secret share scheme 2016 5th International Conference on Multimedia Computing and Systems (ICMCS). 10.1109/ICMCS.2016.7905649. 978-1-5090-5146-5. (366-371).

    http://ieeexplore.ieee.org/document/7905649/

  • Salunkhe S and Patil D. (2016). Division and replication for data with public auditing scheme for cloud storage 2016 International Conference on Computing Communication Control and automation (ICCUBEA). 10.1109/ICCUBEA.2016.7859985. 978-1-5090-3291-4. (1-5).

    http://ieeexplore.ieee.org/document/7859985/

  • Hansen C and Archibald J. (2016). The Case for RAID 4: Cloud-RAID Integration with Local Storage 2016 11th International Conference on Availability, Reliability and Security (ARES ). 10.1109/ARES.2016.100. 978-1-5090-0990-9. (235-240).

    http://ieeexplore.ieee.org/document/7784576/

  • Hong S. (2015). Two-channel user authentication by using USB on Cloud. Journal of Computer Virology and Hacking Techniques. 10.1007/s11416-015-0254-y. 12:3. (137-143). Online publication date: 1-Aug-2016.

    http://link.springer.com/10.1007/s11416-015-0254-y

  • Malik S, Khan S, Ewen S, Tziritas N, Kolodziej J, Zomaya A, Madani S, Min-Allah N, Wang L, Xu C, Malluhi Q, Pecero J, Balaji P, Vishnu A, Ranjan R, Zeadally S and Li H. (2016). Performance analysis of data intensive cloud systems based on data management and replication. Distributed and Parallel Databases. 34:2. (179-215). Online publication date: 1-Jun-2016.

    https://doi.org/10.1007/s10619-015-7173-2

  • Costa P, Bai X, Ramos F and Correia M. Medusa. Proceedings of the 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing. (443-452).

    https://doi.org/10.1109/CCGrid.2016.20

  • Li M, Qin C, Li J and Lee P. CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal. IEEE Internet Computing. 10.1109/MIC.2016.45. 20:3. (45-53).

    http://ieeexplore.ieee.org/document/7436640/

  • Marwan M, Kartit A and Ouahmane H. (2016). A secure framework for medical image storage based on multi-cloud 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). 10.1109/CloudTech.2016.7847683. 978-1-4673-8894-8. (88-94).

    http://ieeexplore.ieee.org/document/7847683/

  • Chang C, Sun J and Chen H. (2016). Coral: A Cloud-Backed Frugal File System. IEEE Transactions on Parallel and Distributed Systems. 27:4. (978-991). Online publication date: 1-Apr-2016.

    https://doi.org/10.1109/TPDS.2015.2424705

  • Razaque A, Nadimpalli S, Vommina S, Atukuri D, Reddy D, Anne P, Vegi D and Malllapu V. (2016). Secure data sharing in multi-clouds 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT). 10.1109/ICEEOT.2016.7755020. 978-1-4673-9939-5. (1909-1913).

    http://ieeexplore.ieee.org/document/7755020/

  • Filho P, Rech L, Lung L, Correia M and Camargos L. (2016). Priority-Based State Machine Replication with PRaxos 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). 10.1109/AINA.2016.63. 978-1-5090-1858-1. (540-547).

    http://ieeexplore.ieee.org/document/7474136/

  • Jogdand R, Batlad S and Gangodkar D. (2016). CSaaS - a multi-cloud framework for secure file storage technology using open ZFS. International Journal of High Performance Computing and Networking. 9:3. (230-241). Online publication date: 1-Jan-2016.

    https://doi.org/10.1504/ijhpcn.2016.076265

  • Arora A, Mishra K and Rakesh N. (2016). Reconsidering the cloud approach towards VANET communication 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC). 10.1109/PDGC.2016.7913157. 978-1-5090-3669-1. (22-27).

    http://ieeexplore.ieee.org/document/7913157/

  • Colman-Meixner C, Develder C, Tornatore M and Mukherjee B. A Survey on Resiliency Techniques in Cloud Computing Infrastructures and Applications. IEEE Communications Surveys & Tutorials. 10.1109/COMST.2016.2531104. 18:3. (2244-2281).

    http://ieeexplore.ieee.org/document/7409914/

  • Jin Y, Wang Y, Xia W, Deng L and He H. A Data Hiding Scheme Based on Lagrange Interpolation Algorithm and Multi-clouds. Proceedings of the 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP). (210-216).

    https://doi.org/10.1109/PAAP.2015.47

  • Lee B, Awad A and Awad M. Towards secure provenance in the cloud. Proceedings of the 8th International Conference on Utility and Cloud Computing. (577-582).

    /doi/10.5555/3233397.3233511

  • Lee B, Awad A and Awad M. (2015). Towards Secure Provenance in the Cloud: A Survey 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC). 10.1109/UCC.2015.102. 978-0-7695-5697-0. (577-582).

    https://ieeexplore.ieee.org/document/7431477/

  • Hussain R, Rezaeifar Z, Lee Y and Oh H. (2015). Secure and privacy-aware traffic information as a service in VANET-based clouds. Pervasive and Mobile Computing. 24:C. (194-209). Online publication date: 1-Dec-2015.

    https://doi.org/10.1016/j.pmcj.2015.07.007

  • Tang H, Liu F, Shen G, Jin Y and Guo C. UniDrive. Proceedings of the 16th Annual Middleware Conference. (137-148).

    https://doi.org/10.1145/2814576.2814729

  • Vimercati S, Foresti S, Paraboschi S, Pelosi G and Samarati P. (2015). Shuffle Index. ACM Transactions on Storage. 11:4. (1-55). Online publication date: 21-Nov-2015.

    https://doi.org/10.1145/2747878

  • Serbanescu V, Pop F, Cristea V and Antoniu G. (2015). A formal method for rule analysis and validation in distributed data aggregation service. World Wide Web. 18:6. (1717-1736). Online publication date: 1-Nov-2015.

    https://doi.org/10.1007/s11280-015-0334-4

  • Chung J, Ha S and Hong J. (2015). A management architecture for client‐defined cloud storage services. International Journal of Network Management. 10.1002/nem.1904. 25:6. (435-453). Online publication date: 1-Nov-2015.

    https://onlinelibrary.wiley.com/doi/10.1002/nem.1904

  • Graupner H, Torkura K, Berger P, Meinel C and Schnjakin M. Secure access control for multi-cloud resources. Proceedings of the 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops). (722-729).

    https://doi.org/10.1109/LCNW.2015.7365920

  • Kloudas K, Mamede M, Preguiça N and Rodrigues R. (2015). Pixida. Proceedings of the VLDB Endowment. 9:2. (72-83). Online publication date: 1-Oct-2015.

    https://doi.org/10.14778/2850578.2850582

  • Khattak H, Abbass H, Naeem A, Saleem K and Iqbal W. (2015). Security concerns of cloud-based healthcare systems: A perspective of moving from single-cloud to a multi-cloud infrastructure 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). 10.1109/HealthCom.2015.7454474. 978-1-4673-8325-7. (61-67).

    http://ieeexplore.ieee.org/document/7454474/

  • Rizvi S, Razaque A and Cover K. Cloud Data Integrity Using a Designated Public Verifier. Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf on Embedded Software and Systems. (1361-1366).

    https://doi.org/10.1109/HPCC-CSS-ICESS.2015.277

  • Song G, Kim S and Seo D. Saveme: client-side aggregation of cloud storage. IEEE Transactions on Consumer Electronics. 10.1109/TCE.2015.7298089. 61:3. (302-310).

    http://ieeexplore.ieee.org/document/7298089/

  • Huang W, Ganjali A, Kim B, Oh S and Lie D. (2015). The State of Public Infrastructure-as-a-Service Cloud Security. ACM Computing Surveys. 47:4. (1-31). Online publication date: 21-Jul-2015.

    https://doi.org/10.1145/2767181

  • Zhang Q, Li S, Li Z, Xing Y, Yang Z and Dai Y. CHARM: A Cost-Efficient Multi-Cloud Data Hosting Scheme with High Availability. IEEE Transactions on Cloud Computing. 10.1109/TCC.2015.2417534. 3:3. (372-386).

    http://ieeexplore.ieee.org/document/7072495/

  • Hussain R, Rezaeifar Z and Oh H. (2015). A Paradigm Shift from Vehicular Ad Hoc Networks to VANET-Based Clouds. Wireless Personal Communications: An International Journal. 83:2. (1131-1158). Online publication date: 1-Jul-2015.

    https://doi.org/10.1007/s11277-015-2442-y

  • Mao B, Wu S and Jiang H. Improving Storage Availability in Cloud-of-Clouds with Hybrid Redundant Data Distribution. Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium. (633-642).

    https://doi.org/10.1109/IPDPS.2015.47

  • Wu Z, Yu C and Madhyastha H. CosTLO. Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation. (543-557).

    /doi/10.5555/2789770.2789808

  • Haimes Y, Horowitz B, Guo Z, Andrijcic E and Bogdanor J. (2015). Assessing Systemic Risk to Cloud‐Computing Technology as Complex Interconnected Systems of Systems. Systems Engineering. 10.1002/sys.21303. 18:3. (284-299). Online publication date: 1-May-2015.

    https://incose.onlinelibrary.wiley.com/doi/10.1002/sys.21303

  • Chung J, Joe-Wong C, Ha S, Hong J and Chiang M. CYRUS. Proceedings of the Tenth European Conference on Computer Systems. (1-16).

    https://doi.org/10.1145/2741948.2741951

  • Kajiura Y, Ueno S, Kanai A, Tanimoto S and Sato H. An Approach to Selecting Cloud Services for Data Storage in Heterogneous-Multicloud Environment with High Availability and Confidentiality. Proceedings of the 2015 IEEE Twelfth International Symposium on Autonomous Decentralized Systems. (205-210).

    https://doi.org/10.1109/ISADS.2015.37

  • Fabian B, Ermakova T and Junghanns P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems. 48:C. (132-150). Online publication date: 1-Mar-2015.

    https://doi.org/10.1016/j.is.2014.05.004

  • Jogdand R, Goudar R, Sayed G and Dhamanekar P. (2013). Enabling public verifiability and availability for secure data storage in cloud computing. Evolving Systems. 10.1007/s12530-013-9095-4. 6:1. (55-65). Online publication date: 1-Mar-2015.

    http://link.springer.com/10.1007/s12530-013-9095-4

  • Schnjakin M and Meinel C. Solving Security and Availability Challenges in Public Clouds. Cloud Technology. 10.4018/978-1-4666-6539-2.ch093. (1999-2021).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6539-2.ch093

  • Song G, Kim S and Seo D. (2015). SaveMe: User-centric cloud system 2015 IEEE International Conference on Consumer Electronics (ICCE). 10.1109/ICCE.2015.7066361. 978-1-4799-7543-3. (158-159).

    http://ieeexplore.ieee.org/document/7066361/

  • Tawalbeh L, Darwazeh N, Al-Qassas R and AlDosari F. (2015). A Secure Cloud Computing Model based on Data Classification. Procedia Computer Science. 10.1016/j.procs.2015.05.150. 52. (1153-1158).

    https://linkinghub.elsevier.com/retrieve/pii/S1877050915009503

  • Esiner E, Küpçü A and Özkasap Ö. (2015). Analysis and Optimization on FlexDPDP: A Practical Solution for Dynamic Provable Data Possession. Intelligent Cloud Computing. 10.1007/978-3-319-19848-4_5. (65-83).

    https://link.springer.com/10.1007/978-3-319-19848-4_5

  • Butoi A, Moca M and Tomai N. (2015). Data Confidentiality in Cloud Storage Protocol Based on Secret Sharing Scheme: A Brute Force Attack Evaluation. Trust Management IX. 10.1007/978-3-319-18491-3_13. (177-184).

    http://link.springer.com/10.1007/978-3-319-18491-3_13

  • Mu S, Su M, Gao P, Wu Y, Li K and Zomaya A. (2015). Cloud Storage over Multiple Data Centers. Handbook on Data Centers. 10.1007/978-1-4939-2092-1_24. (691-725).

    https://link.springer.com/10.1007/978-1-4939-2092-1_24

  • Butoi A and Tomai N. Secret Sharing Scheme for Data Confidentiality Preserving in a Public-Private Hybrid Cloud Storage Approach. Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. (992-997).

    https://doi.org/10.1109/UCC.2014.163

  • Msahli M, Chen X and Serhrouchni A. Towards a Fine-Grained Access Control for Cloud. Proceedings of the 2014 IEEE 11th International Conference on e-Business Engineering. (286-291).

    https://doi.org/10.1109/ICEBE.2014.56

  • Datta A. (2014). Locally Repairable RapidRAID Systematic Codes — One simple convoluted way to get it all 2014 IEEE Information Theory Workshop (ITW). 10.1109/ITW.2014.6970792. 978-1-4799-5999-0. (60-64).

    http://ieeexplore.ieee.org/document/6970792/

  • Zhai E, Chen R, Wolinsky D and Ford B. Heading off correlated failures through independence-as-a-service. Proceedings of the 11th USENIX conference on Operating Systems Design and Implementation. (317-334).

    /doi/10.5555/2685048.2685073

  • Msahli M and Serhrouchni A. (2014). PCM in cloud 2014 IEEE International Conference on Granular Computing (GrC). 10.1109/GRC.2014.6982835. 978-1-4799-5464-3. (201-206).

    http://ieeexplore.ieee.org/document/6982835/

  • Park Y, Lee E and Seo S. (2014). Lightweight (k, n)-file sharing scheme for distributed storages with diverse communication capacities 2014 IEEE Conference on Communications and Network Security (CNS). 10.1109/CNS.2014.6997506. 978-1-4799-5890-0. (373-381).

    http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6997506

  • Ting W, Lu K, Lo C, Chang S and Liu P. Smart Video Hosting and Processing Platform for Internet-of-Things. Proceedings of the 2014 IEEE International Conference on Internet of Things(iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom). (169-176).

    https://doi.org/10.1109/iThings.2014.33

  • Zardari M, Jung L and Zakaria N. (2014). A quantitative analysis of cloud users' satisfaction and data security in cloud models 2014 Science and Information Conference (SAI). 10.1109/SAI.2014.6918170. 978-0-9893193-1-7. (42-47).

    http://ieeexplore.ieee.org/document/6918170/

  • Yang W, Gu C, Wan F, Sun H and Zhou J. (2014). A cloud storage synchronization strategy based on CDMI 2014 Fourth International Conference on Innovative Computing Technology (INTECH). 10.1109/INTECH.2014.6927743. 978-1-4799-4233-6. (120-129).

    https://ieeexplore.ieee.org/document/6927743/

  • Yeo H, Phang X, Lee H and Lim H. (2014). Leveraging client-side storage techniques for enhanced use of multiple consumer cloud storage services on resource-constrained mobile devices. Journal of Network and Computer Applications. 10.1016/j.jnca.2014.04.006. 43. (142-156). Online publication date: 1-Aug-2014.

    https://linkinghub.elsevier.com/retrieve/pii/S1084804514000897

  • Libardi R, Bedo M, Marganiec S and Estrella J. MSSF. Proceedings of the 2014 IEEE International Conference on Cloud Computing. (952-953).

    https://doi.org/10.1109/CLOUD.2014.138

  • Shon T, Cho J, Han K and Choi H. (2014). Toward Advanced Mobile Cloud Computing for the Internet of Things. Mobile Networks and Applications. 19:3. (404-413). Online publication date: 1-Jun-2014.

    https://doi.org/10.1007/s11036-014-0509-8

  • Petcu D. (2014). Consuming Resources and Services from Multiple Clouds. Journal of Grid Computing. 12:2. (321-345). Online publication date: 1-Jun-2014.

    https://doi.org/10.1007/s10723-013-9290-3

  • Serbanescu V, Pop F, Cristea V and Antoniu G. Architecture of Distributed Data Aggregation Service. Proceedings of the 2014 IEEE 28th International Conference on Advanced Information Networking and Applications. (727-734).

    https://doi.org/10.1109/AINA.2014.89

  • Yuhong Liu , Jungwoo Ryoo and Rizvi S. (2014). Ensuring data confidentiality in cloud computing: an encryption and trust-based solution 2014 23rd Wireless and Optical Communication Conference (WOCC). 10.1109/WOCC.2014.7155633. 978-1-4799-5249-6. (1-6).

    http://ieeexplore.ieee.org/document/7155633/

  • Alsolami F and Boult T. CloudStash. Proceedings of the 2014 11th International Conference on Information Technology: New Generations. (315-320).

    https://doi.org/10.1109/ITNG.2014.119

  • Albahdal A and Boult T. Problems and Promises of Using the Cloud and Biometrics. Proceedings of the 2014 11th International Conference on Information Technology: New Generations. (293-300).

    https://doi.org/10.1109/ITNG.2014.112

  • Albahdal A, Alsolami F and Alsaadi F. Evaluation of Security Supporting Mechanisms in Cloud Storage. Proceedings of the 2014 11th International Conference on Information Technology: New Generations. (285-292).

    https://doi.org/10.1109/ITNG.2014.110

  • Jayalath C, Stephen J and Eugster P. Universal Cross-Cloud Communication. IEEE Transactions on Cloud Computing. 10.1109/TCC.2014.2316813. 2:2. (103-116).

    http://ieeexplore.ieee.org/document/6787059/

  • Li P and Guo S. (2014). Load balancing for privacy-preserving access to big data in cloud IEEE INFOCOM 2014 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 10.1109/INFCOMW.2014.6849286. 978-1-4799-3088-3. (524-528).

    http://ieeexplore.ieee.org/document/6849286/

  • De S and Pal A. A Policy-Based Security Framework for Storage and Computation on Enterprise Data in the Cloud. Proceedings of the 2014 47th Hawaii International Conference on System Sciences. (4986-4997).

    https://doi.org/10.1109/HICSS.2014.613

  • Ling C and Datta A. InterCloud RAIDer. Proceedings of the 15th International Conference on Distributed Computing and Networking - Volume 8314. (453-468).

    https://doi.org/10.1007/978-3-642-45249-9_30

  • Schnjakin M and Meinel C. Solving Security and Availability Challenges in Public Clouds. Information Security in Diverse Computing Environments. 10.4018/978-1-4666-6158-5.ch015. (280-302).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5.ch015

  • Chen H, Hu Y, Lee P and Tang Y. (2014). NCCloud. IEEE Transactions on Computers. 63:1. (31-44). Online publication date: 1-Jan-2014.

    https://doi.org/10.1109/TC.2013.167

  • Tebaa M and Hajji S. (2014). From Single to Multi-clouds Computing Privacy and Fault Tolerance. IERI Procedia. 10.1016/j.ieri.2014.09.099. 10. (112-118).

    https://linkinghub.elsevier.com/retrieve/pii/S2212667814001476

  • Correia M. (2014). Clouds-of-Clouds for Dependability and Security: Geo-replication Meets the Cloud. Euro-Par 2013: Parallel Processing Workshops. 10.1007/978-3-642-54420-0_10. (95-104).

    http://link.springer.com/10.1007/978-3-642-54420-0_10

  • Androulaki E, Cachin C, Dobre D and Vukolić M. (2014). Erasure-Coded Byzantine Storage with Separate Metadata. Principles of Distributed Systems. 10.1007/978-3-319-14472-6_6. (76-90).

    http://link.springer.com/10.1007/978-3-319-14472-6_6

  • Rodrigues J, Ferreira B and Domingos H. TMS. Proceedings of the 8th Workshop on Middleware for Next Generation Internet Computing. (1-6).

    https://doi.org/10.1145/2541608.2541610

  • Liu J, Wang H, Xian M and Huang K. A Secure and Efficient Scheme for Cloud Storage against Eavesdropper. Information and Communications Security. (75-89).

    https://doi.org/10.1007/978-3-319-02726-5_6

  • Zhang G, Li C, Zhang Y and Xing C. A New Electronic Records Security Model for Long-Term Preservation. Proceedings of the 2013 10th Web Information System and Application Conference. (191-194).

    https://doi.org/10.1109/WISA.2013.44

  • Dobre D, Karame G, Li W, Majuntke M, Suri N and Vukolić M. PoWerStore. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. (285-298).

    https://doi.org/10.1145/2508859.2516750

  • Wang C, Ni J, Xu T and Ju D. TH_Cloudkey. Proceedings of the 2013 International Conference on Cloud and Service Computing. (36-41).

    https://doi.org/10.1109/CSC.2013.14

  • Zhai E, Chen R, Wolinsky D and Ford B. An untold story of redundant clouds. Proceedings of the 9th Workshop on Hot Topics in Dependable Systems. (1-6).

    https://doi.org/10.1145/2524224.2524231

  • Wu Z, Butkiewicz M, Perkins D, Katz-Bassett E and Madhyastha H. SPANStore. Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles. (292-308).

    https://doi.org/10.1145/2517349.2522730

  • Verissimo P and Bessani A. (2013). E-biobanking. IEEE Security and Privacy. 11:6. (62-65). Online publication date: 1-Nov-2013.

    https://doi.org/10.1109/MSP.2013.141

  • Rui Zhang , Chuang Lin , Kun Meng and Lin Zhu . (2013). A modeling reliability analysis technique for cloud storage system 2013 15th IEEE International Conference on Communication Technology (ICCT). 10.1109/ICCT.2013.6820346. 978-1-4799-0077-0. (32-36).

    http://ieeexplore.ieee.org/document/6820346/

  • Dong K, Li J, Nan K and Li W. Biomedical Research Data Cloud Services with Duckling Collaboration LiBrary (CLB). Proceedings of the 2013 IEEE 9th International Conference on e-Science. (221-227).

    https://doi.org/10.1109/eScience.2013.17

  • Zhu Y and Masui J. Backing Up Your Data to the Cloud. Proceedings of the 2013 42nd International Conference on Parallel Processing. (409-418).

    https://doi.org/10.1109/ICPP.2013.50

  • Baker T, Mackay M, Randles M and Taleb-Bendiab A. (2013). Intention-oriented programming support for runtime adaptive autonomic cloud-based applications. Computers and Electrical Engineering. 39:7. (2400-2412). Online publication date: 1-Oct-2013.

    https://doi.org/10.1016/j.compeleceng.2013.04.019

  • Cui Z, Zhu H and Chi L. (2013). Lightweight key management on sensitive data in the cloud. Security and Communication Networks. 10.1002/sec.850. 6:10. (1290-1299). Online publication date: 1-Oct-2013.

    https://onlinelibrary.wiley.com/doi/10.1002/sec.850

  • Pileggi S, Calvo-Gallego J and Amor R. Bringing Semantic Resources Together in the Cloud. Proceedings of the 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation. (113-118).

    https://doi.org/10.1109/CIMSim.2013.26

  • Zargari S and Smith A. Policing as a Service in the Cloud. Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies. (589-596).

    https://doi.org/10.1109/EIDWT.2013.106

  • Ma W, Wu Q and Tan Y. (2013). A TPA Based Efficient Non-Repudiation Scheme for Cloud Storage. Advanced Materials Research. 10.4028/www.scientific.net/AMR.765-767.1630. 765-767. (1630-1635).

    https://www.scientific.net/AMR.765-767.1630

  • Costa P, Pasin M, Bessani A and Correia M. (2013). On the Performance of Byzantine Fault-Tolerant MapReduce. IEEE Transactions on Dependable and Secure Computing. 10:5. (301-313). Online publication date: 1-Sep-2013.

    https://doi.org/10.1109/TDSC.2013.7

  • Schunter M. Data Security and Privacy in 2025?. 10th VLDB Workshop on Secure Data Management - Volume 8425. (37-41).

    https://doi.org/10.1007/978-3-319-06811-4_8

  • He Y, Jiang X, Ye K, Ma R and Li X. HPACS. Revised Selected Papers of the 10th International Symposium on Advanced Parallel Processing Technologies - Volume 8299. (132-145).

    https://doi.org/10.1007/978-3-642-45293-2_10

  • Bouchenak S, Chockler G, Chockler H, Gheorghe G, Santos N and Shraer A. (2013). Verifying cloud services. ACM SIGOPS Operating Systems Review. 47:2. (6-19). Online publication date: 23-Jul-2013.

    https://doi.org/10.1145/2506164.2506167

  • Schnjakin M and Meinel C. (2013). Evaluation of Cloud-RAID: A Secure and Reliable Storage above the Clouds 2013 22nd International Conference on Computer Communication and Networks (ICCCN 2013). 10.1109/ICCCN.2013.6614137. 978-1-4673-5775-3. (1-9).

    http://ieeexplore.ieee.org/document/6614137/

  • Alsolami F and Chow C. (2013). N-Cloud: Improving performance and security in cloud storage 2013 IEEE 14th International Conference on High Performance Switching and Routing (HPSR). 10.1109/HPSR.2013.6602319. 978-1-4673-4620-7. (221-222).

    http://ieeexplore.ieee.org/document/6602319/

  • Schnjakin M and Meinel C. Scrutinizing the State of Cloud Storage with Cloud-RAID. Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing. (309-318).

    https://doi.org/10.1109/CLOUD.2013.121

  • Datta A and Oggier F. (2013). Storage codes: Managing big data with small overheads 2013 International Symposium on Network Coding (NetCod). 10.1109/NetCod.2013.6570839. 978-1-4799-0823-3. (1-6).

    http://ieeexplore.ieee.org/document/6570839/

  • Correia M, Neves N and Verissimo P. (2013). BFT-TO. The Computer Journal. 56:6. (693-715). Online publication date: 1-Jun-2013.

    https://doi.org/10.1093/comjnl/bxs148

  • Spillner J, MüLler J and Schill A. (2013). Creating optimal cloud storage systems. Future Generation Computer Systems. 29:4. (1062-1072). Online publication date: 1-Jun-2013.

    https://doi.org/10.1016/j.future.2012.06.004

  • Qiu S, Zhou J and Yang T. Versioned file backup and synchronization for storage clouds. Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing. (302-310).

    https://doi.org/10.1109/CCGrid.2013.60

  • AlZain M, Soh B and Pardede E. (2013). A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds. Journal of Software. 10.4304/jsw.8.5.1068-1078. 8:5.

    http://ojs.academypublisher.com/index.php/jsw/article/view/8330

  • Bleikertz S, Mastelic T, Pape S, Pieters W and Dimkov T. Defining the Cloud Battlefield - Supporting Security Assessments by Cloud Customers. Proceedings of the 2013 IEEE International Conference on Cloud Engineering. (78-87).

    https://doi.org/10.1109/IC2E.2013.31

  • Tysowski P and Hasan M. Cloud-hosted key sharing towards secure and scalable mobile applications in clouds. Proceedings of the 2013 International Conference on Computing, Networking and Communications (ICNC). (449-455).

    https://doi.org/10.1109/ICCNC.2013.6504126

  • Grispos G, Storer T and Glisson W. Calm Before the Storm. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security. 10.4018/978-1-4666-4006-1.ch015. (211-233).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4006-1.ch015

  • Spillner J, Quellmalz M, Friedrich M and Schill A. (2013). peaCS-Performance and Efficiency Analysis for Cloud Storage. Advances in Service-Oriented and Cloud Computing. 10.1007/978-3-642-45364-9_5. (47-58).

    http://link.springer.com/10.1007/978-3-642-45364-9_5

  • Stephen J and Eugster P. (2013). Assured Cloud-Based Data Analysis with ClusterBFT. Middleware 2013. 10.1007/978-3-642-45065-5_5. (82-102).

    http://link.springer.com/10.1007/978-3-642-45065-5_5

  • Soares J, Lourenço J and Preguiça N. (2013). Software Component Replication for Improved Fault-Tolerance: Can Multicore Processors Make It Work?. Dependable Computing. 10.1007/978-3-642-38789-0_15. (173-180).

    http://link.springer.com/10.1007/978-3-642-38789-0_15

  • Cogo V, Nogueira A, Sousa J, Pasin M, Reiser H and Bessani A. (2013). FITCH: Supporting Adaptive Replicated Services in the Cloud. Distributed Applications and Interoperable Systems. 10.1007/978-3-642-38541-4_2. (15-28).

    http://link.springer.com/10.1007/978-3-642-38541-4_2

  • Ferreira B and Domingos H. Management and search of private data on storage clouds. Proceedings of the Workshop on Secure and Dependable Middleware for Cloud Monitoring and Management. (1-6).

    https://doi.org/10.1145/2405186.2405190

  • Kim Y, Shin J, Park C and Park W. DFCloud. Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). (551-556).

    https://doi.org/10.1109/CloudCom.2012.6427606

  • Son J, Eun H, Oh H, Kim S and Hussain R. Rethinking Vehicular Communications. Proceedings of the 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom). (606-609).

    https://doi.org/10.1109/CloudCom.2012.6427481

  • Oliveira P, Lima L, Vinhoza T, Barros J and Medard M. (2012). Coding for Trusted Storage in Untrusted Networks. IEEE Transactions on Information Forensics and Security. 7:6. (1890-1899). Online publication date: 1-Dec-2012.

    https://doi.org/10.1109/TIFS.2012.2217331

  • Spillner J and Schill A. (2012). Flexible data distribution policy language and gateway architecture 2012 IEEE Latin America Conference on Cloud Computing and Communications (LatinCloud). 10.1109/LatinCloud.2012.6508149. 978-1-4673-5163-8. (1-6).

    http://ieeexplore.ieee.org/document/6508149/

  • Sandikkaya M and Harmanci A. Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems. Proceedings of the 2012 IEEE 31st Symposium on Reliable Distributed Systems. (463-468).

    https://doi.org/10.1109/SRDS.2012.84

  • Chen H and Lee P. Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage. Proceedings of the 2012 IEEE 31st Symposium on Reliable Distributed Systems. (51-60).

    https://doi.org/10.1109/SRDS.2012.24

  • PENG Y, ZHAO W, XIE F, DAI Z, GAO Y and CHEN D. (2012). Secure cloud storage based on cryptographic techniques. The Journal of China Universities of Posts and Telecommunications. 10.1016/S1005-8885(11)60424-X. 19. (182-189). Online publication date: 1-Oct-2012.

    https://linkinghub.elsevier.com/retrieve/pii/S100588851160424X

  • Mu S, Chen K, Gao P, Ye F, Wu Y and Zheng W. µLibCloud. Proceedings of the 2012 ACM/IEEE 13th International Conference on Grid Computing. (201-208).

    https://doi.org/10.1109/Grid.2012.28

  • Bessani A, Kapitza R, Petcu D, Romano P, Gogouvitis S, Kyriazis D and Cascella R. (2012). A look to the old-world_sky. ACM SIGOPS Operating Systems Review. 46:2. (43-56). Online publication date: 16-Jul-2012.

    https://doi.org/10.1145/2331576.2331584

  • Zage D and Obert J. (2012). Utilizing linear subspaces to improve cloud security 2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W). 10.1109/DSNW.2012.6264692. 978-1-4673-2266-9. (1-6).

    http://ieeexplore.ieee.org/document/6264692/

  • Verissimo P, Bessani A and Pasin M. (2012). The TClouds architecture: Open and resilient cloud-of-clouds computing 2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W). 10.1109/DSNW.2012.6264686. 978-1-4673-2266-9. (1-6).

    http://ieeexplore.ieee.org/document/6264686/

  • Cachin C, Junker B and Sorniotti A. (2012). On limitations of using cloud storage for data replication 2012 IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W). 10.1109/DSNW.2012.6264683. 978-1-4673-2266-9. (1-6).

    http://ieeexplore.ieee.org/document/6264683/

  • Zhu Y, Lee P, Xiang L, Xu Y and Lingling Gao . (2012). A cost-based heterogeneous recovery scheme for distributed storage systems with RAID-6 codes 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 10.1109/DSN.2012.6263934. 978-1-4673-1625-5. (1-12).

    http://ieeexplore.ieee.org/document/6263934/

  • Basescu C, Cachin C, Eyal I, Haas R, Sorniotti A, Vukolic M and Zachevsky I. (2012). Robust data sharing with key-value stores 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). 10.1109/DSN.2012.6263920. 978-1-4673-1625-5. (1-12).

    http://ieeexplore.ieee.org/document/6263920/

  • AlZain M, Soh B and Pardede E. (2012). A new model to ensure security in cloud computing services. Journal of Service Science Research. 10.1007/s12927-012-0002-5. 4:1. (49-70). Online publication date: 1-Jun-2012.

    http://link.springer.com/10.1007/s12927-012-0002-5

  • Hansen M. (2012). Vertraulichkeit und Integrität von Daten und IT-Systemen im Cloud-Zeitalter. Datenschutz und Datensicherheit - DuD. 10.1007/s11623-012-0149-8. 36:6. (407-412). Online publication date: 1-Jun-2012.

    http://link.springer.com/10.1007/s11623-012-0149-8

  • Grispos G, Storer T and Glisson W. (2012). Calm Before the Storm. International Journal of Digital Crime and Forensics. 10.4018/jdcf.2012040103. 4:2. (28-48). Online publication date: 1-Apr-2012.

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jdcf.2012040103

  • Pavlou K and Snodgrass R. Achieving Database Information Accountability in the Cloud. Proceedings of the 2012 IEEE 28th International Conference on Data Engineering Workshops. (147-150).

    https://doi.org/10.1109/ICDEW.2012.37

  • Teixeira d’Aguiar Norton Brandão L and Neves Bessani A. (2012). On the reliability and availability of replicated and rejuvenating systems under stealth attacks and intrusions. Journal of the Brazilian Computer Society. 10.1007/s13173-012-0062-x. 18:1. (61-80). Online publication date: 1-Mar-2012.

    https://journal-bcs.springeropen.com/articles/10.1007/s13173-012-0062-x

  • Hu Y, Chen H, Lee P and Tang Y. NCCloud. Proceedings of the 10th USENIX conference on File and Storage Technologies. (21-21).

    /doi/10.5555/2208461.2208482

  • Vrable M, Savage S and Voelker G. BlueSky. Proceedings of the 10th USENIX conference on File and Storage Technologies. (19-19).

    /doi/10.5555/2208461.2208480

  • AlZain M, Pardede E, Soh B and Thom J. Cloud Computing Security. Proceedings of the 2012 45th Hawaii International Conference on System Sciences. (5490-5499).

    https://doi.org/10.1109/HICSS.2012.153

  • Rak M, Ficco M, Luna J, Ghani H, Suri N, Panica S and Petcu D. Security Issues in Cloud Federations. Achieving Federated and Self-Manageable Cloud Infrastructures. 10.4018/978-1-4666-1631-8.ch010. (176-194).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-1631-8.ch010

  • Butoi A, Morar G and Ilea A. (2012). Two-Phased Protocol for Providing Data Confidentiality in Cloud Storage Environments. Business Information Systems Workshops. 10.1007/978-3-642-34228-8_21. (220-230).

    http://link.springer.com/10.1007/978-3-642-34228-8_21

  • Deng M, Nalin M, Petković M, Baroni I and Marco A. (2012). Towards Trustworthy Health Platform Cloud. Secure Data Management. 10.1007/978-3-642-32873-2_12. (162-175).

    http://link.springer.com/10.1007/978-3-642-32873-2_12

  • Alzain M, Soh B and Pardede E. MCDB. Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing. (784-791).

    https://doi.org/10.1109/DASC.2011.133

  • Costa P, Pasin M, Bessani A and Correia M. Byzantine Fault-Tolerant MapReduce. Proceedings of the 2011 IEEE Third International Conference on Cloud Computing Technology and Science. (32-39).

    https://doi.org/10.1109/CloudCom.2011.15

  • Wood T, Lagar-Cavilla H, Ramakrishnan K, Shenoy P and Van der Merwe J. PipeCloud. Proceedings of the 2nd ACM Symposium on Cloud Computing. (1-13).

    https://doi.org/10.1145/2038916.2038933

  • Rocha F, Abreu S and Correia M. (2011). The Final Frontier. Computer. 44:9. (44-50). Online publication date: 1-Sep-2011.

    https://doi.org/10.1109/MC.2011.223

  • Padilha R and Pedone F. Belisarius. Proceedings of the 2011 IEEE 10th International Symposium on Network Computing and Applications. (9-16).

    https://doi.org/10.1109/NCA.2011.15

  • Hu Y, Yu C, Li Y, Lee P and Lui J. (2011). NCFS: On the Practicality and Extensibility of a Network-Coding-Based Distributed File System 2011 International Symposium on Network Coding (NetCod). 10.1109/ISNETCOD.2011.5978919. 978-1-61284-138-0. (1-6).

    http://ieeexplore.ieee.org/document/5978919/

  • Rocha F and Correia M. Lucy in the sky without diamonds. Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops. (129-134).

    https://doi.org/10.1109/DSNW.2011.5958798

  • Nguyen Q and Sood A. Designing SCIT architecture pattern in a Cloud-based environment. Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops. (123-128).

    https://doi.org/10.1109/DSNW.2011.5958797