E. Barker, Recommendation for key management part 1: General. Tech. rep., National Institute of Standards and Technology, 2016.
DOI : 10.6028/nist.sp.800-57pt1r4

URL : http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf

A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, DepSky: Dependable and secure storage in a cloud-of-clouds, Proceedings of the Sixth Conference on Computer Systems, pp.31-46, 2011.

J. W. Bos, J. A. Halderman, N. Heninger, J. Moore, M. Naehrig et al., Elliptic Curve Cryptography in Practice, International Conference on Financial Cryptography and Data Security, pp.157-175, 2014.
DOI : 10.1007/978-3-662-45472-5_11

URL : https://eprint.iacr.org/2013/734.pdf

D. Burihabwa, R. Pontes, P. Felber, F. Maia, H. Mercier et al., On the Cost of Safe Storage for Public Clouds: An Experimental Evaluation, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp.157-166, 2016.
DOI : 10.1109/SRDS.2016.028

P. Chown, Advanced encryption standard (AES) ciphersuites for transport layer security (tls), 2002.
DOI : 10.17487/rfc3268

URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc3268.txt.pdf

B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears, Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.143-154, 2010.
DOI : 10.1145/1807128.1807152

URL : http://www.brianfrankcooper.net/pubs/ycsb.pdf

M. Dworkin, Recommendation for block cipher modes of operation. methods and techniques, Tech. rep., DTIC Document, 2001.
DOI : 10.6028/nist.sp.800-38f

S. Ghemawat, H. Gobioff, and S. T. Leung, The Google file system, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.29-43, 2003.
DOI : 10.1145/1165389.945450

S. Gueron and M. E. Kounavis, Intel R carry-less multiplication instruction and its usage for computing the GCM mode, 2010.

N. Jansma and B. Arrendondo, Performance comparison of elliptic curve and rsa digital signatures, 2004.

S. Kamara and K. Lauter, Cryptographic Cloud Storage, International Conference on Financial Cryptography and Data Security, pp.136-149, 2010.
DOI : 10.1007/978-3-642-14992-4_13

URL : http://research.microsoft.com/en-us/people/klauter/cryptostoragerlcps.pdf

C. F. Kerry, Digital signature standard (DSS). FIPS PUB pp, pp.186-190, 2013.

N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987.
DOI : 10.1090/S0025-5718-1987-0866109-5

M. Li, C. Qin, and P. P. Lee, CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal, USENIX Annual Technical Conference, pp.111-124, 2015.
DOI : 10.1109/MIC.2016.45

URL : http://arxiv.org/pdf/1502.05110

R. A. Popa, J. R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang, Enabling security in cloud storage SLAs with CloudProof, USENIX Annual Technical Conference, 2011.

H. Seybert and P. Reinecke, Internet and cloud services?statistics on the use by individuals, Tech. rep, 2014.

A. S. Tanenbaum, J. N. Herder, and H. Bos, File size distribution on UNIX systems, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.100-104, 2006.
DOI : 10.1145/1113361.1113364

M. Vrable, S. Savage, and G. M. Voelker, BlueSky: A cloud-backed file system for the enterprise, Proceedings of the 10th USENIX conference on File and Storage Technologies, pp.19-19, 2012.

X. Wang, Y. L. Yin, and H. Yu, Finding Collisions in the Full SHA-1, Annual International Cryptology Conference, pp.17-36, 2005.
DOI : 10.1007/11535218_2

URL : https://link.springer.com/content/pdf/10.1007%2F11535218_2.pdf

R. Zhao, C. Yue, B. Tak, and C. Tang, SafeSky: A Secure Cloud Storage Middleware for End-User Applications, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp.21-30, 2015.
DOI : 10.1109/SRDS.2015.23

M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, Security and Privacy in Cloud Computing: A Survey, 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp.105-112, 2010.
DOI : 10.1109/SKG.2010.19