Recommendation for key management part 1: General. Tech. rep., National Institute of Standards and Technology, 2016. ,
DOI : 10.6028/nist.sp.800-57pt1r4
URL : http://csrc.nist.gov/publications/nistpubs/800-57/SP800-57-Part1.pdf
DepSky: Dependable and secure storage in a cloud-of-clouds, Proceedings of the Sixth Conference on Computer Systems, pp.31-46, 2011. ,
Elliptic Curve Cryptography in Practice, International Conference on Financial Cryptography and Data Security, pp.157-175, 2014. ,
DOI : 10.1007/978-3-662-45472-5_11
URL : https://eprint.iacr.org/2013/734.pdf
On the Cost of Safe Storage for Public Clouds: An Experimental Evaluation, 2016 IEEE 35th Symposium on Reliable Distributed Systems (SRDS), pp.157-166, 2016. ,
DOI : 10.1109/SRDS.2016.028
Advanced encryption standard (AES) ciphersuites for transport layer security (tls), 2002. ,
DOI : 10.17487/rfc3268
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc3268.txt.pdf
Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, SoCC '10, pp.143-154, 2010. ,
DOI : 10.1145/1807128.1807152
URL : http://www.brianfrankcooper.net/pubs/ycsb.pdf
Recommendation for block cipher modes of operation. methods and techniques, Tech. rep., DTIC Document, 2001. ,
DOI : 10.6028/nist.sp.800-38f
The Google file system, ACM SIGOPS Operating Systems Review, vol.37, issue.5, pp.29-43, 2003. ,
DOI : 10.1145/1165389.945450
Intel R carry-less multiplication instruction and its usage for computing the GCM mode, 2010. ,
Performance comparison of elliptic curve and rsa digital signatures, 2004. ,
Cryptographic Cloud Storage, International Conference on Financial Cryptography and Data Security, pp.136-149, 2010. ,
DOI : 10.1007/978-3-642-14992-4_13
URL : http://research.microsoft.com/en-us/people/klauter/cryptostoragerlcps.pdf
Digital signature standard (DSS). FIPS PUB pp, pp.186-190, 2013. ,
Elliptic curve cryptosystems, Mathematics of Computation, vol.48, issue.177, pp.203-209, 1987. ,
DOI : 10.1090/S0025-5718-1987-0866109-5
CDStore: Toward Reliable, Secure, and Cost-Efficient Cloud Storage via Convergent Dispersal, USENIX Annual Technical Conference, pp.111-124, 2015. ,
DOI : 10.1109/MIC.2016.45
URL : http://arxiv.org/pdf/1502.05110
Enabling security in cloud storage SLAs with CloudProof, USENIX Annual Technical Conference, 2011. ,
Internet and cloud services?statistics on the use by individuals, Tech. rep, 2014. ,
File size distribution on UNIX systems, ACM SIGOPS Operating Systems Review, vol.40, issue.1, pp.100-104, 2006. ,
DOI : 10.1145/1113361.1113364
BlueSky: A cloud-backed file system for the enterprise, Proceedings of the 10th USENIX conference on File and Storage Technologies, pp.19-19, 2012. ,
Finding Collisions in the Full SHA-1, Annual International Cryptology Conference, pp.17-36, 2005. ,
DOI : 10.1007/11535218_2
URL : https://link.springer.com/content/pdf/10.1007%2F11535218_2.pdf
SafeSky: A Secure Cloud Storage Middleware for End-User Applications, 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp.21-30, 2015. ,
DOI : 10.1109/SRDS.2015.23
Security and Privacy in Cloud Computing: A Survey, 2010 Sixth International Conference on Semantics, Knowledge and Grids, pp.105-112, 2010. ,
DOI : 10.1109/SKG.2010.19