Will NoSQL databases live up to their promise?, Computer, issue.2, p.43, 2010. ,
Scalable SQL and NoSQL data stores, ACM SIGMOD Record, vol.39, issue.4, pp.12-27, 2011. ,
,
Bigtable: A distributed storage system for structured data, ACM Transactions on Computer Systems (TOCS), vol.26, issue.2, p.4, 2008. ,
Dynamo and BigTable-Review and comparison, Proceedings of the 28th Convention of the Electrical & Electronics Engineers in Israel, pp.1-5, 2014. ,
Providing database as a service, Proceedings of the 18th International Conference on Data Engineering, pp.29-38, 2002. ,
A certified digital signature, Proceedings of the Conference on the Theory and Application of Cryptology, pp.218-238, 1989. ,
Authentic data publication over the internet, Journal of Computer Security, vol.11, issue.3, pp.291-314, 2003. ,
Dynamic authenticated index structures for outsourced databases, Proceedings of the 2006 ACM SIGMOD international conference on Management of data, pp.121-132, 2006. ,
Authenticated join processing in outsourced databases, Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp.5-18, 2009. ,
Authenticated index structures for aggregation queries, ACM Transactions on Information and System Security (TISSEC), vol.13, issue.4, p.32, 2010. ,
Integrity assurance for outsourced databases without DBMS modification, Proceedings of the 28th conference on Data and Applications Security and Privacy, pp.1-16, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01284838
Authentication and integrity in outsourced databases, ACM Transactions on Storage (TOS), vol.2, issue.2, pp.107-138, 2006. ,
DSAC: integrity for outsourced databases with signature aggregation and chaining, Proceedings of the 14th ACM international conference on Information and knowledge management, pp.235-236, 2005. ,
Integrity auditing of outsourced data, Proceedings of the 33rd international conference on Very large data bases, pp.782-793, 2007. ,
Dual encryption for query integrity assurance, Proceedings of the 17th ACM conference on Information and knowledge management, pp.863-872, 2008. ,
iBigTable: practical data integrity for bigtable in public cloud, Proceedings of the third ACM conference on Data and application security and privacy, pp.341-352, 2013. ,
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
URL : http://people.csail.mit.edu/rivest/pubs/RSA78.pdf
Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970. ,
DOI : 10.1145/362686.362692
Compressed bloom filters, IEEE/ACM Transactions on Networking (TON), vol.10, issue.5, pp.604-612, 2002. ,
DOI : 10.1145/383962.384004
FIPS Publication 180-2. National Institute of Standards and Technology (NIST), 2002. ,
Crowdsourcing systems on the world-wide web, Communications of the ACM, vol.54, issue.4, pp.86-96, 2011. ,
DOI : 10.1145/1924421.1924442
URL : http://dl.acm.org/ft_gateway.cfm?id=1924442&type=pdf
Labeling images with a computer game, Proceedings of the SIGCHI conference on Human factors in computing systems, pp.319-326, 2004. ,
, Advanced encryption standard (AES). Federal Information Processing Standards Publication, vol.197, pp.441-0311, 2001.
HMAC: Keyed-hashing for message authentication, 1997. ,
DOI : 10.17487/rfc2104
URL : https://www.rfc-editor.org/rfc/pdfrfc/rfc2104.txt.pdf
Workload analysis of a large-scale key-value store, ACM SIGMETRICS Performance Evaluation Review, vol.40, issue.1, pp.53-64, 2012. ,
Benchmarking cloud serving systems with YCSB, Proceedings of the 1st ACM symposium on Cloud computing, pp.143-154, 2010. ,
DOI : 10.1145/1807128.1807152
Crowdsourced Data Integrity Verification for Key-Value Stores in the Cloud, Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp.498-503, 2017. ,
,