Farsite: Federated, available, and reliable storage for an incompletely trusted environment, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, OSDI '02, pp.1-14, 2002. ,
A five-year study of file-system metadata, ACM Transactions on Storage, vol.3, issue.3, p.77, 2007. ,
DOI : 10.1145/1288783.1288788
Restful web services cookbook , O'Reilly Media, p.51, 2010. ,
Time machine, online, p.2014 ,
pStore: A secure peer-to-peer backup system, 2002. ,
Probability and measure, 1995. ,
Time series analysis: forecasting and control, 1994. ,
Designing incentives for peer-to-peer routing, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.374-385, 2005. ,
DOI : 10.1109/INFCOM.2005.1497907
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.3333
Pastis: A Highly-Scalable Multi-user Peer-to-Peer File System, Euro-Par 2005, 2005. ,
DOI : 10.1007/11549468_128
URL : https://hal.archives-ouvertes.fr/inria-00070712
High availability, scalable storage, dynamic peer networks: Pick two, Proceedings of the 9th Conference on Hot Topics in Operating Systems, HOTOS'03, USENIX Association, pp.1-1, 2003. ,
DAta Center Damage Boundaries, 2010 12th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems, pp.1-9, 2010. ,
DOI : 10.1109/ITHERM.2010.5501417
Total recall: system support for automated availability management, p.12, 2004. ,
Efficient replica maintenance for distributed storage systems, 2006. ,
Raid: High-performance, reliable secondary storage, ACM Comput. Surv, vol.26, issue.2, pp.145-185, 1994. ,
Protecting free expression online with Freenet, IEEE Internet Computing, vol.6, issue.1, pp.40-49, 2002. ,
DOI : 10.1109/4236.978368
Pastiche: Making backup cheap and easy, Proceedings of OSDI, ACM, 2002. ,
Samsara: Honor among thieves in peer-to-peer storage, Proceedings of the Symposium on Operating Systems Principles, 2003. ,
Incentives build robustness in bittorrent, 2003. ,
Writing reentrant and threadsafe code, online, p.2013 ,
Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996. ,
DOI : 10.1145/226643.226647
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.498
Windows Azure Storage, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.143-157, 2011. ,
DOI : 10.1145/2043556.2043571
Proactive replication in distributed storage systems using machine availability estimation, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, pp.1-27, 2007. ,
DOI : 10.1145/1364654.1364689
MapReduce, Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation , OSDI'04, USENIX Association, pp.10-10, 2004. ,
DOI : 10.1145/1327452.1327492
Home networking as a distributed file system view, Proceedings of the 2nd ACM SIGCOMM workshop on Home networks, HomeNets '11, pp.67-72, 2011. ,
DOI : 10.1145/2018567.2018583
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.353.7507
Network coding for distributed storage systems, IEEE INFOCOM, 2007. ,
DOI : 10.1109/tit.2010.2054295
Swaminathan Sivasubramanian, Peter Vosshall, and Werner Vogels, Dynamo: Amazon's highly available key-value store, Proceedings of Twenty-first ACM SIGOPS, pp.205-220, 2007. ,
Wide-area cooperative storage with cfs, SOSP, 2001. ,
DOI : 10.1145/502034.502054
Efficient peer-to-peer backup services through buffering at the edge., Peer-to-Peer Computing, p.2011 ,
DOI : 10.1109/p2p.2011.6038671
URL : https://hal.archives-ouvertes.fr/hal-00646768
Back to the future: On predicting user uptime, CoRR abs/1010, p.626, 2010. ,
Password strength: an empirical analysis, IEEE INFOCOM, 2010. ,
Adaptive redundancy management for durable p2p backup, online, 1201. ,
The sybil attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
Remote Integrity Checking, Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 2004. ,
DOI : 10.1007/1-4020-7901-X_1
PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, pp.75-80, 2001. ,
DOI : 10.1109/HOTOS.2001.990064
Failure trace archive, online, p.2014 ,
Fundamentals of Database Systems, 2003. ,
Eventually-serializable data services, 1998. ,
DOI : 10.1016/s0304-3975(98)00239-4
Figaro project website, online, p.2014 ,
A study of the internal and external effects of concurrency bugs, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.221-230, 2010. ,
DOI : 10.1109/DSN.2010.5544315
Freebox revolution, online ,
Rest: An alternative to rpc for web services architecture, Future Information Networks, First International Conference on, pp.7-10, 2009. ,
Cryptography engineering -design principles and practical applications, pp.49-57, 2010. ,
The google file system, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles SOSP '03, pp.29-43, 2003. ,
DOI : 10.1145/1165389.945450
Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services, ACM SIGACT News, vol.33, issue.2, p.84, 2002. ,
DOI : 10.1145/564585.564601
P2P storage systems: How much locality can they tolerate?, 2009 IEEE 34th Conference on Local Computer Networks, p.30, 2009. ,
DOI : 10.1109/LCN.2009.5355104
URL : https://hal.archives-ouvertes.fr/inria-00496220
A survey of peer-to-peer storage techniques for distributed file systems, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, p.13, 2005. ,
DOI : 10.1109/ITCC.2005.42
Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures, Networked Systems Design and Implementation, pp.143-158, 2005. ,
Estimating the probability of failure of equipment as a result of direct lightning strikes on transmission lines, Power Delivery, IEEE Transactions on, vol.14, issue.4, pp.1394-1400, 1999. ,
Understanding and exploiting snapshot technology for data protection., online, http: //www.ibm.com/developerworks/tivoli/library/ t-snaptsm1/index.html, Cited on page 5.) [IET13] IETF, Rfc 5246 , online, p.2013, 2006. ,
The garbage collection handbook: The art of automatic memory management, 2011. ,
DOI : 10.1201/9781315388021
Oceanstore: an architecture for global-scale persistent storage, SIGPLAN Not, pp.190-201, 2000. ,
A fast reed-solomon and cyclic redundancy check encoding algorithm for optical disk error control , ASIC Conference and Exhibit, Proceedings ., Seventh Annual IEEE International, pp.250-253, 1994. ,
DOI : 10.1109/asic.1994.404565
The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.398-407, 2010. ,
DOI : 10.1109/CCGRID.2010.71
URL : https://hal.archives-ouvertes.fr/inria-00433523
Web protocols and practice, p.56, 2001. ,
Kroll ontrack data recovery service, online, 2014. ,
Assessing the impact of geographically correlated failures on overlaybased data dissemination, Global Telecommunications Conference, pp.1-5, 2010. ,
Wuala cloud storage service, online, p.79 ,
Performance evaluation of computer and communication systems, 2010. ,
DOI : 10.1201/b16328
Separating durability and availability in self-managed storage, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, 2004. ,
DOI : 10.1145/1133572.1133576
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.538.1227
Reed-solomon codes for satellite communications, Control, Automation and Systems Engineering, IITA International Conference on, pp.246-249, 2009. ,
DOI : 10.1109/case.2009.30
Parallel file download in peer-to-peer networks with random service capacities, Parallel and Distributed Processing Symposium Workshops PhD Forum (IPDPSW), pp.677-686, 2013. ,
DOI : 10.1109/ipdpsw.2013.20
Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010. ,
DOI : 10.1145/1773912.1773922
Measurement and analysis of large-scale network file system workloads, USENIX Association, pp.27-72, 2008. ,
Reed-Solomon decoding algorithms for digital audio broadcasting in the AM band, IEEE Transactions on Broadcasting, vol.47, issue.2, pp.115-122, 2001. ,
DOI : 10.1109/11.948264
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1697
Lt codes, Foundations of Computer Science, Proceedings. The 43rd Annual IEEE Symposium on, p.12, 2002. ,
Peerstore: Better performance by relaxing in peer-to-peer backup, Proceedings on Peer-to-Peer Computing, 2004. ,
Capacity, Cutoff Rate, and Coding for a Direct-Detection Optical Channel, IEEE Transactions on Communications, vol.29, issue.11, pp.1615-1621, 1981. ,
DOI : 10.1109/TCOM.1981.1094916
Online codes, 2002. ,
Multi-level comparison of data deduplication in a backup scenario, Proceedings of SYS- TOR 2009: The Israeli Experimental Systems Conference, pp.1-8, 2009. ,
A low-bandwidth network file system, Proceedings of Symposium on Operating Systems Principles, ACM, 2001. ,
DOI : 10.1145/502034.502052
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8444
Stout: An adaptive interface to scalable cloud storage, Proceedings of the 2010 USENIX Annual Technical Conference , USENIX Association, pp.4-4, 2010. ,
Subtleties in tolerating correlated failures in wide-area storage systems, Proceedings of NSDI'06 USENIX Association, pp.17-17, 2006. ,
Maintaining data integrity through constraints, online ,
Cost analysis of redundancy schemes for distributed storage systems, CoRR, 2011. ,
Maintaining data reliability without availability in p2p storage systems, Proceedings of the 2010 ACM Symposium on Applied Computing, p.2010 ,
A performance evaluation and examination of open-source erasure coding libraries for storage, Proccedings of FAST'09, USENIX Association, pp.253-265, 2009. ,
GF-Complete: A comprehensive open source library for Galois Field arithmetic. version 1.0, 2013. ,
MDx-MAC and Building Fast MACs from Hash Functions, Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology CRYPTO '95, 1995. ,
DOI : 10.1007/3-540-44750-4_1
Deep-Space Transport Protocol: A novel transport scheme for Space DTNs, Computer Communications, vol.32, issue.16, pp.1757-1767, 2009. ,
DOI : 10.1016/j.comcom.2009.02.012
Fundamentals of communication systems, Pearson Education, p.76, 2007. ,
The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001., pp.263-268, 2001. ,
DOI : 10.1109/ICON.2001.962351
A foray into conficker's logic and rendezvous points, Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More LEET'09, USENIX Association, pp.7-7, 2009. ,
Fingerprinting by random polynomials, 1981. ,
Pastry: Scalable, decentralized object location, and routing for large-scale peerto-peer systems, Middleware '01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pp.329-350, 2001. ,
A scalable content-addressable network, Proceedings of SIGCOMM '01, pp.161-172, 2001. ,
DOI : 10.1145/964723.383072
An analysis of vendor lock-in problem in cloud storage, ICCKE 2013, pp.331-335, 2013. ,
DOI : 10.1109/ICCKE.2013.6682808
Analysis of longrunning replicated systems, Proceedings of INFOCOM 2006, pp.1-9, 2006. ,
DOI : 10.1109/infocom.2006.130
Pkcs #5: Password-based cryptography standard ,
Fault tolerance via idempotence, Proceedings of ACM SIGPLAN-SIGACT, POPL '13, ACM, pp.249-262, 2013. ,
DOI : 10.1145/2429069.2429100
Secure data deduplication, Proceedings of the 4th ACM international workshop on Storage security and survivability, StorageSS '08, p.18, 2008. ,
DOI : 10.1145/1456469.1456471
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.499
Raptor codes, IEEE Transactions on Information Theory, vol.52, issue.6, pp.2551-2567, 2006. ,
DOI : 10.1109/TIT.2006.874390
Principles of computer system design: An introduction, pp.89-130, 2009. ,
The Hadoop Distributed File System, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-10, 2010. ,
DOI : 10.1109/MSST.2010.5496972
Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.17-32, 2003. ,
DOI : 10.1109/TNET.2002.808407
Kerberos: An authentication service for open network systems, Usenix Conference Proceedings, 1988. ,
Advanced programming in the unix environment, Addison-Wesley professional computing series, 2005. ,
Datacenter Scale Evaluation of the Impact of Temperature on Hard Disk Drive Failures, ACM Transactions on Storage, vol.9, issue.2, pp.1-6, 2013. ,
DOI : 10.1145/2491472.2491475
Data and computer communications -fifth edition, 1997. ,
Worm disk drive systems, Data Storage Technology, IEE Colloquium on, issue.6, pp.1-6, 1990. ,
To BLOB or not to BLOB: large object storage in a database or a filesystem, p.59, 2006. ,
Redundancy management for P2P backup, 2012 Proceedings IEEE INFOCOM, pp.95-141, 2012. ,
DOI : 10.1109/INFCOM.2012.6195743
Online data backup: A peer-assisted approach, Peer-to-Peer Computing, 2010 IEEE Tenth International Conference on, pp.1-10, 2010. ,
DOI : 10.1109/p2p.2010.5570003
Implementation of distback , online, p.2014 ,
A measurement study of the Wuala on-line storage service, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.16-71, 2012. ,
DOI : 10.1109/P2P.2012.6335804
The security of cryptographic hashes, Proceedings of the 49th Annual Southeast Regional Conference on, ACM-SE '11, pp.103-108, 2011. ,
DOI : 10.1145/2016039.2016072
The rsync algorithm, 1996. ,
Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05), pp.329-340, 2005. ,
DOI : 10.1109/MSST.2005.39
On the use of modern coding techniques in QR applications, 2013 21st Signal Processing and Communications Applications Conference (SIU), pp.1-4, 2013. ,
DOI : 10.1109/SIU.2013.6531318
Characterizing cloud computing hardware reliability, Proceedings of the 1st ACM Symposium on Cloud Computing SoCC '10, pp.193-204, 2010. ,
File system usage in windows nt 4, Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles SOSP '99, pp.93-109, 1999. ,
DOI : 10.1145/319344.319158
Reed-solomon codes and their applications, pp.12-33, 1999. ,
Design and evaluation of distributed wide-area on-line archival storage systems, 2006. ,
Uniprocessor garbage collection techniques, Proceedings of the International Workshop on Memory Management IWMM '92, pp.1-42, 1992. ,
Dynamic storage allocation: A survey and critical review, Proceedings of the International Workshop on Memory Management, IWMM '95, pp.1-116, 1995. ,
Tahoe: The leastauthority filesystem, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability StorageSS '08, pp.21-26, 2008. ,
A 4-mbit dram with 16-bit concurrent ecc, Solid- State Circuits, IEEE Journal, vol.23, issue.1, pp.20-26, 1988. ,
A comprehensive review of hard-disk drive reliability, Reliability and Maintainability Symposium, pp.403-409, 1999. ,
Effect of dust contamination on electrical contact failure, IEEE Holm Conference on Electrical Contacts, p.xxi?xxx, 2007. ,
Characterizing the efficiency of data deduplication for big data storage management, 2013 IEEE International Symposium on Workload Characterization (IISWC), pp.98-108, 2013. ,
DOI : 10.1109/IISWC.2013.6704674