A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken et al., Farsite: Federated, available, and reliable storage for an incompletely trusted environment, Proceedings of the 5th Symposium on Operating Systems Design and Implementation, OSDI '02, pp.1-14, 2002.

[. Agrawal, W. J. Bolosky, J. R. Douceur, and J. R. Lorch, A five-year study of file-system metadata, ACM Transactions on Storage, vol.3, issue.3, p.77, 2007.
DOI : 10.1145/1288783.1288788

A. Allamaraju, Restful web services cookbook , O'Reilly Media, p.51, 2010.

A. Inc, Time machine, online, p.2014

[. Batten, K. Barr, A. Saraf, and S. Trepetin, pStore: A secure peer-to-peer backup system, 2002.

[. Billingsley, Probability and measure, 1995.

E. P. George, G. M. Box, and G. C. Jenkins, Time series analysis: forecasting and control, 1994.

[. Blanc, Y. Liu, and A. Vahdat, Designing incentives for peer-to-peer routing, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., pp.374-385, 2005.
DOI : 10.1109/INFCOM.2005.1497907

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.3333

[. Busca, F. Picconi, and P. Sens, Pastis: A Highly-Scalable Multi-user Peer-to-Peer File System, Euro-Par 2005, 2005.
DOI : 10.1007/11549468_128

URL : https://hal.archives-ouvertes.fr/inria-00070712

C. Blake and R. Rodrigues, High availability, scalable storage, dynamic peer networks: Pick two, Proceedings of the 9th Conference on Hot Topics in Operating Systems, HOTOS'03, USENIX Association, pp.1-1, 2003.

[. Bash, R. Shih, . Amip, C. Shah, and . Patel, DAta Center Damage Boundaries, 2010 12th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems, pp.1-9, 2010.
DOI : 10.1109/ITHERM.2010.5501417

R. Bhagwan, K. Tati, Y. Cheng, S. Savage, and G. M. Voelker, Total recall: system support for automated availability management, p.12, 2004.

F. Byung-gon-chun, A. Dabek, E. Haeberlen, H. Sit, F. Weatherspoon et al., Efficient replica maintenance for distributed storage systems, 2006.

D. A. Katz and . Patterson, Raid: High-performance, reliable secondary storage, ACM Comput. Surv, vol.26, issue.2, pp.145-185, 1994.

S. Cmh-+-02-]-ian-clarke, T. Miller, O. Hong, B. Sandberg, and . Wiley, Protecting free expression online with Freenet, IEEE Internet Computing, vol.6, issue.1, pp.40-49, 2002.
DOI : 10.1109/4236.978368

L. P. Cox, C. D. Murray, and B. D. Noble, Pastiche: Making backup cheap and easy, Proceedings of OSDI, ACM, 2002.

P. Landon, B. D. Cox, and . Noble, Samsara: Honor among thieves in peer-to-peer storage, Proceedings of the Symposium on Operating Systems Principles, 2003.

[. Cohen, Incentives build robustness in bittorrent, 2003.

[. Corp, Writing reentrant and threadsafe code, online, p.2013

[. Chandra and S. Toueg, Unreliable failure detectors for reliable distributed systems, Journal of the ACM, vol.43, issue.2, pp.225-267, 1996.
DOI : 10.1145/226643.226647

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.498

J. Calder, A. Wang, N. Ogus, A. Nilakantan, S. Skjolsvold et al., Windows Azure Storage, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP '11, pp.143-157, 2011.
DOI : 10.1145/2043556.2043571

[. Duminuco, E. Biersack, and T. En-najjary, Proactive replication in distributed storage systems using machine availability estimation, Proceedings of the 2007 ACM CoNEXT conference on , CoNEXT '07, pp.1-27, 2007.
DOI : 10.1145/1364654.1364689

J. Dean and S. Ghemawat, MapReduce, Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation , OSDI'04, USENIX Association, pp.10-10, 2004.
DOI : 10.1145/1327452.1327492

S. Defrance, R. Gendrot, J. L. Roux, G. Straub, and T. Tapie, Home networking as a distributed file system view, Proceedings of the 2nd ACM SIGCOMM workshop on Home networks, HomeNets '11, pp.67-72, 2011.
DOI : 10.1145/2018567.2018583

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.353.7507

A. Dimakis, B. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, Network coding for distributed storage systems, IEEE INFOCOM, 2007.
DOI : 10.1109/tit.2010.2054295

G. Decandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman et al., Swaminathan Sivasubramanian, Peter Vosshall, and Werner Vogels, Dynamo: Amazon's highly available key-value store, Proceedings of Twenty-first ACM SIGOPS, pp.205-220, 2007.

F. Dabek, F. Kaashoek, and D. Karger, Wide-area cooperative storage with cfs, SOSP, 2001.
DOI : 10.1145/502034.502054

S. Defrance, A. Kermarrec, E. Le-merrer, N. L. Scouarnec, G. Straub et al., Efficient peer-to-peer backup services through buffering at the edge., Peer-to-Peer Computing, p.2011
DOI : 10.1109/p2p.2011.6038671

URL : https://hal.archives-ouvertes.fr/hal-00646768

M. Dell-'amico, P. Michiardi, and Y. Roudier, Back to the future: On predicting user uptime, CoRR abs/1010, p.626, 2010.

M. Dell-'amico, P. Michiardi, and Y. Roudier, Password strength: an empirical analysis, IEEE INFOCOM, 2010.

M. Dell-'amico, P. Michiardi, L. Toka, and P. Cataldi, Adaptive redundancy management for durable p2p backup, online, 1201.

R. John and . Douceur, The sybil attack, Revised Papers from the First International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002.

Y. Deswarte and J. Quisquater, Remote Integrity Checking, Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 2004.
DOI : 10.1007/1-4020-7901-X_1

P. Druschel and A. Rowstron, PAST: a large-scale, persistent peer-to-peer storage utility, Proceedings Eighth Workshop on Hot Topics in Operating Systems, pp.75-80, 2001.
DOI : 10.1109/HOTOS.2001.990064

D. Epema, A. Iosup, M. Gallet, E. Jeannot, D. Kondo et al., Failure trace archive, online, p.2014

[. Elmasri and S. Navathe, Fundamentals of Database Systems, 2003.

A. Fekete, D. Gupta, V. Luchangco, N. Lynch, and A. Shvartsman, Eventually-serializable data services, 1998.
DOI : 10.1016/s0304-3975(98)00239-4

[. Consortium, Figaro project website, online, p.2014

[. Fonseca, C. Li, V. Singhal, and R. Rodrigues, A study of the internal and external effects of concurrency bugs, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp.221-230, 2010.
DOI : 10.1109/DSN.2010.5544315

. Fre13 and S. Free, Freebox revolution, online

[. Feng, J. Shen, and Y. Fan, Rest: An alternative to rpc for web services architecture, Future Information Networks, First International Conference on, pp.7-10, 2009.

[. Ferguson, B. Schneier, and T. Kohno, Cryptography engineering -design principles and practical applications, pp.49-57, 2010.

[. Ghemawat, H. Gobioff, and S. Leung, The google file system, Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles SOSP '03, pp.29-43, 2003.
DOI : 10.1145/1165389.945450

[. Gilbert and N. Lynch, Brewer's conjecture and the feasibility of consistent, available, partition-tolerant web services, ACM SIGACT News, vol.33, issue.2, p.84, 2002.
DOI : 10.1145/564585.564601

[. Giroire, J. Monteiro, and S. Perennes, P2P storage systems: How much locality can they tolerate?, 2009 IEEE 34th Conference on Local Computer Networks, p.30, 2009.
DOI : 10.1109/LCN.2009.5355104

URL : https://hal.archives-ouvertes.fr/inria-00496220

Z. Hasan, W. Anwar, L. Yurcik, R. Brumbaugh, and . Campbell, A survey of peer-to-peer storage techniques for distributed file systems, International Conference on Information Technology: Coding and Computing (ITCC'05), Volume II, p.13, 2005.
DOI : 10.1109/ITCC.2005.42

[. Haeberlen, A. Mislove, and P. Druschel, Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures, Networked Systems Design and Implementation, pp.143-158, 2005.

A. Ismaili and P. Bernard, Estimating the probability of failure of equipment as a result of direct lightning strikes on transmission lines, Power Delivery, IEEE Transactions on, vol.14, issue.4, pp.1394-1400, 1999.

[. Corp, Understanding and exploiting snapshot technology for data protection., online, http: //www.ibm.com/developerworks/tivoli/library/ t-snaptsm1/index.html, Cited on page 5.) [IET13] IETF, Rfc 5246 , online, p.2013, 2006.

[. Jones, A. Hosking, and E. Moss, The garbage collection handbook: The art of automatic memory management, 2011.
DOI : 10.1201/9781315388021

J. Kubiatowicz, Oceanstore: an architecture for global-scale persistent storage, SIGPLAN Not, pp.190-201, 2000.

[. Kao and V. Gibbs, A fast reed-solomon and cyclic redundancy check encoding algorithm for optical disk error control , ASIC Conference and Exhibit, Proceedings ., Seventh Annual IEEE International, pp.250-253, 1994.
DOI : 10.1109/asic.1994.404565

[. Kondo, B. Javadi, A. Iosup, and D. Epema, The Failure Trace Archive: Enabling Comparative Analysis of Failures in Diverse Distributed Systems, 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, pp.398-407, 2010.
DOI : 10.1109/CCGRID.2010.71

URL : https://hal.archives-ouvertes.fr/inria-00433523

[. Krishnamurthy and J. Rexford, Web protocols and practice, p.56, 2001.

[. Ontrack, Kroll ontrack data recovery service, online, 2014.

[. Kim and N. Venkatasubramanian, Assessing the impact of geographically correlated failures on overlaybased data dissemination, Global Telecommunications Conference, pp.1-5, 2010.

A. Lacie, Wuala cloud storage service, online, p.79

[. Boudec, Performance evaluation of computer and communication systems, 2010.
DOI : 10.1201/b16328

G. Lefebvre and M. J. Feeley, Separating durability and availability in self-managed storage, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, 2004.
DOI : 10.1145/1133572.1133576

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.538.1227

Y. Liu, J. Guan, G. Zhang, Y. Wang, and . Zhang, Reed-solomon codes for satellite communications, Control, Automation and Systems Engineering, IITA International Conference on, pp.246-249, 2009.
DOI : 10.1109/case.2009.30

[. Li, Parallel file download in peer-to-peer networks with random service capacities, Parallel and Distributed Processing Symposium Workshops PhD Forum (IPDPSW), pp.677-686, 2013.
DOI : 10.1109/ipdpsw.2013.20

[. Lakshman and P. Malik, Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010.
DOI : 10.1145/1773912.1773922

A. W. Leung, S. Pasupathy, G. Goodson, and E. L. Miller, Measurement and analysis of large-scale network file system workloads, USENIX Association, pp.27-72, 2008.

N. Laneman and C. Sundberg, Reed-Solomon decoding algorithms for digital audio broadcasting in the AM band, IEEE Transactions on Broadcasting, vol.47, issue.2, pp.115-122, 2001.
DOI : 10.1109/11.948264

[. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.1697

[. Luby, Lt codes, Foundations of Computer Science, Proceedings. The 43rd Annual IEEE Symposium on, p.12, 2002.

[. Landers, H. Zhang, and K. Tan, Peerstore: Better performance by relaxing in peer-to-peer backup, Proceedings on Peer-to-Peer Computing, 2004.

[. Massey, Capacity, Cutoff Rate, and Coding for a Direct-Detection Optical Channel, IEEE Transactions on Communications, vol.29, issue.11, pp.1615-1621, 1981.
DOI : 10.1109/TCOM.1981.1094916

[. Maymounkov, Online codes, 2002.

D. Meister and A. Brinkmann, Multi-level comparison of data deduplication in a backup scenario, Proceedings of SYS- TOR 2009: The Israeli Experimental Systems Conference, pp.1-8, 2009.

[. Muthitacharoen, B. Chen, and D. Eres, A low-bandwidth network file system, Proceedings of Symposium on Operating Systems Principles, ACM, 2001.
DOI : 10.1145/502034.502052

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.8444

J. C. Mccullough, J. Dunagan, A. Wolman, and A. C. Snoeren, Stout: An adaptive interface to scalable cloud storage, Proceedings of the 2010 USENIX Annual Technical Conference , USENIX Association, pp.4-4, 2010.

[. Nath, H. Yu, P. B. Gibbons, and S. Seshan, Subtleties in tolerating correlated failures in wide-area storage systems, Proceedings of NSDI'06 USENIX Association, pp.17-17, 2006.

O. Corp, Maintaining data integrity through constraints, online

[. and E. Biersack, Cost analysis of redundancy schemes for distributed storage systems, CoRR, 2011.

[. and P. Garcia-lopez, Maintaining data reliability without availability in p2p storage systems, Proceedings of the 2010 ACM Symposium on Applied Computing, p.2010

J. S. Plank, J. Luo, C. D. Schuman, L. Xu, and Z. Wilcox-o-'hearn, A performance evaluation and examination of open-source erasure coding libraries for storage, Proccedings of FAST'09, USENIX Association, pp.253-265, 2009.

. S. Pmg-+-13-]-j, E. L. Plank, K. M. Miller, B. A. Greenan, J. A. Arnold et al., GF-Complete: A comprehensive open source library for Galois Field arithmetic. version 1.0, 2013.

[. Prenel and P. C. Van-oorschot, MDx-MAC and Building Fast MACs from Hash Functions, Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology CRYPTO '95, 1995.
DOI : 10.1007/3-540-44750-4_1

[. Papastergiou, Deep-Space Transport Protocol: A novel transport scheme for Space DTNs, Computer Communications, vol.32, issue.16, pp.1757-1767, 2009.
DOI : 10.1016/j.comcom.2009.02.012

J. Proakis and M. Salehi, Fundamentals of communication systems, Pearson Education, p.76, 2007.

[. Portmann, P. Sookavatana, S. Ardon, and A. Seneviratne, The cost of peer discovery and searching in the Gnutella peer-to-peer file sharing protocol, Proceedings. Ninth IEEE International Conference on Networks, ICON 2001., pp.263-268, 2001.
DOI : 10.1109/ICON.2001.962351

[. Porras, H. Sa¨?disa¨?di, and V. Yegneswaran, A foray into conficker's logic and rendezvous points, Proceedings of the 2Nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More LEET'09, USENIX Association, pp.7-7, 2009.

[. Rabin, Fingerprinting by random polynomials, 1981.

I. T. Antony, P. Rowstron, and . Druschel, Pastry: Scalable, decentralized object location, and routing for large-scale peerto-peer systems, Middleware '01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pp.329-350, 2001.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, Proceedings of SIGCOMM '01, pp.161-172, 2001.
DOI : 10.1145/964723.383072

[. Majid-razavian, H. Khani, N. Yazdani, and F. Ghassemi, An analysis of vendor lock-in problem in cloud storage, ICCKE 2013, pp.331-335, 2013.
DOI : 10.1109/ICCKE.2013.6682808

[. Ramabhadran and J. Pasquale, Analysis of longrunning replicated systems, Proceedings of INFOCOM 2006, pp.1-9, 2006.
DOI : 10.1109/infocom.2006.130

[. Laboratories, Pkcs #5: Password-based cryptography standard

[. Ramalingam and K. Vaswani, Fault tolerance via idempotence, Proceedings of ACM SIGPLAN-SIGACT, POPL '13, ACM, pp.249-262, 2013.
DOI : 10.1145/2429069.2429100

[. Storer, K. Greenan, D. Long, and E. Miller, Secure data deduplication, Proceedings of the 4th ACM international workshop on Storage security and survivability, StorageSS '08, p.18, 2008.
DOI : 10.1145/1456469.1456471

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.499

A. Shokrollahi and R. Codes, Raptor codes, IEEE Transactions on Information Theory, vol.52, issue.6, pp.2551-2567, 2006.
DOI : 10.1109/TIT.2006.874390

H. Jerome, M. F. Saltzer, and . Kaashoek, Principles of computer system design: An introduction, pp.89-130, 2009.

[. Shvachko, H. Kuang, S. Radia, and R. Chansler, The Hadoop Distributed File System, 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp.1-10, 2010.
DOI : 10.1109/MSST.2010.5496972

R. Stoica, D. Morris, D. R. Liben-nowell, M. F. Karger, F. Kaashoek et al., Chord: a scalable peer-to-peer lookup protocol for internet applications, IEEE/ACM Transactions on Networking, vol.11, issue.1, pp.17-32, 2003.
DOI : 10.1109/TNET.2002.808407

J. G. Steiner, C. Neuman, and J. I. Schiller, Kerberos: An authentication service for open network systems, Usenix Conference Proceedings, 1988.

[. Stevens and R. Rago, Advanced programming in the unix environment, Addison-Wesley professional computing series, 2005.

[. Sankar, M. Shaw, K. Vaid, and S. Gurumurthi, Datacenter Scale Evaluation of the Impact of Temperature on Hard Disk Drive Failures, ACM Transactions on Storage, vol.9, issue.2, pp.1-6, 2013.
DOI : 10.1145/2491472.2491475

[. Stallings, Data and computer communications -fifth edition, 1997.

[. Storey, Worm disk drive systems, Data Storage Technology, IEE Colloquium on, issue.6, pp.1-6, 1990.

[. Sears, C. Van-ingen, and J. Gray, To BLOB or not to BLOB: large object storage in a database or a filesystem, p.59, 2006.

[. Toka, P. Cataldi, M. Dell-'amico, and P. Michiardi, Redundancy management for P2P backup, 2012 Proceedings IEEE INFOCOM, pp.95-141, 2012.
DOI : 10.1109/INFCOM.2012.6195743

[. Toka, M. Dell-'amico, and P. Michiardi, Online data backup: A peer-assisted approach, Peer-to-Peer Computing, 2010 IEEE Tenth International Conference on, pp.1-10, 2010.
DOI : 10.1109/p2p.2010.5570003

[. Mager, Implementation of distback , online, p.2014

[. Mager, E. Biersack, and P. Michiardi, A measurement study of the Wuala on-line storage service, 2012 IEEE 12th International Conference on Peer-to-Peer Computing (P2P), pp.16-71, 2012.
DOI : 10.1109/P2P.2012.6335804

C. Teat and S. Peltsverger, The security of cryptographic hashes, Proceedings of the 49th Annual Southeast Regional Conference on, ACM-SE '11, pp.103-108, 2011.
DOI : 10.1145/2016039.2016072

A. Tridgell, The rsync algorithm, 1996.

J. Tucek, P. Stanton, E. Haubert, R. Hasan, L. Brumbaugh et al., Trade-Offs in Protecting Storage: A Meta-Data Comparison of Cryptographic, Backup/Versioning, Immutable/Tamper-Proof, and Redundant Storage Solutions, 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies (MSST'05), pp.329-340, 2005.
DOI : 10.1109/MSST.2005.39

[. Tepekule, U. Yavuz, and A. Pusane, On the use of modern coding techniques in QR applications, 2013 21st Signal Processing and Communications Applications Conference (SIU), pp.1-4, 2013.
DOI : 10.1109/SIU.2013.6531318

K. Venkatesh, V. , and N. Nagappan, Characterizing cloud computing hardware reliability, Proceedings of the 1st ACM Symposium on Cloud Computing SoCC '10, pp.193-204, 2010.

[. Vogels, File system usage in windows nt 4, Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles SOSP '99, pp.93-109, 1999.
DOI : 10.1145/319344.319158

B. Stephen, V. K. Wicker, and . Bhargava, Reed-solomon codes and their applications, pp.12-33, 1999.

[. Weatherspoon, Design and evaluation of distributed wide-area on-line archival storage systems, 2006.

R. Paul and . Wilson, Uniprocessor garbage collection techniques, Proceedings of the International Workshop on Memory Management IWMM '92, pp.1-42, 1992.

R. Paul, M. S. Wilson, M. Johnstone, D. Neely, and . Boles, Dynamic storage allocation: A survey and critical review, Proceedings of the International Workshop on Memory Management, IWMM '95, pp.1-116, 1995.

[. Wilcox-o-'hearn and B. Warner, Tahoe: The leastauthority filesystem, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability StorageSS '08, pp.21-26, 2008.

[. Yamada, H. Kotani, J. Matsushima, and M. Inoue, A 4-mbit dram with 16-bit concurrent ecc, Solid- State Circuits, IEEE Journal, vol.23, issue.1, pp.20-26, 1988.

J. Yang and F. Sun, A comprehensive review of hard-disk drive reliability, Reliability and Maintainability Symposium, pp.403-409, 1999.

J. Gao and Z. , Effect of dust contamination on electrical contact failure, IEEE Holm Conference on Electrical Contacts, p.xxi?xxx, 2007.

[. Zhou, M. Liu, and T. Li, Characterizing the efficiency of data deduplication for big data storage management, 2013 IEEE International Symposium on Workload Characterization (IISWC), pp.98-108, 2013.
DOI : 10.1109/IISWC.2013.6704674