Open Access
ITM Web Conf.
Volume 11, 2017
2017 International Conference on Information Science and Technology (IST 2017)
Article Number 10002
Number of page(s) 8
Section Session X: Big Data Processing and Management
Published online 23 May 2017
  1. Dongju Yang, Chuan Ren. VCSS: An Integration Framework for Open Cloud Storage Services [J]. Services (SERVICES), 2014 IEEE World Congress on. June 27 2014-July 2 2014, Pages: 155–160 [Google Scholar]
  2. Machado G.S., Bocek T., Ammann M, Stiller B. A Cloud Storage overlay to aggregate heterogeneous Cloud services [J]. Local Computer Networks (LCN), 2013 IEEE 38th Conference on. 21-24 Oct 2013, Pages: 597–605 [Google Scholar]
  3. Pawar C.S., Patil P.R., Chaudhari S.V. Providing security and integrity for dta stored in cloud storage [J]. Information Communication and Embedded Systems (ICICES), 2014 International Conference on. 27-28 Feb 2014, Pages: 1–5 [Google Scholar]
  4. Arockiam L., Monikandan S. Efficient cloud storage confidentiality to ensure data security [J]. Computer Communication and Informatics (ICCCI), 2014 International Conference on. 3-5 Jan 2014, Pages: 1–5 [Google Scholar]
  5. Kavuri S.K.S.V.A., Kancherla G.R., Bobba B.R. Data authentication and integrity verification techniques for trustd/untrusted cloud servers [J]. Advanced in Computing Communications and Informatics (ICACCI), 2014 International Conference on. 24-27 Sept 2014, Pages: 2590–2596 [Google Scholar]
  6. Data verification_Baidu Encyclopedia [Z]. 2013 [Google Scholar]
  7. Chang Liu, Chi Yang, et al. External integrity verification for outsourced big data in cloud and IoT : A big picture [J], Future Generation Computer System, 2015, 49, Pages : 58–67. [CrossRef] [Google Scholar]
  8. White T. Hadoop: The definitive guide [M]. O, Reilly Media, 2012 [Google Scholar]
  9. Shvachko K, Kuang H, Radia S, et al. The hadoop distributed file system[C]. In: 2010. Pages: 1–10 [Google Scholar]
  10. Zhaoguang Peng, Yu Lu, Alice Miller, et al. Formal Specification and Quantitative Analysis of a Constellation of Navigation Satellites[J], Quality and Reliability Engineering International, 2016, 32(2), Pages : 345–361. [CrossRef] [Google Scholar]
  11. Yingjie Xia, Fubiao Xia, Xuejiao Liu, et al. An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage [J], KSII Transactions on Internet and Information Systems, 2014, 8(10), Pages : 3607–3623 [Google Scholar]
  12. Yu Lu, Zhaoguang Peng, Alice A. Miller, et al. How reliable is satellite navigation for aviation? Checking availability properties with probabilistic verification [J]. Reliability Engineering & System Safety, 2015, 144, Pages : 95–116. [CrossRef] [Google Scholar]
  13. Khatri T.S., Jethava G.B. Improving dynamic data integrity verification in cloud computing [J]. Computing Communication and Networking Technologies (ICCCNT), 2013 Fourth International Conference on. 4-6 July 2013, Pages: 1–6 [Google Scholar]
  14. Danyang Cao, Bingru Yang. Design and implementation for MD5-based data integrity checking system [J]. Information Management and Engineering (ICIME), 2010 the 2nd IEEE International Conference on. 16-18 April 2010, Pages: 608–611 [Google Scholar]
  15. Matusiewicz K, Pieprzyk J. Finding good differential patterns for attacks on SHA-1[J]. Coding and Cryptography. 2006, Pages: 164–177 [MathSciNet] [Google Scholar]
  16. Peterson W.W., Brown D.T. Cyclic Codes for Error Detection [J]. Proceedings of the IRE. Jan 1961, Pages: 228–235 [Google Scholar]
  17. Kounavis M.E., Berry F.L. A systematic approach to building high performance software-based CRC generators[C]. In: 2005, Pages: 855–862 [Google Scholar]
  18. Rui Jing. Research and Improvement of Data Check Strategy in Distributed File System [D]. Jilin: Jilin University, 2013. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.