{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:33:15Z","timestamp":1766485995867,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":53,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_5","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"95-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Proof of Isolation for Cloud Storage"],"prefix":"10.1007","author":[{"given":"Zhan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Kun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Jiwu","family":"Jing","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"5_CR1","volume-title":"A. H","author":"A. K. Fischman","year":"2010","unstructured":"A. K. Fischman, A. H. Vermeulen: Keymap service architecture for a distributed storage system (2010)"},{"unstructured":"Amazon Simple Storage Service (S3): http:\/\/aws.amazon.com\/s3\/","key":"5_CR2"},{"unstructured":"Amazon Web Services: aws.amazon.com","key":"5_CR3"},{"unstructured":"apgbfm, http:\/\/linux.die.net\/man\/1\/apgbfm: http:\/\/linux.die.net\/man\/1\/apgbfm","key":"5_CR4"},{"doi-asserted-by":"crossref","unstructured":"Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, CCS \u201907, pp. 598\u2013609. ACM, New York, NY, USA (2007). DOI\u00a010.1145\/1315245.1315318. http:\/\/doi.acm.org\/10.1145\/1315245.1315318","key":"5_CR5","DOI":"10.1145\/1315245.1315318"},{"doi-asserted-by":"crossref","unstructured":"Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: Hypersentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM conference on Computer and communications security, CCS \u201910, pp. 38\u201349. ACM, New York, NY, USA (2010). DOI\u00a010.1145\/1866307.1866313. http:\/\/doi.acm.org\/10.1145\/1866307.1866313","key":"5_CR6","DOI":"10.1145\/1866307.1866313"},{"doi-asserted-by":"crossref","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T.L., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP, pp. 164\u2013177 (2003)","key":"5_CR7","DOI":"10.1145\/1165389.945462"},{"doi-asserted-by":"crossref","unstructured":"Benson, K., Dowsley, R., Shacham, H.: Do you know where your cloud files are? In: CCSW, pp. 73\u201382 (2011)","key":"5_CR8","DOI":"10.1145\/2046660.2046677"},{"issue":"7","key":"5_CR9","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"unstructured":"Bovet, D.P., Cesati, M.: Understanding the Linux Kernel - from I\/O ports to process management: covers version 2.6 (3. ed.). O\u2019Reilly (2005)","key":"5_CR10"},{"doi-asserted-by":"crossref","unstructured":"Bowers, K.D., van Dijk, M., Juels, A., Oprea, A., Rivest, R.L.: How to tell if your cloud files are vulnerable to drive crashes. In: ACM Conference on Computer and Communications Security, pp. 501\u2013514 (2011)","key":"5_CR11","DOI":"10.1145\/2046707.2046766"},{"doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., Oprea, A.: Hail: a high-availability and integrity layer for cloud storage. In: Proceedings of the 16th ACM conference on Computer and communications security, CCS \u201909, pp. 187\u2013198. ACM, New York, NY, USA (2009). DOI\u00a010.1145\/1653662.1653686. http:\/\/doi.acm.org\/10.1145\/1653662.1653686","key":"5_CR12","DOI":"10.1145\/1653662.1653686"},{"doi-asserted-by":"crossref","unstructured":"Brewer, D.F.C., Nash, M.J.: The chinese wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206\u2013214 (1989)","key":"5_CR13","DOI":"10.1109\/SECPRI.1989.36295"},{"doi-asserted-by":"crossref","unstructured":"Butt, S., Lagar-Cavilla, H.A., Srivastava, A., Ganapathy, V.: Self-service cloud computing. In: ACM Conference on Computer and Communications Security, pp. 253\u2013264 (2012)","key":"5_CR14","DOI":"10.1145\/2382196.2382226"},{"doi-asserted-by":"crossref","unstructured":"Calder, B., Wang, J., Ogus, A., Nilakantan, N., Skjolsvold, A., McKelvie, S., Xu, Y., Srivastav, S., Wu, J., Simitci, H., Haridas, J., Uddaraju, C., Khatri, H., Edwards, A., Bedekar, V., Mainali, S., Abbasi, R., Agarwal, A., ul\u00a0Haq, M.F., ul\u00a0Haq, M.I., Bhardwaj, D., Dayanand, S., Adusumilli, A., McNett, M., Sankaran, S., Manivannan, K., Rigas, L.: Windows azure storage: a highly available cloud storage service with strong consistency. In: SOSP, pp. 143\u2013157 (2011)","key":"5_CR15","DOI":"10.1145\/2043556.2043571"},{"unstructured":"Chen, B., Curtmola, R.: Towards self-repairing replication-based storage systems using untrusted clouds. In: Proceedings of the third ACM conference on Data and application security and privacy, CODASPY \u201913, pp. 377\u2013388. ACM, New York, NY, USA (2013). DOI\u00a010.1145\/2435349.2435402. http:\/\/doi.acm.org\/10.1145\/2435349.2435402","key":"5_CR16"},{"unstructured":"Cloud Security Alliance: The notorious nine: Cloud computing top threats in 2013 (2013)","key":"5_CR17"},{"doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM conference on Computer and communications security, CCS \u201906, pp. 79\u201388. ACM, New York, NY, USA (2006). DOI\u00a010.1145\/1180405.1180417. http:\/\/doi.acm.org\/10.1145\/1180405.1180417","key":"5_CR18","DOI":"10.1145\/1180405.1180417"},{"doi-asserted-by":"crossref","unstructured":"Curtmola, R., Khan, O., Burns, R., Ateniese, G.: Mr-pdp: Multiple-replica provable data possession. In: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, ICDCS \u201908, pp. 411\u2013420. IEEE Computer Society, Washington, DC, USA (2008). DOI\u00a010.1109\/ICDCS.2008.68. http:\/\/dx.doi.org\/10.1109\/ICDCS.2008.68","key":"5_CR19","DOI":"10.1109\/ICDCS.2008.68"},{"unstructured":"Dan@AWS: Best Practices for Using Amazon S3 (2009). http:\/\/aws.amazon.com\/articles\/1904","key":"5_CR20"},{"doi-asserted-by":"crossref","unstructured":"Dent, A.W.: The cramer-shoup encryption scheme is plaintext aware in the standard model. In: EUROCRYPT, pp. 289\u2013307 (2006)","key":"5_CR21","DOI":"10.1007\/11761679_18"},{"key":"5_CR22","volume-title":"Hourglass schemes: How to prove that cloud files are encrypted","author":"M.V. Dijk","year":"2012","unstructured":"Dijk, M.V., Juels, A., Oprea, A., Rivest, R.L., Stefanov, E., Triandopoulos, N.: Hourglass schemes: How to prove that cloud files are encrypted. In: ACM Conference on Computer and Communications Security (2012)"},{"doi-asserted-by":"crossref","unstructured":"Dodis, Y., Vadhan, S.P., Wichs, D.: Proofs of retrievability via hardness amplification. In: Theory of Cryptography Conference, pp. 109\u2013127 (2009)","key":"5_CR23","DOI":"10.1007\/978-3-642-00457-5_8"},{"doi-asserted-by":"crossref","unstructured":"Erway, C., K\u00fcp\u00e7\u00fc, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM conference on Computer and communications security, CCS \u201909, pp. 213\u2013222. ACM, New York, NY, USA (2009). DOI\u00a010.1145\/1653662.1653688. http:\/\/doi.acm.org\/10.1145\/1653662.1653688","key":"5_CR24","DOI":"10.1145\/1653662.1653688"},{"unstructured":"Eucalyptus, http:\/\/www.eucalyptus.com: www.eucalyptus.com","key":"5_CR25"},{"doi-asserted-by":"crossref","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. SIGOPS Oper. Syst. Rev. 37(5), 193\u2013206 (2003). DOI\u00a010.1145\/1165389.945464. http:\/\/doi.acm.org\/10.1145\/1165389.945464","key":"5_CR26","DOI":"10.1145\/1165389.945464"},{"key":"5_CR27","volume-title":"Forecast overview: Public cloud services, worldwide, 2011\u20132016, 4q12 update","author":"Inc Gartiner","year":"2013","unstructured":"Gartiner, Inc.: Forecast overview: Public cloud services, worldwide, 2011\u20132016, 4q12 update (2013)"},{"doi-asserted-by":"crossref","unstructured":"Ghemawat, S., Gobioff, H., Leung, S.T.: The google file system. In: SOSP, pp. 29\u201343 (2003)","key":"5_CR28","DOI":"10.1145\/1165389.945450"},{"key":"5_CR29","volume-title":"Scalpel: A frugal, high performance file carver","author":"G.G.R. III","year":"2005","unstructured":"III, G.G.R., Roussev, V.: Scalpel: A frugal, high performance file carver. In: DFRWS (2005)"},{"key":"5_CR30","volume-title":"Memory Systems: Cache, DRAM","author":"B. Jacob","year":"2007","unstructured":"Jacob, B., Ng, S., Wang, D.: Memory Systems: Cache, DRAM, Disk. Morgan Kaufmann Publishers Inc. (2007)"},{"doi-asserted-by":"crossref","unstructured":"Jhawar, R., Piuri, V.: Fault tolerance management in iaas clouds. In: Proc. of the 1st IEEE-AESS Conference in Europe about Space and Satellite Telecommunications (ESTEL 2012), ESTEL 2012. Rome, Italy (2012)","key":"5_CR31","DOI":"10.1109\/ESTEL.2012.6400113"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., Oprea, A.: New approaches to security and availability for cloud data. Commun. ACM 56(2), 64\u201373 (2013). DOI\u00a010.1145\/2408776.2408793. http:\/\/doi.acm.org\/10.1145\/2408776.2408793","key":"5_CR32","DOI":"10.1145\/2408776.2408793"},{"doi-asserted-by":"crossref","unstructured":"Keller, E., Szefer, J., Rexford, J., Lee, R.B.: Nohype: virtualized cloud infrastructure without the virtualization. In: Proceedings of the 37th annual international symposium on Computer architecture, ISCA \u201910, pp. 350\u2013361. ACM, New York, NY, USA (2010). DOI\u00a010.1145\/1815961.1816010. http:\/\/doi.acm.org\/10.1145\/1815961.1816010","key":"5_CR33","DOI":"10.1145\/1816038.1816010"},{"doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: ACM Conference on Computer and Communications Security, pp. 199\u2013212 (2009)","key":"5_CR34","DOI":"10.1145\/1653662.1653687"},{"key":"5_CR35","first-page":"186","volume":"2008","author":"M.A. Shah","year":"2008","unstructured":"Shah, M.A., Swaminathan, R., Baker, M.: Privacy-preserving audit and extraction of digital contents. IACR Cryptology ePrint Archive 2008, 186 (2008)","journal-title":"IACR Cryptology ePrint Archive"},{"unstructured":"Silberschatz, A., Galvin, P.B., Gagne, G.: Operating system concepts (7. ed.). Wiley (2005)","key":"5_CR36"},{"unstructured":"Spafford, E.: Opus: Preventing weak password choices","key":"5_CR37"},{"unstructured":"di\u00a0Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd international conference on Very large data bases, VLDB \u201907, pp. 123\u2013134. VLDB Endowment (2007). http:\/\/dl.acm.org\/citation.cfm?id=1325851.1325869","key":"5_CR38"},{"doi-asserted-by":"crossref","unstructured":"di\u00a0Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Support for write privileges on outsourced data. In: SEC, pp. 199\u2013210 (2012)","key":"5_CR39","DOI":"10.1007\/978-3-642-30436-1_17"},{"doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Wang, J., Urs, K.M.R.: Harnessing the cloud for securely solving large-scale systems of linear equations. In: ICDCS, pp. 549\u2013558 (2011)","key":"5_CR40","DOI":"10.1109\/ICDCS.2011.41"},{"issue":"1","key":"5_CR41","first-page":"9","volume":"8","author":"Q. Wang","year":"2011","unstructured":"Wang, Q., Ren, K., Yu, S., Lou, W.: Dependable and secure sensor data storage with dynamic integrity assurance. TOSN 8(1), 9 (2011)","journal-title":"TOSN"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Jiang, X.: Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP \u201910, pp. 380\u2013395. IEEE Computer Society, Washington, DC, USA (2010). DOI\u00a010.1109\/SP.2010.30. http:\/\/dx.doi.org\/10.1109\/SP.2010.30","key":"5_CR42","DOI":"10.1109\/SP.2010.30"},{"unstructured":"Wang, Z., Sun, K., Jajodia, S., Jing, J.: Disk storage isolation and verification in cloud. In: Globecom 2012. Anaheim, CA, USA (2012)","key":"5_CR43"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Sun, K., Jajodia, S., Jing, J.: Terracheck: Verification of dedicated cloud storage. In: 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec \u201913). Newark, NJ, USA (2013)","key":"5_CR44","DOI":"10.1007\/978-3-642-39256-6"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Sun, K., Jajodia, S., Jing, J.: Verification of data redundancy in cloud storage. In: Proceedings of the 2013 International Workshop on Security in Cloud Computing (To Appear)","key":"5_CR45","DOI":"10.1145\/2484402.2484407"},{"unstructured":"Watson, G.J., Safavi-Naini, R., Alimomeni, M., Locasto, M.E., Narayan, S.: Lost: location based storage. In: Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, CCSW \u201912, pp. 59\u201370. ACM, New York, NY, USA (2012). DOI\u00a010.1145\/2381913.2381926. http:\/\/doi.acm.org\/10.1145\/2381913.2381926","key":"5_CR46"},{"unstructured":"Wu, Z., Xu, Z., Wang, H.: Whispers in the hyper-space: High-speed covert channel attacks in the cloud. In: the 21st USENIX Security Symposium (Security\u201912) (2012)","key":"5_CR47"},{"doi-asserted-by":"crossref","unstructured":"Xiao, J., Xu, Z., Huang, H., Wang, H.: A covert channel construction in a virtualized environment. In: ACM Conference on Computer and Communications Security, pp.\u00a01040\u20131042 (2012)","key":"5_CR48","DOI":"10.1145\/2382196.2382318"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Bailey, M., Jahanian, F., Joshi, K.R., Hiltunen, M.A., Schlichting, R.D.: An exploration of l2 cache covert channels in virtualized environments. In: CCSW, pp. 29\u201340 (2011)","key":"5_CR49","DOI":"10.1145\/2046660.2046670"},{"doi-asserted-by":"crossref","unstructured":"Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: INFOCOM, pp. 534\u2013542 (2010)","key":"5_CR50","DOI":"10.1109\/INFCOM.2010.5462174"},{"doi-asserted-by":"crossref","unstructured":"Zhang, F., Chen, J., Chen, H., Zang, B.: Cloudvisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP \u201911, pp. 203\u2013216. ACM, New York, NY, USA (2011). DOI\u00a010.1145\/2043556.2043576. http:\/\/doi.acm.org\/10.1145\/2043556.2043576","key":"5_CR51","DOI":"10.1145\/2043556.2043576"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Oprea, A., Reiter, M.K.: Homealone: Co-residency detection in the cloud via side-channel analysis. In: IEEE Symposium on Security and Privacy, pp. 313\u2013328 (2011)","key":"5_CR52","DOI":"10.1109\/SP.2011.31"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-vm side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on Computer and communications security, CCS \u201912, pp. 305\u2013316. ACM, New York, NY, USA (2012). DOI\u00a010.1145\/2382196.2382230. http:\/\/doi.acm.org\/10.1145\/2382196.2382230","key":"5_CR53","DOI":"10.1145\/2382196.2382230"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:50:56Z","timestamp":1746118256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_5","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}