{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:04:44Z","timestamp":1740096284356,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642453632"},{"type":"electronic","value":"9783642453649"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45364-9_5","type":"book-chapter","created":{"date-parts":[[2013,12,12]],"date-time":"2013-12-12T22:41:52Z","timestamp":1386888112000},"page":"47-58","source":"Crossref","is-referenced-by-count":0,"title":["peaCS-Performance and Efficiency Analysis for Cloud Storage"],"prefix":"10.1007","author":[{"given":"Josef","family":"Spillner","sequence":"first","affiliation":[]},{"given":"Maximilian","family":"Quellmalz","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Friedrich","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Schill","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: A Case for Cloud Storage Diversity. In: 1st ACM Symposium on Cloud Computing (SoCC), Indianapolis, Indiana, USA, pp. 229\u2013240 (June 2010)","key":"5_CR1","DOI":"10.1145\/1807128.1807165"},{"doi-asserted-by":"crossref","unstructured":"Beloglazov, A., Buyya, R.: Energy Efficient Resource Management in Virtualized Cloud Data Centers. In: Proceedings of the 2010 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing (CCGrid), Melbourne, Australia, pp. 826\u2013831 (May 2010)","key":"5_CR2","DOI":"10.1109\/CCGRID.2010.46"},{"doi-asserted-by":"crossref","unstructured":"Bertolino, A., Polini, A.: SOA Test Governance: Enabling Service Integration Testing across Organization and Technology Borders. In: International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Denver, Colorado, USA, pp. 277\u2013286 (April 2009)","key":"5_CR3","DOI":"10.1109\/ICSTW.2009.39"},{"doi-asserted-by":"crossref","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: DEPSKY: Dependable and Secure Storage in a Cloud-of-Clouds. In: Proceedings of EuroSys, Salzburg, Austria (2011)","key":"5_CR4","DOI":"10.1145\/1966445.1966449"},{"unstructured":"Boyd, D., Crawford, K.: Six Provocations for Big Data. In: Decade, A. (ed.) A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, Oxford Internet Institute (September 2011)","key":"5_CR5"},{"unstructured":"Calheiros, R.N., Ranjan, R., Rose, C.A.F.D., Buyya, R.: CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services. Tech. Rep. GRIDS-TR-2009-1, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia (March 2009)","key":"5_CR6"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MITP.2006.51","volume":"8","author":"G. Canfora","year":"2006","unstructured":"Canfora, G., Penta, M.D.: Testing Services and Service-Centric Systems: Challenges and Opportunities. IT Professional\u00a08(2), 10\u201317 (2006)","journal-title":"IT Professional"},{"doi-asserted-by":"crossref","unstructured":"Datta, A., Oggier, F.: An Overview of Codes Tailor-made for Better Repairability in Networked Distributed Storage Systems. ACM SIGACT News Distributed Computing Column (March 2013)","key":"5_CR8","DOI":"10.1145\/2447712.2447735"},{"unstructured":"Khan, O., Burns, R., Plank, J., Pierce, W., Huang, C.: Rethinking Erasure Codes for Cloud File Systems: Minimizing I\/O for Recovery and Degraded Reads. In: 10th USENIX Conference on File and Storage Technologies (FAST), San Jose, California, USA (February 2012)","key":"5_CR9"},{"doi-asserted-by":"crossref","unstructured":"Livenson, I., Laure, E.: Towards Transparent Integration of Heterogeneous Cloud Storage Platforms. In: Proceedings of the Fourth International Workshop on Data-Intensive Distributed Computing (DIDC), San Jose, California, USA, pp. 27\u201334 (June 2011)","key":"5_CR10","DOI":"10.1145\/1996014.1996020"},{"doi-asserted-by":"crossref","unstructured":"Meng, X., Isci, C., Kephart, J., Zhang, L., Bouillet, E., Pendarakis, D.: Efficient Resource Provisioning in Compute Clouds via VM Multiplexing. In: Proceedings of the 7th IEEE\/ACM International Conference on Autonomic Computing (ICAC), Washington, DC, USA, pp. 11\u201320 (June 2010)","key":"5_CR11","DOI":"10.1145\/1809049.1809052"},{"doi-asserted-by":"crossref","unstructured":"Nepal, S., Friedrich, C., Henry, L., Chen, S.: A Secure Storage Service in the Hybrid Cloud. In: Fourth IEEE\/ACM International Conference on Utility and Cloud Computing (UCC), Melbourne, Australia, pp. 334\u2013335 (December 2011)","key":"5_CR12","DOI":"10.1109\/UCC.2011.55"},{"doi-asserted-by":"crossref","unstructured":"Noikajana, S., Suwannasart, T.: An Improved Test Case Generation Method for Web Service Testing from WSDL-S and OCL with Pair-Wise Testing Technique. In: 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), Seattle, Washington, USA, pp. 115\u2013123 (July 2009)","key":"5_CR13","DOI":"10.1109\/COMPSAC.2009.25"},{"unstructured":"Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: A Library in C\/C++ Facilitating Erasure Coding for Storage Applications. Tech. Rep. UT-CS-08-627, University of Tennessee, Knoxville, Tennessee, USA (August 2008)","key":"5_CR14"},{"doi-asserted-by":"crossref","unstructured":"Rajgarhia, A., Gehani, A.: Performance and Extension of User Space File Systems, Sierre, Switzerland (March 2010)","key":"5_CR15","DOI":"10.1145\/1774088.1774130"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-93851-4_13","volume-title":"Service-Oriented Computing - ICSOC 2007 Workshops","author":"S. Reiff-Marganiec","year":"2009","unstructured":"Reiff-Marganiec, S., Yu, H.Q., Tilly, M.: Service Selection Based on Non-functional Properties. In: Di Nitto, E., Ripeanu, M. (eds.) ICSOC 2007. LNCS, vol.\u00a04907, pp. 128\u2013138. Springer, Heidelberg (2009)"},{"key":"5_CR17","volume-title":"Sicher in die Digitale Welt von Morgen \u2013 12. Dt. IT-Sicherheitskongress des BSI","author":"M. Schnjakin","year":"2011","unstructured":"Schnjakin, M., Meinel, C.: Plattform zur Bereitstellung sicherer und hochverf\u00fcgbarer Speicherressourcen in der Cloud. In: Sicher in die Digitale Welt von Morgen \u2013 12. Dt. IT-Sicherheitskongress des BSI. SecuMedia Verlag, Bonn (May 2011)"},{"doi-asserted-by":"crossref","unstructured":"Seiger, R., Gro\u00df, S., Schill, A.: SecCSIE: A Secure Cloud Storage Integrator for Enterprises. In: 13th IEEE Conference on Commerce and Enterprise Computing, Workshop on Clouds for Enterprises, Luxembourg, pp. 252\u2013255 (September 2011)","key":"5_CR18","DOI":"10.1109\/CEC.2011.45"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H. Shacham","year":"2008","unstructured":"Shacham, H., Waters, B.: Compact Proofs of Retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol.\u00a05350, pp. 90\u2013107. Springer, Heidelberg (2008)"},{"unstructured":"Slamanig, D., Hanser, C.: On cloud storage and the cloud of clouds approach. In: The 7th International Conference for Internet Technology and Secured Transactions (ICITST), London, United Kingdom, pp. 649\u2013655 (December 2012)","key":"5_CR20"},{"doi-asserted-by":"crossref","unstructured":"Spillner, J., M\u00fcller, J., Schill, A.: Creating Optimal Cloud Storage Systems. Future Generation Computer Systems 29(4), 1062\u20131072 (June 2013), doi:\n                    \n                      http:\/\/dx.doi.org\/10.1016\/j.future.2012.06.004","key":"5_CR21","DOI":"10.1016\/j.future.2012.06.004"},{"doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Oprea, A., Juels, A.: Iris: A Scalable Cloud File System with Efficient Integrity Checks. In: 28th Annual Computer Security Applications Conference (ACSAC), Orlando, Florida, pp. 1\u201333 (December 2012)","key":"5_CR22","DOI":"10.1145\/2420950.2420985"},{"unstructured":"Vanninen, M., Wang, J.Z.: On Benchmarking Popular File Systems. Clemson University Study (2009)","key":"5_CR23"},{"doi-asserted-by":"crossref","unstructured":"Yigitbasi, N., Iosup, A., Epema, D., Ostermann, S.: C-Meter: A Framework for Performance Analysis of Computing Clouds. In: 9th IEEE\/ACM International Symposium on Cluster Computing and the Grid (CCGRID), Shanghai, China, pp. 472\u2013477 (May 2009)","key":"5_CR24","DOI":"10.1109\/CCGRID.2009.40"},{"doi-asserted-by":"crossref","unstructured":"Zhang, N., Jing, J., Liu, P.: Removing the Laptop On-Road Data Disclosure Threat in the Cloud Computing Era. In: Proceedings of the 6th International Conference on Frontier of Computer Science and Technology (FCST). IEEE Digital Library (November 2011)","key":"5_CR25","DOI":"10.1109\/TrustCom.2011.221"},{"doi-asserted-by":"crossref","unstructured":"Zhao, G., Rong, C., Li, J., Zhang, F., Tang, Y.: Trusted Data Sharing over Untrusted Cloud Storage Providers. In: IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), Indianapolis, Indiana, USA, pp. 97\u2013103 (December 2010)","key":"5_CR26","DOI":"10.1109\/CloudCom.2010.36"},{"unstructured":"Zooko, W.B., Hopwood, D., Secor, P., Deppierraz, F., McDonald, P., Marti, F., Tooley, M., Carstensen, K.: Tahoe-LAFS: The Least Authority File System. Open source project (2013), \n                    \n                      http:\/\/tahoe-lafs.org\/","key":"5_CR27"}],"container-title":["Communications in Computer and Information Science","Advances in Service-Oriented and Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45364-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T08:00:43Z","timestamp":1558771243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45364-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642453632","9783642453649"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45364-9_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}