{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T10:06:52Z","timestamp":1708078012761},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2011,2,23]],"date-time":"2011-02-23T00:00:00Z","timestamp":1298419200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1007\/s11042-011-0734-0","type":"journal-article","created":{"date-parts":[[2011,2,21]],"date-time":"2011-02-21T23:37:54Z","timestamp":1298331474000},"page":"543-568","source":"Crossref","is-referenced-by-count":2,"title":["SeWDReSS: on the design of an application independent, secure, wide-area disaster recovery storage system"],"prefix":"10.1007","volume":"58","author":[{"given":"Lingfang","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Bharadwaj","family":"Veeravalli","sequence":"additional","affiliation":[]},{"given":"Qingsong","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Feng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,23]]},"reference":[{"key":"734_CR1","unstructured":"Anastasiadis MSS, Sevcik K (2002) Maximizing throughput in replicated disk striping of variable bit-rate streams. Proc. of the annual USENIX technical conference, pp\u00a0191\u2013204"},{"key":"734_CR2","unstructured":"Apple Computer, Inc. (2009) Apple .mac service. http:\/\/www.apple.com\/mobileme\/ . Last accessed September 2009"},{"key":"734_CR3","unstructured":"Amazon.com, Inc. (2009) Amazon simple storage service. http:\/\/aws.amazon.com\/s3 . Last accessed September 2009"},{"key":"734_CR4","doi-asserted-by":"crossref","unstructured":"Bell WH, Cameron DG, Carvajal-Schiaffino R, Millar AP, Stockinger K, Zini F (2003) Evaluation of an economy-based file replication strategy for a data grid. In: Proc. of the 3rd international symposium on cluster computing and the grid, pp\u00a0661\u2013668","DOI":"10.1109\/CCGRID.2003.1199430"},{"key":"734_CR5","doi-asserted-by":"crossref","unstructured":"Bhagwat D, Pollack K, Long D, Schwarz T, Miller EL, Paris J-F (2006) Providing high reliability in a minimum redundancy archival storage system. In: Proc. of MASCOTS\u201906, pp\u00a0413\u2013421","DOI":"10.1109\/MASCOTS.2006.42"},{"key":"734_CR6","unstructured":"Blake C, Rodrigues R (2003) High availability, scalable storage, dynamic peer networks: pick two. In: Proc. of HotOS\u201903, pp\u00a01\u20136"},{"key":"734_CR7","unstructured":"Bloemer J, Kalfane M, Karpinski M, Karp RM, Luby M, Zuckerman D (1995) An XOR-based erasure-resilient coding scheme. Technical Report TR-95-048. Berkeley, CA"},{"key":"734_CR8","unstructured":"Chen Y, Edler J, Goldberg A, Gottlieb A, Sobti S, Yianilos P (1996) Prototype implementation of archival intermemory. In: Proc. of ICDE\u201996, pp\u00a0485\u2013495"},{"key":"734_CR9","unstructured":"Chou C, Golubchik L, Lui JCS (2000) Striping doesn\u2019t scale: how to achieve scalability for continuous media servers with replication. In: Proc. of ICDCS\u201900, pp\u00a064\u201371"},{"key":"734_CR10","unstructured":"Chun B, Dabek F, Haeberlen A, Sit E, Weatherspoon H, Kaashoek MF, Kubiatowicz J, Morris R (2006) Efficient replica maintenance for distributed storage systems. In: Proc. of NSDI\u201906"},{"key":"734_CR11","unstructured":"Douglis F, Iyengar A (2003) Application-specific delta encoding via resemblance detection. In: Proc. of the 2003 USENIX annual technical conference, pp\u00a0113\u2013126"},{"key":"734_CR12","unstructured":"EMC Corporation (2002) EMC centera: content addressed storage system. Data Sheet"},{"key":"734_CR13","doi-asserted-by":"crossref","unstructured":"Gerasimov I, Zhuravlev A, Pershin M, Gerasimov DV (2003) Design and implementation of a block storage multi-protocol converter. In: Proc. of MSST\u201903","DOI":"10.1109\/MASS.2003.1194855"},{"key":"734_CR14","unstructured":"Haeberlen A, Mislove A, Druschel P (2005) Glacier: highly durable, decentralized storage despite massive correlated failures. In: Proc. of NSDI\u201905"},{"key":"734_CR15","doi-asserted-by":"crossref","unstructured":"Hartman J, Ousterhout J (1993) The Zebra striped network file system. In: Proc. of ACM SOSP\u201993, pp\u00a029\u201343","DOI":"10.1145\/168619.168622"},{"key":"734_CR16","unstructured":"Hennessy J, Patterson D (2006) Computer architecture: a quantitative approach, 4th edn. Morgan Kaufmann"},{"key":"734_CR17","unstructured":"Iometer benchmark (2006) http:\/\/sourceforge.net\/projects\/Iometer\/ . Accessed 27 July 2006."},{"key":"734_CR18","unstructured":"Katcher J (1997) PostMark: a new file system benchmark. Network Appliance, Technical Report 3022"},{"key":"734_CR19","doi-asserted-by":"crossref","unstructured":"Kubiatowicz J, Bindel D, Chen Y et al (2000) Oceanstore: an architecture for global-scale persistent storage. In: Proc. of ASPLOS\u201900","DOI":"10.1145\/378993.379239"},{"key":"734_CR20","unstructured":"Laure E (2003) The architecture of the European datagrid. The European DataGrid Project Team, Technical Report"},{"key":"734_CR21","unstructured":"Li J, Krohn M, Mazi\u2018eres D, Shasha D (2004) Secure untrusted data repository (sundr). In: Proc. of OSDI\u201904, pp\u00a0121\u2013136"},{"issue":"1","key":"734_CR22","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/214451.214456","volume":"3","author":"K Mani Chandy","year":"1985","unstructured":"Mani Chandy K, Lamport L (1985) Distributed snapshots: determining global states of distributed systems. ACM Trans Comput Syst 3(1):63\u201375","journal-title":"ACM Trans Comput Syst"},{"issue":"1","key":"734_CR23","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1047915.1047917","volume":"23","author":"P Maniatis","year":"2005","unstructured":"Maniatis P, Roussopoulos M, Giuli TJ, Rosenthal DSH, Baker M (2005) The LOCKSS Peer-to-Peer digital preservation system. ACM Trans Comput Syst 23(1):2\u201350","journal-title":"ACM Trans Comput Syst"},{"key":"734_CR24","unstructured":"Mauelshagen H (2004) Linux cluster logical volume manager. In: Proc. of the 11th Linux Kongress, Erlangen, Germany"},{"key":"734_CR25","unstructured":"Moore RW, Terekhov I, Chervenak A, Studham S, Watson C, Stockinger H (2002) Data grid implementations. Global Grid Forum. Technical report. http:\/\/www.ppdg.net\/docs\/WhitePapers\/Capabilities-grids.v6.pdf"},{"key":"734_CR26","unstructured":"Muthitacharoen A, Chen B, Mazieres D (2001) A lowbandwidth network file system. In: Proc. of SOSP\u201901"},{"key":"734_CR27","unstructured":"National Security Agency (2006) Global information grid (GIG). http:\/\/www.nsa.gov\/ia\/industry\/gig.cfm . Last accessed September 2006"},{"key":"734_CR28","doi-asserted-by":"crossref","unstructured":"Patterson D, Gibson G, Katz R (1988) The case for RAID: redundant arrays of inexpensive disks. In: Proc. of ACM SIGMOD conf., pp\u00a0106\u2013113","DOI":"10.1145\/50202.50214"},{"key":"734_CR29","unstructured":"Plank JS (2003) A tutorial on Reed\u2013Solomon coding for fault tolerance in RAID-like systems. Technical Report UT-CS-03-504"},{"key":"734_CR30","doi-asserted-by":"crossref","unstructured":"Ranganathan K, Foster I (2001) Identifying dynamic replication strategies for a high performance data grid. In: Proc. of the international grid computing workshop","DOI":"10.1007\/3-540-45644-9_8"},{"key":"734_CR31","doi-asserted-by":"crossref","unstructured":"Ratnasamy S, Francis P, Handley M, Karp R, Shenker S (2001) A scalable content-addressable network. In: Proc. of ACM SIGCOMM\u201901. San Diego, CA","DOI":"10.1145\/383059.383072"},{"key":"734_CR32","unstructured":"Rhea S, Eaton P, Geels D, Weatherspoon H, Zhao B, Kubiatowicz J (2003) Pond: the oceanstore prototype. In: Proc. of FAST\u201903"},{"key":"734_CR33","doi-asserted-by":"crossref","unstructured":"Rowstron A, Druschel P (2001) Pastry: scalable, distributed object location and routing for large-scale Peer-to-Peer systems. In: Proc. of IFIP\/ACM international conference on distributed systems platforms (Middleware\u201901)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"734_CR34","unstructured":"Schnor B, Petri S, Oleyniczak R, Langendorfer H (1996) Scheduling of parallel applications on heterogeneous workstation clusters. In: Proc. of PDCS\u201996, pp\u00a0330\u2013337"},{"key":"734_CR35","unstructured":"Schwarz TSJ, Miller EL (2006) Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Proc. of ICDCS\u201906"},{"issue":"3\u20134","key":"734_CR36","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/S0166-5316(99)00044-9","volume":"38","author":"P Shenoy","year":"1999","unstructured":"Shenoy P, Vin HM (1999) Efficient striping techniques for variable bit rate continuous media file servers. Perform Eval 38(3\u20134):175\u2013199","journal-title":"Perform Eval"},{"key":"734_CR37","doi-asserted-by":"crossref","unstructured":"Storer MW, Greenan K, Miller EL (2006) Long-term threats to secure archives. In: Proc. of StorageSS\u201906","DOI":"10.1145\/1179559.1179562"},{"key":"734_CR38","unstructured":"Storer MW, Greenan K, Miller EL, Voruganti K (2007) POTSHARDS: secure long-term storage without encryption. In: Proc. of the 2007 USENIX technical conference"},{"key":"734_CR39","unstructured":"Trivedi KS (2002) Probability & statistics with reliability, queuing and computer science applications, 2nd edn. John Wiley & Sons"},{"key":"734_CR40","unstructured":"UNH iSCSI reference implementation. http:\/\/www.iol.unh.edu\/consortiums\/iscsi . Last accessed September 2006"},{"issue":"2","key":"734_CR41","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/12.663770","volume":"47","author":"A Varma","year":"1998","unstructured":"Varma A, Jacobson Q (1998) Destage algorithms for disk arrays with nonvolatile caches. IEEE Trans Comput 47(2):228\u2013235","journal-title":"IEEE Trans Comput"},{"key":"734_CR42","doi-asserted-by":"crossref","unstructured":"Wang RY, Krishnamurthy A, Martin RP et al (1998) Modeling communication pipeline latency. In: Proc. of the ACM SIGMETRICS joint international conference on measurement and modeling of computer systems, pp 22\u201332, NY, USA","DOI":"10.1145\/277851.277867"},{"key":"734_CR43","unstructured":"Weatherspoon H (2006) Design and evaluation of distributed wide-area on-line archival storage systems. Technical Report No. UCB\/EECS-2006-130"},{"key":"734_CR44","unstructured":"Weatherspoon H, Kubiatowicz JD (2002) Erasure coding vs. replication: a quantitative comparison. In: Proc. of IPTPS\u201902"},{"key":"734_CR45","doi-asserted-by":"crossref","unstructured":"Weatherspoon H, Eaton P, Chun B, Kubiatowicz J (2007) Antiquity: exploiting a secure log for wide-area distributed storage. In: Proc. of Eurosys\u201907","DOI":"10.1145\/1272996.1273035"},{"key":"734_CR46","unstructured":"Xiao W, Liu Y, Yang Q, Ren J, Xie C (2006) Implementation and performance evaluation of two snapshot methods on iSCSI target storages. In: Proc. of MSST\u201906)"},{"key":"734_CR47","unstructured":"Xin Q (2007) Understanding and coping with failures in large-scale storage systems. Technical Report UCSC-SSRC-07-06"},{"key":"734_CR48","doi-asserted-by":"crossref","unstructured":"You LL, Pollack KT, Long DDE (2005) Deep store: an archival storage system architecture. In: Proc. of ICDE\u201905","DOI":"10.1109\/ICDE.2005.47"},{"key":"734_CR49","unstructured":"Zhao B, Kubiatowicz J, Joseph A (2001) Tapestry: an infrastructure for fault-tolerant widearea location and routing. Technical Report UCB\/CSD-01-1141, UC Berkeley"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0734-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-011-0734-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-011-0734-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T14:46:53Z","timestamp":1560005213000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-011-0734-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,23]]},"references-count":49,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,6]]}},"alternative-id":["734"],"URL":"https:\/\/doi.org\/10.1007\/s11042-011-0734-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,23]]}}}