{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,2]],"date-time":"2023-10-02T08:59:16Z","timestamp":1696237156365},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,3,7]],"date-time":"2015-03-07T00:00:00Z","timestamp":1425686400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s12083-015-0337-z","type":"journal-article","created":{"date-parts":[[2015,3,6]],"date-time":"2015-03-06T07:00:02Z","timestamp":1425625202000},"page":"299-312","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement"],"prefix":"10.1007","volume":"9","author":[{"given":"Gi Seok","family":"Park","sequence":"first","affiliation":[]},{"given":"Hwangjun","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,7]]},"reference":[{"key":"337_CR1","doi-asserted-by":"crossref","unstructured":"Caceres J, Vaquero LM, RoderoMerino L, Polo A, Hierro JJ (2010) Service scalability over the cloud. Handb Cloud Comput 357\u2013377","DOI":"10.1007\/978-1-4419-6524-0_15"},{"key":"337_CR2","unstructured":"Amazon Glacier. Available: http:\/\/aws.amazon.com\/ec2\/reserved-instances\/#3 . Accessed 18 Oct 2013"},{"key":"337_CR3","unstructured":"Google Drive. Available: http:\/\/drive.google.com\/ . Accessed 18 Oct 2013"},{"key":"337_CR4","unstructured":"Microsoft SkyDrive. Available: http:\/\/skydrive.live.com\/ . Accessed 18 Oct 2013"},{"key":"337_CR5","unstructured":"Baca S (2010) Cloud Computing: What it is and what it can do for you (pp. 1\u20136). www.globalknowledge.com\/ . Accessed 18 Oct 2013"},{"key":"337_CR6","unstructured":"Dropbox. Available: http:\/\/dropbox.com\/ . Accessed 18 Oct 2013"},{"key":"337_CR7","unstructured":"Harihara SG, Janakiram B, Chandra MG, Aravind KG, Kadhe S, Balamuralidhar P, Adiga BS (2010) SpreadStore: a LDPC erasure code scheme for distributed storage system. Int Conf Data Storage Data Eng 154\u2013158"},{"key":"337_CR8","unstructured":"Spoor R, Peddemors A (2010) Cloud storage and peer-to-peer storage. [Online]. Available: http:\/\/www.surf.nl\/binaries\/content\/assets\/surf\/en\/knowledgebase\/2010\/EDS-3R+Cloud+and+p2p+storage-v1.1.pdf\/ . Accessed 18 Oct 2013"},{"key":"337_CR9","unstructured":"iSuppli. Available: http:\/\/isuppli.com\/ . Accessed 18 Oct 2013"},{"key":"337_CR10","unstructured":"Li J, Huang Q (2006) Erasure resilient codes in peer-to-peer storage cloud. IEEE Int Conf Acoust Speech Signal Process 4:4"},{"key":"337_CR11","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.parco.2007.02.003","volume":"33","author":"B Gaidioz","year":"2007","unstructured":"Gaidioz B, Koblitz B, Santaos N (2007) Exploring high performance distributed file storage using LDPC codes. Parallel Comput 33:264\u2013274","journal-title":"Parallel Comput"},{"key":"337_CR12","doi-asserted-by":"crossref","unstructured":"Li J (2006) Adaptive erasure resilient coding in distributed storage. IEEE Int Conf Multimedia Expo 561\u2013564","DOI":"10.1109\/ICME.2006.262470"},{"key":"337_CR13","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/11558989_21","volume":"3640","author":"R Rodrigues","year":"2005","unstructured":"Rodrigues R, Liskov B (2005) High availability in DHTs: erasure coding vs. replication. Peer-to-Peer Syst IV 3640:226\u2013239","journal-title":"Peer-to-Peer Syst IV"},{"key":"337_CR14","unstructured":"Kim S, Lee S (2009) Rateless erasure resilient codes for content storage and distribution in P2P networks. 11th International Conference on Advanced Communication Technology 1:444\u2013446"},{"key":"337_CR15","unstructured":"Ji W, Jian Z, Tong W, Qian S (2011) Study on redundant strategies in peer to peer cloud storage systems. Appl Math Inf Sci Int J 5-2S:235S\u2013242S"},{"key":"337_CR16","unstructured":"Park S, Moon B, Park M (2004) Design, implementation, and performance analysis of the remote storage system in mobile environment. 2nd International Conference on Information Technology for Application"},{"key":"337_CR17","volume-title":"Implementing CIFS: the common internet file system","author":"CR Hertel","year":"2003","unstructured":"Hertel CR (2003) Implementing CIFS: the common internet file system. Prentice Hall, Englewood Cliffs"},{"key":"337_CR18","first-page":"101","volume":"3640","author":"P Radkov","year":"2004","unstructured":"Radkov P, Yin L, Goyal P, Sarkar P, Shenoy P (2004) \u201cA Performance comparison of NFS and iSCSI for IP-networked storage\u201d, 3rd USENIX conference on file and storage technologies. USENIX Assoc 3640:101\u2013114","journal-title":"USENIX Assoc"},{"key":"337_CR19","unstructured":"Cao N, Yu S, Yang Z, Lou W, Hou YT (2012) LT code-based secure and reliable cloud storage service. IEEE INFOCOM 693\u2013701"},{"key":"337_CR20","unstructured":"Bl\u00f6mer J, Kalfane M, Karpinski M Karp R, Luby M, Zuckerman D (1995) An XOR-based erasure-resilient coding scheme. ICSI Technical Report No. TR\u2013950048"},{"key":"337_CR21","doi-asserted-by":"crossref","unstructured":"Luby M (2002) LT codes. Ann Symp Found Comput Sci 271\u2013280. doi: 10.1109\/SFCS.2002.1181950 . Accessed 18 Oct 2013","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"337_CR22","doi-asserted-by":"crossref","first-page":"1032","DOI":"10.1109\/JSAC.2011.110513","volume":"29","author":"S Han","year":"2011","unstructured":"Han S, Joo H, Lee D, Song H (2011) An end-to-end virtual path construction system for stable live video streaming over heterogeneous wireless networks. IEEE J Sel Areas Commun 29:1032\u20131041","journal-title":"IEEE J Sel Areas Commun"},{"key":"337_CR23","doi-asserted-by":"crossref","unstructured":"Shokrollahi A (2006) Raptor codes. IEEE Trans Inf Theory 52(6):2551\u20132567. doi: 10.1109\/TIT.2006.874390 . Accessed 18 Oct 2013","DOI":"10.1109\/TIT.2006.874390"},{"key":"337_CR24","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/JSAC.2007.070520","volume":"25","author":"Q Xu","year":"2007","unstructured":"Xu Q, Stankovi\u0107 V, Xiong Z (2007) Distributed joint source-channel coding of video using Raptor codes. IEEE J Sel Areas Commun 25:851\u2013861","journal-title":"IEEE J Sel Areas Commun"},{"key":"337_CR25","doi-asserted-by":"crossref","unstructured":"Ribeiro V, Riedi R, Baraniuk R, Navratil J, Cottrell L (2003) pathChirp: efficient available bandwidth estimation for network paths. Passive and Active Measurement Workshop. doi: 10.2172\/813038 . Accessed 18 Oct 2013","DOI":"10.2172\/813038"},{"key":"337_CR26","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.disopt.2008.11.002","volume":"6","author":"N Ntene","year":"2009","unstructured":"Ntene N, Vuuren JHV (2009) A survey and comparison of guillotine heuristics for the 2D oriented offline strip packing problem. Discret Optim 6:174\u2013188","journal-title":"Discret Optim"},{"key":"337_CR27","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/S0377-2217(02)00123-6","volume":"141","author":"A Lodi","year":"2002","unstructured":"Lodi A, Martello S, Monaci M (2002) Two-dimensional packing problems: a survey. Eur J Oper Res 141:241\u2013252","journal-title":"Eur J Oper Res"},{"key":"337_CR28","unstructured":"Bustamante FE, Qiao Y (2004) Friendships that last: peer lifespan and its role in P2P protocols. Int Work Web Content Caching Distrib 233\u2013246"},{"key":"337_CR29","doi-asserted-by":"crossref","unstructured":"Stutzbach D, Rejaie R (2006) Understanding churn in peer-to-peer network. The 6th ACM SIGCOMM Conference on Internet Measurement, pp. 189\u2013202","DOI":"10.1145\/1177080.1177105"},{"key":"337_CR30","doi-asserted-by":"crossref","unstructured":"Steiner M, En-Najjary T, Biersack E (2009) Long term study of peer behavior in the KAD DHT. IEEE\/ACM Trans Netw 17(6):1371\u20131384. doi: 10.1109\/TNET.2008.2009053 . Accessed 18 Oct 2013","DOI":"10.1109\/TNET.2008.2009053"},{"key":"337_CR31","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/TNET.2007.893199","volume":"15","author":"D Leonard","year":"2007","unstructured":"Leonard D, Yao Z, Rai V, Loguinov D (2007) On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks. IEEE\/ACM Trans Networking 15:644\u2013656","journal-title":"IEEE\/ACM Trans Networking"},{"key":"337_CR32","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1049\/ip-com:20050237","volume":"152","author":"DJC Mackay","year":"2005","unstructured":"Mackay DJC (2005) Fountain codes. IEE Proc Commun 152:1062\u20131068","journal-title":"IEE Proc Commun"},{"key":"337_CR33","first-page":"669","volume":"14","author":"EW Lawler","year":"1966","unstructured":"Lawler EW, Wood DE (1966) Branch\u2013and\u2013bound method\u2014a survey. Oper Res 14:669\u2013719","journal-title":"Oper Res"},{"key":"337_CR34","doi-asserted-by":"crossref","unstructured":"Lunttila T, Lindholm J, Pajukoski K, Tiirola E, Toskala A (2007) EUTRAN uplink performance. Int Symp Wirel Pervasive Comput. doi: 10.1109\/ISWPC.2007.342658 . Accessed 18 Oct 2013","DOI":"10.1109\/ISWPC.2007.342658"},{"key":"337_CR35","unstructured":"Turner WP, IV, Seader JH, Renaud V, Brill KG (2006) Tier classifications define site infrastructure performance. White Paper, The Uptime Institute"},{"key":"337_CR36","unstructured":"Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. Intell Comput Cogn Inform380\u2013383"},{"key":"337_CR37","unstructured":"Yang Y, Yuan D (2011) A novel cost-effective dynamic data replication strategy for reliability in cloud data centers. IEEE Dependable Auton Secure Comput"},{"key":"337_CR38","unstructured":"OECD Broadband Portal (2012). http:\/\/www.oecd.org\/sti\/ict\/broadband . Accessed 18 Oct 2013"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0337-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0337-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0337-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T03:44:53Z","timestamp":1559447093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0337-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,7]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["337"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0337-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3,7]]}}}