{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:12:21Z","timestamp":1772039541501,"version":"3.50.1"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2011,12,1]],"date-time":"2011-12-01T00:00:00Z","timestamp":1322697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA-9550-10-1-0073"],"award-info":[{"award-number":["FA-9550-10-1-0073"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-09-10757"],"award-info":[{"award-number":["N00014-09-10757"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0720649CCF-1048269CNS-1055057"],"award-info":[{"award-number":["CNS-0720649CCF-1048269CNS-1055057"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0720649CCF-1048269CNS-1055057"],"award-info":[{"award-number":["CNS-0720649CCF-1048269CNS-1055057"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2011,12]]},"abstract":"<jats:p>This article describes the design, implementation, and evaluation of Depot, a cloud storage system that minimizes trust assumptions. Depot tolerates buggy or malicious behavior by<jats:italic>any number<\/jats:italic>of clients or servers, yet it provides safety and liveness guarantees to correct clients. Depot provides these guarantees using a two-layer architecture. First, Depot ensures that the updates observed by correct nodes are consistently ordered under Fork-Join-Causal consistency (FJC). FJC is a slight weakening of causal consistency that can be both safe and live despite faulty nodes. Second, Depot implements protocols that use this consistent ordering of updates to provide other desirable consistency, staleness, durability, and recovery properties. Our evaluation suggests that the costs of these guarantees are modest and that Depot can tolerate faults and maintain good availability, latency, overhead, and staleness even when significant faults occur.<\/jats:p>","DOI":"10.1145\/2063509.2063512","type":"journal-article","created":{"date-parts":[[2012,1,3]],"date-time":"2012-01-03T15:59:14Z","timestamp":1325606354000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":112,"title":["Depot"],"prefix":"10.1145","volume":"29","author":[{"given":"Prince","family":"Mahajan","sequence":"first","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Srinath","family":"Setty","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Sangmin","family":"Lee","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Allen","family":"Clement","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Lorenzo","family":"Alvisi","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Mike","family":"Dahlin","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]},{"given":"Michael","family":"Walfish","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin"}]}],"member":"320","published-online":{"date-parts":[[2011,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01784241"},{"key":"e_1_2_1_3_1","unstructured":"Amazon. 2011. Summary of the Amazon EC2 and Amazon RDS service disruption in the US East region. http:\/\/aws.amazon.com\/message\/65648. Amazon . 2011. Summary of the Amazon EC2 and Amazon RDS service disruption in the US East region. http:\/\/aws.amazon.com\/message\/65648."},{"key":"e_1_2_1_4_1","volume-title":"Amazon S3 Team. Amazon S3 availability event","author":"Amazon","year":"2008","unstructured":"Amazon S3 Team. 2008. Amazon S3 Team. Amazon S3 availability event : July 20, 2008 . http:\/\/status.aws.amazon.com\/s3-20080720.html. Amazon S3 Team. 2008. Amazon S3 Team. Amazon S3 availability event: July 20, 2008. http:\/\/status.aws.amazon.com\/s3-20080720.html."},{"key":"e_1_2_1_5_1","volume-title":"Google App Engine: Information regarding","author":"Beckmann C.","year":"2009","unstructured":"Beckmann , C. 2009. Google App Engine: Information regarding 2 July 2009 outage. http:\/\/groups.google.com\/group\/google-appengine\/browse_thread\/thread\/e9237fc7b0aa7df5\/ba95ded980c8c179. Beckmann, C. 2009. Google App Engine: Information regarding 2 July 2009 outage. http:\/\/groups.google.com\/group\/google-appengine\/browse_thread\/thread\/e9237fc7b0aa7df5\/ba95ded980c8c179."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Belaramani N.","unstructured":"Belaramani , N. , Dahlin , M. , Gao , L. , Nayate , A. , Venkataramani , A. , Yalagandula , P. , and Zheng , J . 2006. PRACTI replication . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Belaramani, N., Dahlin, M., Gao, L., Nayate, A., Venkataramani, A., Yalagandula, P., and Zheng, J. 2006. PRACTI replication. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/358468.358487"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281121"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN).","author":"Cachin C.","unstructured":"Cachin , C. , Keidar , I. , and Shraer , A . 2009. Fail-aware untrusted storage . In Proceedings of the International Conference on Dependable Systems and Networks (DSN). Cachin, C., Keidar, I., and Shraer, A. 2009. Fail-aware untrusted storage. In Proceedings of the International Conference on Dependable Systems and Networks (DSN)."},{"key":"e_1_2_1_10_1","unstructured":"Calore M. 2009. Magnolia suffers major data loss site taken offline. Wired Mag. Calore M. 2009. Magnolia suffers major data loss site taken offline. Wired Mag ."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Chang F.","unstructured":"Chang , F. , Dean , J. , Ghemawat , S. , Hsieh , W. , Wallach , D. , Burrows , M. , Chandra , T. , Fikes , A. , and Gruber , R . 2006. Bigtable: A distributed storage system for structured data . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Chang, F., Dean, J., Ghemawat, S., Hsieh, W., Wallach, D., Burrows, M., Chandra, T., Fikes, A., and Gruber, R. 2006. Bigtable: A distributed storage system for structured data. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_2_1_14_1","volume-title":"Survey: Cloud computing \u2018no hype","author":"Circle ID.","year":"2009","unstructured":"Circle ID. 2009 . Survey: Cloud computing \u2018no hype \u2019, but fear of security and control slowing adoption. http:\/\/www.circleid.com\/posts\/20090226_cloud_computing_hype_security\/. CircleID. 2009. Survey: Cloud computing \u2018no hype\u2019, but fear of security and control slowing adoption. http:\/\/www.circleid.com\/posts\/20090226_cloud_computing_hype_security\/."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629602"},{"key":"e_1_2_1_16_1","unstructured":"CNet News. 2011. Google probing lost Gmail messages contacts. http:\/\/news.cnet.com\/8301-1023 3-20037019-93.html. CNet News . 2011. Google probing lost Gmail messages contacts. http:\/\/news.cnet.com\/8301-1023 3-20037019-93.html."},{"key":"e_1_2_1_17_1","unstructured":"Cook B. 2009. Seattle data center fire knocks out Bing Travel other web sites. http:\/\/www.techflash.com\/seattle\/2009\/07\/Seattle_data_center_fire_knocks_out_Bing_Travel_other_Web_sites_49876777.html. Cook B. 2009. Seattle data center fire knocks out Bing Travel other web sites. http:\/\/www.techflash.com\/seattle\/2009\/07\/Seattle_data_center_fire_knocks_out_Bing_Travel_other_Web_sites_49876777.html."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the International Conference on Very Large Data Bases (VLDB).","author":"Cooper B.","unstructured":"Cooper , B. , Ramakrishnan , R. , Srivastava , U. , Silberstein , A. , Bohannon , P. , Jacobsen , H. , Puz , N. , Weaver , D. , and Yerneni , R . 2008. PNUTS: Yahoo!\u2019s hosted data serving platform . In Proceedings of the International Conference on Very Large Data Bases (VLDB). Cooper, B., Ramakrishnan, R., Srivastava, U., Silberstein, A., Bohannon, P., Jacobsen, H., Puz, N., Weaver, D., and Yerneni, R. 2008. PNUTS: Yahoo!\u2019s hosted data serving platform. In Proceedings of the International Conference on Very Large Data Bases (VLDB)."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST).","author":"Demmer M.","unstructured":"Demmer , M. , Du , B. , and Brewer , E . 2008. TierStore: A distributed filesystem for challenged networks in developing regions . In Proceedings of the USENIX Conference on File and Storage Technologies (FAST). Demmer, M., Du, B., and Brewer, E. 2008. TierStore: A distributed filesystem for challenged networks in developing regions. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST)."},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Feldman A. J.","unstructured":"Feldman , A. J. , Zeller , W. P. , Freedman , M. J. , and Felten , E. W . 2010. SPORC: Group collaboration using untrusted cloud resources . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Feldman, A. J., Zeller, W. P., Freedman, M. J., and Felten, E. W. 2010. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/277651.277690"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/505452.505453"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the Annual Network & Distributed System Security Symposium (NDSS).","author":"Goh E.-J.","unstructured":"Goh , E.-J. , Shacham , H. , Modadugu , N. , and Boneh , D . 2003. SiRiUS: Securing remote untrusted storage . In Proceedings of the Annual Network & Distributed System Security Symposium (NDSS). Goh, E.-J., Shacham, H., Modadugu, N., and Boneh, D. 2003. SiRiUS: Securing remote untrusted storage. In Proceedings of the Annual Network & Distributed System Security Symposium (NDSS)."},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Gray J. and Shenoy P. 2000. Rules of thumb in data engineering. In Data Engineering. 3--12. Gray J. and Shenoy P. 2000. Rules of thumb in data engineering. In Data Engineering . 3--12.","DOI":"10.1109\/ICDE.2000.839382"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Haeberlen A.","unstructured":"Haeberlen , A. , Mislove , A. , and Druschel , P . 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Haeberlen, A., Mislove, A., and Druschel, P. 2005. Glacier: Highly durable, decentralized storage despite massive correlated failures. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294269"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST).","author":"Kallahalla M.","unstructured":"Kallahalla , M. , Riedel , E. , Swaminathan , R. , Wang , Q. , and Fu , K . 2003. Plutus: Scalable secure file sharing on untrusted storage . In Proceedings of the USENIX Conference on File and Storage Technologies (FAST). Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., and Fu, K. 2003. Plutus: Scalable secure file sharing on untrusted storage. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146942"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC).","author":"Kotla R.","unstructured":"Kotla , R. , Alvisi , L. , and Dahlin , M . 2007. SafeStore: A durable and practical storage system . In Proceedings of the USENIX Annual Technical Conference (ATC). Kotla, R., Alvisi, L., and Dahlin, M. 2007. SafeStore: A durable and practical storage system. In Proceedings of the USENIX Annual Technical Conference (ATC)."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Levin D.","unstructured":"Levin , D. , Douceur , J. R. , Lorch , J. R. , and Moscibroda , T . 2009. TrInc: Small trusted hardware for large distributed systems . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Levin, D., Douceur, J. R., Lorch, J. R., and Moscibroda, T. 2009. TrInc: Small trusted hardware for large distributed systems. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Li J.","unstructured":"Li , J. and Mazi\u00e8res , D . 2007. Beyond one-third faulty replicas in Byzantine fault tolerant systems . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Li, J. and Mazi\u00e8res, D. 2007. Beyond one-third faulty replicas in Byzantine fault tolerant systems. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Li J.","unstructured":"Li , J. , Krohn , M. , Mazi\u00e8res , D. , and Shasha , D . 2004. Secure untrusted data repository (SUNDR) . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Li, J., Krohn, M., Mazi\u00e8res, D., and Shasha, D. 2004. Secure untrusted data repository (SUNDR). In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050050"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_2_1_47_1","unstructured":"Miller R. 2009. FBI siezes servers at Dallas data center. http:\/\/www.datacenterknowledge.com\/archives\/2009\/04\/03\/fbi-seizes-servers-at-dallas-data-center\/. Miller R. 2009. FBI siezes servers at Dallas data center. http:\/\/www.datacenterknowledge.com\/archives\/2009\/04\/03\/fbi-seizes-servers-at-dallas-data-center\/."},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Nath S.","unstructured":"Nath , S. , Yu , H. , Gibbons , P. B. , and Seshan , S . 2006. Subtleties in tolerating correlated failures in wide-area storage systems . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Nath, S., Yu, H., Gibbons, P. B., and Seshan, S. 2006. Subtleties in tolerating correlated failures in wide-area storage systems. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_49_1","unstructured":"News C. 2002. Victims of lost files out of luck. http:\/\/news.cnet.com\/Victims-of-lost-files-out-of-luck\/2100-1023_3-887849.html. News C. 2002. Victims of lost files out of luck. http:\/\/news.cnet.com\/Victims-of-lost-files-out-of-luck\/2100-1023_3-887849.html."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394441.1394442"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS).","author":"Oppenheimer D.","unstructured":"Oppenheimer , D. , Ganapathi , A. , and Patterson , D. A . 2003. Why do Internet services fail, and what can be done about it? In Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS). Oppenheimer, D., Ganapathi, A., and Patterson, D. A. 2003. Why do Internet services fail, and what can be done about it? In Proceedings of the USENIX Symposium on Internet Technologies and Systems (USITS)."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/11864219_18"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236733"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266711"},{"key":"e_1_2_1_55_1","volume-title":"Proceedings of the USENIX Conference on File and Storage Technologies (FAST).","author":"Pinheiro E.","unstructured":"Pinheiro , E. , Weber , W. , and Barroso , L . 2007. Failure trends in a large disk drive population . In Proceedings of the USENIX Conference on File and Storage Technologies (FAST). Pinheiro, E., Weber, W., and Barroso, L. 2007. Failure trends in a large disk drive population. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST)."},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC).","author":"Popa R. A.","unstructured":"Popa , R. A. , Lorch , J. R. , Molnar , D. , Wang , H. J. , and Zhuang , L . 2011. Enabling security in cloud storage SLAs with CloudProof . In Proceedings of the USENIX Annual Technical Conference (ATC). Popa, R. A., Lorch, J. R., Molnar, D., Wang, H. J., and Zhuang, L. 2011. Enabling security in cloud storage SLAs with CloudProof. In Proceedings of the USENIX Annual Technical Conference (ATC)."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095830"},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Ramasubramanian V.","unstructured":"Ramasubramanian , V. , Rodeheffer , T. , Terry , D. B. , Walraed-Sullivan , M. , Wobber , T. , Marshall , C. C. , and Vahdat , A . 2009. Cimbiosys: A platform for content-based partial replication . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Ramasubramanian, V., Rodeheffer, T., Terry, D. B., Walraed-Sullivan, M., Wobber, T., Marshall, C. C., and Vahdat, A. 2009. Cimbiosys: A platform for content-based partial replication. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the USENIX Summer Technical Conference.","author":"Reiher P.","unstructured":"Reiher , P. , Heidemann , J. , Ratner , D. , Skinner , G. , and Popek , G . 1994. Resolving file conflicts in the Ficus file system . In Proceedings of the USENIX Summer Technical Conference. Reiher, P., Heidemann, J., Ratner, D., Skinner, G., and Popek, G. 1994. Resolving file conflicts in the Ficus file system. In Proceedings of the USENIX Summer Technical Conference."},{"key":"e_1_2_1_60_1","unstructured":"S3 App Catalog. 2011. AWS forum: Customer app catalog. http:\/\/developer.amazonwebservices.com\/connect\/kbcategory.jspa?categoryID=66. S3 App Catalog . 2011. AWS forum: Customer app catalog. http:\/\/developer.amazonwebservices.com\/connect\/kbcategory.jspa?categoryID=66."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/128738.128742"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS).","author":"Shah M.","unstructured":"Shah , M. , Baker , M. , Mogul , J. , and Swaminathan , R . 2007. Auditing to keep online storage services honest . In Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS). Shah, M., Baker, M., Mogul, J., and Swaminathan, R. 2007. Auditing to keep online storage services honest. In Proceedings of the Workshop on Hot Topics in Operating Systems (HotOS)."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866841"},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Singh A.","unstructured":"Singh , A. , Fonseca , P. , Kuznetsov , P. , Rodrigues , R. , and Maniatis , P . 2009. Zeno: Eventually consistent Byzantine fault tolerance . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Singh, A., Fonseca, P., Kuznetsov, P., Rodrigues, R., and Maniatis, P. 2009. Zeno: Eventually consistent Byzantine fault tolerance. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Strunk J.","unstructured":"Strunk , J. , Goodson , G. , Scheinholtz , M. , Soules , C. , and Ganger , G . 2000. Self-Securing storage: Protecting data in compromised systems . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Strunk, J., Goodson, G., Scheinholtz, M., Soules, C., and Ganger, G. 2000. Self-Securing storage: Protecting data in compromised systems. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the International Conference on Parallel and Distributed Information Systems (PDIS).","author":"Terry D. B.","unstructured":"Terry , D. B. , Demers , A. J. , Petersen , K. , Spreitzer , M. , Theimer , M. , and Welch , B. W . 1994. Session guarantees for weakly consistent replicated data . In Proceedings of the International Conference on Parallel and Distributed Information Systems (PDIS). Terry, D. B., Demers, A. J., Petersen, K., Spreitzer, M., Theimer, M., and Welch, B. W. 1994. Session guarantees for weakly consistent replicated data. In Proceedings of the International Conference on Parallel and Distributed Information Systems (PDIS)."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224070"},{"key":"e_1_2_1_68_1","unstructured":"US. 2005. US Secret Service report on insider attacks. http:\/\/www.sei.cmu.edu\/about\/press\/insider-2005.html. US . 2005. US Secret Service report on insider attacks. http:\/\/www.sei.cmu.edu\/about\/press\/insider-2005.html."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146381.1146385"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060313"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755943"},{"key":"e_1_2_1_72_1","unstructured":"Yahoo. 2011. Yahoo\u2019s offloading of delicious a reminder of cloud risks. http:\/\/www.infoworld.com\/t\/cloud-computing\/yahoos-offloading-delicious-reminder-cloud-risks-735. Yahoo. 2011. Yahoo\u2019s offloading of delicious a reminder of cloud risks. http:\/\/www.infoworld.com\/t\/cloud-computing\/yahoos-offloading-delicious-reminder-cloud-risks-735."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Yang J.","unstructured":"Yang , J. , Sar , C. , and Engler , D . 2006. EXPLODE: A lightweight, general system for finding serious storage system errors . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). Yang, J., Sar, C., and Engler, D. 2006. EXPLODE: A lightweight, general system for finding serious storage system errors. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_2_1_74_1","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI).","author":"Yip A.","unstructured":"Yip , A. , Chen , B. , and Morris , R . 2006. Pastwatch: A distributed version control system . In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI). Yip, A., Chen, B., and Morris, R. 2006. Pastwatch: A distributed version control system. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI)."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288783.1288786"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2063509.2063512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2063509.2063512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:08Z","timestamp":1750241168000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2063509.2063512"}},"subtitle":["Cloud Storage with Minimal Trust"],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":73,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["10.1145\/2063509.2063512"],"URL":"https:\/\/doi.org\/10.1145\/2063509.2063512","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,12]]},"assertion":[{"value":"2010-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}