{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T20:15:11Z","timestamp":1774556111341,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3368235.3368872","type":"proceedings-article","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T15:07:35Z","timestamp":1575299255000},"page":"93-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Blockchain as a Trusted Component in Cloud SLA Verification"],"prefix":"10.1145","author":[{"given":"Amir Teshome","family":"Wonjiga","sequence":"first","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, Rennes, France"}]},{"given":"Sean","family":"Peisert","sequence":"additional","affiliation":[{"name":"CRD, LBNL, Berkeley, CA, USA"}]},{"given":"Louis","family":"Rilling","sequence":"additional","affiliation":[{"name":"DGA, Bruz, France"}]},{"given":"Christine","family":"Morin","sequence":"additional","affiliation":[{"name":"Univ Rennes, Inria, CNRS, IRISA, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2019,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Affordable and easy to use decentralized cloud object storage. https:\/\/storj.io\/  Affordable and easy to use decentralized cloud object storage. https:\/\/storj.io\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Amazon Compute SLA. https:\/\/aws.amazon.com\/compute\/sla\/  Amazon Compute SLA. https:\/\/aws.amazon.com\/compute\/sla\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon S3. https:\/\/aws.amazon.com\/s3\/  Amazon S3. https:\/\/aws.amazon.com\/s3\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Chainpoint. https:\/\/chainpoint.org\/  Chainpoint. https:\/\/chainpoint.org\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Corrupt iCloud data causes iOS crash. https:\/\/www.macobserver.com\/tmo\/ article\/corrupt-icloud-data-can-cause-ios-springboard-home-screen-crash  Corrupt iCloud data causes iOS crash. https:\/\/www.macobserver.com\/tmo\/ article\/corrupt-icloud-data-can-cause-ios-springboard-home-screen-crash"},{"key":"e_1_3_2_1_6_1","unstructured":"Docker. https:\/\/www.docker.com\/  Docker. https:\/\/www.docker.com\/"},{"key":"e_1_3_2_1_7_1","unstructured":"DriveHQ SLA. https:\/\/www.drivehq.com\/premium\/DriveHQSLA.aspx  DriveHQ SLA. https:\/\/www.drivehq.com\/premium\/DriveHQSLA.aspx"},{"key":"e_1_3_2_1_8_1","unstructured":"Dropbox. https:\/\/www.dropbox.com\/  Dropbox. https:\/\/www.dropbox.com\/"},{"key":"e_1_3_2_1_9_1","unstructured":"Facebook temporarily loses more than 10% of photos. http:\/\/bit.ly\/2lwHkfU  Facebook temporarily loses more than 10% of photos. http:\/\/bit.ly\/2lwHkfU"},{"key":"e_1_3_2_1_10_1","unstructured":"Grid5000. https:\/\/www.grid5000.fr\/  Grid5000. https:\/\/www.grid5000.fr\/"},{"key":"e_1_3_2_1_11_1","unstructured":"Guidance on GxP data integrity. https:\/\/www.gov.uk\/government\/publications\/ guidance-on-gxp-data-integrity  Guidance on GxP data integrity. https:\/\/www.gov.uk\/government\/publications\/ guidance-on-gxp-data-integrity"},{"key":"e_1_3_2_1_12_1","unstructured":"On Public and Private Blockchains. https:\/\/blog.ethereum.org\/2015\/08\/07\/onpublic- and-private-blockchains\/  On Public and Private Blockchains. https:\/\/blog.ethereum.org\/2015\/08\/07\/onpublic- and-private-blockchains\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Python HTTP servers. https:\/\/docs.python.org\/3\/library\/http.server.html  Python HTTP servers. https:\/\/docs.python.org\/3\/library\/http.server.html"},{"key":"e_1_3_2_1_14_1","unstructured":"S3 data corruption. https:\/\/forums.aws.amazon.com\/thread.jspa'start=0& threadID=22709&tstart=0  S3 data corruption. https:\/\/forums.aws.amazon.com\/thread.jspa'start=0& threadID=22709&tstart=0"},{"key":"e_1_3_2_1_15_1","unstructured":"xxHash. http:\/\/cyan4973.github.io\/xxHash  xxHash. http:\/\/cyan4973.github.io\/xxHash"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. TrustCom\/BigDataSE.","author":"Apolin\u00e1rio F.","unstructured":"F. Apolin\u00e1rio , M. Pardal , and M. Correia . 2018. S-Audit: Efficient Data Integrity Verification for Cloud Storage . In Proc. TrustCom\/BigDataSE. F. Apolin\u00e1rio, M. Pardal, and M. Correia. 2018. S-Audit: Efficient Data Integrity Verification for Cloud Storage. In Proc. TrustCom\/BigDataSE."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. ITASEC.","author":"Gaetani E.","unstructured":"E. Gaetani , L. Aniello , R. Baldoni , F. Lombardi , A. Margheri , and V. Sassone . 2017. Blockchain-based database to ensure data integrity in cloud computing environments . In Proc. ITASEC. E. Gaetani, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri, and V. Sassone. 2017. Blockchain-based database to ensure data integrity in cloud computing environments. In Proc. ITASEC."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. ISDPE. IEEE.","author":"Hao Z.","unstructured":"Z. Hao and N. Yu . 2010. A multiple-replica remote data possession checking protocol with public verifiability . In Proc. ISDPE. IEEE. Z. Hao and N. Yu. 2010. A multiple-replica remote data possession checking protocol with public verifiability. In Proc. ISDPE. IEEE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Z. Hao S. Zhong and N. Yu. 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. TKDE 23 9 (2011).  Z. Hao S. Zhong and N. Yu. 2011. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability. TKDE 23 9 (2011).","DOI":"10.1109\/TKDE.2011.62"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.54"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. CCIS. IEEE.","author":"Luo W.","unstructured":"W. Luo and G. Bai . 2011. Ensuring the data integrity in cloud data storage . In Proc. CCIS. IEEE. W. Luo and G. Bai. 2011. Ensuring the data integrity in cloud data storage. In Proc. CCIS. IEEE."},{"key":"e_1_3_2_1_23_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https: \/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. https: \/\/bitcoin.org\/bitcoin.pdf S. Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https: \/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. USENIX.","author":"Popa R. A.","unstructured":"R. A. Popa , J. R Lorch , D. Molnar , H. J. Wang , and L. Zhuang . 2011. Enabling Security in Cloud Storage SLAs with CloudProof .. In Proc. USENIX. R. A. Popa, J. R Lorch, D. Molnar, H. J. Wang, and L. Zhuang. 2011. Enabling Security in Cloud Storage SLAs with CloudProof.. In Proc. USENIX."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. IC2E. IEEE.","author":"Wang P.","unstructured":"P. Wang , D. J. Dean , and X. Gu . 2015. Understanding real world data corruptions in cloud systems . In Proc. IC2E. IEEE. P. Wang, D. J. Dean, and X. Gu. 2015. Understanding real world data corruptions in cloud systems. In Proc. IC2E. IEEE."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. NOMS.","author":"Wonjiga A. T.","unstructured":"A. T. Wonjiga , L. Rilling , and C. Morin . 2018. Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS . In Proc. NOMS. A. T.Wonjiga, L. Rilling, and C. Morin. 2018. Verification for security monitoring SLAs in IaaS clouds: The example of a network IDS. In Proc. NOMS."},{"key":"e_1_3_2_1_27_1","unstructured":"A. T. Wonjiga L. Rilling and C. Morin. 2019. Defining Security Monitoring SLAs in IaaS Clouds: the Example of a Network IDS. Technical Report RR-9263. Inria.  A. T. Wonjiga L. Rilling and C. Morin. 2019. Defining Security Monitoring SLAs in IaaS Clouds: the Example of a Network IDS. Technical Report RR-9263. Inria."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Y. Zhu H. Hu G. Ahn and M. Yu. 2012. Cooperative provable data possession for integrity verification in multicloud storage. TPDS 23 12 (2012).  Y. Zhu H. Hu G. Ahn and M. Yu. 2012. Cooperative provable data possession for integrity verification in multicloud storage. TPDS 23 12 (2012).","DOI":"10.1109\/TPDS.2012.66"}],"event":{"name":"UCC '19: IEEE\/ACM 12th International Conference on Utility and Cloud Computing","location":"Auckland New Zealand","acronym":"UCC '19","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE TCSC IEEE Technical Committee on Scalable Computing"]},"container-title":["Proceedings of the 12th IEEE\/ACM International Conference on Utility and Cloud Computing Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368235.3368872","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368235.3368872","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:05Z","timestamp":1750197725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368235.3368872"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":28,"alternative-id":["10.1145\/3368235.3368872","10.1145\/3368235"],"URL":"https:\/\/doi.org\/10.1145\/3368235.3368872","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]},"assertion":[{"value":"2019-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}