{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T22:03:56Z","timestamp":1778537036277,"version":"3.51.4"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2013,11,1]],"date-time":"2013-11-01T00:00:00Z","timestamp":1383264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"INESC-ID","award":["PEst-OE\/EEI\/LA0021\/2011"],"award-info":[{"award-number":["PEst-OE\/EEI\/LA0021\/2011"]}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Multi-annual Program"},{"DOI":"10.13039\/501100004963","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["ICT-257243"],"award-info":[{"award-number":["ICT-257243"]}],"id":[{"id":"10.13039\/501100004963","id-type":"DOI","asserted-by":"publisher"}]},{"name":"RC-Clouds","award":["PTDC\/EIA-EIA\/115211\/2009"],"award-info":[{"award-number":["PTDC\/EIA-EIA\/115211\/2009"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2013,11]]},"abstract":"<jats:p>The increasing popularity of cloud storage services has lead companies that handle critical data to think about using these services for their storage needs. Medical record databases, large biomedical datasets, historical information about power systems and financial data are some examples of critical data that could be moved to the cloud. However, the reliability and security of data stored in the cloud still remain major concerns. In this work we present DepSky, a system that improves the availability, integrity, and confidentiality of information stored in the cloud through the encryption, encoding, and replication of the data on diverse clouds that form a cloud-of-clouds. We deployed our system using four commercial clouds and used PlanetLab to run clients accessing the service from different countries. We observed that our protocols improved the perceived availability, and in most cases, the access latency, when compared with cloud providers individually. Moreover, the monetary costs of using DepSky in this scenario is at most twice the cost of using a single cloud, which is optimal and seems to be a reasonable cost, given the benefits.<\/jats:p>","DOI":"10.1145\/2535929","type":"journal-article","created":{"date-parts":[[2013,12,10]],"date-time":"2013-12-10T13:28:12Z","timestamp":1386682092000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":246,"title":["DepSky"],"prefix":"10.1145","volume":"9","author":[{"given":"Alysson","family":"Bessani","sequence":"first","affiliation":[{"name":"University of Lisbon, Faculty of Sciences"}]},{"given":"Miguel","family":"Correia","sequence":"additional","affiliation":[{"name":"University of Lisbon, Faculty of Sciences"}]},{"given":"Bruno","family":"Quaresma","sequence":"additional","affiliation":[{"name":"University of Lisbon, Faculty of Sciences"}]},{"given":"Fernando","family":"Andr\u00e9","sequence":"additional","affiliation":[{"name":"University of Lisbon, Faculty of Sciences"}]},{"given":"Paulo","family":"Sousa","sequence":"additional","affiliation":[{"name":"University of Lisbon, Faculty of Sciences"}]}],"member":"320","published-online":{"date-parts":[[2013,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-005-0151-6"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807165"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2008.54"},{"key":"e_1_2_1_4_1","unstructured":"Amazon. 2011. Amazon simple storage service FAQS. http:\/\/aws.amazon.com\/s3\/faqs\/.  Amazon. 2011. Amazon simple storage service FAQS. http:\/\/aws.amazon.com\/s3\/faqs\/."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 22nd IEEE Symposium on Reliable Distributed Systems (SRDS). 174--183","author":"Attiya H.","unstructured":"Attiya , H. and Bar-Or , A . 2003. Sharing memory with semi-Byzantine clients and faulty storage servers . In Proceedings of the 22nd IEEE Symposium on Reliable Distributed Systems (SRDS). 174--183 . Attiya, H. and Bar-Or, A. 2003. Sharing memory with semi-Byzantine clients and faulty storage servers. In Proceedings of the 22nd IEEE Symposium on Reliable Distributed Systems (SRDS). 174--183."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 42nd International Conference on Dependable Systems and Networks (DSN).","author":"Basescu C.","unstructured":"Basescu , C. , Cachin , C. , Eyal , I. , Haas , R. , Sorniotti , A. , Vukolic , M. , and Zachevsky , I . 2012. Robust data sharing with key-value stores . In Proceedings of the 42nd International Conference on Dependable Systems and Networks (DSN). Basescu, C., Cachin, C., Eyal, I., Haas, R., Sorniotti, A., Vukolic, M., and Zachevsky, I. 2012. Robust data sharing with key-value stores. In Proceedings of the 42nd International Conference on Dependable Systems and Networks (DSN)."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352610"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653686"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376645"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2006.56"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571837"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.126"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.810312"},{"key":"e_1_2_1_14_1","volume-title":"Critical cloud computing: A CIIP perspective on cloud computing services (v1.0). Tech. rep","author":"Dekker M. A. C.","unstructured":"Dekker , M. A. C. 2012. Critical cloud computing: A CIIP perspective on cloud computing services (v1.0). Tech. rep ., European Network and Information Security Agency (ENISA) . Dekker, M. A. C. 2012. Critical cloud computing: A CIIP perspective on cloud computing services (v1.0). Tech. rep., European Network and Information Security Agency (ENISA)."},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 337--350","author":"Feldman A. J.","unstructured":"Feldman , A. J. , Zeller , W. P. , Freedman , M. J. , and Felten , E. W . 2010. SPORC: Group collaboration using untrusted cloud resources . In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 337--350 . Feldman, A. J., Zeller, W. P., Freedman, M. J., and Felten, E. W. 2010. SPORC: Group collaboration using untrusted cloud resources. In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 337--350."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0070-8"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/291069.291029"},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks (DSN). 135--144","author":"Goodson G.","unstructured":"Goodson , G. , Wylie , J. , Ganger , G. , and Reiter , M . 2004. Efficient Byzantine-tolerant erasure-coded storage . In Proceedings of the International Conference on Dependable Systems and Networks (DSN). 135--144 . Goodson, G., Wylie, J., Ganger, G., and Reiter, M. 2004. Efficient Byzantine-tolerant erasure-coded storage. In Proceedings of the International Conference on Dependable Systems and Networks (DSN). 135--144."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2010.5542595"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1349426.1349444"},{"key":"e_1_2_1_22_1","unstructured":"Hanley M. Dean T. Schroeder W. Houy M. Trzeciak R. F. and Montelibano J. 2011. An analysis of technical observations in insider theft of intellectual property cases. Tech. note CMU\/SEI-2011-TN-006 Carnegie Mellon Software Engineering Institute.  Hanley M. Dean T. Schroeder W. Houy M. Trzeciak R. F. and Montelibano J. 2011. An analysis of technical observations in insider theft of intellectual property cases. Tech. note CMU\/SEI-2011-TN-006 Carnegie Mellon Software Engineering Institute."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294269"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 7th USENIX Conference on File and Storage Technologies (Keynote Address).","author":"Henry A.","year":"2009","unstructured":"Henry , A. 2009 . Cloud storage FUD (failure, uncertainty, and durability) . In Proceedings of the 7th USENIX Conference on File and Storage Technologies (Keynote Address). Henry, A. 2009. Cloud storage FUD (failure, uncertainty, and durability). In Proceedings of the 7th USENIX Conference on File and Storage Technologies (Keynote Address)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 23th IEEE Internatiomal Conference on Distributed Computing Systems (ICDCS). 522--529","author":"Herlihy M.","unstructured":"Herlihy , M. , Lucangco , V. , and Moir , M . 2003. Obstruction-free synchronization: Double-ended queues as an example . In Proceedings of the 23th IEEE Internatiomal Conference on Distributed Computing Systems (ICDCS). 522--529 . Herlihy, M., Lucangco, V., and Moir, M. 2003. Obstruction-free synchronization: Double-ended queues as an example. In Proceedings of the 23th IEEE Internatiomal Conference on Distributed Computing Systems (ICDCS). 522--529."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 145--158","author":"Hunt P.","unstructured":"Hunt , P. , Konar , M. , Junqueira , F. , and Reed , B . 2010. Zookeeper: Wait-free coordination for Internet-scale services . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 145--158 . Hunt, P., Konar, M., Junqueira, F., and Reed, B. 2010. Zookeeper: Wait-free coordination for Internet-scale services. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 145--158."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/278298.278305"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC).","author":"Kotla R.","unstructured":"Kotla , R. , Avisi , L. , and Dahlin , M . 2007. SafeStore: A durable and practical storage system . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). Kotla, R., Avisi, L., and Dahlin, M. 2007. SafeStore: A durable and practical storage system. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 13th International Cryptology Conference (CRYPTO). 136--146","author":"Krawczyk H.","year":"1993","unstructured":"Krawczyk , H. 1993 . Secret sharing made short . In Proceedings of the 13th International Cryptology Conference (CRYPTO). 136--146 . Krawczyk, H. 1993. Secret sharing made short. In Proceedings of the 13th International Cryptology Conference (CRYPTO). 136--146."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01786227"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.83"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063512"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s004460050050"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems (SRDS). 51--60","author":"Malkhi D.","unstructured":"Malkhi , D. and Reiter , M . 1998b. Secure and scalable replication in Phalanx . In Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems (SRDS). 51--60 . Malkhi, D. and Reiter, M. 1998b. Secure and scalable replication in Phalanx. In Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems (SRDS). 51--60."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of the 16th International Symposium on Distributed Computing (DISC). 311--325","author":"Martin J.-P.","unstructured":"Martin , J.-P. , Alvisi , L. , and Dahlin , M . 2002. Minimal Byzantine storage . In Proceedings of the 16th International Symposium on Distributed Computing (DISC). 311--325 . Martin, J.-P., Alvisi, L., and Dahlin, M. 2002. Minimal Byzantine storage. In Proceedings of the 16th International Symposium on Distributed Computing (DISC). 311--325."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/nm0110-6a"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 47--60","author":"McCullough J. C.","unstructured":"McCullough , J. C. , Dunagan , J. , Wolman , A. , and Snoeren , A. C . 2010. Stout: An adaptive interface to scalable cloud storage . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 47--60 . McCullough, J. C., Dunagan, J., Wolman, A., and Snoeren, A. C. 2010. Stout: An adaptive interface to scalable cloud storage. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 47--60."},{"key":"e_1_2_1_40_1","unstructured":"Metz C. 2009. DDoS attack rains down on Amazon cloud. The Register. http:\/\/www.theregister.co.uk\/2009\/10\/05\/amazon_bitbucket_outage\/.  Metz C. 2009. DDoS attack rains down on Amazon cloud. The Register. http:\/\/www.theregister.co.uk\/2009\/10\/05\/amazon_bitbucket_outage\/."},{"key":"e_1_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Mills D. L. 1992. Network time protocol (version 3): Specification implementation and analysis. IETF RFC 1305.   Mills D. L. 1992. Network time protocol (version 3): Specification implementation and analysis. IETF RFC 1305.","DOI":"10.17487\/rfc1305"},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST). 197--210","author":"Muniswamy-Reddy K.-K.","unstructured":"Muniswamy-Reddy , K.-K. , Macko , P. , and Seltzer , M . 2010. Provenance for the cloud . In Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST). 197--210 . Muniswamy-Reddy, K.-K., Macko, P., and Seltzer, M. 2010. Provenance for the cloud. In Proceedings of the 8th USENIX Conference on File and Storage Technologies (FAST). 197--210."},{"key":"e_1_2_1_43_1","unstructured":"Naone E. 2009. Are we safeguarding social data? Technology Review published by MIT Review http:\/\/www.technologyreview.com\/blog\/editors\/22924\/.  Naone E. 2009. Are we safeguarding social data? Technology Review published by MIT Review http:\/\/www.technologyreview.com\/blog\/editors\/22924\/."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/50202.50214"},{"key":"e_1_2_1_45_1","volume-title":"Jerasure: A library in C\/C++ facilitating erasure coding for storage applications. Tech. rep. CS-07-603","author":"Plank J. S.","year":"2007","unstructured":"Plank , J. S. 2007 . Jerasure: A library in C\/C++ facilitating erasure coding for storage applications. Tech. rep. CS-07-603 , University of Tennessee . Plank, J. S. 2007. Jerasure: A library in C\/C++ facilitating erasure coding for storage applications. Tech. rep. CS-07-603, University of Tennessee."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_2_1_47_1","unstructured":"Raphael J. 2011. The 10 worst cloud outages (and what we can learn from them). Infoworld. http:\/\/www.infoworld.com\/d\/cloud-computing\/the-10-worst-cloud-outages-and-what-we-can-learn-them-902.  Raphael J. 2011. The 10 worst cloud outages (and what we can learn from them). Infoworld. http:\/\/www.infoworld.com\/d\/cloud-computing\/the-10-worst-cloud-outages-and-what-we-can-learn-them-902."},{"key":"e_1_2_1_48_1","unstructured":"Sarno D. 2009. Microsoft says lost sidekick data will be restored to users. Los Angeles Times.  Sarno D. 2009. Microsoft says lost sidekick data will be restored to users. Los Angeles Times."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703956"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.80"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866841"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 143--156","author":"Storer M. W.","unstructured":"Storer , M. W. , Greenan , K. M. , Miller , E. L. , and Voruganti , K . 2007. POTSHARDS: Secure long-term storage without encryption . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 143--156 . Storer, M. W., Greenan, K. M., Miller, E. L., and Voruganti, K. 2007. POTSHARDS: Secure long-term storage without encryption. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). 143--156."},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 3rd International Conference on Parallel and Distributed Information Systems. 140--149","author":"Terry D. B.","unstructured":"Terry , D. B. , Demers , A. J. , Petersen , K. , Spreitzer , M. J. , Theimer , M. M. , and Welch , B. B . 1994. Session guarantees for weakly consistent replicated data . In Proceedings of the 3rd International Conference on Parallel and Distributed Information Systems. 140--149 . Terry, D. B., Demers, A. J., Petersen, K., Spreitzer, M. J., Theimer, M. M., and Welch, B. B. 1994. Session guarantees for weakly consistent replicated data. In Proceedings of the 3rd International Conference on Parallel and Distributed Information Systems. 140--149."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629080.1629084"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST).","author":"Vrable M.","unstructured":"Vrable , M. , Savage , S. , and Voelker , G. M . 2012. BlueSky: A cloud-backed file system for the enterprise . In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST). Vrable, M., Savage, S., and Voelker, G. M. 2012. BlueSky: A cloud-backed file system for the enterprise. In Proceedings of the 10th USENIX Conference on File and Storage Technologies (FAST)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1855118.1855137"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 307--320","author":"Weil S. A.","unstructured":"Weil , S. A. , Brandt , S. A. , Miller , E. L. , Long , D. D. E. , and Maltzahn , C . 2006. Ceph: A scalable, high-performance distributed file system . In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 307--320 . Weil, S. A., Brandt, S. A., Miller, E. L., Long, D. D. E., and Maltzahn, C. 2006. Ceph: A scalable, high-performance distributed file system. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 307--320."}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535929","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2535929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:06Z","timestamp":1750234206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2535929"}},"subtitle":["Dependable and Secure Storage in a Cloud-of-Clouds"],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["10.1145\/2535929"],"URL":"https:\/\/doi.org\/10.1145\/2535929","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"value":"1553-3077","type":"print"},{"value":"1553-3093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11]]},"assertion":[{"value":"2012-03-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2013-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}