{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:52:57Z","timestamp":1773615177349,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.3103\/s0146411617040101","type":"journal-article","created":{"date-parts":[[2017,9,15]],"date-time":"2017-09-15T05:50:39Z","timestamp":1505454639000},"page":"240-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Robust CHARM: an efficient data hosting scheme for cloud data storage system"],"prefix":"10.3103","volume":"51","author":[{"given":"M.","family":"Thangapandiyan","sequence":"first","affiliation":[]},{"given":"P. M.","family":"Rubesh Anand","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2017,9,16]]},"reference":[{"key":"6592_CR1","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1145\/2663716.2663747","volume-title":"Proceedings of the 2014 Conference on Internet Measurement Conference (IMC\u201914)","author":"Z. Li","year":"2014","unstructured":"Li, Z., Jin, C., Xu, T., Wilson, C., Liu, Y., Cheng, L., Liu, Y., Dai, Y., and Zhang, Z.-L., Towards network-level efficiency for cloud storage services, Proceedings of the 2014 Conference on Internet Measurement Conference (IMC\u201914), Vancouver, BC, 2014, pp. 115\u2013128."},{"key":"6592_CR2","first-page":"1","volume-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC'10)","author":"A. Li","year":"2010","unstructured":"Li, A., Yang, X., Kandula, S., and Zhang, M., CloudCmp: Comparing public cloud providers, Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement (IMC'10), Melbourne, 2010, pp. 1\u201314."},{"issue":"4","key":"6592_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2535929","volume":"9","author":"A. Bessani","year":"2013","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andre, F., and Sousa, P., DepSky: Dependable and secure storage in a cloud-of-clouds, Trans. Storage, 2013, vol. 9, no. 4, pp. 1\u201333.","journal-title":"Trans. Storage"},{"key":"6592_CR4","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1145\/1807128.1807165","volume-title":"Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC '10)","author":"H. Abu-Libdeh","year":"2010","unstructured":"Abu-Libdeh, H., Princehouse, L., and Weatherspoon, H., RACS: A case for cloud storage diversity, Proceedings of the 1st ACM Symposium on Cloud Computing (SoCC '10), Indianapolis, Indiana, 2010, pp. 229\u2013240."},{"key":"6592_CR5","first-page":"327","volume-title":"Proceedings of the 13th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid)","author":"S. Liu","year":"2013","unstructured":"Liu, S., Huang, X., Fu, H., and Yang, G., Understanding data characteristics and access patterns in a cloud storage system, Proceedings of the 13th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), Delft, 2013, pp. 327\u2013334."},{"key":"6592_CR6","first-page":"1","volume-title":"Proceedings of the 2012 International Conference for High Performance Computing, Networking, Storage and Analysis (SC)","author":"T.G. Papaioannou","year":"2012","unstructured":"Papaioannou, T.G., Bonvin, N., and Aberer, K., Scalia: An adaptive scheme for efficient multi-cloud storage, Proceedings of the 2012 International Conference for High Performance Computing, Networking, Storage and Analysis (SC), Salt Lake City, 2012, pp. 1\u201310."},{"key":"6592_CR7","first-page":"299","volume-title":"Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST'13)","author":"J.S. Plank","year":"2013","unstructured":"Plank, J.S., Greenan, K.M., and Miller, E.L., Screaming Fast Galois Field Arithmetic using Intel SIMD Instructions, Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST'13), San Jose, CA, 2013, pp. 299\u2013306."},{"key":"6592_CR8","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45748-8_31","volume":"2429","author":"H. Weatherspoon","year":"2002","unstructured":"Weatherspoon, H. and Kubiatowicz, J.D., Erasure coding vs. replication: A quantitative comparison, Lect. Notes Comput. Sci., 2002, vol. 2429, pp. 328\u2013337.","journal-title":"Lect. Notes Comput. Sci."},{"key":"6592_CR9","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/11558989_21","volume":"3640","author":"R. Rodrigues","year":"2005","unstructured":"Rodrigues, R. and Liskov, B., High Availability in DHTs: Erasure coding vs. replication, Lect. Notes Comput. Sci., 2005, vol. 3640, pp. 226\u2013239.","journal-title":"Lect. Notes Comput. Sci."},{"issue":"4","key":"6592_CR10","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1109\/TDSC.2013.9","volume":"10","author":"J. Yu","year":"2013","unstructured":"Yu, J., Lu, P., Zhu, Y., Xue, G., and Li, M., Toward secure multikeyword Top-k retrieval over encrypted cloud data, IEEE Trans. Depend. Secure Comput., 2013, vol. 10, no. 4, pp. 239\u2013250.","journal-title":"IEEE Trans. Depend. Secure Comput."},{"key":"6592_CR11","first-page":"1","volume-title":"Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems HOTOS\u201907","author":"M.A. Shah","year":"2007","unstructured":"Shah, M.A., Baker, M., Mogul, J.C., Swaminathan, R., et al., Auditing to keep online storage services honest, Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems HOTOS\u201907, San Diego, CA, 2007, pp. 1\u20136."},{"key":"6592_CR12","first-page":"317","volume-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation","author":"E. Zhai","year":"2014","unstructured":"Zhai, E., Chen, R., Wolinsky, D.I., and Ford, B., Heading off correlated failures through independence-as-aservice, Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, Broomfield, CO, 2014, pp. 317\u2013334."},{"key":"6592_CR13","first-page":"15","volume-title":"Proceedings of the 2012 USENIX Annual Technical Conference","author":"C. Huang","year":"2012","unstructured":"Huang, C., et al., Erasure coding in Windows Azure Storage, Proceedings of the 2012 USENIX Annual Technical Conference, Boston, MA, 2012, pp. 15\u201326."},{"key":"6592_CR14","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1109\/INFOCOM.2014.6847951","volume-title":"IEEE INFOCOM 2014, IEEE Conference on Computer Communications","author":"Y. Zhao","year":"2014","unstructured":"Zhao, Y., Jiang, H., Zhou, K., Huang, Z., and Huang, P., Meeting service level agreement cost-effectively for video-on-demand applications in the cloud, IEEE INFOCOM 2014, IEEE Conference on Computer Communications, Toronto, 2014, pp. 298\u2013306."},{"issue":"1","key":"6592_CR15","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TPDS.2013.45","volume":"25","author":"N. Cao","year":"2014","unstructured":"Cao, N., Wang, C., Li., M., Ren, K., and Lou, W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 2014, vol. 25, no. 1, pp. 222\u2013233.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617040101.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411617040101","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411617040101.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T21:56:23Z","timestamp":1773611783000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411617040101"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["6592"],"URL":"https:\/\/doi.org\/10.3103\/s0146411617040101","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,7]]},"assertion":[{"value":"2 November 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 September 2017","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}