A TRUST–REPUTATION MODEL OFFERING DATA RETRIEVABILITY AND CORRECTNESS IN DISTRIBUTED STORAGES

Coimbatore K. Shyamala and Tattamangalam R. Padmanabhan

References

  1. [1] K.D. Bowers, A. Juels, and A Oprea, HAIL: A high-availability and integrity layer for cloud storage, CCS ’09 ACM, 2009, 187–198.
  2. [2] L. Gao, M. Dahlin, J. Zheng, L. Alvisi, and A. Iyengar, Dual-quorum: A highly available and consistent replication system for edge services, IEEE Transactions on Dependable and Secure computing, 7 (2), 2010, 159–174.
  3. [3] M. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, Journal of Alternative and Complementary Medicine, 36 (2), 1989, 335–348.
  4. [4] J.A. Garay, R. Gennaro, and C. Jutla, Secure distributed storage and retrieval, Theoretical Computer Science, 243 (1–2), 2000, 363–389.
  5. [5] G.R. Goodson, J.J. Wylie, G.R. Ganger, and M.K. Reiter, Efficient byzantine-tolerant erasure coded storage, 34th International Conference on Dependable Systems and Networks, 2004, 135–144.
  6. [6] J. Hendricks, G.R. Ganger, and M.K. Reiter, Verifying distributed erasure-coded data, PODC’26, 2007, 139–146.
  7. [7] M. Placek and R. Buyya, A taxonomy of distributed storage systems (University of Melbourne, 2006).
  8. [8] M. Lillibridge, S. Elnikety, A. Birrell, M. Burrows, and M. Isard, A cooperative Internet backup scheme, USENIX Annual Technical Conference, General Track 2003, 2003, 29–41.
  9. [9] D.L.G. Filho and P.S.L.M. Barreto, Demonstrating data possession and uncheatable data transfer, IACR, eArchive 2006/150, 2006.
  10. [10] M.A. Shah, M. Baker, J.C. Mogul, and R. Swaminathan, Auditing to keep online storage services honest source, USENIX HotOS, 11, 2007.
  11. [11] C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in cloud computing, IACR, Eprint Archive2009/08, 2009.
  12. [12] Ari Juels and B.S. Kaliski Jr., PORs: Proofs of retrievability for large files, CCS ’07 ACM, New York, USA, 2007, 584–597.
  13. [13] J. Kubiatowicz, D. Bindel, Y. Chen, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao, Oceanstore: An architecture for global-scale persistent storage, Proceedings of ACM ASPLOS, 35(11), 2000, 190–201.
  14. [14] A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R.P. Wattenhofer, Farsite: Federated, available, and reliable storage for an incompletely trusted environment, SIGOPS Operating Systems Review, 36, 2002, 1–14.
  15. [15] F.G. Mármol and G.M. Pérez, Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems, Computer Standards & Interfaces, Elsevier Science Publishers, 32 (4), 2010, 185–196.
  16. [16] A. Boukerche, L. Xu, and K. El-Khatib, Trust-based security for wireless ad hoc and sensor networks, Computer Communications, 30 (11–12), 2007, 2413–2427.
  17. [17] G. Zacharia and P. Maes, Trust management through reputation mechanisms, Applied Artificial Intelligence, 14, 2000, 881–907.
  18. [18] C. Huang, H. Hu, and Z. Wang, A dynamic trust model based on feedback control mechanism for P2P applications, Autonomic and Trusted Computing LNCS, (4158), 2006, 312–321.
  19. [19] S. Kamvar, M. Schlosser, and H. Garcia-Molina, The Eigen-Trust algorithm for reputation management in P2P networks, Proc. International WorldWide Web Conf., Budapest, Hungary, 2003, 640–651.
  20. [20] C. Cachin and S. Tessaro, Asynchronous verifiable information dispersal, SRD’24, 2005, 191–202.
  21. [21] C. Cachin and S. Tessaro, Optimal resilience for erasure-coded Byzantine storage, DSN’06, 2006, 115–124.
  22. [22] H. Krawczyk, Distributed fingerprints and secure information dispersal, PODC’12, 1993, 207–218.
  23. [23] M.M. Keith, Challenging the adversary model in secret sharing schemes, Proc. Royal Flemish Academy of Belgium for Science and the Arts Coding and Cryptography II, 2008, 45–63.
  24. [24] S. Lin, D.J. Costello Jr., Error control coding fundamentals and applications (Upper Saddle River, NJ: Prentice-Hall, 2004).
  25. [25] Y. Wang and J. Vassileva, Trust and reputation model in peer-to-peer networks, Proc. IEEE Conf. on P2P Computing, Sweden, 2003, 150–157.
  26. [26] B. Yamuna and T.R. Padmanabhan, A reliability level list based SDD algorithm for binary cyclic block codes, International Journal of Computers, Communications & Control, 7 (2), 2012, 388–395.

Important Links:

Go Back