1 S. Ghemawat., "The Google File System" 2003
2 T. Aditya., "Space-efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments" 292-299, 2011
3 G. Ateniese., "Scalable and Efficient Provable Data Possession" 2008
4 W. Jiang, "Scalable Packet Classification on FPGA" 20 (20): 1668-1680, 2012
5 Y. Deswarte., "Remote Integrity Checking" 1-11, 2004
6 G. Ateniese., "Provable data possession at untrusted stores" 598-609, 2007
7 C. Wang., "Privacy-Preserving Public Auditing for Secure Cloud Storage" 62 (62): 362-375, 2013
8 C. Wang., "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing" 2010
9 A. Juels., "Pors : proofs of retrievability for large files" 584-597, 2007
10 B. Wang., "Oruta : Privacy-Preserving Public Auditingfor Shared Data in the Cloud" 2 (2): 43-56, 2014
1 S. Ghemawat., "The Google File System" 2003
2 T. Aditya., "Space-efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments" 292-299, 2011
3 G. Ateniese., "Scalable and Efficient Provable Data Possession" 2008
4 W. Jiang, "Scalable Packet Classification on FPGA" 20 (20): 1668-1680, 2012
5 Y. Deswarte., "Remote Integrity Checking" 1-11, 2004
6 G. Ateniese., "Provable data possession at untrusted stores" 598-609, 2007
7 C. Wang., "Privacy-Preserving Public Auditing for Secure Cloud Storage" 62 (62): 362-375, 2013
8 C. Wang., "Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing" 2010
9 A. Juels., "Pors : proofs of retrievability for large files" 584-597, 2007
10 B. Wang., "Oruta : Privacy-Preserving Public Auditingfor Shared Data in the Cloud" 2 (2): 43-56, 2014
11 Y. Yu., "On the security of auditing mechanisms for secure cloud storage" 30 : 127-132, 2014
12 J. Ni., "On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage" 25 (25): 2760-2761, 2014
13 H. Wang., "On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage" 25 (25): 264-267, 2014
14 E. Stefanov., "Iris : A Scalable Cloud File System with Efficient Integrity Checks" 2012-, 2012
15 H. Wang, "Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage" (99) : 1-12, 2014
16 C. Liu., "External integrity verification for outsourced big data in cloud and IoT : A big picture" 49 : 58-67, 2015
17 F. Seb´e., "Efficient Remote Data Possession Checking in Critical Information Infrastructures" 20 (20): 1034-1038, 2008
18 Y. Zhu., "Dynamic Audit Services for Outsourced Storages in Clouds" 6 (6): 227-238, 2013
19 M. -S. Hwang., "Data error locations reported by public auditing in cloud storage service" 21 (21): 373-390, 2014
20 G. Xu., "Data Sampling Algorithms for Data Integrity Verification in Cloud Storage" 5 (5): 1026-1034, 2013
21 P. Williams., "Building castles out of mud : Practical access pattern privacy and correctness on untrusted storage" 139-148, 2008
22 L. N. Bairavasundaram., "An analysis of latent sector errors in disk drives" 289-300, 2007
23 L. N. Bairavasundaram., "An analysis of data corruption in the storage stack" 4 (4): 8:1-8:28, 2008
24 K. Yang., "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing" 24 (24): 1717-1726, 2013
25 K. Yang., "An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing" 24 (24): 1717-1726, 2013
26 Z. Hao., "A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability" 23 (23): 1432-1437, 2011