A survey of information-centric networking research
The current Internet architecture was founded upon a host-centric communication model,
which was appropriate for co** with the needs of the early Internet users. Internet usage …
which was appropriate for co** with the needs of the early Internet users. Internet usage …
A survey of software techniques for using non-volatile memories for storage and main memory systems
Non-volatile memory (NVM) devices, such as Flash, phase change RAM, spin transfer
torque RAM, and resistive RAM, offer several advantages and challenges when compared …
torque RAM, and resistive RAM, offer several advantages and challenges when compared …
Ipfs-content addressed, versioned, p2p file system
J Benet - arxiv preprint arxiv:1407.3561, 2014 - arxiv.org
The InterPlanetary File System (IPFS) is a peer-to-peer distributed file system that seeks to
connect all computing devices with the same system of files. In some ways, IPFS is similar to …
connect all computing devices with the same system of files. In some ways, IPFS is similar to …
Erasure coding in windows azure storage
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability
to store seemingly limitless amounts of data for any duration of time. WAS customers have …
to store seemingly limitless amounts of data for any duration of time. WAS customers have …
Networking named content
V Jacobson, DK Smetters, JD Thornton… - Proceedings of the 5th …, 2009 - dl.acm.org
Network use has evolved to be dominated by content distribution and retrieval, while
networking technology still speaks only of connections between hosts. Accessing content …
networking technology still speaks only of connections between hosts. Accessing content …
f4: Facebook's warm {BLOB} storage system
Facebook's corpus of photos, videos, and other Binary Large OBjects (BLOBs) that need to
be reliably stored and quickly accessible is massive and continues to grow. As the footprint …
be reliably stored and quickly accessible is massive and continues to grow. As the footprint …
Chord: A scalable peer-to-peer lookup service for internet applications
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the
node that stores a particular data item. This paper presents Chord, a distributed lookup …
node that stores a particular data item. This paper presents Chord, a distributed lookup …
Dynamo: Amazon's highly available key-value store
G DeCandia, D Hastorun, M Jampani… - ACM SIGOPS operating …, 2007 - dl.acm.org
Reliability at massive scale is one of the biggest challenges we face at Amazon. com, one of
the largest e-commerce operations in the world; even the slightest outage has significant …
the largest e-commerce operations in the world; even the slightest outage has significant …
Provable data possession at untrusted stores
We introduce a model for provable data possession (PDP) that allows a client that has
stored data at an untrusted server to verify that the server possesses the original data …
stored data at an untrusted server to verify that the server possesses the original data …
Searchable symmetric encryption: improved definitions and efficient constructions
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to
another party (a server) in a private manner, while maintaining the ability to selectively …
another party (a server) in a private manner, while maintaining the ability to selectively …