A survey of information-centric networking research

G Xylomenos, CN Ververidis, VA Siris… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
The current Internet architecture was founded upon a host-centric communication model,
which was appropriate for co** with the needs of the early Internet users. Internet usage …

A survey of software techniques for using non-volatile memories for storage and main memory systems

S Mittal, JS Vetter - IEEE Transactions on Parallel and …, 2015 - ieeexplore.ieee.org
Non-volatile memory (NVM) devices, such as Flash, phase change RAM, spin transfer
torque RAM, and resistive RAM, offer several advantages and challenges when compared …

Ipfs-content addressed, versioned, p2p file system

J Benet - arxiv preprint arxiv:1407.3561, 2014 - arxiv.org
The InterPlanetary File System (IPFS) is a peer-to-peer distributed file system that seeks to
connect all computing devices with the same system of files. In some ways, IPFS is similar to …

Erasure coding in windows azure storage

C Huang, H Simitci, Y Xu, A Ogus, B Calder… - 2012 USENIX Annual …, 2012 - usenix.org
Windows Azure Storage (WAS) is a cloud storage system that provides customers the ability
to store seemingly limitless amounts of data for any duration of time. WAS customers have …

Networking named content

V Jacobson, DK Smetters, JD Thornton… - Proceedings of the 5th …, 2009 - dl.acm.org
Network use has evolved to be dominated by content distribution and retrieval, while
networking technology still speaks only of connections between hosts. Accessing content …

f4: Facebook's warm {BLOB} storage system

S Muralidhar, W Lloyd, S Roy, C Hill, E Lin… - … USENIX Symposium on …, 2014 - usenix.org
Facebook's corpus of photos, videos, and other Binary Large OBjects (BLOBs) that need to
be reliably stored and quickly accessible is massive and continues to grow. As the footprint …

Chord: A scalable peer-to-peer lookup service for internet applications

I Stoica, R Morris, D Karger, MF Kaashoek… - ACM SIGCOMM …, 2001 - dl.acm.org
A fundamental problem that confronts peer-to-peer applications is to efficiently locate the
node that stores a particular data item. This paper presents Chord, a distributed lookup …

Dynamo: Amazon's highly available key-value store

G DeCandia, D Hastorun, M Jampani… - ACM SIGOPS operating …, 2007 - dl.acm.org
Reliability at massive scale is one of the biggest challenges we face at Amazon. com, one of
the largest e-commerce operations in the world; even the slightest outage has significant …

Provable data possession at untrusted stores

G Ateniese, R Burns, R Curtmola, J Herring… - Proceedings of the 14th …, 2007 - dl.acm.org
We introduce a model for provable data possession (PDP) that allows a client that has
stored data at an untrusted server to verify that the server possesses the original data …

Searchable symmetric encryption: improved definitions and efficient constructions

R Curtmola, J Garay, S Kamara… - Proceedings of the 13th …, 2006 - dl.acm.org
Searchable symmetric encryption (SSE) allows a party to outsource the storage of its data to
another party (a server) in a private manner, while maintaining the ability to selectively …