Scale and performance in a distributed file system
ACM Transactions on Computer Systems (TOCS)
Disconnected operation in the Coda file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Replication in the harp file system
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
The design and implementation of a log-structured file system
ACM Transactions on Computer Systems (TOCS)
The Zebra striped network file system
ACM Transactions on Computer Systems (TOCS)
Serverless network file systems
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Managing update conflicts in Bayou, a weakly connected replicated storage system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Dealing with server corruption in weakly consistent, replicated data systems
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Frangipani: a scalable distributed file system
Proceedings of the sixteenth ACM symposium on Operating systems principles
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Deciding when to forget in the Elephant file system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Communications of the ACM
OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Log-based directory resolution in the coda file system
PDIS '93 Proceedings of the second international conference on Parallel and distributed information systems
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Building secure file systems out of byzantine storage
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Venti: A New Approach to Archival Storage
FAST '02 Proceedings of the Conference on File and Storage Technologies
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Unifying File System Protection
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Atomic Data Access in Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
A Toolkit for User-Level File Systems
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
How to build a trusted database system on untrusted storage
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Self-securing storage: protecting data in compromised system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Fast and secure distributed read-only file system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Taming aggressive replication in the Pangaea wide-area file system
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Experience with an evolving overlay network testbed
ACM SIGCOMM Computer Communication Review
Consistent and automatic replica regeneration
ACM Transactions on Storage (TOS)
Kosha: A Peer-to-Peer Enhancement for the Network File System
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
Implementing aggregation and broadcast over Distributed Hash Tables
ACM SIGCOMM Computer Communication Review
Taming aggressive replication in the Pangaea wide-area file system
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
OpenDHT: a public DHT service and its uses
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
A case study in building layered DHT applications
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Plutus: Scalable Secure File Sharing on Untrusted Storage
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Segank: A Distributed Mobile Storage System
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
Improving lookup latency in distributed hash table systems using random sampling
IEEE/ACM Transactions on Networking (TON)
Reconciling while tolerating disagreement in collaborative data sharing
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Forensic analysis of database tampering
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Bridging the gap: augmenting centralized systems with P2P technologies
ACM SIGOPS Operating Systems Review
Constructing collaborative desktop storage caches for large scientific datasets
ACM Transactions on Storage (TOS)
Searchable symmetric encryption: improved definitions and efficient constructions
Proceedings of the 13th ACM conference on Computer and communications security
Maximizing data locality in distributed systems
Journal of Computer and System Sciences
CISS: An efficient object clustering framework for DHT-based peer-to-peer applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Survey of research towards robust peer-to-peer networks: search methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
BitVault: a highly reliable distributed data retention platform
ACM SIGOPS Operating Systems Review - Systems work at Microsoft Research
CriStore: dynamic storage system for heterogeneous devices in off-site ubiquitous communities
Proceedings of the 2007 ACM symposium on Applied computing
Mace: language support for building distributed systems
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
POST: a secure, resilient, cooperative messaging system
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
WiDS: an integrated toolkit for distributed system development
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
Designing a DHT for low latency and high throughput
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Consistent and automatic replica regeneration
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Total recall: system support for automated availability management
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Explicit control a batch-aware distributed file system
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Antiquity: exploiting a secure log for wide-area distributed storage
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Unibus: a contrarian approach to grid computing
The Journal of Supercomputing
Attested append-only memory: making adversaries stick to their word
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Persistent personal names for globally connected mobile devices
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Provable data possession at untrusted stores
Proceedings of the 14th ACM conference on Computer and communications security
Tamper detection in audit logs
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Autonomic distributed data management with update accesses
Proceedings of the 1st international conference on Autonomic computing and communication systems
A nine year study of file system and storage benchmarking
ACM Transactions on Storage (TOS)
DADC '08 Proceedings of the 2008 international workshop on Data-aware distributed computing
High-performance land surface modeling with a Linux cluster
Computers & Geosciences
Forensic analysis of database tampering
ACM Transactions on Database Systems (TODS)
Fault-Tolerant Partial Replication in Large-Scale Database Systems
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Global-scale peer-to-peer file services with DFS
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Dual-quorum replication for edge services
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Interactive resource-intensive applications made easy
Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware
P2P Networking and Applications
P2P Networking and Applications
A proactive low-overhead file replication scheme for structured P2P content delivery networks
Journal of Parallel and Distributed Computing
Deleting files in the Celeste peer-to-peer storage system
Journal of Parallel and Distributed Computing
Exploring data reliability tradeoffs in replicated storage systems
Proceedings of the 18th ACM international symposium on High performance distributed computing
TrInc: small trusted hardware for large distributed systems
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Flexible, wide-area storage for distributed systems with WheelFS
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Towards an architecture for service deployment in contributory communities
International Journal of Grid and Utility Computing
VStore: efficiently storing virtualized state across mobile devices
Proceedings of the First Workshop on Virtualization in Mobile Computing
Dynamic provable data possession
Proceedings of the 16th ACM conference on Computer and communications security
Maintaining object ordering in a shared P2P storage environment
Maintaining object ordering in a shared P2P storage environment
Deleting files in the celeste peer-to-peer storage system
Deleting files in the celeste peer-to-peer storage system
Device transparency: a new model for mobile storage
ACM SIGOPS Operating Systems Review
Policy-based access control for weakly consistent replication
Proceedings of the 5th European conference on Computer systems
CFR: a peer-to-peer collaborative file repository system
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Distributed hash table based peer-to-peer version control system for collaboration
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Managing difference-based objects with sub-networks in peer-to-peer environments
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
WAND: a robust P2P file system tree interface
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Interactive resource-intensive applications made easy
MIDDLEWARE2007 Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware
Managing data for evaluating trust in unstructured peer-to-peer networks
GPC'08 Proceedings of the 3rd international conference on Advances in grid and pervasive computing
Malugo: A peer-to-peer storage system
International Journal of Ad Hoc and Ubiquitous Computing
Topology-aware routing in structured peer-to-peer overlay networks
Future directions in distributed computing
Multi-tree broadcast in peer-to-peer networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Super-efficient aggregating history-independent persistent authenticated dictionaries
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Accelerating parallel analysis of scientific simulation data via Zazen
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
HydraFS: a high-throughput file system for the HYDRAstor content-addressable storage system
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Scale and concurrency of GIGA+: file system directories with millions of files
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Segank: a distributed mobile storage system
FAST'04 Proceedings of the 3rd USENIX conference on File and storage technologies
Eyo: device-transparent personal storage
USENIXATC'11 Proceedings of the 2011 USENIX conference on USENIX annual technical conference
Authenticated Dictionaries: Real-World Costs and Trade-Offs
ACM Transactions on Information and System Security (TISSEC)
Selective disclosure on encrypted documents
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Minimizing metadata access latency in wide area networked file systems
HiPC'06 Proceedings of the 13th international conference on High Performance Computing
Storing and locating mutable data in structured peer-to-peer overlay networks
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Chord-PKI: A distributed trust infrastructure based on P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
DAEDALUS: a peer-to-peer shared memory system for ubiquitous computing
Euro-Par'06 Proceedings of the 12th international conference on Parallel Processing
Pastis: a highly-scalable multi-user peer-to-peer file system
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
FeedTree: sharing web micronews with peer-to-peer event notification
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Wayfinder: navigating and sharing information in a decentralized world
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
DART: distributed automated regression testing for large-scale network applications
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Towards self-managing qos-enabled peer-to-peer systems
Self-star Properties in Complex Information Systems
Dependable peer-to-peer systems withstanding dynamic adversarial churn
Dependable Systems
MUREX: a mutable replica control scheme for structured peer-to-peer storage systems
GPC'06 Proceedings of the First international conference on Advances in Grid and Pervasive Computing
Highly available DHTs: keeping data consistency after updates
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Dual-Quorum replication for edge services
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
BlueSky: a cloud-backed file system for the enterprise
FAST'12 Proceedings of the 10th USENIX conference on File and Storage Technologies
Searchable symmetric encryption: Improved definitions and efficient constructions
Journal of Computer Security
Hi-index | 0.00 |
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to fully trust either the underlying peer-to-peer-storage system or the other users of the file system.An Ivy file system consists solely of a set of logs, one log per participant. Ivy stores its logs in the DHash distributed hash table. Each participant finds data by consulting all logs, but performs modifications by appending only to its own log. This arrangement allows Ivy to maintain meta-data consistency without locking. Ivy users can choose which other logs to trust, an appropriate arrangement in a semi-open peer-to-peer system.Ivy presents applications with a conventional file system interface. When the underlying network is fully connected, Ivy provides NFS-like semantics, such as close-to-open consistency. Ivy detects conflicting modifications made during a partition, and provides relevant version information to application-specific conflict resolvers. Performance measurements on a wide-area network show that Ivy is two to three times slower than NFS.