TY - STD TI - Abu-Libdeh H, Princehouse L, Weatherspoon H (2010) RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM symposium on cloud computing, SoCC ’10. ACM, New York, pp 229–240 ID - ref1 ER - TY - STD TI - Addis B, Ardagna D, Panicucci B, Zhang L (2010) Autonomic management of cloud service centers with availability guarantees. In: Proceedings of the 3rd international conference on cloud computing (CLOUD 10). IEEE Press, pp 220–227 ID - ref2 ER - TY - STD TI - Chow R et al (2009) Controlling data in the cloud: outsourcing computation without outsourcing control. In: ACM workshop on cloud computing security ID - ref3 ER - TY - STD TI - Deng J, Hu J, Liu ACM, Wu J (2010) Research and application of cloud storage. In: Proceedings of the 2nd international workshop on intelligent systems and applications (ISA 10). IEEE Press, pp 1–5 ID - ref4 ER - TY - STD TI - Feel HTA, Khafagy MH (2011) OCSS: ontology cloud storage system. In: Proceedings of the first international symposium on network cloud computing and applications (NCCA 11). IEEE Press, pp 9–13 ID - ref5 ER - TY - STD TI - Hao L, Han D (2011) The study and design on secure-cloud storage system. In: Proceedings of the international conference on electrical and control engineering (ICECE 11). IEEE Press, pp 5126–5129 ID - ref6 ER - TY - STD TI - He Q, Li Z, Zhang X (2010) Study on cloud storage system based on distributed storage systems. In: Proceedings of the international conference on computational and information sciences (ICCIS 11). IEEE Press, pp 1332–1335 ID - ref7 ER - TY - STD TI - Jayasinghe D, Pu C, Eilam T, Steinder M, Whalley I, Snible E (2011) Improving performance and availability of services hosted on IaaS clouds with structural constraint-aware virtual machine placement. In: Proceedings of the international conference on services computing (SCC 11). IEEE Press, pp 72–79 ID - ref8 ER - TY - STD TI - Koletka R, Hutchison A (2011) An architecture for secure searchable cloud storage. In: Proceedings of the international conference on information security South Africa (ISSA 11). IEEE Press, pp 1–7 ID - ref9 ER - TY - STD TI - Liu W (2012) Research on cloud computing security problem and strategy. In: Proceedings of the 2nd international conference on consumer electronics, communications and networks (CECNet 12). IEE Press, pp 1216–1219 ID - ref10 ER - TY - STD TI - Machida F, Andrade E, Kim DS, Trivedi KS (2011) Candy: component-based availability modeling framework for cloud service management using SysML. In: Proceedings of the 30th IEEE symposium on reliable distributed systems (SRDS 11). IEEE Press, pp 209–218 ID - ref11 ER - TY - STD TI - Ristenpart T, Tromer E, Shacham H, Savage S (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of ACM conference on computer and communications security (CCS 2009), pp 199–212 ID - ref12 ER - TY - STD TI - Sahana RBS, Sarddar D (2015) An enhanced storage management scheme with search optimization for cloud data center. Int J Appl Eng Res. 10(12):32141–32150. ISSN: 0973-4562 ID - ref13 ER - TY - STD TI - Srinivasan J, Wei W, Ma X, Yu T (2011) EMFS: email-based personal cloud storage. In: Proceeding of the 6th international conference on networking, architecture and storage (NAS 11). IEEE Press, pp 248–257 ID - ref14 ER - TY - STD TI - Widjajarto A, Supangkat SH, Gondokaryono YS, Prihatmanto AS (2012) Cloud computing reference model: the modelling of service availability based on application profile and resource allocation. In: Proceedings of the international conference on cloud computing and social networking (ICCCSN 12). IEEE Press, pp 1–4 ID - ref15 ER - TY - STD TI - Wu J, Ping L, Ge X, Wang Y, Fu J (2012) Cloud storage as the infrastructure of cloud computing. In: Proceedings of the international conference on intelligent computing and cognitive informatics (ICICCI 10). IEEE Press, pp 380–383 ID - ref16 ER - TY - STD TI - Zhang D, Sun F, Cheng X, Liu C (2011) Research on hadoop-based enterprise file cloud storage system. In: Proceedings of the 3rd international conference on awareness science and technology (iCAST 11). IEEE Press, pp 434–437 ID - ref17 ER - TY - STD TI - Zhang X, Du H, Chen J, Lin Y, Zeng L (2011) Ensure data security in cloud storage. In: Proceedings of the international conference on network computing and information security (NCIS 11). IEEE Press, pp 284–287 ID - ref18 ER -