{"id":"https://openalex.org/W2896999628","doi":"https://doi.org/10.1109/icccn.2018.8487406","title":"RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems","display_name":"RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2896999628","doi":"https://doi.org/10.1109/icccn.2018.8487406","mag":"2896999628"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2018.8487406","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2018.8487406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100348937","display_name":"Teng Wang","orcid":"https://orcid.org/0000-0002-2244-4513"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Teng Wang","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts Boston, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts Boston, Boston, MA","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008085498","display_name":"Nam Son Nguyen","orcid":null},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nam Son Nguyen","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts Boston, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts Boston, Boston, MA","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101584767","display_name":"Jiayin Wang","orcid":"https://orcid.org/0000-0001-5103-6132"},"institutions":[{"id":"https://openalex.org/I166088655","display_name":"Montclair State University","ror":"https://ror.org/01nxc2t48","country_code":"US","type":"education","lineage":["https://openalex.org/I166088655"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jiayin Wang","raw_affiliation_strings":["Department of Computer Science, Montclair State University, Montclair, NJ"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Montclair State University, Montclair, NJ","institution_ids":["https://openalex.org/I166088655"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031499175","display_name":"Tengpeng Li","orcid":null},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tengpeng Li","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts Boston, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts Boston, Boston, MA","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100408524","display_name":"Xiaoqian Zhang","orcid":"https://orcid.org/0000-0002-4007-4501"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaoqian Zhang","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts Boston, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts Boston, Boston, MA","institution_ids":["https://openalex.org/I33434090"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091825452","display_name":"Ningfang Mi","orcid":"https://orcid.org/0009-0005-0934-1287"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ningfang Mi","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Northeastern University, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Northeastern University, Boston, MA","institution_ids":["https://openalex.org/I12912129"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101607101","display_name":"Bin Zhao","orcid":"https://orcid.org/0000-0002-9521-5981"},"institutions":[{"id":"https://openalex.org/I152031979","display_name":"Nanjing Normal University","ror":"https://ror.org/036trcv74","country_code":"CN","type":"education","lineage":["https://openalex.org/I152031979"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Zhao","raw_affiliation_strings":["School of Computer Science and Technology, Nanjing Normal University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Nanjing Normal University, Nanjing, China","institution_ids":["https://openalex.org/I152031979"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085815921","display_name":"Bo Sheng","orcid":"https://orcid.org/0000-0001-5958-8935"},"institutions":[{"id":"https://openalex.org/I33434090","display_name":"University of Massachusetts Boston","ror":"https://ror.org/04ydmy275","country_code":"US","type":"education","lineage":["https://openalex.org/I33434090"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bo Sheng","raw_affiliation_strings":["Department of Computer Science, University of Massachusetts Boston, Boston, MA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Massachusetts Boston, Boston, MA","institution_ids":["https://openalex.org/I33434090"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100348937"],"corresponding_institution_ids":["https://openalex.org/I33434090"],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70912759,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"21","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8411228656768799},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.7698808908462524},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6034412384033203},{"id":"https://openalex.org/keywords/checksum","display_name":"Checksum","score":0.5604906678199768},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.5269504189491272},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.4104149341583252},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39751145243644714},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.357759028673172},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.29890331625938416},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24798086285591125},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.22414100170135498},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.20144876837730408}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8411228656768799},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.7698808908462524},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6034412384033203},{"id":"https://openalex.org/C162372511","wikidata":"https://www.wikidata.org/wiki/Q218341","display_name":"Checksum","level":2,"score":0.5604906678199768},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.5269504189491272},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.4104149341583252},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39751145243644714},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.357759028673172},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29890331625938416},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24798086285591125},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.22414100170135498},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.20144876837730408},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2018.8487406","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2018.8487406","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1598291964","https://openalex.org/W1905719725","https://openalex.org/W1967373117","https://openalex.org/W2001040824","https://openalex.org/W2004958263","https://openalex.org/W2040075573","https://openalex.org/W2088762523","https://openalex.org/W2106910180","https://openalex.org/W2131132597","https://openalex.org/W2147504831","https://openalex.org/W2150620836","https://openalex.org/W2151657860","https://openalex.org/W2577787132","https://openalex.org/W2604856537","https://openalex.org/W2613324619","https://openalex.org/W2755935209","https://openalex.org/W3163634073","https://openalex.org/W4248578633","https://openalex.org/W6635637697","https://openalex.org/W6640091283","https://openalex.org/W6735916004"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W4287264924","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W1979110442","https://openalex.org/W2156660460","https://openalex.org/W2362866566"],"abstract_inverted_index":{"Erasure":[0],"Coding":[1],"based":[2,144],"Storage":[3],"(ECS)":[4],"is":[5,35,79,97,113,127,143,187],"replacing":[6],"tradition":[7],"replica-based":[8],"systems":[9],"because":[10],"of":[11,27,111,122,137,155],"its":[12,30,66,116],"low":[13],"storage":[14],"overhead.":[15],"In":[16,90,107],"an":[17,98],"ECS,":[18],"however,":[19],"every":[20,109],"task":[21],"needs":[22],"to":[23,82,132],"fetch":[24],"remote":[25],"pieces":[26],"data":[28,33,55,68,86,105,112,141],"for":[29,70,103,176],"execution,":[31],"and":[32,46,100,173,182,189],"verification":[34,142],"missing":[36],"in":[37,53,60,88],"the":[38,57,85,135,138,146,178,192,195],"current":[39],"framework.":[40],"As":[41],"security":[42,50,171],"issues":[43],"keep":[44,134],"rising":[45],"there":[47],"have":[48],"been":[49],"incidents":[51],"occurred":[52],"big":[54,104],"platforms,":[56],"compromised":[58,196],"nodes":[59,72],"a":[61,120,152,159,163,167,174],"computing":[62],"cluster":[63],"may":[64],"manipulate":[65],"hosted":[67],"fed":[69],"other":[71],"yielding":[73],"misleading":[74],"results.":[75],"Without":[76],"replicas,":[77],"it":[78],"quite":[80],"challenging":[81],"efficiently":[83,133],"verify":[84],"integrity":[87],"ECS.":[89],"this":[91],"paper,":[92],"we":[93],"develop":[94],"ROVER,":[95,108],"which":[96],"efficient":[99,190],"verifiable":[101],"ECS":[102],"platforms.":[106],"piece":[110],"monitored":[114],"by":[115],"checksums":[117],"stored":[118],"on":[119,129,145],"set":[121],"witnesses.":[123],"Bloom":[124,156],"filter":[125],"technique":[126],"used":[128],"each":[130],"witness":[131],"records":[136],"checksums.":[139],"The":[140,180],"majority":[147],"voting.":[148],"ROVER":[149,186],"also":[150],"supports":[151],"quick":[153],"reconstruction":[154],"Filter":[157],"when":[158],"node":[160],"recovers":[161],"from":[162,194],"failure.":[164],"We":[165],"present":[166],"complete":[168],"system":[169],"framework,":[170],"analysis,":[172],"guideline":[175],"setting":[177],"parameters.":[179],"implementation":[181],"evaluation":[183],"show":[184],"that":[185],"robust":[188],"against":[191],"attack":[193],"nodes.":[197]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
