{"id":"https://openalex.org/W2204393762","doi":"https://doi.org/10.1109/lcnw.2015.7365764","title":"Stormy Clouds - security in distributed cloud systems","display_name":"Stormy Clouds - security in distributed cloud systems","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2204393762","doi":"https://doi.org/10.1109/lcnw.2015.7365764","mag":"2204393762"},"language":"en","primary_location":{"id":"doi:10.1109/lcnw.2015.7365764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcnw.2015.7365764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075370174","display_name":"Muriel M\u00e9dard","orcid":"https://orcid.org/0000-0003-4059-407X"},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Muriel Medard","raw_affiliation_strings":["Electrical Engineering and Computer Science Department, MIT - Massachusetts Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science Department, MIT - Massachusetts Institute of Technology, USA","institution_ids":["https://openalex.org/I63966007"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083084714","display_name":"C. Green","orcid":null},"institutions":[{"id":"https://openalex.org/I63966007","display_name":"Massachusetts Institute of Technology","ror":"https://ror.org/042nb2s44","country_code":"US","type":"education","lineage":["https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cecil H. Green","raw_affiliation_strings":["Electrical Engineering and Computer Science Department, MIT - Massachusetts Institute of Technology, USA"],"affiliations":[{"raw_affiliation_string":"Electrical Engineering and Computer Science Department, MIT - Massachusetts Institute of Technology, USA","institution_ids":["https://openalex.org/I63966007"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5075370174"],"corresponding_institution_ids":["https://openalex.org/I63966007"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13059798,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7992534637451172},{"id":"https://openalex.org/keywords/information-theoretic-security","display_name":"Information-theoretic security","score":0.6705816984176636},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6355443000793457},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5867050886154175},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5610311627388},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5477253794670105},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5341948866844177},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.48755162954330444},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.48025277256965637},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.43927985429763794},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32709670066833496}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7992534637451172},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.6705816984176636},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6355443000793457},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5867050886154175},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5610311627388},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5477253794670105},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5341948866844177},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.48755162954330444},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.48025277256965637},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.43927985429763794},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32709670066833496},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcnw.2015.7365764","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcnw.2015.7365764","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2362689357","https://openalex.org/W2365982350","https://openalex.org/W2508016950","https://openalex.org/W2951637176","https://openalex.org/W2073145422","https://openalex.org/W2150528942","https://openalex.org/W2154832352","https://openalex.org/W1483037127","https://openalex.org/W2340481533","https://openalex.org/W2898567960"],"abstract_inverted_index":{"As":[0],"massively":[1],"distributed":[2],"storage":[3],"becomes":[4],"the":[5,17,40,86,89,104,158,178,187,207,215,220,224],"norm":[6],"in":[7,21,66,75,100,203],"cloud":[8,173],"networks,":[9],"they":[10],"contend":[11],"with":[12,61,260],"new":[13],"vulnerabilities":[14],"imputed":[15],"by":[16,171],"presence":[18],"of":[19,34,64,88,155,160,180,209,217,223,227],"data":[20,44,65,74],"different,":[22],"possibly":[23],"untrusted":[24,76],"nodes.":[25],"In":[26,78,175],"this":[27,176],"talk,":[28],"we":[29,80,120,141],"consider":[30],"two":[31],"such":[32,117],"types":[33],"vulnerabilities.":[35],"The":[36,152],"first":[37],"one":[38,235,248],"is":[39,192],"risk":[41,159],"posed":[42],"to":[43,59,97,102,107,143,206,233],"stored":[45],"at":[46,236],"nodes":[47,68,166],"that":[48,53,122,134,186,200,229],"are":[49],"untrusted.":[50],"We":[51,212],"show":[52,121],"coding":[54],"alone":[55],"can":[56,130,245],"be":[57,131],"substituted":[58],"encryption,":[60],"coded":[62,73],"portions":[63],"trusted":[67],"acting":[69],"as":[70,84,169,182,219],"keys":[71,83],"for":[72],"ones.":[77],"general,":[79],"may":[81],"interpret":[82],"representing":[85],"size":[87],"list":[90,112],"over":[91,164],"which":[92,140],"an":[93,230],"adversary":[94],"would":[95],"need":[96],"generate":[98],"guesses":[99,210],"order":[101],"recover":[103],"plaintext,":[105],"leading":[106],"a":[108,118,183,196,237],"natural":[109],"connection":[110],"between":[111],"decoding":[113],"and":[114,148],"secrecy.":[115],"Under":[116],"model,":[119],"algebraic":[123],"block":[124],"maximum":[125],"distance":[126],"separable":[127],"(MDS)":[128],"codes":[129],"constructed":[132],"so":[133],"lists":[135],"satisfy":[136],"certain":[137],"secrecy":[138,147,150],"criteria,":[139],"define":[142],"generalize":[144],"common":[145],"perfect":[146],"weak":[149],"notions.":[151],"second":[153],"type":[154],"vulnerability":[156,191],"concerns":[157],"passwords'":[161],"being":[162],"guessed":[163],"some":[165],"storing":[167],"data,":[168],"illustrated":[170],"recent":[172],"attacks.":[174],"domain,":[177],"use":[179],"guesswork":[181],"metric":[184],"shows":[185],"dominant":[188],"effect":[189],"on":[190],"not":[193],"necessarily":[194],"from":[195,253],"single":[197],"node,":[198],"but":[199],"it":[201],"varies":[202],"time":[204],"according":[205],"number":[208,226],"issued.":[211],"also":[213],"introduce":[214],"notion":[216],"inscrutability,":[218],"growth":[221],"rate":[222],"average":[225],"probes":[228],"attacker":[231],"has":[232],"make,":[234],"time,":[238],"using":[239],"his":[240],"best":[241],"strategy,":[242],"until":[243],"he":[244],"correctly":[246],"guess":[247],"or":[249],"more":[250],"secret":[251],"strings":[252],"multiple":[254],"randomly":[255],"chosen":[256],"strings.":[257],"Joint":[258],"work":[259],"Ahmad":[261],"Beirami,":[262],"Joao":[263],"Barros,":[264],"Robert":[265],"Calderbank,":[266],"Mark":[267],"Christiansen,":[268],"Ken":[269],"Duffy,":[270],"Flavio":[271],"du":[272],"Pin":[273],"Calmon,":[274],"Luisa":[275],"Lima,":[276],"Paulo":[277],"Oliveira,":[278],"Stefano":[279],"Tessaro,":[280],"Mayank":[281],"Varia,":[282],"Tiago":[283],"Vinhoza,":[284],"Linda":[285],"Zeger.":[286]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
