{"id":"https://openalex.org/W2090125559","doi":"https://doi.org/10.1145/2484402.2484410","title":"RAFR","display_name":"RAFR","publication_year":2013,"publication_date":"2013-05-08","ids":{"openalex":"https://openalex.org/W2090125559","doi":"https://doi.org/10.1145/2484402.2484410","mag":"2090125559"},"language":"en","primary_location":{"id":"doi:10.1145/2484402.2484410","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2484402.2484410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 international workshop on Security in cloud computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046539794","display_name":"Sumanta Sarkar","orcid":"https://orcid.org/0000-0002-6303-617X"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Sumanta Sarkar","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada","University of Calgary; Calgary; AB; Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary; Calgary; AB; Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010447902","display_name":"Reihaneh Safavi\u2013Naini","orcid":"https://orcid.org/0000-0002-1697-3590"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Reihaneh Safavi-Naini","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada","University of Calgary; Calgary; AB; Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary; Calgary; AB; Canada","institution_ids":["https://openalex.org/I168635309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032937625","display_name":"Liang Feng Zhang","orcid":"https://orcid.org/0000-0003-3543-1524"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Liang Feng Zhang","raw_affiliation_strings":["University of Calgary, Calgary, AB, Canada","University of Calgary; Calgary; AB; Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, AB, Canada","institution_ids":["https://openalex.org/I168635309"]},{"raw_affiliation_string":"University of Calgary; Calgary; AB; Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5046539794"],"corresponding_institution_ids":["https://openalex.org/I168635309"],"apc_list":null,"apc_paid":null,"fwci":0.809,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82971887,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10101","display_name":"Cloud Computing and Resource Management","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.8280298113822937},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7367275357246399},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7178853750228882},{"id":"https://openalex.org/keywords/erasure-code","display_name":"Erasure code","score":0.6973698139190674},{"id":"https://openalex.org/keywords/data-redundancy","display_name":"Data redundancy","score":0.6348639130592346},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.48711585998535156},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3737327456474304},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3118906617164612},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.11755558848381042},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.08478370308876038}],"concepts":[{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.8280298113822937},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7367275357246399},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7178853750228882},{"id":"https://openalex.org/C137529215","wikidata":"https://www.wikidata.org/wiki/Q5385031","display_name":"Erasure code","level":3,"score":0.6973698139190674},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.6348639130592346},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.48711585998535156},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3737327456474304},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3118906617164612},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.11755558848381042},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.08478370308876038}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2484402.2484410","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2484402.2484410","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 international workshop on Security in cloud computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W89553247","https://openalex.org/W1480620864","https://openalex.org/W1995672990","https://openalex.org/W2032976609","https://openalex.org/W2058231031","https://openalex.org/W2067410255","https://openalex.org/W2079493184","https://openalex.org/W2102881299"],"related_works":["https://openalex.org/W2002428578","https://openalex.org/W2619878113","https://openalex.org/W2548001955","https://openalex.org/W2897258045","https://openalex.org/W188037868","https://openalex.org/W2556318977","https://openalex.org/W2891239684","https://openalex.org/W2308337485","https://openalex.org/W2184886395","https://openalex.org/W1572773265"],"abstract_inverted_index":{"Cloud":[0],"storage":[1],"services":[2],"have":[3],"been":[4],"increasingly":[5],"popular":[6],"in":[7,53,89],"recent":[8],"years.":[9],"To":[10],"provide":[11],"guarantee":[12,44],"against":[13],"possible":[14],"drive":[15,68],"failures":[16,69],"and":[17,63,86,106],"crashes,":[18],"data":[19,52,78,105,109],"must":[20],"be":[21,71],"stored":[22,51],"with":[23,39],"redundancy":[24],"on":[25],"multiple":[26],"drives.":[27,91],"In":[28,73],"this":[29],"paper,":[30],"we":[31],"propose":[32],"Remote":[33],"Assessment":[34],"of":[35,42,118],"File":[36],"Redundancy":[37],"(RAFR),":[38],"the":[40,48,77,103,108,116],"goal":[41],"providing":[43],"to":[45,66],"users":[46],"that":[47,96,115],"cloud":[49,75],"has":[50],"k":[54,99,123],"+":[55],"\u03a8":[56,60,67,119],"drives,":[57],"for":[58],"some":[59],"<":[61],"0,":[62],"so":[64,107],"up":[65],"can":[70,94],"tolerated.":[72],"RAFR,":[74],"encodes":[76],"using":[79],"an":[80],"(n,":[81],"k)":[82],"MDS":[83],"erasure":[84],"code":[85],"stores":[87],"it":[88],"n":[90,121],"The":[92],"user":[93],"verify":[95],"at":[97],"least":[98],"drives":[100],"are":[101],"holding":[102],"encoded":[104],"is":[110,120],"recoverable.":[111],"Our":[112],"analysis":[113],"shows":[114],"value":[117],"--":[122,124],"\u03c9(log":[125],"n).":[126]},"counts_by_year":[{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
