@proceedings {7092964, title = {How to Enhance Cloud Architectures to Enable Cross-Federation: Towards Interoperable Storage Providers}, journal = { IEEE International Conference on Cloud Engineering (IC2E), Tempe, AZ, USA}, year = {2015}, month = {March}, pages = {480-486}, publisher = {IEEE Computer Society}, address = {Washington D.C.}, keywords = {Big Data, Big Data storage, CLEVER, CLEVER message oriented middleware, cloud architectures, cloud computing, cloud storage market, cross-federation, Ecosystems, federated cloud ecosystem, federation, Hadoop, Hadoop distribute file system, HDFS, inter-domain communication management, interoperable storage providers, Message systems, middleware, MOM, Protocols, public domain software, Resource management, Servers, small-medium cloud storage providers, Storage, storage management, XML, XMPP}, doi = {10.1109/IC2E.2015.80}, url = {http://conferences.computer.org/IC2E/2015/index.htm}, author = {Maria Fazio and Antonio Celesti and Massimo Villari and Antonio Puliafito} } @article {43, title = {Evaluating A File Fragmentation System For Multi-provider Cloud Storage}, journal = {SCALABLE COMPUTING. PRACTICE AND EXPERIENCE}, volume = {14}, year = {2013}, pages = {265{\textendash}277}, abstract = {

Currently, storage services represent a new way to do business in Cloud computing. This new trend is proved by the number of Cloud storage providers that are appearing on the market. In this work, we present an innovative approach useful for using different Cloud storage providers in a transparent way, avoiding both data lock-in and possible data privacy violation that can be caused by providers themselves. More specifically, we propose an approach enabling Cloud customers to rely on many Cloud storage providers. Differently from other solutions, with our approach only the customers have the full control of their data, and in addition, if a provider suddenly disappears and/or it is not available anymore, the customers will be able to continue accessing their data, reconstructing them from data fragments replicated in other Cloud storage providers. The paper shows how such an approach works. In particular, experiments, besides proving the goodness of our approach, also provide several guidelines regarding how to properly configure software systems in order to meet the customer{\textquoteright}s requirements (in terms of both QoS and costs).

}, keywords = {Big Data, cloud computing, Confidentiality., Reliability, Storage}, doi = {10.12694/scpe.v14i4.932}, url = {http://www.scpe.org/index.php/scpe/article/view/932/0}, author = {Massimo Villari and Antonio Celesti and Maria Fazio and Antonio Puliafito} }