References
- L. C. Miller, S. Fadden, Software Defined Storage for Dummies, ibm platfo Edition, John Wiley & Sons, Inc., New Jersey, 2014.
- V. Turner, J. F. Gantz, D. Reinsel, S. Minton, The Digital Universe of Op-portunities: Rich Data and the Increasing Value of the Internet of Things, IDC Analyze the Future.
- Google, Google Cloud Storage (2016).
- Amazon, Amazon S3 Cloud Storge (2016).
- Dropbox, Dropbox Cloud Storage (2016).
- Red Hat, Ceph Storage (2016).
- G. community, GlusterFS Storage (2016).
- Quobyte Inc, XtreemFS Storage (2016).
- IBM, IBM Storage (2016).
- HPE, HPE Storage (2016).
- Microsoft, Microsoft Storage (2016).
- D. Vellante, What is Federated Storage? (2010).
- Hewlett Packard Enterprise, HPE 3PAR Peer Motion Software (2015).
- D. Yang, and C. Ren, "VCSS: An Integration Framework for Open Cloud Stor-age Services," in Proc. of IEEE 10th World Congress on Services (2014), pp.155- 160, 2014.
- G. Vernik, A. Shulman-Peleg, S. Dippl, C. Formisano, M. C. Jaeger, E. K. Kolodner, M. Villari, "Data On-boarding in federated storage clouds," in Proc. of IEEE International Conference on Cloud Computing CLOUD (2013), pp.244-,2013.
- R. M. d. O. Libardi, S. Reiff-Marganiec, L. H. Nunes, L. J. Adami, C. H. Ferreira, J. C. Estrella, and et al, "MSSF: User-Friendly Multi-Cloud Data Dispersal," in Proc. of 2015 IEEE 8th International Conference on Cloud Computing, pp.341-348, 2015.
- P. Janviriya, T. Ongarjithichai, P. Numruktrakul, C. Ragkhitwetsagul, "CloudyDays: Cloud storage integration system," in Proc. of Proceedings of the 2014 3rd ICT International Senior Project Conference ICT-ISPC 2014, pp.125-128, 2014.
- R. Zhao, C. Yue, B. Tak, C. Tang, "SafeSky: A Secure Cloud Storage Middleware for End-User Applications," in Proc. of 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), pp. 21- 30, 2015.
- S. Shah, A. Nair, U. Thakar, "A framework to integrate multiple cloud storage services and provide consistent feature set," in Proc. of 2014 Annual IEEE India Conference (INDICON), IEEE, pp.1-5, 2014.
- M. Malensek, S. Pallickara, S. Pallickara, "Autonomous Cloud Federation for High- Throughput Queries over Voluminous Datasets," IEEE CLOUD COMPUTING, IEEE, vol.3, No. 3, pp.40-49, 2016. https://doi.org/10.1109/MCC.2016.65
- C. Esposito, M. Ficco, F. Palmieri, A. Castiglione, "Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory," IEEE Transactions on Computers X (c) (2015), pp.2348-2362, 2016.
- C. W. Chang, P. Liu, J. J. Wu, "Probability-based cloud storage providers selection algorithms with maximum availability," in Proc. of Proceedings of the International Conference on Parallel Processing (2012), pp.199-208, 2012.
- H. Hong Tao, W. Yan Ke, C. Cao Bingyao, Yu Fei, Y. Wu Yating, "A dynamic data allocation method with improved load-balancing for cloud storage system," in Proc. of IET International Conference on Smart and Sustain-able City 2013 (ICSSC 2013), pp. 183-188, 2013.
- H. Nakazato, M. Nishio, M. Fujiwara, "Data allocation method considering server performance and data access frequency with consistent hashing," in Proc. of 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS) IEEE 2012, pp. 1-8, 2012.
- W. Xie, J. Zhou, M. Reyes, J. Noble, Y. Chen, "Two-mode data distribution scheme for heterogeneous storage in data centers," in Proc. of 2015 IEEE International Conference on Big Data (Big Data) IEEE 2015, pp.327-332, 2015.
- D. Jayathilake, "Towards structured log analysis," in Proc. of JCSSE 2012 - 9th Inter-national Joint Conference on Computer Science and Software Engineering (2012), 259-264, 2012.
- M. Moh, S. Pininti, S. Doddapaneni, T.-S. Moh, "Detecting Web Attacks Using Multi-Stage Log Analysis," in Proc. of 2016 IEEE 6th International Conference on Advanced Computing (IACC) (2016), pp.733-738, 2016.
- D. Grech, P. Clough, "Investigating Cluster Stability when Analyzing Transaction Logs," in Proc. of 2016 IEEE/ACM Joint Conference on Digital Libraries (JCDL) (2016), pp.115-118, 2016.
- H. Chen, S. Tu, C. Zhao, H. Yongfeng, "Provenance Cloud Security Auditing System Based on Log Analysis," in Proc. of 2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS) (2016), pp.155-159, 2016.
- A. Hamzehei, R. K. Wong, E. Mohammad, F. Chen, E. ShafieiBavani, "Scalable Sentiment Analysis for Microblogs based on Semantic Scoring," in Proc. of 2015 IEEE International Conference on Services Computing Scalable (2015), pp.271-278, 2015.
- OAuth 2.0 protocol (2016).
- T. Dietterich, "Machine Learning," McGraw-Hill Science/Engineering/Math, vol. 28, No.4, 1996.
- Microsoft, Dynamic Expressions (2016).
- Microsoft, Dynamic Expressions Operators (2016).
- N. Iscoe, G. Williams, G. Arango, "Domain modeling for software engineering," in Proc. of [1991 Proceedings] 13th International Conference on Software Engineering, IEEE Comput. Soc. Press, pp.340-343, 1991.
- T. Dykstra, R. Anderson, Getting Started with Entity Framework 6 Code First using MVC 5, 2014.
- Microsoft, Reflection Oriented Programing (2016).
- Microsoft, Task Parallelism (Task Parallel Library) (2016).
- E. BV, The Open Source Elastic Stack (2016).
- M. Greenacre, R. Primicerio, Measures of distance between samples: Euclidean, in: Multivariate Analysis of Ecological Data, pp. 47-59, 2013.
- R. Kohavi, P. Langley, Y. Yun, "The Utility of Feature Weighting in Nearest-Neighbor Algorithms," in Proc. of Proceedings of the Ninth European Conference on Machine Learning, pp.85-92, 1997.
- E. Marcus, S. Hal, Blueprints for High Availability, Second Edition, Robert Ipsen, Indiana, 2003.
- A. Smola, S. Vishwanathan, Introduction to Machine Learning, Cambridge university press, 2008.