Beyond proofs of data possession: Finding defective blocks in outsourced storage | IEEE Conference Publication | IEEE Xplore