{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:22:51Z","timestamp":1743052971543,"version":"3.40.3"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030162047"},{"type":"electronic","value":"9783030162054"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-16205-4_23","type":"book-chapter","created":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T05:01:59Z","timestamp":1553922119000},"page":"307-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Bi-objective Analysis of an Adaptive Secure Data Storage in a Multi-cloud"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0349-5144","authenticated-orcid":false,"given":"Esteban C.","family":"Lopez-Falcon","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1128-6660","authenticated-orcid":false,"given":"Vanessa","family":"Miranda-L\u00f3pez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5029-5212","authenticated-orcid":false,"given":"Andrei","family":"Tchernykh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7066-0061","authenticated-orcid":false,"given":"Mikhail","family":"Babenko","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0470-9944","authenticated-orcid":false,"given":"Arutyun","family":"Avetisyan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,31]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","unstructured":"Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), vol. 1, pp. 647\u2013651. IEEE (2012). https:\/\/doi.org\/10.1109\/ICCSEE.2012.193","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"23_CR2","volume-title":"Cloud Security: A Comprehensive Guide to Secure Cloud Computing","author":"RL Krutz","year":"2010","unstructured":"Krutz, R.L., Vines, R.D.: Cloud Security: A Comprehensive Guide to Secure Cloud Computing, 1st edn. Wiley, Hoboken (2010)","edition":"1"},{"key":"23_CR3","unstructured":"Gagnaire, M., et al.: Downtime statistics of current cloud solutions. International Working Group on Cloud Computing Resiliency, Technical report (2012)"},{"key":"23_CR4","unstructured":"IWGCR International Working Group on Cloud Computing Resiliency Homepage. http:\/\/iwgcr.org\/ . Accessed 1 Sept 2018"},{"key":"23_CR5","unstructured":"SecureList Homepage. https:\/\/securelist.com\/all\/?tag=53 . Accessed 3 Nov 2018"},{"key":"23_CR6","unstructured":"CloudHarmony Homepage. https:\/\/cloudharmony.com\/status-of-storage . Accessed 3 Nov 2018"},{"issue":"9","key":"23_CR7","doi-asserted-by":"publisher","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"56","author":"AG Dimakis","year":"2010","unstructured":"Dimakis, A.G., Godfrey, P.B., Wu, Y., Wainwright, M.J., Ramchandran, K.: Network coding for distributed storage systems. IEEE Trans. Inf. Theory 56(9), 4539\u20134551 (2010). https:\/\/doi.org\/10.1109\/TIT.2010.2054295","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127345.1127346","volume":"9","author":"G Ateniese","year":"2006","unstructured":"Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1\u201330 (2006). https:\/\/doi.org\/10.1145\/1127345.1127346","journal-title":"ACM Trans. Inf. Syst. Secur."},{"issue":"6","key":"23_CR9","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1016\/j.future.2008.12.001","volume":"25","author":"R Buyya","year":"2009","unstructured":"Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener. Comput. Syst. 25(6), 599\u2013616 (2009). https:\/\/doi.org\/10.1016\/j.future.2008.12.001","journal-title":"Future Gener. Comput. Syst."},{"key":"23_CR10","doi-asserted-by":"publisher","unstructured":"Ghemawat, S., Gobioff, H., Leung, S.-T.: The Google file system. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 29\u201343. ACM, New York (2003). https:\/\/doi.org\/10.1145\/1165389.945450","DOI":"10.1145\/1165389.945450"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Ganesan, A., Alagappan, R., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H.: Redundancy does not imply fault tolerance: analysis of distributed storage reactions to single errors and corruptions. In: Proceedings of the 15th Usenix Conference on File and Storage Technologies, pp. 149\u2013165. USENIX Association, Berkeley (2017)","DOI":"10.1145\/3125497"},{"issue":"4","key":"23_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2535929","volume":"9","author":"A Bessani","year":"2013","unstructured":"Bessani, A., Correia, M., Quaresma, B., Andr\u00e9, F., Sousa, P.: DepSky: dependable and secure storage in a cloud-of-clouds. ACM Trans. Storage 9(4), 12 (2013). https:\/\/doi.org\/10.1145\/2535929","journal-title":"ACM Trans. Storage"},{"key":"23_CR13","doi-asserted-by":"publisher","unstructured":"Abu-Libdeh, H., Princehouse, L., Weatherspoon, H.: RACS: a case for cloud storage diversity. In: Proceedings of the 1st ACM Symposium on Cloud computing, pp. 229\u2013240. ACM (2010). https:\/\/doi.org\/10.1145\/1807128.1807165","DOI":"10.1145\/1807128.1807165"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.future.2017.09.061","volume":"92","author":"N Chervyakov","year":"2019","unstructured":"Chervyakov, N., Babenko, M., Tchernykh, A., Kucherov, N., Miranda-L\u00f3pez, V., Cort\u00e9s-Mendoza, J.M.: AR-RRNS: configurable, scalable and reliable systems for Internet of Things to ensure security. Future Gener. Comput. Syst. 92, 1080\u20131092 (2019). https:\/\/doi.org\/10.1016\/j.future.2017.09.061","journal-title":"Future Gener. Comput. Syst."},{"issue":"3","key":"23_CR15","first-page":"177","volume":"1","author":"S Marium","year":"2012","unstructured":"Marium, S., Nazir, Q., Shaikh, A.A., Ahthasham, S., Mehmood, M.A.: Implementation of EAP with RSA for enhancing the security of cloud computing. Int. J. Basic Appl. Sci. 1(3), 177\u2013183 (2012)","journal-title":"Int. J. Basic Appl. Sci."},{"key":"23_CR16","doi-asserted-by":"publisher","unstructured":"Rathanam, G.J., Sumalatha, M.R.: Dynamic secure storage system in cloud services. In: 2014 International Conference on Recent Trends in Information Technology (ICRTIT), pp. 1\u20135. IEEE (2014). https:\/\/doi.org\/10.1109\/ICRTIT.2014.6996175","DOI":"10.1109\/ICRTIT.2014.6996175"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Babitha, M.P., Babu, K.R.R.: Secure cloud storage using AES encryption. In: International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, pp. 859\u2013864 (2016)","DOI":"10.1109\/ICACDOT.2016.7877709"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Tchernykh, A., et al.: Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage. Cluster Comput., 1\u201313 (2019). https:\/\/doi.org\/10.1007\/s10586-018-02896-9","DOI":"10.1007\/s10586-018-02896-9"},{"key":"23_CR19","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-319-73353-1_26","volume-title":"High Performance Computing","author":"V Miranda-L\u00f3pez","year":"2018","unstructured":"Miranda-L\u00f3pez, V., et al.: Experimental analysis of secret sharing schemes for cloud storage based on RNS. In: Mocskos, E., Nesmachnow, S. (eds.) CARLA 2017. CCIS, vol. 796, pp. 370\u2013383. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-73353-1_26"},{"key":"23_CR20","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: Foundations of Secure Computation, pp. 169\u2013177. Academic Press (1978)"},{"key":"23_CR21","unstructured":"Gentry, C.: A fully homomorphic encryption scheme (2009)"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.ijar.2018.07.010","volume":"102","author":"A Tchernykh","year":"2018","unstructured":"Tchernykh, A., et al.: AC-RRNS: anti-collusion secured data sharing scheme for cloud storage. Int. J. Approx. Reason. 102, 60\u201373 (2018). https:\/\/doi.org\/10.1016\/j.ijar.2018.07.010","journal-title":"Int. J. Approx. Reason."},{"key":"23_CR23","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.jnca.2014.09.021","volume":"59","author":"A Celesti","year":"2016","unstructured":"Celesti, A., Fazio, M., Villari, M., Puliafito, A.: Adding long-term availability, obfuscation, and encryption to multi-cloud storage systems. J. Netw. Comput. Appl. 59, 208\u2013218 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2014.09.021","journal-title":"J. Netw. Comput. Appl."},{"key":"23_CR24","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCAS.2015.2484118","volume":"15","author":"CH Chang","year":"2015","unstructured":"Chang, C.H., Molahosseini, A.S., Zarandi, A.A.E., Tay, T.F.: Residue number systems: a new paradigm to datapath optimization for low-power and high-performance digital signal processing applications. IEEE Circ. Syst. Mag. 15, 26\u201344 (2015). https:\/\/doi.org\/10.1109\/MCAS.2015.2484118","journal-title":"IEEE Circ. Syst. Mag."},{"key":"23_CR25","doi-asserted-by":"publisher","unstructured":"Tchernykh, A., Schwiegelsohn, U., Talbi, E., Babenko, M.: Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability. J. Comput. Sci. (2016). https:\/\/doi.org\/10.1016\/j.jocs.2016.11.011","DOI":"10.1016\/j.jocs.2016.11.011"},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"1772","DOI":"10.1016\/j.procs.2015.05.387","volume":"51","author":"A Tchernykh","year":"2015","unstructured":"Tchernykh, A., Schwiegelsohn, U., Alexandrov, V., Talbi, E.: Towards understanding uncertainty in cloud computing resource provisioning. Procedia Comput. Sci. 51, 1772\u20131781 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.05.387","journal-title":"Procedia Comput. Sci."},{"key":"23_CR27","doi-asserted-by":"publisher","unstructured":"Tchernykh, A., et al.: Towards mitigating uncertainty of data security breaches and collusion in cloud computing. In: Proceedings of UCC 2017, Lyon, France, pp. 137\u2013141. IEEE Press (2017). https:\/\/doi.org\/10.1109\/DEXA.2017.44","DOI":"10.1109\/DEXA.2017.44"},{"key":"23_CR28","unstructured":"Egnyte. https:\/\/www.egnyte.com\/file-access\/desktop-access.html . Accessed 15 Feb 2018"},{"key":"23_CR29","doi-asserted-by":"publisher","unstructured":"Drago, I., Mellia, M., Munafo, M.M., Sperotto, A., Sadre, R., Pras, A.: Inside dropbox: understanding personal cloud storage services. In: Proceedings of the 2012 Internet Measurement Conference, pp. 481\u2013494. ACM (2012). https:\/\/doi.org\/10.1145\/2398776.2398827","DOI":"10.1145\/2398776.2398827"},{"key":"23_CR30","unstructured":"OneDrive. https:\/\/onedrive.live.com\/about\/en-us\/ . Accessed 15 Feb 2018"},{"key":"23_CR31","unstructured":"GoogleDrive. https:\/\/www.google.com\/intl\/en_us\/drive\/ . Accessed 15 Feb 2018"},{"key":"23_CR32","unstructured":"Box. https:\/\/www.box.com\/home . Accessed 10 Jan 2018"},{"key":"23_CR33","unstructured":"ShareFile. https:\/\/www.citrix.com\/products\/sharefile\/ . Accessed 10 Jan 2018"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"SalesForce. https:\/\/www.salesforce.com\/eu\/products\/what-is-salesforce\/ . Accessed 15 Feb 2018","DOI":"10.1007\/978-1-4842-5473-8_2"},{"key":"23_CR35","unstructured":"Google Drive API. https:\/\/developers.google.com\/api-client-library\/java\/apis\/drive\/v2"},{"key":"23_CR36","unstructured":"Dropbox API. https:\/\/www.dropbox.com\/developers\/documentation\/java"},{"key":"23_CR37","unstructured":"Box API. http:\/\/opensource.box.com\/box-java-sdk\/"},{"key":"23_CR38","unstructured":"Sharefile API. https:\/\/api.sharefile.com\/rest\/"},{"key":"23_CR39","unstructured":"OneDrive API. https:\/\/docs.microsoft.com\/en-us\/onedrive\/developer\/rest-api\/"},{"key":"23_CR40","unstructured":"Egnyte API. https:\/\/developers.egnyte.com\/docs\/read\/Home"},{"key":"23_CR41","unstructured":"Salesforce API. https:\/\/developer.salesforce.com\/page\/REST_API"},{"key":"23_CR42","unstructured":"Apache HttpClient. https:\/\/hc.apache.org"},{"key":"23_CR43","unstructured":"CloudHarmony. https:\/\/www.networkworld.com\/article\/3020235\/cloud-computing\/and-the-cloud-provider-with-the-best-uptime-in-2015-is.html"}],"container-title":["Communications in Computer and Information Science","High Performance Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-16205-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,14]],"date-time":"2022-09-14T21:39:39Z","timestamp":1663191579000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-16205-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030162047","9783030162054"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-16205-4_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"31 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CARLA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Latin American High Performance Computing Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bucaramanga","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"carla2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/carla2018.ccarla.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}