{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:47:05Z","timestamp":1743155225053,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_5","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"111-131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Practicable Machine Learning Solution for Security-Cognizant Data Placement on Cloud Platforms"],"prefix":"10.1007","author":[{"given":"Rahul Vishwanath","family":"Kale","sequence":"first","affiliation":[]},{"given":"Bharadwaj","family":"Veeravalli","sequence":"additional","affiliation":[]},{"given":"Xiaoli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.cose.2015.11.003","volume":"57","author":"M S K Awan","year":"2016","unstructured":"Awan, M. S. K., Burnap, P., & Rana, O. (2016). Identifying cyber risk hotspots: A framework for measuring temporal variance in computer network risk. Computers & Security, 57, 31\u201346.","journal-title":"Computers & Security"},{"issue":"1","key":"5_CR2","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/s10586-014-0404-x","volume":"18","author":"D Boru","year":"2015","unstructured":"Boru, D., Kliazovich, D., Granelli, F., Bouvry, P., & Zomaya, A. Y. (2015). Energy-efficient data replication in cloud computing datacenters. Cluster Computing, 18(1), 385\u2013402.","journal-title":"Cluster Computing"},{"issue":"2","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1109\/COMST.2015.2494502","volume":"18","author":"A L Buczak","year":"2016","unstructured":"Buczak, A. L., & Guven, E. (2016). A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), 1153\u20131176.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5_CR4","first-page":"1","volume-title":"11th Iberian Conference on Information Systems and Technologies (CISTI), 2016","author":"G H G Silva da","year":"2016","unstructured":"da Silva, G. H. G., Holanda, M., & Araujo, A. (2016). Data replication policy in a cloud computing environment. In 11th Iberian Conference on Information Systems and Technologies (CISTI), 2016 (pp. 1\u20136). Piscataway: IEEE."},{"issue":"6","key":"5_CR5","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1109\/TDSC.2013.2295798","volume":"11","author":"S D C Vimercati di","year":"2014","unstructured":"di Vimercati, S. D. C., Foresti, S., Jajodia, S., Livraga, G., Paraboschi, S., & Samarati, P. (2014). Fragmentation in presence of data dependencies. IEEE Transactions on Dependable and Secure Computing, 11(6), 510\u2013523.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"5_CR6","first-page":"1","volume-title":"International Symposium on Networks, Computers and Communications (ISNCC), 2016","author":"E Hodo","year":"2016","unstructured":"Hodo, E., Bellekens, X., Hamilton, A., Dubouilh, P. L., Iorkyase, E., Tachtatzis, C., et al. (2016). Threat analysis of IoT networks using artificial neural network intrusion detection system. In International Symposium on Networks, Computers and Communications (ISNCC), 2016 (pp. 1\u20136). Piscataway: IEEE."},{"key":"5_CR7","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","volume":"40","author":"N Hoque","year":"2014","unstructured":"Hoque, N., Bhuyan, M. H., Baishya, R. C., Bhattacharyya, D. K., & Kalita, J. K. (2014). Network attacks: Taxonomy, tools and systems. Journal of Network and Computer Applications, 40, 307\u2013324.","journal-title":"Journal of Network and Computer Applications"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"2442","DOI":"10.1109\/BigData.2017.8258202","volume-title":"2017 IEEE International Conference on Big Data","author":"C J Hsu","year":"2017","unstructured":"Hsu, C. J., Freeh, V. W., & Villanustre, F. (2017). Trilogy: Data placement to improve performance and robustness of cloud computing. In 2017 IEEE International Conference on Big Data (pp. 2442\u20132451). Piscataway: IEEE."},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1108\/17427371311315743","volume":"9","author":"A Hudic","year":"2013","unstructured":"Hudic, A., Islam, S., Kieseberg, P., Rennert, S., & Weippl, E. R. (2013) Data confidentiality using fragmentation in cloud computing. International Journal of Pervasive Computing and Communications, 9(1), 37\u201351.","journal-title":"International Journal of Pervasive Computing and Communications"},{"key":"5_CR10","first-page":"514","volume-title":"IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 2017","author":"S Ikken","year":"2017","unstructured":"Ikken, S., Renault, \u00c9., Barkat, A., Tari, A., & Kechad, T. (2017). Cost-efficient big intermediate data placement in a collaborative cloud storage environment. In IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), 2017 (pp. 514\u2013521). Piscataway: IEEE."},{"key":"5_CR11","first-page":"392","volume-title":"International Conference on Frontier Computing","author":"RV Kale","year":"2017","unstructured":"Kale, R.V., Veeravalli, B., & Wang, X. (2017). Design and performance characterization of practically realizable graph-based security aware algorithms for hierarchical and non-hierarchical cloud architectures. In International Conference on Frontier Computing (pp. 392\u2013402). Singapore: Springer,"},{"key":"5_CR12","first-page":"1","volume-title":"International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), 2015","author":"K Kapusta","year":"2015","unstructured":"Kapusta, K., & Memmi, G. (2015). Data protection by means of fragmentation in distributed storage systems. In International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), 2015 (pp. 1\u20138). Piscataway: IEEE."},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/IEEE.ICCC.2017.16","volume-title":"IEEE International Conference on Cognitive Computing (ICCC), 2017","author":"H Khalajzadeh","year":"2017","unstructured":"Khalajzadeh, H., Yuan, D., Grundy, J., & Yang, Y. (2017). Cost-effective social network data placement and replication using graph-partitioning. In IEEE International Conference on Cognitive Computing (ICCC), 2017 (pp. 64\u201371). Piscataway: IEEE."},{"key":"5_CR14","first-page":"560","volume-title":"International Conference on Emerging Internetworking, Data & Web Technologies","author":"S Lentini","year":"2018","unstructured":"Lentini, S., Grosso, E., & Masala, G. L. (2018). A comparison of data fragmentation techniques in cloud servers. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 560\u2013571). Cham: Springer."},{"issue":"5","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TC.2015.2470247","volume":"65","author":"Y Li","year":"2016","unstructured":"Li, Y., Dai, W., Ming, Z., & Qiu, M. (2016). Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers, 65(5), 1339\u20131350.","journal-title":"IEEE Transactions on Computers"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TCC.2013.1","volume":"1","author":"J W Lin","year":"2013","unstructured":"Lin, J. W., Chen, C. H., & Chang, J. M. (2013). QoS-aware data replication for data-intensive applications in cloud computing systems. IEEE Transactions on Cloud Computing, 1(1), 101\u2013115.","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"2","key":"5_CR17","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10115-014-0755-x","volume":"41","author":"W Liu","year":"2014","unstructured":"Liu, W., Peng, S., Du, W., Wang, W., & Zeng, G. S. (2014). Security-aware intermediate data placement strategy in scientific cloud workflows. Knowledge and Information Systems, 41(2), 423\u2013447.","journal-title":"Knowledge and Information Systems"},{"issue":"3","key":"5_CR18","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1007\/s10586-016-0576-7","volume":"19","author":"N Mansouri","year":"2016","unstructured":"Mansouri, N. (2016). QDR: A QoS-aware data replication algorithm for data grids considering security factors. Cluster Computing, 19(3), 1071\u20131087.","journal-title":"Cluster Computing"},{"issue":"6","key":"5_CR19","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/3136623","volume":"50","author":"Y Mansouri","year":"2017","unstructured":"Mansouri, Y., Toosi, A. N., & Buyya, R. (2017). Data storage management in cloud environments: Taxonomy, survey, and future directions. ACM Computing Surveys (CSUR), 50(6), 91.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/SOCA.2017.30","volume-title":"IEEE 10th International Conference on Service-Oriented Computing and Applications (SOCA), 2017","author":"J Matt","year":"2017","unstructured":"Matt, J., Waibel, P., & Schulte, S. (2017). Cost-and latency-efficient redundant data storage in the cloud. In IEEE 10th International Conference on Service-Oriented Computing and Applications (SOCA), 2017 (pp. 164\u2013172). Piscataway: IEEE."},{"key":"5_CR21","unstructured":"Oh, K., Chandra, A., & Weissman, J. (2017). Trips: Automated multi-tiered data placement in a geo-distributed cloud environment. In Proceedings of the 10th ACM International Systems and Storage Conference (p. 12). New York: ACM."},{"key":"5_CR22","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.neucom.2015.04.101","volume":"172","author":"A Saied","year":"2016","unstructured":"Saied, A., Overill, R. E., & Radzik, T. (2016). Detection of known and unknown DDoS attacks using artificial neural networks. Neurocomputing, 172, 385\u2013393.","journal-title":"Neurocomputing"},{"issue":"3","key":"5_CR23","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/TEVC.2015.2459718","volume":"20","author":"H Seada","year":"2016","unstructured":"Seada, H., & Deb, K. (2016). A unified evolutionary optimization procedure for single, multiple, and many objectives. IEEE Transactions on Evolutionary Computation, 20(3), 358\u2013369.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/TSC.2016.2544307","volume":"10","author":"A Sen","year":"2016","unstructured":"Sen, A., & Madria, S. (2016). Risk assessment in a sensor cloud framework using attack graphs. IEEE Transactions on Services Computing, 10, 942\u2013955.","journal-title":"IEEE Transactions on Services Computing"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Wang, X., Vishwanath, K. R., & Veeravalli, B. (2017). Simultaneous optimization of user-centric security-conscious data storage on cloud platforms. In IEEE 42nd Local Computer Networks (LCN) (pp. 223\u2013226).","DOI":"10.1109\/LCN.2017.21"},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MCOM.2017.1600267CM","volume":"55","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., & Shen, X. S. (2017). Security and privacy in smart city applications: Challenges and solutions. IEEE Communications Magazine, 55(1), 122\u2013129.","journal-title":"IEEE Communications Magazine"},{"issue":"6","key":"5_CR27","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang, Q., & Li, H. (2007). Moea\/d: A multiobjective evolutionary algorithm based on decomposition. IEEE Transactions on Evolutionary Computation, 11(6), 712\u2013731.","journal-title":"IEEE Transactions on Evolutionary Computation"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T22:14:33Z","timestamp":1577830473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_5","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}