{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:48Z","timestamp":1730209908879,"version":"3.28.0"},"reference-count":91,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/conielecomp.2019.8673249","type":"proceedings-article","created":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T19:16:17Z","timestamp":1553541377000},"page":"47-54","source":"Crossref","is-referenced-by-count":9,"title":["Application of data fragmentation and replication methods in the cloud: a review"],"prefix":"10.1109","author":[{"given":"Felipe","family":"Castro-Medina","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lisbeth","family":"Rodriguez-Mazahua","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maria Antonieta","family":"Abud-Figueroa","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Celia","family":"Romero-Torres","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Luis Angel","family":"Reyes-Hernandez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Giner","family":"Alor-Hernandez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw041"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/782174"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6856-1_3"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11056-1_17"},{"key":"ref76","first-page":"526","article-title":"New mechanism for Cloud Computing Storage Security","volume":"7","author":"el mrabti","year":"2016","journal-title":"International Journal of Advanced Computer Science and Applications(IJACSA)"},{"key":"ref77","first-page":"977","article-title":"Secure and Efficient Data Storage in Multi-clouds","volume":"3","author":"khandelwal","year":"2013","journal-title":"International Journal of Information and Computation Technology"},{"key":"ref74","first-page":"1","article-title":"Fault Tolerance On Binary Vote Assignment Cloud Quorum (BVACQ) Replication Technique","author":"noraziah","year":"0"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.12.002"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.490-491.1342"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2017.06.001"},{"key":"ref78","first-page":"251","article-title":"Secure Replication management in cloud storage","volume":"3","author":"singh","year":"2014","journal-title":"International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)"},{"key":"ref79","first-page":"429","article-title":"A Metadata Based Storage Model for Securing Data in Cloud Environment","year":"2011","journal-title":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery Beijing"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.future.2016.05.016","article-title":"A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers","volume":"65","author":"kaur","year":"2016","journal-title":"Future Generation Computer Systems"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.08.019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.02.005"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258202"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2016.12.001"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1019","DOI":"10.1016\/j.compeleceng.2018.01.022","article-title":"Data allocation optimization for query processing in graph databases using Lucene","volume":"70","author":"brigit","year":"2018","journal-title":"Computers & Electrical Engineering"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2017.e00487"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.05.027"},{"key":"ref60","first-page":"23","article-title":"Distributed Database Management Systems: Architectural Design Choices for the Cloud","volume":"7","author":"mohammad","year":"2014","journal-title":"Cloud Computing"},{"key":"ref62","first-page":"67","article-title":"Dynamic Distributed Database over Cloud Environment","volume":"488","author":"abdel","year":"2014","journal-title":"AMLTA 2014 Advanced Machine Learning Technologies and Application"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44270-9_5"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06773-5_73"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2013.34"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27140-8_46"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2015.7255217"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1007\/978-3-319-03889-6_3","article-title":"Optimization of Tasks Scheduling by an Efficacy Data Placement and Replication in Cloud Computing","volume":"8286","author":"insaf","year":"2013","journal-title":"ICA3PP 2013 Algorithms and Architectures for Parallel Processing"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49214-7_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2017.24"},{"key":"ref67","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/s10619-015-7173-2","article-title":"Performance analysis of data intensive cloud systems based on data management and replication: a survey","volume":"34","author":"rehman","year":"2016","journal-title":"Distributed and Parallel Databases"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41030-7_23"},{"key":"ref69","first-page":"1","article-title":"Scalable transactions in cloud data stores","volume":"4","author":"ahirrao","year":"2015","journal-title":"Journal of cloud computing"},{"key":"ref2","first-page":"1","article-title":"Data confidentiality using fragmentation in cloud computing","volume":"1","author":"hudic","year":"2012","journal-title":"Int J Communication Networks and Distributed Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCCT.2016.7831698"},{"key":"ref20","first-page":"671","article-title":"Efficient privacy-preserving multi-keyword ranked search utilizing document replication and partition","author":"tseng","year":"0","journal-title":"2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2015.7335304"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2014.1225"},{"key":"ref24","first-page":"834","article-title":"Placement of SaaS cloud data and dynamically access scheduling strategy","author":"hou","year":"2013","journal-title":"2013 8th International Conference on Computer Science & Education"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726816"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0043"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOM.2017.47"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.09.005"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45761-0_3"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-016-0039-y"},{"journal-title":"MySql","year":"2018","key":"ref90"},{"key":"ref59","first-page":"1","article-title":"Data management in cloud environments: NoSQL and NewSQL data stores","volume":"2","author":"grolinger","year":"2013","journal-title":"Journal of cloud computing"},{"key":"ref58","first-page":"1","article-title":"Clustering-based fragmentation and data replication for flexible query answering in distributed databases","volume":"3","author":"wiese","year":"2014","journal-title":"Journal of cloud computing"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-48308-5_28"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1313-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-5182-6"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64468-4_14"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-011-0717-y"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2427-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3147213.3147221"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3105831.3105873"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.028"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2806777.2806844"},{"key":"ref13","first-page":"1","article-title":"Support-based replication algorithm for cloud storage systems","author":"abdul","year":"2014","journal-title":"Proceedings of the 7th ACM India Computing Conference Nagpur IN"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.23"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840932"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2445583.2445588"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2715662"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-010-7068-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCUBEA.2016.7859985"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.62"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2400460"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20424-6_16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6969033"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33666-9_8"},{"journal-title":"UWE &#x2013; UML-based Web Engineering","year":"2018","key":"ref89"},{"key":"ref4","first-page":"146","article-title":"An Enhanced CRUD For Vertical Fragmentation Allocation And Replication Over The Cloud Environment","author":"abdel","year":"2016","journal-title":"INFOS '16 Proceedings of the 10th International Conference on Informatics and Systems Giza EG"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-012-1221-4"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3036290.3036321"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2556685"},{"key":"ref85","first-page":"1","article-title":"On Verifying Dynamic Multiple Data Copies over Cloud Servers","volume":"2011","author":"barsoum","year":"2011","journal-title":"International Association for Cryptologic Research Cryptology ePrint Archive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3152723.3152742"},{"journal-title":"JavaServer Faces Technology","year":"2018","key":"ref86"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196935"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.012"},{"journal-title":"Cloud computing with Amazon Web Services","year":"2018","key":"ref87"},{"journal-title":"Netbeans IDE","year":"2018","key":"ref88"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2628194.2628214"},{"key":"ref46","first-page":"1","article-title":"Partition based clustering of large datasets using MapReduce framework: An analysis of recent themes and directions","volume":"20","author":"habib","year":"2018","journal-title":"Future Computing and Informatics Journal"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2016.11.006"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.11.024"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.06.012"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2013.11.012"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.04.043"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.06.010"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.07.007"}],"event":{"name":"2019 International Conference on Electronics, Communications and Computers (CONIELECOMP)","start":{"date-parts":[[2019,2,27]]},"location":"Cholula, Mexico","end":{"date-parts":[[2019,3,1]]}},"container-title":["2019 International Conference on Electronics, Communications and Computers (CONIELECOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8671596\/8673069\/08673249.pdf?arnumber=8673249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,14]],"date-time":"2022-07-14T23:07:36Z","timestamp":1657840056000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8673249\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/conielecomp.2019.8673249","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}