{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:20Z","timestamp":1773615860863,"version":"3.50.1"},"reference-count":24,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080285","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"1056-1064","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cloud-Based Data Architecture Security"],"prefix":"10.3103","volume":"53","author":[{"given":"N. A.","family":"Semenov","sequence":"first","affiliation":[]},{"given":"A. A.","family":"Poltavtsev","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7218_CR1","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1109\/JSYST.2016.2574719","volume":"12","author":"Q. Jiang","year":"2018","unstructured":"Jiang, Q., Ma, J., and Wei, F., On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services, IEEE Syst. J., 2018, vol. 12, no. 2, pp. 2039\u20132042. https:\/\/doi.org\/10.1109\/JSYST.2016.2574719","journal-title":"IEEE Syst. J."},{"key":"7218_CR2","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1134\/S0040601516130073","volume":"63","author":"Y.S. Vasiliev","year":"2016","unstructured":"Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948\u2013956. https:\/\/doi.org\/10.1134\/S0040601516130073","journal-title":"Therm. Eng."},{"key":"7218_CR3","doi-asserted-by":"publisher","first-page":"947","DOI":"10.3103\/S014641161708003X","volume":"51","author":"E. Aleksandrova","year":"2017","unstructured":"Aleksandrova, E., Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947\u2013958.","journal-title":"Autom. Control Comput. Sci."},{"key":"7218_CR4","doi-asserted-by":"publisher","first-page":"739","DOI":"10.3103\/S0146411616080265","volume":"50","author":"E.B. Aleksandrova","year":"2016","unstructured":"Aleksandrova, E.B., Zegzhda, D.P., and Konoplev, A.S., Applying the group signature for entity authentication in distributed grid computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 739\u2013742. https:\/\/doi.org\/10.3103\/S0146411616080265","journal-title":"Autom. Control Comput. Sci."},{"issue":"2","key":"7218_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2979677","volume":"16","author":"Keke Gai","year":"2017","unstructured":"Keke Gai, Longfei Qiu, Min Chen, Hui Zhao, and Meikang Qiu, SA-EAST: Security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing, ACM Trans. Embedded Comput. Syst., 2017, vol.\u00a016, no. 2. https:\/\/doi.org\/10.1145\/2979677","journal-title":"ACM Transactions on Embedded Computing Systems"},{"key":"7218_CR6","unstructured":"Volkov, S.D., Tsaregorodtsev, A.V., and Tsatskina, E.P., Features of the construction of computer attack detection systems for information and telecommunication systems based on cloud computing technology, Ogarev-Online, 2017, no. 13."},{"key":"7218_CR7","doi-asserted-by":"publisher","first-page":"669","DOI":"10.3103\/S0146411616080101","volume":"50","author":"A.S. Konoplev","year":"2016","unstructured":"Konoplev, A.S. and Kalinin, M.O., Tasks of providing information security in distributed computing networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 669\u2013672. https:\/\/doi.org\/10.3103\/S0146411616080101","journal-title":"Autom. Control Comput. Sci."},{"key":"7218_CR8","doi-asserted-by":"publisher","first-page":"734","DOI":"10.3103\/S014641161608023X","volume":"50","author":"P.D. Zegzhda","year":"2016","unstructured":"Zegzhda, P.D. and Kalinin, M.O., Technology of security services virtualization for high-speed computer networks, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 734\u2013738.","journal-title":"Autom. Control Comput. Sci."},{"key":"7218_CR9","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2016.04.015","volume":"379","author":"Y. Zhang","year":"2017","unstructured":"Zhang, Y., Chen, X., Li, J., Wong, D.S., Li, H., and You, I., Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Inf. Sci., 2017, vol. 379, pp. 42\u201361.","journal-title":"Inf. Sci."},{"key":"7218_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.csi.2017.03.005","volume":"54","author":"Yong Yu","year":"2017","unstructured":"Yu, Y., Man, A.M., Au, H., and Susilo, W., Cloud computing security and privacy: Standards and regulations, Comput. Stand. Interfaces, 2017, vol. 54.","journal-title":"Computer Standards & Interfaces"},{"key":"7218_CR11","unstructured":"TOGAF(R) 9.2\u2014Phase C: Information Systems Architectures\u2014Data Architecture. http:\/\/pubs.opengroup.org\/ architecture\/togaf9-doc\/arch\/chap10.html."},{"key":"7218_CR12","doi-asserted-by":"crossref","unstructured":"Lewis, G., Comella-Dorda, S., Place, P., Plakosh, D., and Seacord, R., Enterprise Information System Data Architecture Guide, Carnegie Mellon University, 2001. https:\/\/resources.sei.cmu.edu\/asset_files\/TechnicalReport\/2001_005_001_13877.pdf.","DOI":"10.21236\/ADA399203"},{"key":"7218_CR13","doi-asserted-by":"publisher","first-page":"1039","DOI":"10.1016\/j.jclepro.2018.08.275","volume":"203","author":"R. Accorsi","year":"2018","unstructured":"Accorsi, R., Cholette, S., Manzini, R., and Tufano, A., A hierarchical data architecture for sustainable food supply chain management and planning, J. Cleaner Prod., 2018, vol. 203, pp. 1039\u20131054.","journal-title":"J. Cleaner Prod."},{"key":"7218_CR14","series-title":"Big data architecture for log data storage and analysis","volume-title":"Integrated Intelligent Computing, Communication and Security","author":"S. Mehta","year":"2018","unstructured":"Mehta, S., Kothuri, P., and Garcia, D.L., Big data architecture for log data storage and analysis, in Integrated Intelligent Computing, Communication and Security, Singapore: Springer, 2018."},{"key":"7218_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/MCOM.2018.1700231","volume":"56","author":"X. He","year":"2018","unstructured":"He, X., Wang, K., Huang, H., and Liu, B., QoE-driven big data architecture for smart city, IEEE Commun. Mag., 2018, vol. 56, no. 2, pp. 88\u201393. https:\/\/doi.org\/10.1109\/MCOM.2018.1700231","journal-title":"IEEE Commun. Mag."},{"key":"7218_CR16","doi-asserted-by":"publisher","unstructured":"Malik, M., Tabone, M., Chassin, D.P., Kara, E.C., Guha, R.V., and Kiliccote, S., A common data architecture for energy data analytics, 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), Dresden, 2017, pp. 417\u2013422. https:\/\/doi.org\/10.1109\/SmartGridComm.2017.8340736","DOI":"10.1109\/SmartGridComm.2017.8340736"},{"key":"7218_CR17","doi-asserted-by":"publisher","unstructured":"Lomotey, K., Pry, J., Sriramoju, S., Kaku, E., and Deters, R., Wearable IoT data architecture, 2017 IEEE World Congress on Services (SERVICES), Honolulu, 2017, pp. 44\u201350. https:\/\/doi.org\/10.1109\/SERVICES.2017.17","DOI":"10.1109\/SERVICES.2017.17"},{"key":"7218_CR18","volume-title":"Data Analysis for Network Cyber-Security","author":"N. Adams","year":"2004","unstructured":"Adams, N. and Heard, N., Data Analysis for Network Cyber-Security, Imperial College Press, 2004."},{"key":"7218_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K. Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., et al., An analysis of security issues for cloud computing, Internet Serv. Appl., 2013, vol. 4, no. 5, pp. 1\u201313. https:\/\/doi.org\/10.1186\/1869-0238-4-5","journal-title":"Internet Serv. Appl."},{"key":"7218_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/978-1-5225-2947-7.ch001","volume-title":"Exploring the Convergence of Big Data and the Internet of Things","author":"Marcus Tanque","year":"2018","unstructured":"Tanque, M. and Foxwell, H.J., Big data and cloud computing: A review of supply chain capabilities and challenges, in Exploring the Convergence of Big Data and the Internet of Things, 2018. https:\/\/doi.org\/10.4018\/978-1-5225-2947-7.ch001"},{"key":"7218_CR21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511844409","volume-title":"Data-Intensive Computing Architectures, Algorithms, and Applications","author":"I. Gorton","year":"2012","unstructured":"Gorton, I. and Gracio, D.K., Data-Intensive Computing Architectures, Algorithms, and Applications, Cambridge Press, 2012."},{"key":"7218_CR22","doi-asserted-by":"publisher","unstructured":"Poltavtseva, M.A., Evolution of data management systems and their security, 2019 International Conference on Engineering Technologies and Computer Science (EnT), Moscow, 2019, pp. 25\u201329. https:\/\/doi.org\/10.1109\/EnT.2019.00010","DOI":"10.1109\/EnT.2019.00010"},{"key":"7218_CR23","volume-title":"Database Systems: A Pragmatic Approach","author":"D. Elvis","year":"2016","unstructured":"Elvis, D. and Foster, C., Database Systems: A Pragmatic Approach, Apress, 2016."},{"key":"7218_CR24","unstructured":"Gaetani, E., Aniello, L., Baldoni, R., Lombardi, F., Margheri, A., and Sassone, V., Blockchain-based database to ensure data integrity in cloud computing environments, Italian Conference on Cybersecurity, Venice, 2017."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080285.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080285","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080285.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:43Z","timestamp":1773612343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080285"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":24,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7218"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080285","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"12 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}