{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:35:52Z","timestamp":1777703752045,"version":"3.51.4"},"reference-count":24,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2018,7,4]],"date-time":"2018-07-04T00:00:00Z","timestamp":1530662400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,7,27]]},"abstract":"<jats:p>Replication technology is one of the most effective measure to improve the cloud data availability and reduce the response time, by put multiple copies on different data centers in the cloud. However, traditional replica placement strategies mainly focused on the performance improvement, such as transfer time reduction, load balancing and so on, with little attention to their safety storage, which inevitably result in new security risks towards replicas\u2019 correct access. Aimed to develop an intelligent solution to enhance the cloud storage system performance, we apply fuzzy comprehensive evaluation to candidate data centers, evaluating its security risk level as replica placements, therefore improve the quality of cloud storage system. First, a novel five-dimensional security model for replica placement is proposed. Then, a security-aware replica placement evaluation algorithm is designed and implemented based on fuzzy set and entropy weight theory to establish a fusion of multiple factors of assessment model. Through comparing the experiment results with the outcome of the different strategies, we can see that data replica availability probability of the proposed strategy is up to 85% and less wait latency can be achieved, indicating the better effectiveness and practicality.<\/jats:p>","DOI":"10.3233\/jifs-169584","type":"journal-article","created":{"date-parts":[[2018,7,6]],"date-time":"2018-07-06T11:58:26Z","timestamp":1530878306000},"page":"243-255","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["A security-aware data replica placement strategy based on fuzzy evaluation in the cloud"],"prefix":"10.1177","volume":"35","author":[{"given":"Wu","family":"Xiuguo","sequence":"first","affiliation":[{"name":"School of Management Science and Engineering, Shandong University of Finance and Economics, Jinan, China"}]}],"member":"179","published-online":{"date-parts":[[2018,7,4]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"91","article-title":"Performance analysis of afile catalog for the LHC computing grid","author":"Baud J.P.","year":"2005","unstructured":"BaudJ.P., CaseyJ., LemaitreS., Performance analysis of afile catalog for the LHC computing grid, Proceedings IEEEInternational Symposium IEEE Computer Society (2005), pp. 91\u201399.","journal-title":"Proceedings IEEEInternational Symposium IEEE Computer Society"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2006.09.006"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","unstructured":"VashishtP. and SharmaA. Decentralized P2P Grid ResourcesDiscovery model in LC-Trie structured overlay Proceedings of International Conference on Parallel Distributed and GridComputing (2010) pp. 330\u2013333.","DOI":"10.1109\/PDGC.2010.5679978"},{"issue":"2","key":"e_1_3_2_5_2","first-page":"362","article-title":"Privacy-preserving publicauditing for secure cloud storage","volume":"62","author":"Wang C.","year":"2013","unstructured":"WangC., ChowS.S.M., WangQ., Privacy-preserving publicauditing for secure cloud storage, IEEE Transactions onComputers62(2) (2013), 362\u2013375.","journal-title":"IEEE Transactions onComputers"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2011.12.018"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2764465"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169168"},{"issue":"9","key":"e_1_3_2_9_2","first-page":"3276","article-title":"A noveldata authentication and monitoring, approach over cloud","volume":"4","author":"Satyavathi B.S.L.","year":"2013","unstructured":"SatyavathiB.S.L.DeviM.VamsiKrishna and SrinivasB., A noveldata authentication and monitoring, approach over cloud, International Journal of Engineering Trends & Technology4(9) (2013), 3276\u20133279.","journal-title":"International Journal of Engineering Trends & Technology"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"AtenieseG. BurnsR. CurtmolaR. Provable data possessionat untrusted stores Proceedings of ACM Conference on Computerand Communications Security ACM (2007) pp. 598\u2013609.","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_11_2","unstructured":"ShahM.A. SwaminathanR. and BakerM. Privacy-preserving audit andextraction of digital contents PasosRevista De Turismo Y Patrimonio Cultural2008 (2009) 477\u2013494."},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","unstructured":"WangQ. WangC. LiJ. Enabling public verifiability anddata dynamics for storage security in cloud computing Proceedings of European Conference on Research in Computer Security Springer-Verlag (2009) pp. 355\u2013370.","DOI":"10.1007\/978-3-642-04444-1_22"},{"issue":"5","key":"e_1_3_2_13_2","first-page":"337","article-title":"Secure auditing and deduplications data in cloud using fuzzy techniques","volume":"3","author":"Nagaraj V.","year":"2016","unstructured":"NagarajV., SasirekaG. and MangaiyarkarasiS., Secure auditing and deduplications data in cloud using fuzzy techniques, International Journal of Emerging Trends in Science and Technology3(5) (2016), 337\u2013342.","journal-title":"International Journal of Emerging Trends in Science and Technology"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.11648\/j.ajam.20160405.11"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2016.05.280"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2338324"},{"issue":"7","key":"e_1_3_2_17_2","first-page":"1261","article-title":"Proposingcloud storage using fuzzy authorization","volume":"3","author":"Jeyageetha V.","year":"2016","unstructured":"JeyageethaV., MownikaP., SerakhaP. and PriyaS.S., Proposingcloud storage using fuzzy authorization, International Journal For Technological Research In Engineering3(7) (2016), 1261\u20131265.","journal-title":"International Journal For Technological Research In Engineering"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.049"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0367-0"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.832944"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12035-0_25"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408793"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1002\/cplx.20317"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","unstructured":"YangY. LiuK. ChenJ. An Algorithm in SwinDeW-C for Scheduling Transaction-Intensive Cost-Constrained Cloud Workflows Proceedings of IEEE Fourth International Conference on Escience (2008) pp. 374\u2013375.","DOI":"10.1109\/eScience.2008.93"},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","unstructured":"YuanD. YangY. LiuX. Local-optimizations based strategy for cost-effective datasets storage of scientific applications inthe cloud Proceedings of IEEE International Conference on Cloud Computing (CLOUD) (2011) pp. 179\u2013186.","DOI":"10.1109\/CLOUD.2011.13"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169584","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169584","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:39:28Z","timestamp":1777455568000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,4]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,7,27]]}},"alternative-id":["10.3233\/JIFS-169584"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169584","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,4]]}}}