dc.creatorJagdish, Mukta
dc.creatoramelec, viloria
dc.creatorVargas Villa, Jesus Eduardo
dc.creatorPineda, Omar
dc.creatorOvallos, David
dc.date2021-03-02T21:41:39Z
dc.date2021-03-02T21:41:39Z
dc.date2020-12-04
dc.date.accessioned2023-10-03T19:13:18Z
dc.date.available2023-10-03T19:13:18Z
dc.identifier18758967
dc.identifier10641246
dc.identifierhttps://hdl.handle.net/11323/7952
dc.identifier10.3233/JIFS-189172
dc.identifierCorporación Universidad de la Costa
dc.identifierREDICUC - Repositorio CUC
dc.identifierhttps://repositorio.cuc.edu.co/
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/9169006
dc.descriptionCloud-based computation is known as the source architecture of the upcoming generation of IT enterprise. In context to up-coming trade solutions, the Information Technology sections are established under logical, personnel, and physical control, it transfers application software and large database to appropriate data centers, where security and management of database with services are not trustworthy fully. So this process may face many challenges towards society and organizations and that not been well understood over a while duration. This becomes one of the major challenges days today. So in this research, it focuses on security-based data storage using cloud, which plays one of the important aspects bases on qualities of services. To assure user data correctness in the cloud system, a flexible and effective distributed technique with two different salient features was examined by utilizing the token called homomorphic with erasure-coded data for distributed verification, based on this technique it achieved error data localization and integration of storage correctness. Also, it identifies server misbehaving, efficient, and security-based dynamic operations on data blocking such as data append, delete, and update methods. Performance analysis and security show the proposed method is more effective resilient and efficient against Byzantine failure, even server colluding attacks and malicious data modification attacks.
dc.formatapplication/pdf
dc.formatapplication/pdf
dc.languageeng
dc.publisherCorporación Universidad de la Costa
dc.rightsCC0 1.0 Universal
dc.rightshttp://creativecommons.org/publicdomain/zero/1.0/
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightshttp://purl.org/coar/access_right/c_abf2
dc.sourceJournal of Intelligent & Fuzzy Systems
dc.sourcehttps://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs189172
dc.subjectCloud security
dc.subjectArchitecture design
dc.subjectData storage
dc.subjectHomomorphic token
dc.subjectDynamic operation
dc.titleModeling software architecture design on data storage security in cloud computing environments
dc.typeArtículo de revista
dc.typehttp://purl.org/coar/resource_type/c_6501
dc.typeText
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typehttp://purl.org/redcol/resource_type/ART
dc.typeinfo:eu-repo/semantics/acceptedVersion
dc.typehttp://purl.org/coar/version/c_ab4af688f83e57aa


Este ítem pertenece a la siguiente institución