Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special section: Recent trends, Challenges and Applications in Cognitive Computing for Intelligent Systems
Guest editors: Vijayakumar Varadarajan, Piet Kommers, Vincenzo Piuri and V. Subramaniyaswamy
Article type: Research Article
Authors: Jagdish, Muktaa | Viloria, Amelecb; * | Vargas, Jesusb | Pineda Lezama, Omar Bonergec | Ovallos-Gazabon, Davidd
Affiliations: [a] Mahatma Gandhi Government College, Mayabunder, North and Middle Andaman, Andaman and Nicobar Islands, India | [b] Universidad de la Costa, Barranquilla, Colombia | [c] Universidad Tecnológica, San Pedro Sula, Honduras | [d] Universidad Simon Bolivar, Barranquilla, Colombia
Correspondence: [*] Corresponding author. Amelec Viloria, Universidad de la Costa, Barranquilla, Colombia. E-mail: [email protected].
Abstract: Cloud-based computation is known as the source architecture of the upcoming generation of IT enterprise. In context to up-coming trade solutions, the Information Technology sections are established under logical, personnel, and physical control, it transfers application software and large database to appropriate data centers, where security and management of database with services are not trustworthy fully. So this process may face many challenges towards society and organizations and that not been well understood over a while duration. This becomes one of the major challenges days today. So in this research, it focuses on security-based data storage using cloud, which plays one of the important aspects bases on qualities of services. To assure user data correctness in the cloud system, a flexible and effective distributed technique with two different salient features was examined by utilizing the token called homomorphic with erasure-coded data for distributed verification, based on this technique it achieved error data localization and integration of storage correctness. Also, it identifies server misbehaving, efficient, and security-based dynamic operations on data blocking such as data append, delete, and update methods. Performance analysis and security show the proposed method is more effective resilient and efficient against Byzantine failure, even server colluding attacks and malicious data modification attacks.
Keywords: Cloud security, architecture design, data storage, homomorphic token, dynamic operation
DOI: 10.3233/JIFS-189172
Journal: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8557-8564, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]