
Ciencia y Educación
(L-ISSN: 2790-8402 E-ISSN: 2707-3378)
Vol. 7 No. 2.2
Edición Especial II 2026
Página 271
almacenamiento en la nube, donde la rapidez de
respuesta es esencial.
Referencias Bibliográficas
Cao, J., Wang, L., Dou, J., Chu, L., & Qu, C.
(2020). Objective function optimization-
based time-competition forwarding strategy
in Internet of Marine Things. Proceedings of
the 6th International Conference on
Computing and Artificial Intelligence, 468–
475.
https://doi.org/10.1145/3404555.3404631
Chandan, R., Krishna, B., Chauhan, S., Papreja,
M., Chhabra, R., & Miglani, R. (2024). A
dependable and scalable encryption
framework for cloud data protection and
storage optimization. IEEE Access, 13.
https://doi.org/10.1109/ACCESS.2024.3389
127
Chen, L., Guo, C., Gong, B., Waqas, M., Deng,
L., & Qin, H. (2024). A secure cross-domain
authentication scheme based on threshold
signature for MEC. Journal of Cloud
Computing, 13, 70.
https://doi.org/10.1186/s13677-024-00631-
x
Da Rocha, M., Valadares, D., Perkusich, A.,
Gorgonio, K., Pagno, R., & Will, N. (2020).
Secure cloud storage with client-side
encryption using a trusted execution
environment. Proceedings of the 10th
International Conference on Cloud
Computing and Services Science, 31–43.
https://doi.org/10.5220/0009130600310043
Daoud, L., & Huen, H. (2023). Performance
study of software-based encrypting data at
rest. E3S Web of Conferences, 391, 01015.
https://doi.org/10.1051/e3sconf/202339101
015
El-Sofany, H. (2022). A proposed biometric
authentication model to improve cloud
systems security. Computer Systems Science
and Engineering, 43(2), 573–589.
https://doi.org/10.32604/csse.2022.024302
Gholami, A., & Laure, E. (2016). Security and
privacy of sensitive data in cloud computing:
A survey. arXiv.
https://arxiv.org/abs/1601.01498
Govindarajan, V. (2025). A novel system for
managing encrypted data using searchable
encryption techniques. International Journal
of Advanced Computer Science and
Applications, 16(3).
https://doi.org/10.14569/IJACSA.2025.016
0312
Hashizume, K., Rosado, D., Fernández, E., &
Fernandez, E. (2013). An analysis of security
issues for cloud computing. Journal of
Internet Services and Applications, 4, 5.
https://doi.org/10.1186/1869-0238-4-5
ISO/IEC. (2015). Information technology —
Security controls for cloud services
(ISO/IEC 27017). International Organization
for Standardization.
ISO/IEC. (2019). Code of practice for
protection of personally identifiable
information (PII) in public clouds (ISO/IEC
27018). International Organization for
Standardization.
Karanam, M., Reddy, S., Chakilam, A., &
Banothu, S. (2023). Performance evaluation
of cryptographic security algorithms on
cloud. E3S Web of Conferences, 391, 01015.
https://doi.org/10.1051/e3sconf/202339101
015
Kumar, P., & Goel, S. (2025). A secure and
efficient encryption system based on
adaptive and machine learning for securing
data in fog computing. Scientific Reports,
15(1). https://doi.org/10.1038/s41598-025-
92245-9
Kurek, T., Niemiec, M., & Lason, A. (2024).
Performance evaluation of a firewall service
based on virtualized IncludeOS unikernels.
Scientific Reports, 14, 51167.
https://doi.org/10.1038/s41598-024-51167-
8
Maniah, B., Gaol, F., & Abdurachman, E.
(2022). Risk analysis in cloud migration: A
systematic literature review. Journal of King
Saud University – Computer and
Information Sciences, 34(6), 3111–3120.
https://doi.org/10.1016/j.jksuci.2021.01.008
Microsoft. (2025). ¿Qué es la seguridad en la
nube?
https://www.microsoft.com/es-
co/security/business/security-101/what-is-
cloud-security