Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image


Page 1 of 7

  1. The Internet of things (IoT) is an important technology that is highly beneficial in establishing smart items, connections and cities. However, there are worries regarding security and privacy vulnerabilities ...

    Authors: Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, Bijeta Seth, Praise Young and Mohd Anas Wajid
    Citation: Journal of Cloud Computing 2022 11:26
  2. In recent years DevOps and agile approaches like microservice architectures and Continuous Integration have become extremely popular given the increasing need for flexible and scalable solutions. However, seve...

    Authors: Iman Kohyarnejadfard, Daniel Aloise, Seyed Vahid Azhari and Michel R. Dagenais
    Citation: Journal of Cloud Computing 2022 11:25
  3. Big Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that t...

    Authors: Blend Berisha, Endrit Mëziu and Isak Shabani
    Citation: Journal of Cloud Computing 2022 11:24
  4. Blockchain is the latest boon in the world which handles mainly banking and finance. The blockchain is also used in the healthcare management system for effective maintenance of electronic health and medical r...

    Authors: Tao Hai, Jincheng Zhou, S. R. Srividhya, Sanjiv Kumar Jain, Praise Young and Shweta Agrawal
    Citation: Journal of Cloud Computing 2022 11:22
  5. Much research has focused on task offloading in fog-enabled IoT networks. However, there is an important offloading issue that has hardly been addressed—the impact of different virtualization modes on task res...

    Authors: Ismail Mohamed, Hassan Al-Mahdi, Mohamed Tahoun and Hamed Nassar
    Citation: Journal of Cloud Computing 2022 11:21
  6. In an Internet of Things (IoT) system based on an anything as a service (XaaS) architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and aggregated on the server side. Within thi...

    Authors: Quan Chen, Liangshun Wu and Congshi Jiang
    Citation: Journal of Cloud Computing 2022 11:20
  7. The navigation and positioning subsystem offers important position information for an autonomous underwater vehicle (AUV) system. It plays a crucial role during the underwater exploration and operations of AUV...

    Authors: Qinghua Luo, Xiaozhen Yan, Chenxu Wang, Yang Shao, Zhiquan Zhou, Jianfeng Li, Cong Hu, Chuntao Wang and Jinfeng Ding
    Citation: Journal of Cloud Computing 2022 11:18
  8. Mobile edge computing (MEC) is considered to be a promising technique to enhance the computation capability and reduce the energy consumption of smart mobile devices (SMDs) in the sixth-generation (6G) network...

    Authors: Shichao Li, Ning Zhang, Ruihong Jiang, Zou Zhou, Fei Zheng and Guiqin Yang
    Citation: Journal of Cloud Computing 2022 11:17
  9. The evolving intercloud enables idle resources to be traded among cloud providers to facilitate utilization optimization and to improve the cost-effectiveness of the service for cloud consumers. However, sever...

    Authors: Lin Li, Li Liu, Shalin Huang, Shibiao Lv, Kaibiao Lin and Shunzhi Zhu
    Citation: Journal of Cloud Computing 2022 11:16
  10. The applications of the Internet of Things in different areas and the resources that demand these applications are on the increase. However, the limitations of the IoT devices such as processing capability, st...

    Authors: Nweso Emmanuel Nwogbaga, Rohaya Latip, Lilly Suriani Affendey and Amir Rizaan Abdul Rahiman
    Citation: Journal of Cloud Computing 2022 11:15
  11. In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the...

    Authors: Junling Guo, Lidong Han, Guang Yang, Xuejiao Liu and Chengliang Tian
    Citation: Journal of Cloud Computing 2022 11:14
  12. A workflow is an effective way for modeling complex applications and serves as a means for scientists and researchers to better understand the details of applications. Cloud computing enables the running of wo...

    Authors: Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh, Saeid Abrishami, Hoda Taheri and Hamid Abrishami
    Citation: Journal of Cloud Computing 2022 11:13
  13. Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. ...

    Authors: Chunming Rong, Jiahui Geng, Thomas J. Hacker, Haakon Bryhni and Martin G. Jaatun
    Citation: Journal of Cloud Computing 2022 11:12
  14. The Unrelated Parallel Machines Scheduling Problem (UPMSP) with sequence-dependent setup times has been widely applied to cloud computing, edge computing and so on. When the setup times are ignored, UPMSP will...

    Authors: Xingwang Huang, Lingqing Chen, Yuxin Zhang, Shubin Su, Yangbin Lin and Xuhui Cao
    Citation: Journal of Cloud Computing 2022 11:9
  15. In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same ...

    Authors: Doyel Pal, Praveen Khethavath, Johnson P. Thomas and Utpal Mangla
    Citation: Journal of Cloud Computing 2022 11:8
  16. Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the in...

    Authors: Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu and Rui Xue
    Citation: Journal of Cloud Computing 2022 11:7
  17. The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communic...

    Authors: Norisvaldo Ferraz Junior, Anderson A.A. Silva, Adilson E. Guelfi and Sergio T. Kofuji
    Citation: Journal of Cloud Computing 2022 11:6
  18. Cloud Computing popularization inspired the emergence of many new cloud service providers. The significant number of cloud providers available drives users to complex or even impractical choice of the most sui...

    Authors: Lucas Borges de Moraes, Rafael Stubs Parpinelli and Adriano Fiorese
    Citation: Journal of Cloud Computing 2022 11:5
  19. K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swin...

    Authors: Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian and Xiaomei Yu
    Citation: Journal of Cloud Computing 2022 11:2
  20. In current infrastructure-as-a service (IaaS) cloud services, customers are charged for the usage of computing/storage resources only, but not the network resource. The difficulty lies in the fact that it is n...

    Authors: Xiaocui Sun, Zhijun Wang, Yunxiang Wu, Hao Che and Hong Jiang
    Citation: Journal of Cloud Computing 2021 10:55
  21. In this paper, we study how an oligopolist influences the coalition structure in federated cloud markets. Specifically, we use cooperative game theory to model the circumstances under which a cloud provider pr...

    Authors: Yash Khandelwal, Arushi Dogra, Karthik Ganti, Suresh Purini and Puduru V. Reddy
    Citation: Journal of Cloud Computing 2021 10:54
  22. With the rapid development of Internet of Things (IoT) technologies, fog computing has emerged as an extension to the cloud computing that relies on fog nodes with distributed resources at the edge of network....

    Authors: Zahra Movahedi, Bruno Defude and Amir mohammad Hosseininia
    Citation: Journal of Cloud Computing 2021 10:53
  23. Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively. However, the existing blockchain system has weak p...

    Authors: Xiaogang Xing, Yuling Chen, Tao Li, Yang Xin and Hongwei Sun
    Citation: Journal of Cloud Computing 2021 10:52
  24. In current power grids, a massive amount of power equipment raises various emerging requirements, e.g., data perception, information transmission, and real-time control. The existing cloud computing paradigm i...

    Authors: Tianjiao Pu, Xinying Wang, Yifan Cao, Zhicheng Liu, Chao Qiu, Ji Qiao and Shuhua Zhang
    Citation: Journal of Cloud Computing 2021 10:48
  25. While a multitude of cloud vendors exist today offering flexible application hosting services, the application adaptation capabilities provided in terms of autoscaling are rather limited. In most cases, a stat...

    Authors: Andreas Tsagkaropoulos, Yiannis Verginadis, Nikos Papageorgiou, Fotis Paraskevopoulos, Dimitris Apostolou and Gregoris Mentzas
    Citation: Journal of Cloud Computing 2021 10:45

    The Correction to this article has been published in Journal of Cloud Computing 2021 10:50

  26. Distributed steganography is an approach to concealing the secret in several files, leaving fewer traces than the classical approach. Recent work proposed by Moyou and Ndoumdan have improved this approach by p...

    Authors: Stéphane Willy Mossebo Tcheunteu, Leonel Moyou Metcheka and René Ndoundam
    Citation: Journal of Cloud Computing 2021 10:43
  27. With the increasing level of IoT applications, computation offloading is now undoubtedly vital because of the IoT devices limitation of processing capability and energy. Computation offloading involves moving ...

    Authors: Nweso Emmanuel Nwogbaga, Rohaya Latip, Lilly Suriani Affendey and Amir Rizaan Abdul Rahiman
    Citation: Journal of Cloud Computing 2021 10:40
  28. Serverless computing has gained importance over the last decade as an exciting new field, owing to its large influence in reducing costs, decreasing latency, improving scalability, and eliminating server-side ...

    Authors: Hassan B. Hassan, Saman A. Barakat and Qusay I. Sarhan
    Citation: Journal of Cloud Computing 2021 10:39
  29. Modern datacenters provide a wide variety of application services, which generate a mix of delay-sensitive short flows and throughput-oriented long flows, transmitting in the multi-path datacenter network. Tho...

    Authors: Tao Zhang, Yasi Lei, Qianqiang Zhang, Shaojun Zou, Juan Huang and Fangmin Li
    Citation: Journal of Cloud Computing 2021 10:37
  30. Through virtualization and resource integration, cloud computing has expanded its service area and offers a better user experience than the traditional platforms, along with its business operation model bringi...

    Authors: Wenjuan Li, Jiyi Wu, Jian Cao, Nan Chen, Qifei Zhang and Rajkumar Buyya
    Citation: Journal of Cloud Computing 2021 10:35
  31. By sharing resources with each other, different cloud providers in a cloud federation can exploit their diversity in resource configuration and operational cost so as to improve service performance. They shoul...

    Authors: Runhao Lu, Yuning Liang, Qing Ling, Changle Li and Weigang Wu
    Citation: Journal of Cloud Computing 2021 10:34
  32. Connected and Automated Vehicle (CAV) is a transformative technology that has great potential to improve urban traffic and driving safety. Electric Vehicle (EV) is becoming the key subject of next-generation C...

    Authors: Bing Lin, Kai Lin, Changhang Lin, Yu Lu, Ziqing Huang and Xinwei Chen
    Citation: Journal of Cloud Computing 2021 10:33

Annual Journal Metrics

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here