Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image


Page 3 of 9

  1. The applications of the Internet of Things in different areas and the resources that demand these applications are on the increase. However, the limitations of the IoT devices such as processing capability, st...

    Authors: Nweso Emmanuel Nwogbaga, Rohaya Latip, Lilly Suriani Affendey and Amir Rizaan Abdul Rahiman
    Citation: Journal of Cloud Computing 2022 11:15
  2. In the cloud, users prefer to store their sensitive data in encrypted form. Searching keywords over encrypted data without loss of data confidentiality is an important issue. In 2004, Boneh et al. proposed the...

    Authors: Junling Guo, Lidong Han, Guang Yang, Xuejiao Liu and Chengliang Tian
    Citation: Journal of Cloud Computing 2022 11:14
  3. A workflow is an effective way for modeling complex applications and serves as a means for scientists and researchers to better understand the details of applications. Cloud computing enables the running of wo...

    Authors: Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh, Saeid Abrishami, Hoda Taheri and Hamid Abrishami
    Citation: Journal of Cloud Computing 2022 11:13
  4. Modern information systems are built fron a complex composition of networks, infrastructure, devices, services, and applications, interconnected by data flows that are often private and financially sensitive. ...

    Authors: Chunming Rong, Jiahui Geng, Thomas J. Hacker, Haakon Bryhni and Martin G. Jaatun
    Citation: Journal of Cloud Computing 2022 11:12
  5. The Unrelated Parallel Machines Scheduling Problem (UPMSP) with sequence-dependent setup times has been widely applied to cloud computing, edge computing and so on. When the setup times are ignored, UPMSP will...

    Authors: Xingwang Huang, Lingqing Chen, Yuxin Zhang, Shubin Su, Yangbin Lin and Xuhui Cao
    Citation: Journal of Cloud Computing 2022 11:9
  6. In a distributed cloud, unlike centralized resource management, users provide and share resources. However, this allows for the existence of free riders who do not provide resources to others, but at the same ...

    Authors: Doyel Pal, Praveen Khethavath, Johnson P. Thomas and Utpal Mangla
    Citation: Journal of Cloud Computing 2022 11:8
  7. Traditional remote data possession auditing mechanisms are usually divided into two types: private auditing and public auditing. Informally, private auditing only allows the original data owner to check the in...

    Authors: Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu and Rui Xue
    Citation: Journal of Cloud Computing 2022 11:7
  8. The Internet of Things (IoT) enables the development of innovative applications in various domains such as healthcare, transportation, and Industry 4.0. Publish-subscribe systems enable IoT devices to communic...

    Authors: Norisvaldo Ferraz Junior, Anderson A.A. Silva, Adilson E. Guelfi and Sergio T. Kofuji
    Citation: Journal of Cloud Computing 2022 11:6
  9. Cloud Computing popularization inspired the emergence of many new cloud service providers. The significant number of cloud providers available drives users to complex or even impractical choice of the most sui...

    Authors: Lucas Borges de Moraes, Rafael Stubs Parpinelli and Adriano Fiorese
    Citation: Journal of Cloud Computing 2022 11:5
  10. K-anonymity has been gaining widespread attention as one of the most widely used technologies to protect location privacy. Nevertheless, there are still some threats such as behavior deception and service swin...

    Authors: Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian and Xiaomei Yu
    Citation: Journal of Cloud Computing 2022 11:2
  11. In current infrastructure-as-a service (IaaS) cloud services, customers are charged for the usage of computing/storage resources only, but not the network resource. The difficulty lies in the fact that it is n...

    Authors: Xiaocui Sun, Zhijun Wang, Yunxiang Wu, Hao Che and Hong Jiang
    Citation: Journal of Cloud Computing 2021 10:55
  12. In this paper, we study how an oligopolist influences the coalition structure in federated cloud markets. Specifically, we use cooperative game theory to model the circumstances under which a cloud provider pr...

    Authors: Yash Khandelwal, Arushi Dogra, Karthik Ganti, Suresh Purini and Puduru V. Reddy
    Citation: Journal of Cloud Computing 2021 10:54
  13. With the rapid development of Internet of Things (IoT) technologies, fog computing has emerged as an extension to the cloud computing that relies on fog nodes with distributed resources at the edge of network....

    Authors: Zahra Movahedi, Bruno Defude and Amir mohammad Hosseininia
    Citation: Journal of Cloud Computing 2021 10:53
  14. Blockchain technology has the characteristics of decentralization and tamper resistance, which can store data safely and reduce the cost of trust effectively. However, the existing blockchain system has weak p...

    Authors: Xiaogang Xing, Yuling Chen, Tao Li, Yang Xin and Hongwei Sun
    Citation: Journal of Cloud Computing 2021 10:52
  15. In current power grids, a massive amount of power equipment raises various emerging requirements, e.g., data perception, information transmission, and real-time control. The existing cloud computing paradigm i...

    Authors: Tianjiao Pu, Xinying Wang, Yifan Cao, Zhicheng Liu, Chao Qiu, Ji Qiao and Shuhua Zhang
    Citation: Journal of Cloud Computing 2021 10:48
  16. While a multitude of cloud vendors exist today offering flexible application hosting services, the application adaptation capabilities provided in terms of autoscaling are rather limited. In most cases, a stat...

    Authors: Andreas Tsagkaropoulos, Yiannis Verginadis, Nikos Papageorgiou, Fotis Paraskevopoulos, Dimitris Apostolou and Gregoris Mentzas
    Citation: Journal of Cloud Computing 2021 10:45

    The Correction to this article has been published in Journal of Cloud Computing 2021 10:50

  17. Distributed steganography is an approach to concealing the secret in several files, leaving fewer traces than the classical approach. Recent work proposed by Moyou and Ndoumdan have improved this approach by p...

    Authors: Stéphane Willy Mossebo Tcheunteu, Leonel Moyou Metcheka and René Ndoundam
    Citation: Journal of Cloud Computing 2021 10:43
  18. With the increasing level of IoT applications, computation offloading is now undoubtedly vital because of the IoT devices limitation of processing capability and energy. Computation offloading involves moving ...

    Authors: Nweso Emmanuel Nwogbaga, Rohaya Latip, Lilly Suriani Affendey and Amir Rizaan Abdul Rahiman
    Citation: Journal of Cloud Computing 2021 10:40
  19. Serverless computing has gained importance over the last decade as an exciting new field, owing to its large influence in reducing costs, decreasing latency, improving scalability, and eliminating server-side ...

    Authors: Hassan B. Hassan, Saman A. Barakat and Qusay I. Sarhan
    Citation: Journal of Cloud Computing 2021 10:39
  20. Modern datacenters provide a wide variety of application services, which generate a mix of delay-sensitive short flows and throughput-oriented long flows, transmitting in the multi-path datacenter network. Tho...

    Authors: Tao Zhang, Yasi Lei, Qianqiang Zhang, Shaojun Zou, Juan Huang and Fangmin Li
    Citation: Journal of Cloud Computing 2021 10:37
  21. Through virtualization and resource integration, cloud computing has expanded its service area and offers a better user experience than the traditional platforms, along with its business operation model bringi...

    Authors: Wenjuan Li, Jiyi Wu, Jian Cao, Nan Chen, Qifei Zhang and Rajkumar Buyya
    Citation: Journal of Cloud Computing 2021 10:35
  22. By sharing resources with each other, different cloud providers in a cloud federation can exploit their diversity in resource configuration and operational cost so as to improve service performance. They shoul...

    Authors: Runhao Lu, Yuning Liang, Qing Ling, Changle Li and Weigang Wu
    Citation: Journal of Cloud Computing 2021 10:34
  23. Connected and Automated Vehicle (CAV) is a transformative technology that has great potential to improve urban traffic and driving safety. Electric Vehicle (EV) is becoming the key subject of next-generation C...

    Authors: Bing Lin, Kai Lin, Changhang Lin, Yu Lu, Ziqing Huang and Xinwei Chen
    Citation: Journal of Cloud Computing 2021 10:33
  24. Internet of Things (IoT) has posed new requirements to the underlying processing architecture, specially for real-time applications, such as event-detection services. Complex Event Processing (CEP) engines pro...

    Authors: Giovanny Mondragón-Ruiz, Alonso Tenorio-Trigoso, Manuel Castillo-Cara, Blanca Caminero and Carmen Carrión
    Citation: Journal of Cloud Computing 2021 10:32
  25. Modern data center networks typically adopt multi-rooted tree topologies such leaf-spine and fat-tree to provide high bisection bandwidth. Load balancing is critical to achieve low latency and high throughput....

    Authors: Jiawei Huang, Shiqi Wang, Shuping Li, Shaojun Zou, Jinbin Hu and Jianxin Wang
    Citation: Journal of Cloud Computing 2021 10:31
  26. In cloud service delivery, the cloud user is concerned about “what” function and performance the cloud service could provide, while the cloud provider is concerned about “how” to design proper underlying cloud...

    Authors: Chao Wu, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima and Kenichi Tayama
    Citation: Journal of Cloud Computing 2021 10:30
  27. This paper examines possibilities for improving the existing strategies of consistency management for highly-distributed transactional database in a hybrid cloud environment. With a detailed analysis of the ex...

    Authors: Jasmina Dizdarevic, Zikrija Avdagic, Fahrudin Orucevic and Samir Omanovic
    Citation: Journal of Cloud Computing 2021 10:27
  28. Cloud providers shares their resources and services through collaboration in order to increase resource utilization, profit and quality of services. The offered services with different access patterns, similar...

    Authors: Sameer Singh Chauhan, Emmanuel S. Pilli and R. C. Joshi
    Citation: Journal of Cloud Computing 2021 10:26
  29. We present an algorithm and a software architecture for a cloud-based system that executes cyclic scientific workflows whose structure may change during run time. Existing approaches either rely on workflow de...

    Authors: Michel Krämer, Hendrik M. Würz and Christian Altenhofen
    Citation: Journal of Cloud Computing 2021 10:25
  30. Adding buffers to networks is part of the fundamental advance in data communication. Since edge cloud computing is based on the heterogeneous collaboration network model in a federated environment, it is natur...

    Authors: Zheng Li, Francisco Millar-Bilbao, Gonzalo Rojas-Durán and Susana Ladra
    Citation: Journal of Cloud Computing 2021 10:24
  31. Herein, we present a novel topic variation detection method that combines a topic extraction method and a change-point detection method. It extracts topics from time-series text data as the feature of each tim...

    Authors: Sota Kato, Takafumi Nakanishi, Budrul Ahsan and Hirokazu Shimauchi
    Citation: Journal of Cloud Computing 2021 10:21

Annual Journal Metrics

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here