Content
January 2024, Volume 14, Issue 1
- 1-17 Next-Gen Phishing Defense Enhancing Detection With Machine Learning and Expert Whitelisting/Blacklisting
by Abdelraouf Ishtaiwi & Ali Mohd Ali & Ahmad Al-Qerem & Mohammad Sabahean & Bilal Alzubi & Ammar Almomani & Mohammad Alauthman & Amjad Aldweesh & Mohammad A. Al Khaldy - 1-19 Using Supervised Learning to Detect Command and Control Attacks in IoT
by Muath AlShaikh & Waleed Alsemaih & Sultan Alamri & Qusai Ramadan - 1-19 Software Engineering for Developing a Cloud Computing Museum-Guide System
by Hadeel Al-Obaidy & Aysha Ebrahim & Ali Aljufairi & Ahmed Mero & Omar Eid - 1-19 Detecting Ambiguities in Requirement Documents Written in Arabic Using Machine Learning Algorithms
by Ahmad Althunibat & Bayan Alsawareah & Siti Sarah Maidin & Belal Hawashin & Iqbal Jebril & Belal Zaqaibeh & Haneen A. Al-khawaja - 1-19 A Distributed Cloud Architecture Based on General De Bruijn Overlay Network
by Osama R. S. Ramadan & Mohamed Yasin I. Afifi & Ahmed Yahya - 1-24 Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System
by Manoj Subhash Kakade & K.R. Anupama & Sushil Nayak & Swarnab Garang - 1-30 Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques
by Utsav Upadhyay & Alok Kumar & Gajanand Sharma & Ashok Kumar Saini & Varsha Arya & Akshat Gaurav & Kwok Tai Chui - 1-30 IIoT Protocols for Edge/Fog and Cloud Computing in Industrial AI: A High Frequency Perspective
by Telmo Fernández De Barrena Sarasola & Ander García & Juan Luis Ferrando
January 2023, Volume 13, Issue 1
- 1-9 Privacy Protection of Cloud Computing Based on Strong Forward Security
by Fengyin Li & Junhui Wang & Zhihao Song - 1-14 An Efficient ECK-Secured FCM-Based Firefly Optimization Algorithm for Dynamic Resource Sharing in Multi-Tenant SaaS Service Clouds
by Pallavi G. B. - 1-14 A Multi-Agent-Based VM Migration for Dynamic Load Balancing in Cloud Computing Cloud Environment
by Soumen Swarnakar & Chandan Banerjee & Joydeep Basu & Debanjana Saha - 1-14 Resource-Aware Least Busy (RALB) Strategy for Load Balancing in Containerized Cloud Systems
by Zakariyae Bouflous & Mohammed Ouzzif & Khalid Bouragba - 1-16 Performance Evaluation of Hybrid Meta-Heuristics-Based Task Scheduling Algorithm for Energy Efficiency in Fog Computing
by Ali Garba Jakwa & Abdulsalam Yau Gital & Souley Boukari & Fatima Umar Zambuk - 1-16 Enhancing Techno Economic Efficiency of FTC Distillation Using Cloud-Based Stochastic Algorithm
by Toto Haksoro & Aulia Siti Aisjah & Sreerakuvandana & Mosiur Rahaman & Totok Ruki Biyanto - 1-18 A RYU-SDN Controller-Based VM Migration Scheme Using SD-EAW Ranking Methods for Identifying Active Jobs in the 5G Cloud Framework
by Grace Shalini T. & Rathnamala S. - 1-21 Sociocultural Factors in Times of Global Crisis
by Maximiliano Perez & David Coello - 1-21 A Hybrid Binary Bird Swarm Optimization (BSO) and Dragonfly Algorithm (DA) for VM Allocation and Load Balancing in Cloud
by Thanwamas Kassanuk & Khongdet Phasinam - 1-22 A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks
by B. V. Subba Rao & Vivek Sharma & Neeraj Rathore & Devendra Prasad & Harishchander Anandaram & Gaurav Soni - 1-24 An Adaptable Approach to Fault Tolerance in Cloud Computing
by Priti Kumari & Parmeet Kaur - 1-24 The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds
by Amjad Aldweesh & Mohammad Alauthman & Mohammad Al Khaldy & Abdelraouf Ishtaiwi & Ahmad al-Qerem & Ammar Almoman & Brij B. Gupta - 1-25 Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment
by Kamlesh Lakhwani & Gajanand Sharma & Ramandeep Sandhu & Naresh Kumar Nagwani & Sandeep Bhargava & Varsha Arya & Ammar Almomani - 1-26 Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols
by Ala Hamarsheh & Ahmad Alqeerm & Iman Akour & Mohammad Alauthman & Amjad Aldweesh & Ali Mohd Ali & Ammar Almomani & Someah Alangari - 1-28 Empirical Comparison of Energy Efficiency Between 3-Tier and High-Speed 3-Tier Network Topologies
by Manal Alkoshman & Saleh Atiewi - 1-30 Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review
by Chellammal Surianarayanan & Pethuru Raj Chelliah
April 2022, Volume 12, Issue 2
- 1-11 Stock Market E-Assistance on Platform-as-a-Service (PaaS)
by Shahul Chettali Hameed - 1-12 Resource Optimization in Cloud Data Centers Using Particle Swarm Optimization
by Madhumala R. B. & Harshvardhan Tiwari & Devaraj Verma C. - 1-14 Resource-Efficient Pareto-Optimal Green Scheduler Architecture
by Urmila Shrawankar & Chetan Ashokrao Dhule - 1-16 A Cost-Optimized Data Parallel Task Scheduling in Multi-Core Resources Under Deadline and Budget Constraints
by Saravanan Krishnan & Rajalakshmi N. R.
January 2022, Volume 12, Issue 1
- 1-10 An Adaptive Mechanism for Virtual Machine Migration in the Cloud Environment
by Gurpreet Singh & Manisha Malhotra & Ajay Sharma - 1-10 Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm
by Huthaifa A. Al Issa & Mustafa Hamzeh Al-Jarah & Ammar Almomani & Ahmad Al-Nawasrah - 1-11 A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing
by Bineet Joshi & Bansidhar Joshi & Anupama Mishra & Varsha Arya & Avadhesh Kumar Gupta & Dragan Peraković - 1-12 AFTTM: Agent-Based Fault Tolerance Trust Mechanism in Cloud Environment
by Shivani Jaswal & Manisha Malhotra - 1-12 A Cloud-Based Predictive Model for the Detection of Breast Cancer
by Kuldeep Pathoee & Deepesh Rawat & Anupama Mishra & Varsha Arya & Marjan Kuchaki Rafsanjani & Avadhesh Kumar Gupta - 1-13 Integrated Predictive Experience Management Framework (IPEMF) for Improving Customer Experience: In the Era of Digital Transformation
by Neelesh Ragunath Kumbhojkar & Arun Balakrishna Menon - 1-13 Efficient Local Cloud-Based Solution for Liver Cancer Detection Using Deep Learning
by Anil B. C. & Dayananda P. & Nethravathi B. & Mahesh S. Raisinghani - 1-14 Device Access Control and Key Exchange (DACK) Protocol for Internet of Things
by Md Alimul Haque & Nourah Almrezeq & Shameemul Haque & A.A. Abd El-Aziz - 1-14 Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication
by Pandi Vijayakumar & S. C. Rajkumar & L. Jegatha Deborah - 1-14 Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review
by Meryem Ammi & Oluwasegun Adedugbe & Fahad Mohamed Alharby & Elhadj Benkhelifa - 1-14 Survey on Service Placement, Provisioning, and Composition for Fog-Based IoT Systems
by Thiruchadai Pandeeswari Sadatacharapandi & Padmavathi S. - 1-14 A New Fault-Tolerant Algorithm Based on Replication and Preemptive Migration in Cloud Computing
by Abderraziq Semmoud & Mourad Hakem & Badr Benmammar & Jean-Claude Charr - 1-14 A Hybrid Approach for Task Scheduling in the Cloud Environment
by Krishan Tuli & Manisha Malhotra - 1-14 A Multi-Objective Adaptive Upper Threshold Approach for Overloaded Host Detection in Cloud Computing
by Rajeshwari Sissodia & ManMohan Singh Rauthan & Varun Barthwal - 1-15 Migration From DevOps to DevSecOps: A Complete Migration Framework, Challenges, and Evaluation
by Nisha T. N. & Amit Khandebharad - 1-15 Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT
by Medikonda Asha Kiran & Syam Kumar Pasupuleti & R. Eswari - 1-15 Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks
by Deepak Srivastava & Ajay Kumar & Anupama Mishra & Varsa Arya & Ammar Almomani & Ching Hsien Hsu & Domenico Santaniello - 1-15 Evaluating the Impact of Cryptographic Algorithms on Network Performance
by Samuel Asare & Winfred Yaokumah & Ernest Barfo Boadi Gyebi & Jamal-Deen Abdulai - 1-16 RDF Query Path Optimization Using Hybrid Genetic Algorithms: Semantic Web vs. Data-Intensive Cloud Computing
by Qazi Mudassar Ilyas & Muneer Ahmad & Sonia Rauf & Danish Irfan - 1-16 Modelling of the Cloud Service Quality Factors Using ISM
by Rajesh Agarwal & Sanjay Dhingra - 1-16 Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud
by Ankush Balaram Pawar & Shashikant U. Ghumbre & Rashmi M. Jogdand - 1-16 A Survey on Multi-Objective Tasks and Workflow Scheduling Algorithms in Cloud Computing
by Rajeshwari Sissodia & Man Mohan Singh Rauthan & Kanchan Naithani - 1-16 Cloudlet and Virtual Machine Performance Enhancement With CLARA and Evolutionary Paradigm
by Tanvi Gupta & Supriya P. Panda - 1-16 Density-Based Machine Learning Scheme for Outlier Detection in Smart Forest Fire Monitoring Sensor Cloud
by Rajendra Kumar Dwivedi - 1-16 Cloud Data Centre Energy Utilization Estimation: Simulation and Modelling With iDR
by Ravindra Kumar Singh Rajput & Dinesh Goyal & Anjali Pant & Gajanand Sharma & Varsha Arya & Marjan Kuchaki Rafsanjani - 1-16 Fog Computing for Delay Minimization and Load Balancing
by Waseem Akram & Zahoor Najar & Abid Sarwar & Iraq Ahmad Reshi - 1-17 Review on Mapping of Tasks to Resources in Cloud Computing
by Vinothina V. & Jasmine Beulah G. & Sridaran Rajagopal - 1-17 Tifinagh Handwriting Character Recognition Using a CNN Provided as a Web Service
by Ouahab Kadri & Abderrezak Benyahia & Adel Abdelhadi - 1-17 A Case Study of Cloud Computing Service Models for the General Computing Environment in a University
by Ho Yeon Kang & Jong Yun Lee & Seo-Young Noh - 1-17 An Optimization Model for Task Scheduling in Mobile Cloud Computing
by Rashid Alakbarov - 1-17 Business Process Discovery Using Process Mining Techniques and Distributed Framework
by Ishak H. A. Meddah & Fatiha Guerroudji - 1-17 Catholic Impact Evolution Through Public Twitter Data During COVID-19
by Enrique Caño Marín & Cristina Blanco González-Tejero & María Guijarro García & F. Javier Sendra García - 1-17 MATEM: A Multi-Agent-Based Trust Evaluation Model for Discovery and Delivery of Reliable Cloud Services
by Shivani Jaswal & Manisha Malhotra - 1-17 Trust Evaluation and Prioritization of Cloud Service Providers Using MADM Methods
by Suruchi Pawar & Eunice Grace Paulson & Prajakta Sunil Badgujar & Shilpa Deshpande - 1-17 The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing
by Tabassum N. Mujawar & Lokesh B. Bhajantri - 1-17 System Level Benchmarking of Public Clouds
by Sanjay P. Ahuja - 1-17 A Cloud-Based Model for Driver Drowsiness Detection and Prediction Based on Facial Expressions and Activities
by Ankit Kumar Jain & Aakash Yadav & Manish Kumar & Francisco José García-Peñalvo & Kwok Tai Chui & Domenico Santaniello - 1-18 A Metaphoric Design of Electronic Medical Record (EMR) for Periodic Health Examination Reports: An Initiative to Cloud's Medical Data Analysis
by Sharifah Ahmed Alamer & Qazi Mudassar Ilyas & Muneer Ahmad & Danish Irfan - 1-18 A Hybrid Cloud Enterprise Strategic Management System
by Emmanuel Ramaru & Lalit Garg & Chinmay Chakraborty - 1-18 Marketing Analytics for Analyzing Social Media and Branding Efforts of Indian Telecom Operators
by Sujata Joshi & Sindhu Koparrati & Vaishali Singhal - 1-18 Efficient Resource Management Using Improved Bio-Inspired Algorithms for the Fog Computing Environment
by Chetan M. Bulla & Mahantesh N. Birje - 1-19 Analysis of Security-Based Access Control Models for Cloud Computing
by Sandeep Choudhary & Nanhay Singh - 1-19 An Indicator-Based Algorithm for Task Scheduling in Multi-Cloud Environments
by Sohan Kumar Pande & Priyanka Swain & Sanjib Kumar Nayak & Sanjaya Kumar Panda - 1-19 Multi-Cloud Service Brokers for Selecting the Optimal Data Center in Cloud Environment
by Mousa Elrotub & Abdelouahed Gherbi - 1-20 Load and Cost-Aware Min-Min Workflow Scheduling Algorithm for Heterogeneous Resources in Fog, Cloud, and Edge Scenarios
by Jyoti Bisht & Venkata Subrahmanyam Vampugani - 1-20 Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure
by Akashdeep Bhardwaj & Keshav Kaushik - 1-20 Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning
by Sarvesh Kumar & Surendra Kumar & Nikhil Ranjan & Shivam Tiwari & T. Rajesh Kumar & Dinesh Goyal & Gajanand Sharma & Varsha Arya & Marjan Kuchaki Rafsanjani - 1-20 Mobile Cloud Computing and Sustainable Development: Opportunities, Challenges, and Future Directions
by Francisco José García Peñalvo & Akash Sharma & Anureet Chhabra & Sunil K. Singh & Sudhakar Kumar & Varsha Arya & Akshat Gaurav - 1-21 Performance Evaluation of Contiguous and Noncontiguous Processor Allocation Based on Common Communication Patterns for 2D Mesh Interconnection Network
by Areen Al Abass & Saad Bani-Mohammad & Ismail Ababneh - 1-21 Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles
by Richa Sharma & Teek Parval Sharma & Ajay Kumar Sharma - 1-21 A Dynamic Weighted Averaging Technique for Trust Assessment in Cloud Computing
by Saima Mehraj & M. Tariq Banday - 1-21 A Multi-Objective Optimization Scheduling Method Based on the Genetic Algorithm in Cloud Computing
by Rajeshwari Sissodia & ManMohan Singh Rauthan & Varun Barthwal - 1-21 Determinants of Customer Loyalty in a Cloud Computing Environment
by Tor Guimaraes & Mike Walton & Ketan Paranjape - 1-21 A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud
by Savita Devi & Taran Singh Bharti - 1-21 Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment
by Kwok Tai Chui & Tanveer Singh Kochhar & Amit Chhabra & Sunil K. Singh & Deepinder Singh & Dragan Peraković & Ammar Almomani & Varsha Arya - 1-22 A Heuristic-Based Task Scheduling Policy for QoS Improvement in Cloud
by Gaurav Tripathi & Rakesh Kumar - 1-22 Business Demand for a Cloud Enterprise Data Warehouse in Electronic Healthcare Computing: Issues and Developments in E-Healthcare Cloud Computing
by Amaonwu Onyebuchi & Ugochukwu O. Matthew & Jazuli S. Kazaure & Nwamaka U. Okafor & Ogobuchi Daniel Okey & Prisca I. Okochi & Janet Folasade Taiwo & Ani Okechukwu Matthew - 1-22 Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism
by Ashish Tiwari & Ritu Garg - 1-22 Enhancing QoS with Resource Optimization Technique Based on Harmony Search in Cloud Environment
by Geeta Singh & Santosh Kumar & Shiva Prakash - 1-22 λHive: Formal Semantics of an Edge Computing Model Based on JavaScript
by Matias Teragni & Claudia Pons - 1-22 Improving Virtual Machine Migration Effects in Cloud Computing Environments Using Depth First Inspired Opportunity Exploration
by Kamal Kumar & Jyoti Thaman - 1-23 Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI
by Hemraj Shobharam Lamkuche & Vijaya Bhaskar Kondaveety & Vijaya Lakshmi Sapparam & Shruti Singh & Raj Deepak Rajpurkar - 1-23 Reactive Hybrid Model for Fault Mitigation in Real-Time Cloud Computing
by Festus Adeyinka Osuolale - 1-23 Future of Internet of Things: Enhancing Cloud-Based IoT Using Artificial Intelligence
by Sana Khanam & Safdar Tanweer & Syed Sibtain Khalid - 1-23 A Review on Integration of Vehicular Ad-Hoc Networks and Cloud Computing
by Limali Sahoo & Sanjaya Kumar Panda & Kunal Kumar Das - 1-24 SMA-LinR: An Energy and SLA-Aware Autonomous Management of Virtual Machines
by Varun Barthwal & Manmohan Singh Rauthan & Rohan Varma - 1-24 Server Consolidation Algorithms for Cloud Computing: Taxonomies and Systematic Analysis of Literature
by Hind Mikram & Said El Kafhali & Youssef Saadi - 1-24 Load Balancing Approaches in Cloud and Fog Computing Environments: A Framework, Classification, and Systematic Review
by Hiba Shakeel & Mahfooz Alam - 1-27 An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup
by Umesh Kumar & V. Ch. Venkaiah - 1-27 Cost-Effective Spot Instances Provisioning Using Features of Cloud Markets
by Abdullah Alourani & Ajay D. Kshemkalyani - 1-27 Quality of Service-Based Resource Management in Fog Computing: A Systematic Review
by Vibha Jain & Bijendra Kumar - 1-28 Capability-Based Access Control With Trust for Effective Healthcare Systems
by Shweta Kaushik & Charu Gandhi & Charu Gandhi - 1-33 A Comprehensive Survey on Cloud Computing: Architecture, Tools, Technologies, and Open Issues
by Md Saquib Jawed & Mohammad Sajid - 1-34 A Novel Decentralized Group Key Management Scheme for Cloud-Based Vehicular IoT Networks
by Rakesh Kumar & Sunil K. Singh & D. K. Lobiyal & Kwok Tai Chui & Domenico Santaniello & Marjan Kuchaki Rafsanjani
October 2021, Volume 11, Issue 4
- 1-13 HSDLM: A Hybrid Sampling With Deep Learning Method for Imbalanced Data Classification
by Khan Md. Hasib & Nurul Akter Towhid & Md Rafiqul Islam - 14-41 A Review on Cloud, Fog, Roof, and Dew Computing: IoT Perspective
by Ishtiaq Ahammad & Ashikur Rahman Khan & Zayed Us Salehin - 42-58 Reliable and Energy-Efficient Routing Scheme for Underwater Wireless Sensor Networks (UWSNs)
by Semab Iqbal & Israr Hussain & Zubair Sharif & Kamran Hassan Qureshi & Javeria Jabeen - 59-79 A Bio-Inspired and Heuristic-Based Hybrid Algorithm for Effective Performance With Load Balancing in Cloud Environment
by Soumen Swarnakar & Souvik Bhattacharya & Chandan Banerjee - 80-99 Current Trends in Cloud Computing for Data Science Experiments
by Syed Imran Jami & Siraj Munir - 100-112 Analysis of Different Load Balancing Algorithms in Cloud Computing
by Poonam Nandal & Deepa Bura & Meeta Singh & Sudeep Kumar - 113-135 Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey
by Aayush Vishnoi & Preeti Mishra & Charu Negi & Sateesh Kumar Peddoju - 136-151 The Impact of Cloud Computing on Organizational Performance
by Thura Al-Azzawi & Tugberk Kaya - 152-173 Robo-Advisory Services in India: A Study to Analyse Awareness and Perception of Millennials
by Arti Chandani & Sriharshitha S. & Ankita Bhatia & Rizwana Atiq & Mita Mehta - 174-193 Integrated Fog and Cloud Computing Issues and Challenges
by Shivom Sharma & Mohammad Sajid
July 2021, Volume 11, Issue 3
- 1-18 Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography
by Rajendra Kumar Dwivedi & Rakesh Kumar & Rajkumar Buyya - 19-32 Quantum Key Distribution Approach for Secure Authentication of Cloud Servers
by Shahin Fatima & Shish Ahmad - 33-57 Towards an Intelligent Framework for Cloud Service Discovery
by Abdullah Marish Ali & Siti Mariyam Shamsuddin & Fathy E. Eassa & Faisal Saeed & Madini O. Alassafi & Tawfik Al-Hadhrami & Ahmed M. Elmisery - 58-71 Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model
by Divya Sharma & Gireesh Kumar & Richa Sharma - 72-91 Effective Utilization of Resources Through Optimal Allocation and Opportunistic Migration of Virtual Machines in Cloud Environment
by Priyanka H. & Mary Cherian
April 2021, Volume 11, Issue 2
- 1-13 Detecting Compromised Social Network Accounts Using Deep Learning for Behavior and Text Analyses
by Steven Yen & Melody Moh & Teng-Sheng Moh - 1-16 Assisted-Fog-Based Framework for IoT-Based Healthcare Data Preservation
by Mohamed Sarrab & Fatma Alshohoumi - 17-31 A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual Verification
by Lanfang Zhang & Zhiyong Zhang & Ting Zhao - 32-47 Using E-Reputation for Sentiment Analysis: Twitter as a Case Study
by Dhai Eddine Salhi & Abelkamel Tari & Mohand Tahar Kechadi - 48-66 Improvement of QoS in an IoT Ecosystem by Integrating Fog Computing and SDN
by Ishtiaq Ahammad & Md. Ashikur Rahman Khan & Zayed Us Salehin & Main Uddin & Sultana Jahan Soheli - 67-96 Multi-Cloud Adoption Challenges for the Cloud-Native Era: Best Practices and Solution Approaches
by Pethuru Raj Chelliah & Chellammal Surianarayanan
January 2021, Volume 11, Issue 1
- 1-20 A Reliable Trust Computing Mechanism in Fog Computing
by Vijay Lingaraddi Hallappanavar & Mahantesh N. Birje - 21-51 A Robust and Efficient MCDM-Based Framework for Cloud Service Selection Using Modified TOPSIS
by Rohit Kumar Tiwari & Rakesh Kumar - 52-72 Gaussian Distribution-Based Machine Learning Scheme for Anomaly Detection in Healthcare Sensor Cloud
by Rajendra Kumar Dwivedi & Rakesh Kumar & Rajkumar Buyya - 73-92 A Multi-Agent-Based Data Collection and Aggregation Model for Fog-Enabled Cloud Monitoring
by Chetan M. Bulla & Mahantesh N. Birje - 93-111 Predictive Data Center Selection Scheme for Response Time Optimization in Cloud Computing
by Deepak Kapgate
October 2020, Volume 10, Issue 4
- 1-12 Biometrics-Based Un-Locker to Enhance Cloud Security Systems
by Ashima Narang & Deepali Gupta & Amandeep Kaur - 13-27 Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths
by Ritu Bansal & Vikash Kumar Singh - 28-47 Cloud Computing as the Next Utility: Market Strategies for Cloud Service Providers
by Alexander Bogislav Herzfeldt & Hans Peter Rauer & Reimar Weißbach & Christoph Ertl - 48-69 Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs
by Acheampong Owusu - 70-97 Execution of Long-Duration Multi-Cloud Serverless Functions Using Selective Migration-Based Approach
by Boubaker Soltani & Afifa Ghenai & Nadia Zeghib
July 2020, Volume 10, Issue 3
- 1-16 Multi-Factor Performance Comparison of Amazon Web Services Elastic Compute Cluster and Google Cloud Platform Compute Engine
by Sanjay P. Ahuja & Emily Czarnecki & Sean Willison - 17-53 A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing
by Ahmad Al-Nawasrah & Ammar Ali Almomani & Samer Atawneh & Mohammad Alauthman - 54-66 Merkle Tree and Blockchain-Based Cloud Data Auditing
by Arun Prasad Mohan & Mohamed Asfak R. & Angelin Gladston - 67-80 SCEF: A Model for Prevention of DDoS Attacks From the Cloud
by Ganeshayya Ishwarayya Shidaganti & Amogh Shreedhar Inamdar & Sindhuja V. Rai & Anagha M. Rajeev - 81-95 Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds
by Djouhra Dad & Ghalem Belalem - 96-110 Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan
by Khalid Ali Rababah & Bilal Ali Al-nassar & Sana'a Nawaf Al-Nsour
April 2020, Volume 10, Issue 2
- 1-21 Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree
by Muhammad Aliyu & Murali M & Abdulsalam Y. Gital & Souley Boukari - 22-35 A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm
by Sudipta Sahana & Tanmoy Mukherjee & Debabrata Sarddar - 36-55 Offloading as a Service Middleware for Mobile Cloud Apps
by Hamid A. Jadad & Abderezak Touzene & Khaled Day - 56-76 Multi Factor Two-way Hash-Based Authentication in Cloud Computing
by K. DeviPriya & Sumalatha Lingamgunta - 77-92 Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System
by M. Sumathi & S. Sangeetha
January 2020, Volume 10, Issue 1
- 1-10 Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications
by Sanjay P. Ahuja & Nathan Wheeler - 11-27 Strategic Outsourcing to Cloud Computing: A Comprehensive Framework Based on Analytic Hierarchy Process
by Abdelwahhab SATTA & Sihem Mostefai - 28-45 Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud
by Praveen Kumar Premkamal & Syam Kumar Pasupuleti & Alphonse PJA - 46-63 Performance Enhancement of Cloud Based Storage using Disk Scheduling Technique
by Saswati Sarkar & Anirban Kundu - 64-84 Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing
by Shweta Kaushik & Charu Gandhi
October 2019, Volume 9, Issue 4
- 1-20 Privacy-Preserving Public Auditing and Data Dynamics for Secure Cloud Storage Based on Exact Regenerated Code
by Syam Kumar Pasupuleti - 21-36 Ensure Hierarchal Identity Based Data Security in Cloud Environment
by Shweta Kaushik & Charu Gandhi - 37-65 Examining the Antecedents of Cloud Service Profitability
by Alexander Herzfeldt & Sebastian Floerecke & Christoph Ertl & Helmut Krcmar - 66-85 On Investigating Energy Stability for Cellular Automata Based PageRank Validation Model in Green Cloud
by Arnab Mitra - 86-106 Policy-Driven Middleware for Multi-Tenant SaaS Services Configuration
by Khadija Aouzal & Hatim Hafiddi & Mohamed Dahchour
July 2019, Volume 9, Issue 3
- 1-21 A Novel Meta-Information Management System for SaaS
by Amit Kr Mandal & Aniban Sarkar - 22-36 Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection
by Ashwani Kumar - 37-57 Multi-Objective Genetic Algorithm for Tasks Allocation in Cloud Computing
by Youssef Harrath & Rashed Bahlool - 58-74 Context-Aware Prediction Model for Offloading Mobile Application Tasks to Mobile Cloud Environments
by Hamid A. Jadad & Abederezak Touzene & Khaled Day & Nasser Alziedi & Bassel Arafeh - 75-88 Dynamic Load Balancing Using Hybrid Approach
by Sunita Gond & Shailendra Singh - 89-109 Multiple Perspective of Cloud Computing Adoption Determinants in Higher Education a Systematic Review
by Mohammed Banu Ali
April 2019, Volume 9, Issue 2
- 1-27 Adoption and Success of e-HRM in a Cloud Computing Environment: A Field Study
by Robert-Christian Ziebell & Jose Albors-Garrigos & Klaus-Peter Schoeneberg & Maria Rosario Perello Marin - 28-42 Factors Affecting Students' Intention Toward Mobile Cloud Computing: Mobile Cloud Computing
by Fatheia Hassan Abdulfattah - 43-59 IoT Data Compression and Optimization Techniques in Cloud Storage: Current Prospects and Future Directions
by Kaium Hossain & Mizanur Rahman & Shanto Roy - 60-78 Distributed Ledger Technology based Property Transaction System with Support for IoT Devices
by Nikita Singh & Manu Vardhan - 79-98 An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms
by Oladayo Olufemi Olakanmi & Adedamola Dada
January 2019, Volume 9, Issue 1
- 1-15 U-LITE, a Private Cloud Approach for Particle Physics Computing
by Barbara Demin & Sandra Parlati & Pietro Fedele Spinnato & Stefano Stalio - 16-32 Performance of Memory Virtualization Using Global Memory Resource Balancing
by Pvss Gangadhar & Ashok Kumar Hota & Mandapati Venkateswara Rao & Vedula Venkateswara Rao - 33-49 Fast and Efficient Multiview Access Control Mechanism for Cloud Based Agriculture Storage Management System
by Kuldeep Sambrekar & Vijay S. Rajpurohit - 50-58 Vulnerability of the Synchronization Process in the Quantum Key Distribution System
by A. P. Pljonkin - 59-81 Towards Green Cloud Computing an Algorithmic Approach for Energy Minimization in Cloud Data Centers
by Jenia Afrin Jeba & Shanto Roy & Mahbub Or Rashid & Syeda Tanjila Atik & Md Whaiduzzaman
October 2018, Volume 8, Issue 4
- 1-19 A Context-Aware Museum-Guide System Based on Cloud Computing
by Hamed Vahdat-Nejad & Mohammad Sadeq Navabi & Hosein Khosravi-Mahmouei - 20-28 An Improved Genetic Algorithm for Document Clustering on the Cloud
by Ruksana Akter & Yoojin Chung - 29-48 Assignment of Virtual Networks to Substrate Network for Software Defined Networks
by Ali Akbar Nasiri & Farnaz Derakhshan - 49-71 An Analysis of the Factors Affecting the Adoption of Cloud Computing in Higher Educational Institutions: A Developing Country Perspective
by Ali Tarhini & Khamis Al-Gharbi & Ali Al-Badi & Yousuf Salim AlHinai - 72-87 KIET Framework for Cloud Adoption: Indian Banking Case Study
by Lalit Mohan Sanagavarapu & Gangadharan G.R. & Raghu Reddy Y. - 88-117 Quantifying the Resilience of Cloud-Based Manufacturing Composite Services
by Mohammad Reza Namjoo & Abbas Keramati & S. Ali Torabi & Fariborz Jolai - 118-133 A New Conception of Load Balancing in Cloud Computing Using Tasks Classification Levels
by Fahim Youssef & Ben Lahmar El Habib & Rahhali Hamza & Labriji El Houssine & Eddaoui Ahmed & Mostafa Hanoune
July 2018, Volume 8, Issue 3
- 1-19 Fault Tolerant and Optimal Task Clustering for Scientific Workflow in Cloud
by Nagaraj V. Dharwadkar & Shivananda R. Poojara & Priyanka M. Kadam - 20-31 Efficient Fault Tolerance on Cloud Environments
by Sam Goundar & Akashdeep Bhardwaj - 32-47 A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE
by Cheng Li & Zhiyong Zhang & Lanfang Zhang - 48-59 Performance Evaluation of Unstructured PBRA for Bigdata with Cassandra and MongoDB in Cloud
by Sangeeta Gupta - 60-77 An Efficient Data Replication Algorithm for Distributed Systems
by Sanjaya Kumar Panda & Saswati Naik - 78-117 Cost Effective Approaches for Content Placement in Cloud CDN Using Dynamic Content Delivery Model
by S. Sajitha Banu & S.R. Balasundaram
April 2018, Volume 8, Issue 2
- 1-26 On the Exploration of Equal Length Cellular Automata Rules Targeting a MapReduce Design in Cloud
by Arnab Mitra & Anirban Kundu & Matangini Chattopadhyay & Samiran Chattopadhyay - 27-46 An Affordable Hybrid Cloud Based Cluster for Secure Health Informatics Research
by Basit Qureshi - 47-65 Architectural Design of Trusted Platform for IaaS Cloud Computing
by Ubaidullah Alias Kashif & Zulfiqar Ali Memon & Shafaq Siddiqui & Abdul Rasheed Balouch & Rakhi Batra - 66-95 An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing
by Adil Maarouf & Youssef Mifrah & Abderrahim Marzouk & Abdelkrim Haqiq - 96-112 An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms
by Ammar Almomani & Mohammad Alauthman & Firas Albalas & O. Dorgham & Atef Obeidat - 113-129 Secure NoSQL for the Social Networking and E-Commerce Based Bigdata Applications Deployed in Cloud
by Sangeeta Gupta & Narsimha Gugulothu
January 2018, Volume 8, Issue 1
- 1-20 Towards a Better Understanding of Ubiquitous Cloud Computing
by Hamed Vahdat-Nejad & Shaghayegh Ostadi Eilaki & Shaghayegh Izadpanah - 21-54 Assessment of Honeypots: Issues, Challenges and Future Directions
by B. B. Gupta & Alisha Gupta - 55-79 A Novel Security Framework for Managing Android Permissions Using Blockchain Technology
by Abdellah Ouaguid & Noreddine Abghour & Mohammed Ouzzif - 80-96 On the Performance Evaluation of IaaS Cloud Services With System-Level Benchmarks
by Sanjay P. Ahuja & Niharika Deval - 97-116 Cloud Computing Adoption: Scale Development, Measurement and Validation
by Pragati Priyadarshinee - 117-142 Energy-Efficient Task Consolidation for Cloud Data Center
by Sudhansu Shekhar Patra - 143-153 A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing
by Hoon Ko & Libor Mesicek & Jongsun Choi & Junho Choi & Seogchan Hwang - 154-172 Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud
by O. Dorgham & Banan Al-Rahamneh & Ammar Almomani & Moh'd Al-Hadidi & Khalaf F. Khatatneh
October 2017, Volume 7, Issue 4
- 1-19 The Impact of Cloud-Based Digital Transformation on IT Service Providers: Evidence From Focus Groups
by Trevor Clohessy & Thomas Acton & Lorraine Morgan - 20-40 An Energy-Aware Task Scheduling in the Cloud Computing Using a Hybrid Cultural and Ant Colony Optimization Algorithm
by Poopak Azad & Nima Jafari Navimipour