IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Journal of Cloud Computing

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Special Issues - Guidelines for Guest Editors

For more information for Guest Editors, please see our Guidelines

Special Issues - Call for Papers

We welcome submissions for the upcoming special issues of the Journal of Cloud Computing

Computational Intelligence Techniques for Pattern Recognition in Multimedia Data Guest Editors: Mughair Aslam Bhatti, Sibghat Ullah Bazai, Konstantinos E. Psannis Submission deadline:  3 May 2024 

Advanced Blockchain and Federated Learning Techniques Towards Secure Cloud Computing Guest Editors: Yuan Liu, Jie Zhang, Athirai A. Irissappane, Zhu Sun Submission deadline:  30 April 2024

Mobile Edge Computing Meets AI Guest Editors: Lianyong Qi, Maqbool Khan, Qiang He, Shui Yu, Wajid Rafique Submission deadline:  3 May 2024   Blockchain-enabled Decentralized Cloud/Edge Computing Guest Editors: Qingqi Pei, Kaoru Ota, Martin Gilje Jaatun, Jie Feng, Shen Su Submission deadline: 31 st  March 2023

  • Most accessed

MSCO: Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments

Authors: Veni Thangaraj and Thankaraja Raja Sree

Provably secure data selective sharing scheme with cloud-based decentralized trust management systems

Authors: S. Velmurugan, M. Prakash, S. Neelakandan and Arun Radhakrishnan

Stacked-CNN-BiLSTM-COVID: an effective stacked ensemble deep learning framework for sentiment analysis of Arabic COVID-19 tweets

Authors: Naglaa Abdelhady, Taysir Hassan A. Soliman and Mohammed F. Farghally

Traffic prediction for diverse edge IoT data using graph network

Authors: Tao Shen, Lu Zhang, Renkang Geng, Shuai Li and Bin Sun

Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy

Authors: Siren Zhao, Jilun Zhang and Jianbin Zhang

Most recent articles RSS

View all articles

A quantitative analysis of current security concerns and solutions for cloud computing

Authors: Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi

Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective

Authors: Justice Opara-Martins, Reza Sahandi and Feng Tian

Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas

Authors: Amr Adel

Intrusion detection systems for IoT-based smart environments: a survey

Authors: Mohamed Faisal Elrawy, Ali Ismail Awad and Hesham F. A. Hamed

Load balancing in cloud computing – A hierarchical taxonomical classification

Authors: Shahbaz Afzal and G. Kavitha

Most accessed articles RSS

Aims and scope

The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future. Comprehensive review and survey articles that offer up new insights, and lay the foundations for further exploratory and experimental work, are also relevant.

Published articles will impart advanced theoretical grounding and practical application of Clouds and related systems as are offered up by the numerous possible combinations of internet-based software, development stacks and database availability, and virtualized hardware for storing, processing, analysing and visualizing data. Where relevant, Clouds should be scrutinized alongside other paradigms such Peer to Peer (P2P) computing, Cluster computing, Grid computing, and so on. Thorough examination of Clouds with respect to issues of management, governance, trust and privacy, and interoperability, are also in scope. The Journal of Cloud Computing is indexed by the Science Citation Index Expanded/SCIE. SCI has subsequently merged into SCIE.  

Cloud Computing is now a topic of significant impact and, while it may represent an evolution in technology terms, it is revolutionising the ways in which both academia and industry are thinking and acting. The Journal of Cloud Computing, Advances, Systems and Applications (JoCCASA) has been launched to offer a high quality journal geared entirely towards the research that will offer up future generations of Clouds. The journal publishes research that addresses the entire Cloud stack, and as relates Clouds to wider paradigms and topics.

Chunming Rong, Editor-in-Chief University of Stavanger, Norway

  • Editorial Board
  • Sign up for article alerts and news from this journal

Annual Journal Metrics

2022 Citation Impact 4.0 - 2-year Impact Factor 4.4 - 5-year Impact Factor 1.711 - SNIP (Source Normalized Impact per Paper) 0.976 - SJR (SCImago Journal Rank)

2023 Speed 10 days submission to first editorial decision for all manuscripts (Median) 116 days submission to accept (Median)

2023 Usage  733,672 downloads 49 Altmetric mentions 

  • More about our metrics
  • ISSN: 2192-113X (electronic)

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Cloud computing research paper

Profile image of kavitha chinnadurai

Related Papers

Venkataravana Nayak

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further largescale Distributed Denial-of-Service (DDoS).DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnerability scanning, and compromising identified vulnerable virtual machines as zombies, and finally DDoS attacks through the compromised zombies. Within the cloud system, especially the Infrastructure-as-a-Service (IaaS) clouds, the detection of zombie exploration attacks is extremely difficult. This is because cloud users may install vulnerable applications on their virtual machines. To prevent vulnerable virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability detection, measurement, and countermeasure selection mechanism called NICE, which is bui...

cloud computing research paper free download

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

https://www.ijert.org/zombie-avoidance-using-attack-analyzer-in-cloud-environment https://www.ijert.org/research/zombie-avoidance-using-attack-analyzer-in-cloud-environment-IJERTV3IS041961.pdf Cloud Computing refers to On-demand network access to a shared pool of manageable computing resources which are applicable to both software and hardware services. Cloud Computing makes use of available resources on "on-need" basis. Security problem plays the most Significant role in cloud computing. Due to this nature, attackers launch Distributed Denial of Service to make resources unavailable to potential users. Usually, Denial of Service easily attacks the virtual machines as Zombies but it is extremely hard to detect Zombies. In this paper, we have proposed a viable approach to prevent the vulnerable virtual machine from Zombies through multi-phase distributed susceptibility detection, measurement and countermeasure selection mechanism called NICE. This experimental model shows a more secure and reliable network access to reconfigure the virtual network.

https://www.ijert.org/an-efficient-mechanism-for-intrusion-detection-and-prevention-of-zombie-attacks-in-cloud https://www.ijert.org/research/an-efficient-mechanism-for-intrusion-detection-and-prevention-of-zombie-attacks-in-cloud-IJERTV3IS042095.pdf Cloud Computing is an emerging technology in recent trends as it provides several services to user. One of the main objectives of cloud is to provide storage capability of the users. Hence security is the main concern with respect to cloud computing as the users are given access to install various applications and store data in the cloud. Among the various attacks on the cloud, Zombie attack and in particular Distributed Denial of Service (DDoS) is considered loosely in the literature survey. DDoS involves the attacker launching an attack at early stage with multistep exploitation, low-vulnerability scanning and compromising the identified vulnerable virtual machine as zombies and later launching a DDoS through the zombie machines. Detecting such an attack is difficult as the cloud user may install vulnerable application in the virtual machine created for the user's purpose. This survey paper aims at compiling the various mechanism developed so far to provide solutions for the various attacks and we conclude by providing an efficient intrusion detection system to identify zombie machine in particular and avoid the attacker from launching an DDoS attack.

In Cloud System, virtual machine is considered as the security threat. This is because all cloud users install their applications in virtual machines. Particularly, intruders can exploit vulnerability to a cloud system and compromise virtual machines to deploy further large scale types of attack like distributed denial of service (DDOS). Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users. To prevent vulnerable virtual machine from being compromised in the cloud, the proposed framework introducing multiphase distributed vulnerability detection measurement and countermeasure selection mechanism. It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability. The model consist information about virtual topology and also about cloud servers. Based on the information provided by the analytical model then the system deploy an appropriate counter measures.

Editor IJCS

GJESR Journal

Cloud computing is getting popular now a days. Use of cloud is increase daily. As in the cloud environment resources such as OS virtual machines, software are shared by billions of users of the cloud. The virtual machines resides on the cloud are more vulnerable to the denial of service attack. If this machines are connected to more achiness then it becomes more dangerous as it harms all cloud network. In the cloud especially infrastructure as a service the detection of denial of service attack is more challenging task. This is due to cloud users can install vulnerable software on the virtual machines. In this paper we have proposed multiphase vulnerability detection in the cloud environment. We have proposed an open flow network program NICE to detect and mitigate the attacks on the virtual machines. NICE is built on the scenario attack graph based model. We have proposed a novel approach to mitigate the attacks in the cloud environment by selecting different countermeasure depending upon the percentages of vulnerability of the virtual machines. Now a days IDS is used to detect the attack in the network by many organizations. In the proposed system we focuses on the distributed denial of service attack in the cloud. Keywords: Cloud computing, Ccenario attack graph, Correlation, Network analyzer, Intrusion, zombies.

Intrusion Detection and Prevention Systems (IDPS) are used: to identify possible attacks, collecting information about them and the trying to stop their occurrence and at last reporting them to the system administrator. These systems are used by some organizations to detect the weaknesses in their security policies, documenting existing attacks and threats and preventing an individual from violating security policies. Because of their advantages these systems became an important part of the security infrastructure in nearly every organization. In a Cloud computing environment, attackers can determine the vulnerabilities in the cloud systems and compromise the virtual machines to set out large scale Distributed Denial-of-Service (DDOS) attack. To avert these virtual machines from concession, we propose a multi-phase solution NICE (Network Intrusion Detection and Countermeasure selection in Virtual Network Systems).

International Journal of Intelligent Engineering and Systems

Hosam El-Sofany

Anh Trần Việt

—Innovation is necessary to ride the inevitable tide of change. The buzzword of 2009 seems to be "cloud computing" which is a futuristic platform to provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. But with this ever developing cloud concept, problems are arising from this ―golden solution‖ in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee. Regardless of company size or volume and magnitude of the cloud, this paper explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another datacenter. We're not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.

IRJET Journal

Clouding Computing is very popular nowadays. It is the on demand availability of computer system resources like data storage and computing program, information or multimedia content. All these data or information is available to different user with the help of internet. The cloud computing architecture in which third party users, virtual machine and cloud service provider are involved for data uploading and downloading with the help of internet. Security of this architecture is the main issue, today's organizations, but there exist many security vulnerabilities. Among all type of security attacks zombie attack is the most dangerous type of attack. This attack decreases the network performance in terms of delay, information and bandwidth consumption. In the zombie attack, some unauthorized user may join the network which spoof data of the authorized user and zombie nodes start communicate with virtual machine on the behalf of authorized user. In this proposed work, the technique based on the strong authentication which has been detecting malicious and unauthorized user from the network on cloud and isolates them from the cloud architecture. There are various techniques, methods and algorithms described in this paper to isolate a zombie attack and other security vulnerabilities at cloud architecture. We discuss the methods for detection and stopping this kind of zombie attack from cloud.

RELATED PAPERS

Anais do Seminário do Programa de Pós-Graduação em Desenho Cultura e Interatividade

Suely Souza

Fresenius' Journal of Analytical Chemistry

Marjan Veber

Water and Society V

David Cristóbal-Acevedo

mohun ritesh

Daz Saunders

Maria Teresa Iglesias López

The American Journal of Clinical Nutrition

Charles Czeisler

Carolina Campos Borges

Physica A: Statistical Mechanics and its Applications

Santiago L Rovere

Psicologia - Teoria e Prática

Chrissie Carvalho

… des NRW-Programms …

Andrea Pufahl

Tri Tri lestari wirawati

Nucleic Acids Research

mukta asnani

Pertanika Journal of …

ABDULAZEEZ IBRAHIM

Yohanes Harsoyo

Davidson paulo

Plant Physiology

David L Ferguson

Tri Anika Wati

Journal of Applied Toxicology

Toshinari Suzuki

Fadli Mulyadi

2013 ASEE Annual Conference & Exposition Proceedings

Merwan Mehta

Yolanda Peña

Working paper (Federal Reserve Bank of Cleveland)

Peter Ritchken

Süleyman Demirel Üniversitesi Eğirdir Su Ürünleri Fakültesi Dergisi

HIKMET YETER ÇOĞUN

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

green cloud computing Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Unconstrained Power Management Algorithm for Green Cloud Computing

Green cloud computing-oriented algorithmic approach-based virtual machine consolidation, green-cloud computing (g-cc) data center and its architecture toward efficient usage of energy, a new metaheuristic‐based method for solving the virtual machines migration problem in the green cloud computing, mapping and consolidation of vms using locust-inspired algorithms for green cloud computing, enabling rank-based distribution of microservices among containers for green cloud computing environment, an optimized vm placement approach to reduce energy consumption in green cloud computing, investigation study on secured data communication with blockchain and iot in green cloud computing, energy aware load balancing algorithm for upgraded effectiveness in green cloud computing, study on green cloud computing—a review, export citation format, share document.

IMAGES

  1. (PDF) Research Paper on Cloud Computing

    cloud computing research paper free download

  2. (PDF) Green Cloud Computing: Balancing Energy in Processing, Storage

    cloud computing research paper free download

  3. Research Paper

    cloud computing research paper free download

  4. Cloud computing essay

    cloud computing research paper free download

  5. (PDF) CLOUD COMPUTING

    cloud computing research paper free download

  6. (PDF) Review on Green Cloud Computing: A Step Towards Saving Global

    cloud computing research paper free download

VIDEO

  1. Cloud Computing Research paper presentation

  2. Cloud computing important questions

  3. Cloud Computing The Future of Data Storage

  4. Cloud Computing|| Research paper based||@learnprogramming5090 Review paper

  5. ECE 528

  6. Cloud Computing week 12 assignment answers NPTEL @learninbrief

COMMENTS

  1. IEEE Cloud Computing

    Profile Information. Communications Preferences. Profession and Education. Technical Interests. Need Help? US & Canada:+1 800 678 4333. Worldwide: +1 732 981 0060. Contact & Support. About IEEE Xplore.

  2. (PDF) Research Paper on Cloud Computing

    Student. , M.Sc. I.T., I.C.S. College, Khed, Ratnagri. Abstract: Cloud Computing has come of age later Amazons introduce the first of its kind of cloud services in2006. It is. particularly ...

  3. cloud computing Latest Research Papers

    The paper further compares and reviews different layout model for the discovery of services, selection of services and composition of services in Cloud computing. Recent research trends in service composition are identified and then research about microservices are evaluated and shown in the form of table and graphs. Download Full-text.

  4. (PDF) A COMPREHENSIVE STUDY ON CLOUD COMPUTING

    A COMPREHENSIVE STUDY ON CLOUD. COMPUTING PARADIGM. Ab Rashid Dar 1, Dr. D. Ravindran 2. 1,2 Department of Computer Science, St. Joseph's College. (Autonomous), Tiruchirappalli Tamil Nadu, (Indi ...

  5. Ieee Transactions on Cloud Computing, Vol. Xx, No. X, February 2022 1

    Index Terms—Serverless Computing, Metric-Based Autoscaling, Knative, Google Cloud Run, Performance Modelling, Optimization, Stochastic Processes. F 1 INTRODUCTION S ERVERLESS computing platforms are the latest paradigm in the cloud computing era that aim to minimize the administration tasks required to deploy a workload to the cloud.

  6. Welcome to the new Journal of Cloud Computing by Springer

    Metrics. Since 2012, the Journal of Cloud Computing has been promoting research and technology development related to Cloud Computing, as an elastic framework for provisioning complex infrastructure services on-demand, including service models such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service ...

  7. Articles

    Huimin Han, Harold Neira-Molina, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous, Bilal Ahmed and Yazeed Yasin Ghadi. Journal of Cloud Computing 2024 13 :77. Correction Published on: 27 March 2024. The original article was published in Journal of Cloud Computing 2024 13 :20. Full Text.

  8. Cloud Computing: A Systematic Literature Review and Future Agenda

    Download full -text PDF Read full ... discovers the research gaps and provides a research agenda for the future research on cloud computing within the context of information management in business ...

  9. Home page

    The Journal of Cloud Computing, Advances, Systems and Applications (JoCCASA) has been launched to offer a high quality journal geared entirely towards the research that will offer up future generations of Clouds. The journal publishes research that addresses the entire Cloud stack, and as relates Clouds to wider paradigms and topics.

  10. Cloud Computing: a Prologue

    The concept of cloud computing on the basis of the various definitions available in the industry and the characteristics of cloud computing are being analyzed in this paper. The paper also describes the main cloud service providers and their products followed by primary cloud computing operating systems. Keywords: Cloud Computing, IaaS, PaaS ...

  11. Adoption of cloud computing as innovation in the organization

    Barriers to Cloud Computing deployment can be observed in the work of Jangjou M et al., 2022 where there is a strong focus on the Cybersecurity risks when adopting Cloud Computing technology in both client and server-side layers of Cloud architecture. 26 These risks include Providing vulnerable APIs to Cloud users, lack of awareness of the ...

  12. Research on Mobile Cloud Computing: Review, Trend and Perspectives

    1) Framework: cloud computing systems actually can be considered as a collection of different services, thus the framework of cloud computing is divided into three layers, which are infrastructure layer, platform layer, and application layer (see Fig. 2). Fig. 2: The Framework of Cloud Computing.

  13. PDF Cloud Computing Introduction

    Cloud computing -Characteristics "Cloud Computing offers on-demand, scalable and elastic computing (and storage services). The resources used for these services can be metered and users are charged only for the resources used. " from the Book Shared Resources and Resource Management: 1.Cloud uses a shared pool of resources

  14. (PDF) A Review Paper on Cloud Computing

    It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The ...

  15. PDF TOP 10 CLOUD COMPUTING PAPERS

    A principal goal of this paper is to identify privacy and confidentiality issue that may be of interest and concern to cloud computing participants and users [11]. Thus this paper explores to elicit possible issues and regulations in the area of privacy that affect the implementation of Cloud Computing Technologies.

  16. (PDF) Cloud computing research paper

    2014 •. Venkataravana Nayak. Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further largescale Distributed Denial-of-Service (DDoS).DDoS attacks usually ...

  17. PDF Cloud Computing: Opportunities and Challenges

    Keywords: Cloud Computing, Cloud Services, Cloud Opportunities 1. Introduction Cloud computing is one of the current which grows very fast all around the world. Cloud computing is a construct which allows accessing applications which are stored in the remote locations. In other word, cloud computing is distance data center.

  18. (PDF) The Future of Cloud Computing: Opportunities ...

    Thapar Institute of Engineering and Technology School of Computing and Information Systems, Patiala, Punjab, India The University of Melbourne, Australia. [email protected], vpsingh@thapar ...

  19. green cloud computing Latest Research Papers

    Find the latest published documents for green cloud computing, Related hot topics, top authors, the most cited documents, and related journals. ... Download Full-text. GREEN-Cloud Computing (G-CC) Data Center and Its Architecture toward Efficient Usage of Energy

  20. Wall Street Favorites: 3 Cloud Computing Stocks With ...

    Wager on these top cloud computing stocks fueling the AI revolution and shaping tomorrow's technology. Amazon (): With a 31% global market share in cloud computing, Amazon's AWS is well ...

  21. (PDF) Hybrid Clouds Arising from Software as a Service Adoption

    Cloud Computing builds on the latest achieve- ments of diverse research areas, such as Grid Computing, Service-oriented computing, business processes and virtual- ization.

  22. (PDF) Research and Development on Cloud Computing

    In this research paper we have discussed importance of cloud computing, history, and the latest technical advancements in depth. Also, this study aims to introduce and define Software as a Service.