brand

Call for papers

The annual ACM Symposium on Cloud Computing (SoCC’23) brings together researchers, developers, users, and practitioners interested in cloud computing. ACM SoCC’23 is the 14th edition of the premier conference on cloud computing; it is the only conference co-sponsored by the ACM Special Interest Groups on Management of Data ( SIGMOD ) and Operating Systems ( SIGOPS ).

SoCC’23 will take place in-person in Santa Cruz, California. As in prior SoCC conferences, SoCC’23 will foster connections between the academic and industrial communities operating in the cloud space.

We solicit original contributions on all aspects of cloud computing. We particularly encourage submissions on the research, development, practice, and experience of cloud computing systems and data management. Specific topics of interest include but are not limited to the following, when related to the cloud:

  • Administration, service level agreements, and manageability
  • Blockchain systems and decentralized ledgers
  • Confidential computing
  • Cross data center data management
  • Datacenter architectures
  • Data markets and data economy
  • Distributed and networked systems
  • Distributed/parallel query processing and optimization
  • Edge and fog computing
  • Energy efficiency, sustainability, and management
  • Fault tolerance, high availability, and reliability
  • Internet-of-Things infrastructure and cyber-physical systems
  • Large-scale cloud applications
  • Machine learning for systems
  • Multi-tenancy in the cloud
  • Networking and communication
  • Operating systems and system support
  • Platform-as-a-Service and other cloud models
  • Privacy and security
  • Programming models for cloud (e.g., serverless, microservices)
  • Resource management, allocation, scheduling, provisioning. and metering
  • Scientific data management and workflows
  • Sky computing
  • Storage systems and new storage technologies
  • Systems for machine learning
  • Tracing and monitoring systems
  • Transactional models and transaction processing
  • Virtualization, containers, and virtual machines

Submission Categories

Authors can submit a paper in one of the following categories:

  • Research Papers (12 pages + unlimited references) : describe original research, where novelty is a primary consideration.
  • Industry Papers (12 pages + unlimited references) : Industry papers describe important industrial advances and application achievements. It encourages work on applying recent research work to real-world problems and industrial systems. Moreover, new applications, systems, challenging real-world use cases, practical customer case studies, as well as analysis of applied technology in an industrial context are highly welcome. We require that at least one of the authors has a non-academic affiliation.
  • Vision Papers (6 pages + unlimited references) : Vision papers describe speculative but well-reasoned and thought-provoking ideas, where insight is a primary consideration. Vision papers should present ideas and solutions that differ from prior work and the status quo. A full-fledged system implementation is not required, but empirical evidence and measurements may be helpful in illustrating the feasibility of the proposed vision.
  • Work-in-Progress Papers (4 pages + unlimited references) : This is a new category of papers which discusses early-stage results of highly promising research. These papers are similar to workshop papers in other venues, i.e., if you have some early working system and some empirical evidence to support your view, but still have open questions, a work-in-progress paper is a suitable fit.

All submissions will be judged based on their originality, technical merit, relevance, value to the community, and likelihood of producing interesting discussions at the symposium. Submissions will be kept confidential until accepted. Rejected submissions will be kept confidential permanently.

At least one author of each accepted paper is expected to attend the conference in order to present the paper.

Submission Guidelines

Authors must submit original papers that are not being considered for publication in other forums. Submissions cannot be accompanied by nondisclosure, confidentiality, or similar agreements. Further, all submitted papers must cite and clearly differentiate from relevant prior publications, including workshop papers from the same or other authors.

Papers that violate these requirements will be rejected without reviews. Judicious use of color is permitted, but the paper should print clearly in black and white. Non-rejected papers will be shepherded, and final acceptance will be conditional on the shepherd’s approval.

Reviewing for Research, Vision and Work-in-Progress papers is dual anonymous (i.e., author identities will be kept confidential from reviewers during the review process, and vice versa) . Authors must make a good faith effort to anonymize their submissions, and they should not identify themselves either explicitly or by implication (e.g., through the references or acknowledgments). Submissions violating the detailed formatting and anonymization rules will not be considered for review.

Reviewing for Industry papers is transparent with respect to the company/product, but dual anonymous with respect to the authors . That is, you need not anonymize the company or products/services you are referring to. However, you should not reveal the paper’s author names directly in your submission.

Prior or concurrent publication in non-peer-reviewed contexts (e.g., arXiv.org, technical reports, talks, and social media) is permitted. However, your submission must use an anonymized system/project name that is different from any used in such contexts.

If you are uncertain about how to anonymize your submission, please contact the program co-chairs (contact information is at the end of the page) well in advance of the submission deadline.

Formatting Guidelines

Formatting : Research papers must follow the ACM Proceedings Format, using either the sample-sigconf.tex provided at https://www.acm.org/publications/proceedings-template for LaTeX (version 2e) or Word, respectively. We require 9pt font size for paper submission. The LaTeX template should be used as follows: \documentclass[sigconf, anonymous]{acmart} . The margins, inter-column spacing, and line spacing in the templates must be kept unchanged. Any submitted paper violating the length, file type, or formatting requirements will be rejected without review. Judicious use of color is permitted, but the paper should print clearly in black and white.

Paper type : As a subtitle, papers should indicate the submission type (e.g., research, industry, vision, work-in-progress).

File type : Each research paper is to be submitted as a single PDF file, formatted for 8.5" x 11" paper and no more than 10 MB in file size. (Larger files will be rejected by the submission site.) Submitted papers must print without difficulty on a variety of printers, using Adobe Acrobat Reader. It is the responsibility of the authors to ensure that their submitted PDF file renders correctly.

Guidance on Inclusion

ACM Symposium on Cloud Computing (SoCC) brings a large scientific and technical community together and has a direct impact on many people from different backgrounds from around the world. Hence, we deeply care about D&I and believe that using inclusive language and examples in paper writing can make a difference. Thus, we strongly encourage authors to follow the D&I writing instructions when drafting the paper submissions. this article on gender-inclusive language), and inclusive examples when describing people (e.g., see this blog post on inclusive examples). -->

Registration deadline: June 9, 2023 at 5:00 pm EDT You can register new submissions until this deadline. --> --> Submission deadline: June 9, 2023 at 5:00 pm EDT Papers must be submitted by this deadline to be reviewed. Author Response Period: August 14-18, 2023 Author Notification: September 1, 2023 Conference dates: October 30 – Nov 1, 2023

Submission Site

The paper submission site is now online at https://socc23.hotcrp.com .

IEEE Conferences

  • Symposium on Distributed Computing Continuum (DCC)

Call for Papers

  • Organizing Committee

IEEE Cloud 2023 Call for Papers

PDF Call for Papers

IEEE CLOUD 2023 invites original papers addressing all aspects of cloud computing infrastructure, applications, and business innovations. Topics of interest include but are not limited to the following:

  • Use of AI to Improve Cloud Services & Operations
  • Use of Cloud to Improve AI Research and Deployment
  • Predictive Analysis and Federated Learning
  • Anomaly Detection and Automation for Remediation & Mitigation
  • Observability, Transparency and Reproducibility
  • Cloud Computing Systems and Architectures
  • Edge Computing Systems and Architectures
  • Cloud Storage and Data Architectures
  • Cloud-centric Network Architectures (SDN, NFV, etc)
  • Computing Continuum and Edge-Cloud-HPC federation
  • Large Scale Cloud Applications
  • Edge Applications
  • Microservice-based, Containerized, & Serverless Applications
  • Digital Twins & Applications across Edge-Cloud-HPC Continuum
  • Hybrid-cloud Integration and Multi-cloud Environments
  • Distributed and Parallel Query Processing
  • Resource, Energy, Data Management
  • Cloud Metering and Monitoring
  • Containers, Serverless Computing
  • Cloud Service Adaptation and Automation
  • Cloud Federation, Service Composition
  • Sustainable Cloud Computing
  • Confidential Cloud Computing and Trusted Cloud Environments
  • Access Control, Authorization, Authentication
  • Assurance, Audit, Certification, Compliance
  • Fault Tolerance, High Availability, Reliability
  • Privacy-aware Data Management
  • Cloud Applications of Distributed Ledger Technologies
  • Cloud Strategy for Enterprise Business Transformation
  • Cloud Service Level Agreement (SLAs)
  • Economics and Business Models for XaaS
  • Cloud Quality Management
  • Cloud ROI Analysis, Cost and Pricing
  • Infrastructure as a Service (IaaS)
  • Platform as a Service (PaaS)
  • Function as a Service (FaaS)
  • Software as a Service (SaaS)
  • Network / Storage as a Service

Manuscript Guidelines and Submission Information

Please visit the Information for Authors page on the Congress website for manuscript guidelines.

Paper Submission - EasyChair

Important Dates (Anywhere on Earth)

December 1, 2022: EasyChair opens for draft submissions UPDATED: March 25, 2023: EasyChair closes for submissions (e.g., HARD submission deadline) UPDATED: May 8, 2023: Acceptance notification UPDATED: Camera-ready due: June 5, 2023 July 2-8, 2023: SERVICES Congress in Chicago

IEEE is the world’s largest professional association advancing innovation and technological excellence for the benefit of humanity. IEEE and its members inspire a global community to innovate for a better tomorrow through its highly cited publications, conferences, technology standards, and professional and educational activities. IEEE is the trusted “voice” for engineering, computing and technology information around the globe.

About IEEE Computer Society

With nearly 85,000 members, the IEEE Computer Society (CS) is the world’s leading organization of computing professionals. Founded in 1946, and the largest of the 38 societies of the Institute of Electrical and Electronics Engineers (IEEE), the CS is dedicated to advancing the theory and application of computer and information-processing technology.

About the Technical Committee on Services Computing

Founded in 2003, IEEE Computer Society’s Technical Community on Services Computing (TCSVC) is a multidisciplinary group whose purpose is to advance and coordinate work in the field of Services Computing carried out throughout the IEEE in scientific, engineering, standard, literary and educational areas. IEEE TCSVC membership details are available at http://tab.computer.org/tcsvc/

Subscribe to the PwC Newsletter

Join the community, add a new evaluation result row, cloud computing.

89 papers with code • 0 benchmarks • 0 datasets

Benchmarks Add a Result

Latest papers, cluster-wide task slowdown detection in cloud system.

cloud computing research papers 2023

To tackle these challenges, we propose SORN (i. e., Skimming Off subperiods in descending amplitude order and Reconstructing Non-slowing fluctuation), which consists of a Skimming Attention mechanism to reconstruct the compound periodicity and a Neural Optimal Transport module to distinguish cluster-wide slowdowns from other exceptional fluctuations.

Adaptive Two-Stage Cloud Resource Scaling via Hierarchical Multi-Indicator Forecasting and Bayesian Decision-Making

The surging demand for cloud computing resources, driven by the rapid growth of sophisticated large-scale models and data centers, underscores the critical importance of efficient and adaptive resource allocation.

Comparing Deep Learning Models for Rice Mapping in Bhutan Using High Resolution Satellite Imagery

For this independent model evaluation, the U-Net RGBN, RGBNE, RGBNES, and RGBN models displayed the F1-scores of 0. 5935, 0. 6154, 0. 5882, and 0. 6582, suggesting U-Net RGBNES as the best model.

Privacy-Preserving Deep Learning Using Deformable Operators for Secure Task Learning

To address these challenges, we propose a novel Privacy-Preserving framework that uses a set of deformable operators for secure task learning.

IMPaCT: Interval MDP Parallel Construction for Controller Synthesis of Large-Scale Stochastic Systems

kiguli/impact • 7 Jan 2024

This paper is concerned with developing a software tool, called IMPaCT, for the parallelized verification and controller synthesis of large-scale stochastic systems using interval Markov chains (IMCs) and interval Markov decision processes (IMDPs), respectively.

LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection

Through experiments, we prove that LiPar has great detection performance, running efficiency, and lightweight model size, which can be well adapted to the in-vehicle environment practically and protect the in-vehicle CAN bus security.

CloudEval-YAML: A Practical Benchmark for Cloud Configuration Generation

alibaba/cloudeval-yaml • 10 Nov 2023

We develop the CloudEval-YAML benchmark with practicality in mind: the dataset consists of hand-written problems with unit tests targeting practical scenarios.

Deep learning based Image Compression for Microscopy Images: An Empirical Study

In the end, we hope the present study could shed light on the potential of deep learning based image compression and the impact of image compression on downstream deep learning based image analysis models.

MLatom 3: Platform for machine learning-enhanced computational chemistry simulations and workflows

MLatom 3 is a program package designed to leverage the power of ML to enhance typical computational chemistry simulations and to create complex workflows.

Federated learning compression designed for lightweight communications

Federated Learning (FL) is a promising distributed method for edge-level machine learning, particularly for privacysensitive applications such as those in military and medical domains, where client data cannot be shared or transferred to a cloud computing server.

cloud computing Recently Published Documents

Total documents.

  • Latest Documents
  • Most Cited Documents
  • Contributed Authors
  • Related Sources
  • Related Keywords

Simulation and performance assessment of a modified throttled load balancing algorithm in cloud computing environment

<span lang="EN-US">Load balancing is crucial to ensure scalability, reliability, minimize response time, and processing time and maximize resource utilization in cloud computing. However, the load fluctuation accompanied with the distribution of a huge number of requests among a set of virtual machines (VMs) is challenging and needs effective and practical load balancers. In this work, a two listed throttled load balancer (TLT-LB) algorithm is proposed and further simulated using the CloudAnalyst simulator. The TLT-LB algorithm is based on the modification of the conventional TLB algorithm to improve the distribution of the tasks between different VMs. The performance of the TLT-LB algorithm compared to the TLB, round robin (RR), and active monitoring load balancer (AMLB) algorithms has been evaluated using two different configurations. Interestingly, the TLT-LB significantly balances the load between the VMs by reducing the loading gap between the heaviest loaded and the lightest loaded VMs to be 6.45% compared to 68.55% for the TLB and AMLB algorithms. Furthermore, the TLT-LB algorithm considerably reduces the average response time and processing time compared to the TLB, RR, and AMLB algorithms.</span>

An improved forensic-by-design framework for cloud computing with systems engineering standard compliance

Reliability of trust management systems in cloud computing.

Cloud computing is an innovation that conveys administrations like programming, stage, and framework over the web. This computing structure is wide spread and dynamic, which chips away at the compensation per-utilize model and supports virtualization. Distributed computing is expanding quickly among purchasers and has many organizations that offer types of assistance through the web. It gives an adaptable and on-request administration yet at the same time has different security dangers. Its dynamic nature makes it tweaked according to client and supplier’s necessities, subsequently making it an outstanding benefit of distributed computing. However, then again, this additionally makes trust issues and or issues like security, protection, personality, and legitimacy. In this way, the huge test in the cloud climate is selecting a perfect organization. For this, the trust component assumes a critical part, in view of the assessment of QoS and Feedback rating. Nonetheless, different difficulties are as yet present in the trust the board framework for observing and assessing the QoS. This paper talks about the current obstructions present in the trust framework. The objective of this paper is to audit the available trust models. The issues like insufficient trust between the supplier and client have made issues in information sharing likewise tended to here. Besides, it lays the limits and their enhancements to help specialists who mean to investigate this point.

Cloud Computing Adoption in the Construction Industry of Singapore: Drivers, Challenges, and Strategies

An extensive review of web-based multi granularity service composition.

The paper reviews the efforts to compose SOAP, non-SOAP and non-web services. Traditionally efforts were made for composite SOAP services, however, these efforts did not include the RESTful and non-web services. A SOAP service uses structured exchange methodology for dealing with web services while a non-SOAP follows different approach. The research paper reviews the invoking and composing a combination of SOAP, non-SOAP, and non-web services into a composite process to execute complex tasks on various devices. It also shows the systematic integration of the SOAP, non-SOAP and non-web services describing the composition of heterogeneous services than the ones conventionally used from the perspective of resource consumption. The paper further compares and reviews different layout model for the discovery of services, selection of services and composition of services in Cloud computing. Recent research trends in service composition are identified and then research about microservices are evaluated and shown in the form of table and graphs.

Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges

Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with conventional service architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchronization. Blockchain can be leveraged to address these challenges, partly due to the underlying characteristics such as transparency, traceability, decentralization, security, immutability, and automation. We present a comprehensive survey of how blockchain is applied to provide security services in the cloud computing model and we analyze the research trends of blockchain-related techniques in current cloud computing models. During the reviewing, we also briefly investigate how cloud computing can affect blockchain, especially about the performance improvements that cloud computing can provide for the blockchain. Our contributions include the following: (i) summarizing the possible architectures and models of the integration of blockchain and cloud computing and the roles of cloud computing in blockchain; (ii) classifying and discussing recent, relevant works based on different blockchain-based security services in the cloud computing model; (iii) simply investigating what improvements cloud computing can provide for the blockchain; (iv) introducing the current development status of the industry/major cloud providers in the direction of combining cloud and blockchain; (v) analyzing the main barriers and challenges of integrated blockchain and cloud computing systems; and (vi) providing recommendations for future research and improvement on the integration of blockchain and cloud systems.

Cloud Computing and Undergraduate Researches in Universities in Enugu State: Implication for Skills Demand

Cloud building block chip for creating fpga and asic clouds.

Hardware-accelerated cloud computing systems based on FPGA chips (FPGA cloud) or ASIC chips (ASIC cloud) have emerged as a new technology trend for power-efficient acceleration of various software applications. However, the operating systems and hypervisors currently used in cloud computing will lead to power, performance, and scalability problems in an exascale cloud computing environment. Consequently, the present study proposes a parallel hardware hypervisor system that is implemented entirely in special-purpose hardware, and that virtualizes application-specific multi-chip supercomputers, to enable virtual supercomputers to share available FPGA and ASIC resources in a cloud system. In addition to the virtualization of multi-chip supercomputers, the system’s other unique features include simultaneous migration of multiple communicating hardware tasks, and on-demand increase or decrease of hardware resources allocated to a virtual supercomputer. Partitioning the flat hardware design of the proposed hypervisor system into multiple partitions and applying the chip unioning technique to its partitions, the present study introduces a cloud building block chip that can be used to create FPGA or ASIC clouds as well. Single-chip and multi-chip verification studies have been done to verify the functional correctness of the hypervisor system, which consumes only a fraction of (10%) hardware resources.

Study On Social Network Recommendation Service Method Based On Mobile Cloud Computing

Cloud-based network virtualization in iot with openstack.

In Cloud computing deployments, specifically in the Infrastructure-as-a-Service (IaaS) model, networking is one of the core enabling facilities provided for the users. The IaaS approach ensures significant flexibility and manageability, since the networking resources and topologies are entirely under users’ control. In this context, considerable efforts have been devoted to promoting the Cloud paradigm as a suitable solution for managing IoT environments. Deep and genuine integration between the two ecosystems, Cloud and IoT, may only be attainable at the IaaS level. In light of extending the IoT domain capabilities’ with Cloud-based mechanisms akin to the IaaS Cloud model, network virtualization is a fundamental enabler of infrastructure-oriented IoT deployments. Indeed, an IoT deployment without networking resilience and adaptability makes it unsuitable to meet user-level demands and services’ requirements. Such a limitation makes the IoT-based services adopted in very specific and statically defined scenarios, thus leading to limited plurality and diversity of use cases. This article presents a Cloud-based approach for network virtualization in an IoT context using the de-facto standard IaaS middleware, OpenStack, and its networking subsystem, Neutron. OpenStack is being extended to enable the instantiation of virtual/overlay networks between Cloud-based instances (e.g., virtual machines, containers, and bare metal servers) and/or geographically distributed IoT nodes deployed at the network edge.

Export Citation Format

Share document.

cloud computing research papers 2023

The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization

Cloud computing 2023, june 26, 2023 to june 30, 2023 - nice, saint-laurent-du-var, france.

Submission

Apr 07, 2023

Notification

May 05, 2023

Registration

May 19, 2023

Camera ready

May 26, 2023

Deadlines differ for special tracks. Please consult the conference home page for special tracks Call for Papers (if any).

cloud computing research papers 2023

Published by IARIA Press (operated by )

Archived in the Open Access

Prints available at

Authors of selected papers will be invited to submit extended versions to a

cloud computing research papers 2023

CLOUD COMPUTING 2023 - The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization

June 26, 2023 - June 30, 2023

Cloud computing is a normal evolution of distributed computing combined with Service-oriented architecture, leveraging most of the GRID features and Virtualization merits. The technology foundations for cloud computing led to a new approach of reusing what was achieved in GRID computing with support from virtualization.

CLOUD COMPUTING 2023 is intended as an event to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target is to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols.

We solicit both academic, research, and industrial contributions. We welcome technical papers presenting research and practical results, position papers addressing the pros and cons of specific proposals, such as those being discussed in the standard fora or in industry consortia, survey papers addressing the key problems and solutions on any of the above topics short papers on work in progress, and panel proposals.

Industrial presentations are not subject to the format and content constraints of regular submissions. We expect short and long presentations that express industrial position and status.

Tutorials on specific related topics and panels on challenging areas are encouraged.

The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas.

All topics and submission formats are open to both research and industry contributions.

CLOUD COMPUTING 2023 conference tracks:

TRENDS: New trends

Fog-computing; Mobile Edge Computing; Cloudlets; Hosted Cloud services (WebRTC, Containers, Cloud micro-services); Cloud computing and SDN/NFV; Cloud computing and 5G; Cloud computing and LTE Pro 4.5; Cloud computing ad Big Data; High performance computing (HPC) in the Cloud; Superfluid Clouds; Mobile Apps to the public Clouds; Vehicular Cloud networks; Cloud orchestration features; Converged edge systems; Cloud federation; Micro-cloud provider federation; Open-implementation Cloud infrastructures; Untrusted Cloud environments; Multiple Clouds and data centers; Power Constrained VMs; Cloud Green abstraction layer; Managing applications in the clouds (CloudOps)

CLOUD: Cloud computing

Cloud economics; Core cloud services; Cloud technologies; Cloud computing; On-demand computing models; Hardware-as-a-service; Software-as-a-service [SaaS applications]; Platform-as-service; Storage as a service in cloud; Data-as-a-Service; Service-oriented architecture (SOA); Cloud computing programming and application development; Scalability, discovery of services and data in Cloud computing infrastructures; Trust and clouds; Client-cloud computing challenges; Geographical constraints for deploying clouds

CLOUD: Challenging features

Privacy, security, ownership and reliability issues; Performance and QoS; Dynamic resource provisioning; Power-efficiency and Cloud computing; Load balancing; Application streaming; Cloud SLAs; Business models and pricing policies; Cloud service subscription models; Cloud standardized SLA; Cloud-related privacy; Cloud-related control; Managing applications in the clouds; Mobile clouds; Roaming services in Clouds; Agent-based cloud computing; Cloud brokering; Cloud contracts (machine readable); Cloud security; Security and assurance properties in cloud environments; Big Data Analytics in clouds; Cloud computing back-end solutions; Cloud applications portability; Cloud-native application design; Security by design for cloud services; Data privacy guarantee at run-time

CLOUD: Platforms, Infrastructures and Applications

Custom platforms; Large-scale compute infrastructures; Data centers; Processes intra- and inter-clouds; Content and service distribution in Cloud computing infrastructures; Multiple applications can run on one computer (virtualization a la VMWare); Grid computing (multiple computers can be used to run one application); Cloud-computing vendor governance and regulatory compliance; Enterprise clouds; Enterprise-centric cloud computing; Interaction between vertical clouds; Public, Private, and Hybrid clouds; Cloud computing testbeds

GRID: Grid networks, services and applications

GRID theory, frameworks, methodologies, architecture, ontology; GRID infrastructure and technologies; GRID middleware; GRID protocols and networking; GRID computing, utility computing, autonomic computing, metacomputing; Programmable GRID; Data GRID; Context ontology and management in GRIDs; Distributed decisions in GRID networks; GRID services and applications; Virtualization, modeling, and metadata in GRID; Resource management, scheduling, and scalability in GRID; GRID monitoring, control, and management; Traffic and load balancing in GRID; User profiles and priorities in GRID; Performance and security in GRID systems; Fault tolerance, resilience, survivability, robustness in GRID; QoS/SLA in GRID networks; GRID fora, standards, development, evolution; GRID case studies, validation testbeds, prototypes, and lessons learned

VIRTUALIZATION: Computing in virtualization-based environments

Principles of virtualization; Virtualization platforms; Thick and thin clients; Data centers and nano-centers; Open virtualization format; Orchestration of virtualization across data centers; Dynamic federation of compute capacity; Dynamic geo-balancing; Instant workload migration; Virtualization-aware storage; Virtualization-aware networking; Virtualization embedded-software-based smart mobile phones; Trusted platforms and embedded supervisors for security; Virtualization management operations /discovery, configuration, provisioning, performance, etc.; Energy optimization and saving for green datacenters; Virtualization supporting cloud computing; Applications as pre-packaged virtual machines; Licensing and support policies

Submission

Apr 07, 2023

Notification

May 05, 2023

Registration

May 19, 2023

Camera ready

May 26, 2023

INSTRUCTION FOR THE AUTHORS

Authors of selected papers will be invited to submit extended versions to one of the IARIA Journals .

Publisher: XPS (Xpert Publishing Services) Archived: ThinkMind TM Digital Library (free access) Prints available at Curran Associates, Inc. How to submit to appropriate indexes .

Only .pdf or .doc files will be accepted for paper submission. All received submissions will be acknowledged via an automated system.

Contribution types

  • regular papers [in the proceedings, digital library]
  • short papers (work in progress) [in the proceedings, digital library]
  • ideas: two pages [in the proceedings, digital library]
  • extended abstracts: two pages [in the proceedings, digital library]
  • posters: two pages [in the proceedings, digital library]
  • posters: slide only [slide-deck posted on www.iaria.org ]
  • presentations: slide only [slide-deck posted on www.iaria.org ]
  • demos: two pages [posted on www.iaria.org ]

Final author manuscripts will be 8.5" x 11", not exceeding 6 pages; max 4 extra pages allowed at additional cost.

Helpful information for paper formatting for MS Word can be found here .

There is a community provided LaTeX template : the CTAN package iaria (with full IARIA formatting rules, including IARIA citation style, but for providing citation style it is tightly bound to pdflatex+biblatex+biber). In addition, there is also iaria-lite (not bound to pdflatex+biblatex+biber, but compatible with any TeX stack; thus, it cannot provide the IARIA citation formattings, but only the titlepage and content-related IARIA formatting rules). Based on the iaria package, there is a minimal working example as Overleaf template . When you are using the LaTeX templates, please still adhere to the additional editorial rules .

Slides-based contributions can use the corporate/university format and style.

Your paper should also comply with the additional editorial rules .

Once you receive the notification of contribution acceptance, you will be provided by the publisher an online author kit with all the steps an author needs to follow to submit the final version. The author kits URL will be included in the letter of acceptance.

We would recommend that you should not use too many extra pages, even if you can afford the extra fees. No more than 2 contributions per event are recommended, as each contribution must be separately registered and paid for. At least one author of each accepted paper must register to ensure that the paper will be included in the conference proceedings and in the digital library, or posted on the www.iaria.org (for slide-based contributions).

CONTRIBUTION TYPE

Regular Papers (up to 6-10 page article -6 pages covered the by regular registration; max 4 extra pages allowed at additional cost- ) (oral presentation) These contributions could be academic or industrial research, survey, white, implementation-oriented, architecture-oriented, white papers, etc. They will be included in the proceedings, posted in the free-access ThinkMind digital library and sent for indexing. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the appropriate contribution type. 12-14 presentation slides are suggested.

Short papers (work in progress) (up to 4 pages long) (oral presentation) Work-in-progress contributions are welcome. These contributions represent partial achievements of longer-term projects. They could be academic or industrial research, survey, white, implementation-oriented, architecture-oriented, white papers, etc. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as work in progress. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings, posted in the free-access ThinkMind digital library and sent for indexing. For more details, see the Work in Progress explanation page. 12-14 presentation slides are suggested.

Ideas contributions (2 pages long) (oral presentation) This category is dedicated to new ideas in their very early stage. Idea contributions are expression of yet to be developed approaches, with pros/cons, not yet consolidated. Ideas contributions are intended for a debate and audience feedback. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as Idea. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings, posted in the free-access ThinkMind digital library and sent for indexing. For more details, see the Ideas explanation page. 12-14 presentation slides are suggested.

Extended abstracts (2 pages long) (oral presentation) Extended abstracts summarize a long potential publication with noticeable results. It is intended for sharing yet to be written, or further on intended for a journal publication. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as Extended abstract. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings, posted in the free-access ThinkMind digital library and sent for indexing. 12-14 presentation slides are suggested.

Posters (paper-based, two pages long) (oral presentation) Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. A two-page paper summarizes a presentation intended to be a POSTER. This allows an author to summarize a series of results and expose them via a big number of figures, graphics and tables. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as Poster Two Pages. Contributors must follow the conference deadlines, describing early research and novel skeleton ideas in the areas of the conference topics. The work will be published in the conference proceedings, posted in the free-access ThinkMind digital library and sent for indexing. 8-10 presentation slides are suggested. Also a big Poster is suitable, used for live discussions with the attendees, in addition to the oral presentation.

Posters (slide-based, only) (oral presentation) Posters are intended for ongoing research projects, concrete realizations, or industrial applications/projects presentations. The poster may be presented during sessions reserved for posters, or mixed with presentation of articles of similar topic. The slides must have comprehensive comments. This type of contribution only requires a 8-10 slide-deck. Please submit the contributions following the instructions for the regular submissions using the "Submit a Paper" button and selecting the contribution type as Poster (slide-only). The slide-deck will be posted, post-event, on www.iaria.org . 8-10 presentation slides are suggested. Also a big Poster is suitable, used for live discussions with the attendees, additionally to the oral presentation.

Presentations (slide-based, only) (oral presentation) These contributions represent technical marketing/industrial/business/positioning presentations. This type of contribution only requires a 12-14 slide-deck. Please submit the contributions following the submission instructions by using the "Submit a Paper" button and selecting the contribution type as Presentation (slide-only). The slide-deck will be posted, post-event, on www.iaria.org . 12-14 presentation slides are suggested.

Demos (two pages) [posted on www.iaria.org ] Demos represent special contributions where a tool, an implementation of an application, or a freshly implemented system is presented in its alfa/beta version. It might also be intended for thsoe new application to gather the attendee opinion. A two-page summary for a demo is intended to be. It would be scheduled in special time spots, to ensure a maximum attendance from the participants. Please submit the contributions following the submission instructions by using the "Submit a Paper" button and selecting the contribution type as Demos. The Demos paper will be posted, post-event, on www.iaria.org .

Tutorial proposals Tutorials provide overviews of current high interest topics. Proposals should be for 2-3 hour long. Proposals must contain the title, the summary of the content, and the biography of the presenter(s). The tutorial slide decks will be posted on the IARIA site. Please send your proposals to tutorial proposal

Panel proposals The organizers encourage scientists and industry leaders to organize dedicated panels dealing with controversial and challenging topics and paradigms. Panel moderators are asked to identify their guests and manage that their appropriate talk supports timely reach our deadlines. Moderators must specifically submit an official proposal, indicating their background, panelist names, their affiliation, the topic of the panel, as well as short biographies. The panel slide deck will be posted on the IARIA site. Please send your proposals to panel proposal

cloud computing research papers 2023

Copyright (c) 2006-2024, IARIA

This week: the arXiv Accessibility Forum

Help | Advanced Search

Computer Science > Distributed, Parallel, and Cluster Computing

Title: cloud cost optimization: a comprehensive review of strategies and case studies.

Abstract: Cloud computing has revolutionized the way organizations manage their IT infrastructure, but it has also introduced new challenges, such as managing cloud costs. This paper explores various techniques for cloud cost optimization, including cloud pricing, analysis, and strategies for resource allocation. Real-world case studies of these techniques are presented, along with a discussion of their effectiveness and key takeaways. The analysis conducted in this paper reveals that organizations can achieve significant cost savings by adopting cloud cost optimization techniques. Additionally, future research directions are proposed to advance the state of the art in this important field.
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computational Engineering, Finance, and Science (cs.CE); General Economics (econ.GN); Systems and Control (eess.SY)
 classes: K.6.0
Cite as: [cs.DC]
  (or [cs.DC] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • Google Scholar
  • Semantic Scholar

BibTeX formatted citation

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Call for Papers - Edge/Cloud-based Secure, trustable, and privacy-conscious digital twins

Guest Editors: Aftab Ali: PhD, School of Computing, Ulster University, Belfast, United Kingdom     Farrukh Aslam Khan:  King Saud University, Riyadh, Saudi Arabia Mohand Tahar Kechadi:  University College Dublin, Ireland      Liming Chen:  Ulster University, Belfast, United Kingdom

Submission Status: Closed     |   Submission Deadline: 31 January 2024

This collection is no longer accepting submissions.

cloud computing research papers 2023

About the collection

  • Collection Articles

Submission Guidelines

Data will significantly increase as a result of the interdependence of digital twin solutions growing. The likelihood of data leakage or privacy violation consequently rises, necessitating new privacy and security protection solutions. This special issue on Edge/Cloud-based Digital Twin will offer a high-profile, cutting-edge forum for researchers, engineers, and practitioners to present the most recent developments and innovations in the field of secure digital twins, as well as to pinpoint new areas for future research and chart the course of the field. Due to the fact that edge computing, in which resources such as processing and storage are located closer to the data source, can reduce the amount of time spent waiting for data to be transmitted while simultaneously improving both security and privacy. The edge/cloud-based digital twin will provide flexibility and will enhance the processing capability.  This thematic series' overarching objective is to collect the most pertinent active research initiatives in the field of edge-based digital twin security and privacy. We are looking for papers that propose new research directions, introduce novel methodologies, and develop novel techniques in the area of secure advanced edge-based digital twin theories, methods, implementations, and applications.

Image credit: © metamorworks / Getty Images / iStock

Compliance and feedback based model to measure cloud trustworthiness for hosting digital twins

Cloud-based digital twins use real-time data from various data sources to simulate the behavior and performance of their physical counterparts, enabling monitoring and analysis. However, one restraining factor...

  • View Full Text

Human digital twin: a survey

The concept of the Human Digital Twin (HDT) has recently emerged as a new research area within the domain of digital twin technology. HDT refers to the replica of a physical-world human in the digital world. C...

Automated visual quality assessment for virtual and augmented reality based digital twins

Virtual and augmented reality digital twins are becoming increasingly prevalent in a number of industries, though the production of digital-twin systems applications is still prohibitively expensive for many s...

Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment

Social network rumor harm metric is a task to score the harm caused by a rumor by analyzing the spreading range of the rumor, the users affected, the repercussions caused, etc., and then the harm caused by the...

An enhanced state-aware model learning approach for security analysis in lightweight protocol implementations

Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously...

Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin

With the booming of cloud-based digital twin systems, monitoring key performance indicators has become crucial for ensuring system security and reliability. Due to the massive amount of monitoring data generat...

The key security management scheme of cloud storage based on blockchain and digital twins

As a secure distributed ledger technology, blockchain has attracted widespread attention from academia and industry for its decentralization, immutability, and traceability characteristics. This paper proposes...

Enhancement of damaged-image prediction based on digital twin technology

Digital twins have revolutionized the field of image enhancement by applying their unique capabilities. A digital twin refers to a virtual replica of a physical object or system, which can be utilized to simul...

Improving cloud storage and privacy security for digital twin based medical records

As digital transformation progresses across industries, digital twins have emerged as an important technology. In healthcare, digital twins are created by digitizing patient parameters, medical records, and tr...

Privacy and integrity-preserving data aggregation scheme for wireless sensor networks digital twins

The security technology of digital twin is an important guarantee to ensure the security of digital twin operation, which mainly includes network security technology, data security technology and privacy prote...

This Collection welcomes submission of Research Articles. Before submitting your manuscript, please ensure you have read our submission guidelines . Articles for this Collection should be submitted via our submission system SNAPP . During the submission process, under the section additional information, you will be asked whether you are submitting to a Collection, please select "Emerging quantum phenomena in van der Waals materials" from the dropdown menu.

Articles will undergo the journal’s standard peer-review process  and are subject to all of the journal’s standard  policies . Articles will be added to the Collection as they are published.

The Guest Editors have no competing interests with the submissions which they handle through the peer review process. The peer review of any submissions for which the Guest Editors have competing interests is handled by another Editorial Board Member who has no competing interests.

Advances, Systems and Applications

  • Open access
  • Published: 06 August 2022

Big data analytics in Cloud computing: an overview

  • Blend Berisha 1 ,
  • Endrit Mëziu 1 &
  • Isak Shabani 1  

Journal of Cloud Computing volume  11 , Article number:  24 ( 2022 ) Cite this article

38k Accesses

44 Citations

10 Altmetric

Metrics details

Big Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that traditional processing tools are unable to deal with them. Besides being big, this data moves fast and has a lot of variety. Big Data is a concept that deals with storing, processing and analyzing large amounts of data. Cloud computing on the other hand is about offering the infrastructure to enable such processes in a cost-effective and efficient manner. Many sectors, including among others businesses (small or large), healthcare, education, etc. are trying to leverage the power of Big Data. In healthcare, for example, Big Data is being used to reduce costs of treatment, predict outbreaks of pandemics, prevent diseases etc. This paper, presents an overview of Big Data Analytics as a crucial process in many fields and sectors. We start by a brief introduction to the concept of Big Data, the amount of data that is generated on a daily bases, features and characteristics of Big Data. We then delve into Big Data Analytics were we discuss issues such as analytics cycle, analytics benefits and the movement from ETL to ELT paradigm as a result of Big Data analytics in Cloud. As a case study we analyze Google’s BigQuery which is a fully-managed, serverless data warehouse that enables scalable analysis over petabytes of data. As a Platform as a Service (PaaS) supports querying using ANSI SQL. We use the tool to perform different experiments such as average read, average compute, average write, on different sizes of datasets.

Introduction

We live in the data age. We see them everywhere and this is due to the great technological developments that have taken place in recent years. The rate of digitalization has increased significantly and now we are rightly talking about” digital information societies”. If 20 or 30 years ago only 1% of the information produced was digital, now over 94% of this information is digital and it comes from various sources such as our mobile phones, servers, sensor devices on the Internet of Things, social networks, etc. [ 1 ]. The year 2002 is considered the” beginning of the digital age” where an explosion of digitally produced equipment and information was seen.

The number and amount of information collected has increased significantly due to the increase of devices that collect this information such as mobile devices, cheap and numerous sensor devices on the Internet of Things (IoT), remote sensing, software logs, cameras, microphones, RFID readers, wireless sensor networks, etc. [ 2 ]. According to statistics, the amount of data generated / day is about 44 zettabytes (44 × 10 21 bytes). Every second, 1.7 MB of data is generated per person [ 3 ]. Based on International Data Group forecasts, the global amount of data will increase exponentially from 2020 to 2025, with a move from 44 to 163 zettabytes [ 4 ]. Figure  1 shows the amount of global data generated, copied and consumed. As can be seen, in the years 2010–2015, the rate of increase from year to year has been smaller, while since 2018, this rate has increased significantly thus making the trend exponential in nature [ 3 ].

figure 1

Volume of data/information created, captured, copied, and consumed worldwide from 2010 to 2024 (estimated) [ 3 ]

To get a glimpse of the amount of data that is generated on a daily basis, let’s see a portion of data that different platforms produce. On the Internet, there is so much information at our fingertips. We add to the stockpile everytime we look for answers from our search engines. As a results Google now produces more than 500,000 searches every second (approximately 3.5 billion search per day) [ 5 ]. By the time of writing this article, this number must have changed! Social media on the other hand is a massive data producer. 

People’s ‘love affair’ with social media certainly fuels data creation. Every minute, Snapchat users share 527,760 photos, more than 120 professionals join LinkedIn, users watch 4,146,6000 Youtube videos, 456,000 are sent to Twitter and Instagram users post 46,740 photos [ 5 ]. Facebook remains the largest social media platform, with over 300 million photos uploaded every day with more than 510,000 comments posted and 293,000 statuses updated every minute.

With the increase in the number and quantity of data, there have been advantages but also challenges as systems for managing relational databases and other traditional systems have difficulties in processing and analyzing this quantity. For this reason, the term ‘big data’ arose not only to describe the amount of data but also the need for new technologies and ways of processing and analyzing this data. Cloud Computing has facilitated data storage, processing and analysis. Using Cloud we have access to almost limitless storage and computer power offered by different vendors. Cloud delivery models such as: IAAS (Infrastructure as a Service), PAAS (Platform as a Service) can help organisations across different sectors handle Big Data easier and faster. The aim of this paper is to provide an overview of how analytics of Big Data in Cloud Computing can be done. For this we use Google’s platform BigQuery which is a serverless data warehouse with built-in machine learning capabilities. It’s very robust and has plenty of features to help with the analytics of different size and type of data.

What is big data?

Many authors and organizations have tried to provide a definition of ‘Big Data’. According to [ 6 ] “Big Data refers to data volumes in the range of exabytes and beyond”. In Wikipedia [ 7 ] big data is defined as an accumulation of datasets so huge and complex that it becomes hard to process using database management tools or traditional data processing applications, while the challenges include capture, storage, search, sharing, transfer, analysis, and visualization.

Sam Madden from Massachusetts Institute of Technology (MIT) considers” Big Data” to be data that is too big, too fast, or too hard for existing tools to process [ 8 ]. By too big, it means data that is at the petabyte level and that comes from various sources. By ‘too fast’ it means data growth which is fast and should also be processed quickly. By too hard it means the difficulty that arises as a result the data not adapting to the existing processing tools [ 9 ]. In PCMag (one of the most popular journals on technological trends), Big data refers to the massive amounts of data that is collected over time that are difficult to analyze and handle using common database management tools [ 10 ]. There are many other definitions for Big Data, but we consider that these are enough to gain an impression on this concept.

Features and characteristics of big data

One question that researchers have struggled to answer is what might qualify as ‘big data’? For this reason, in 2001 industry analyst Doug Laney from Gartner introduced the 3 V model which are three features that must complement the data to be considered” big data”: volume, velocity, variety . Volume is a property or characteristic that determines the size of data, usually reported in Terabyte or Petabyte. For example, social networks like Facebook store among others photos of users. Due to the large number of users, it is estimated that Facebook stores about 250 billion photos and over 2.5 trillion posts of its users. This is an extremely large amount of data that needs to be stored and processed. Volume is the most representative feature of ‘big data’ [ 8 ]. In terms of volume, tera or peta level data is usually considered ‘big’ although this depends on the capacity of those analyzing this data and the tools available to them [ 8 ]. Figure  2 shows what each of the three V's represent.

figure 2

3 V’s of Big Data [ 6 ]

The second property or characteristic is velocity . This refers to the degree to which data is generated or the speed at which this data must be processed and analyzed [ 8 ]. For example, Facebook users upload more than 900 million photos a day, which is approximately 104 uploaded photos per second. In this way, Facebook needs to process, store and retrieve this information to its users in real time. Figure  3 shows some statistics obtained from [ 11 ] which show the speed of data generation from different sources. As can be seen, social media and the Internet of Things (IoT) are the largest data generators, with a growing trend.

figure 3

Examples of the velocity of Big Data [ 9 ]

There are two main types of data processing: batch and stream. In batch, processing happens in blocks of data that have been stored over a period of time. Usually data processed in batch are big, so they will take longer to process. Hadoop MapReduce is considered to be the best framework for processing data in batches [ 11 ]. This approach works well in situations where there is no need for real-time analytics and where it is important to process large volumes of data to get more detailed insights.

Stream processing, on the other hand, is a key to the processing and analysis of data in real time. Stream processing allows for data processing as they arrive. This data is immediately fed into analytics tools so the results are generated instantly. There are many scenarios where such an approach can be useful such as fraud detection, where anomalies that signal fraud are detected in real time. Another use case would be online retailers, where real-time processing would enable them to compile large histories of costumer interactions so that additional purchases could be recommended for the costumers in real time [ 11 ].

The third property is variety , which refers to different types of data which are generated from different sources. “Big Data” is usually classified into three major categories: structured data (transactional data, spreadsheets, relational databases etc.), semi-structured (Extensible Markup Language - XML, web server logs etc) and unstructured (social media posts, audio, images, video etc.). In the literature, as a fourth category is also mentioned ‘meta-data’ which represents data about data. This is also shown in Fig.  4 . Most of the data today belong to the category of unstructured data (80%) [ 11 ].

figure 4

Main categories of data variety in Big Data [ 9 ]

Over time, the tree features of big data have been complemented by two additional ones: veracity and value . Veracity is equivalent to quality, which means data that are clean and accurate and that have something to offer [ 12 ]. The concept is also related to the reliability of data that is extracted (e.g., costumer sentiments in social media are not highly reliable data). Value of the data is related to the social or economic value data can generate. The degree of value data can produce depends also on the knowledge of those that make use of it.

Big data analytics in cloud computing

Cloud Computing is the delivery of computing services such as servers, storage, databases, networking, software, analytics etc., over the Internet (“the cloud”) with the aim of providing flexible resources, faster innovation and economies of scale [ 13 ]. Cloud computing has revolutionized the way computing infrastructure is abstracted and used. Cloud paradigms have been extended to include anything that can be considered as a service (hence x a service). The many benefits of cloud computing such as elasticity, pay-as-you-go or pay-per-use model, low upfront investment etc., have made it a viable and desirable choice for big data storage, management and analytics [ 13 ]. Because big data is now considered vital for many organizations and fields, service providers such as Amazon, Google and Microsoft are offering their own big data systems in a cost-efficient manner. These systems offer scalability for business of all sizes. This had led to the prominence of the term Analytics as a Service (AaaS) as a faster and efficient way to integrate, transform and visualize different types of data. Data Analytics.

Big data analytics cycle

According to [ 14 ] processing big data for analytics differs from processing traditional transactional data. In traditional environments, data is first explored then a model design as well as a database structure is created. Figure  5 . depicts the flow of big data analysis. As can be seen, it starts by gathering data from multiple sources, such as multiple files, systems, sensors and the Web. This data is then stored in the so called” landing zone” which is a medium capable of handling the volume, variety and velocity of data. This is usually a distributed file system. After data is stored, different transformations occur in this data to preserve its efficiency and scalability. Afer that, they are integrated into particular analytical tasks, operational reporting, databases or raw data extracts [ 14 ].

figure 5

Flow in the processing of Big Data [ 11 ]

Moving from ETL to ELT paradigm

ETL (Extract, Transform, Load) is about taking data from a data source, applying the transformations that might be required and then load it into a data warehouse to run reports and queries against them. The downside of this approach or paradigm is that is characterized by a lot of I/O activity, a lot of string processing, variable transformation and a lot of data parsing [ 15 ].

ELT (Extract, Load, Transform) is about taking the most compute-intensive activity (transformation) and doing it not in an on-premise service which is already under pressure with regular transaction-handling but instead taking it to the cloud [ 15 ]. This means that there is no need for data staging because data warehousing solution is used for different types.

of data including those that are structured, semi-structured, unstructured and raw. This approach employs the concept of” data lakes” that are different from OLAP (Online Analytical Processing) data warehouses because they do not require the transformation of data before loading them [ 15 ]. Figure 6 illustrates the differences between the two paradigms. As seen, the main difference is where transformation process takes place.

figure 6

Differences between ETL and ELT [ 15 ]

ELT has many benefits over traditional ETL paradigm. The most crucial, as mentioned, is the fact that data of any format can be ingested as soon as it becomes available. Another one is the fact that only the data required for particular analysis can be transformed. In ETL, the entire pipeline and structure of the data in the OLAP may require modification if the previous structure does not allow for new types of analysis [ 16 ].

Some advantages of big data analytics

As mentioned, companies across various sectors in the industry are leveraging Big Data in order to promote decision making that is data-driven. Besides tech industry, the usage and popularity of Big Data has expanded to include healthcare, governance, retail, supply chain management, education etc. Some of the benefits of Big Data Analytics mentioned in [ 17 ] include:

Data accumulation from different sources including the Internet, online shopping sites, social media, databases, external third-party sources etc.

Identification of crucial points that are hidden within large datasets in order to influence business decisions.

Identification of the issues regarding systems and business processes in real time.

Facilitation of service/product delivery to meet or exceed client expecations.

Responding to customer requests, queries and grievances in real time.

Some other benefits according to [ 16 ] are related to:

Cost optimization - One of the biggest advantages of Big Data tools such as Hadoop or Spark is that they offer cost advantages to businesses regarding the storage, processing and analysis of large amounts of data. Authors mention the logistics industry as an example to highlight the cost-reduction benefits of Big Data. In this industry, the cost of product returns is 1.5 times higher than that of actual shipping costs. With Big Data Analytics, companies can minimize product return costs by predicting the likelihood of product returns. By doing so, they can then estimate which products are most likely to be returned and thus enable the companies to take suitable measures to reduce losses on returns.

Efficiency improvements - Big Data can improve operational efficiency by a margin. Big Data tools can amass large amounts of useful costumer data by interacting and gaining their feedback. This data can then be analyzed and interpreted to extract some meaningful patterns hidden within such as customer taste and preferences, buying behaviors etc. This in turn allows companies to create personalized or tailored products/services.

Innovation - Insights from Big Data can be used to tweak business strategies, develop new products/services, optimize service delivery, improve productivity etc. These can all lead to more innovation.

As seen, Big Data Analytics has been mostly leveraged by businesses, but other sectors have also benefited. For example, in healthcare many states are now utilizing the power of Big Data to predict and also prevent epidemics, cure diseases, cut down costs etc. This data has also been used to establish many efficient treatment models. With Big Data more comprehensive reports were generated and these were then converted into relevant critical insights to provide better care [ 17 ].

In education, Big Data has also been used extensively. They have enabled teachers to measure, monitor and respond in real-time to student’s understanding of the material. Professors have created tailor-made materials for students with different knowledge levels to increase their interest [ 18 ].

Case study: GOOGLE’S big query for data processing and analytics

Google Cloud Platform contains a number of services designed to analyze and process big data. Throughout this paper we have described and discussed the architecture and main components of Biguery as one of the most used big data processing tools in GCP. BigQuery is a fully-managed, serverless data warehouse that enables scalable analysis over petabytes of data. It is a Platform as a Service (PaaS) that supports querying using ANSI SQL. It also has built-in machine learning capabilities. Since its launch in 2011 it has gained a lot of popularity and many big companies have utilized it for their data analytics [ 19 ].

From a user perspective, BigQuery has an intuitive user interface which can be accessed in a number of ways depending on user needs. The simplest way to interact with this tool is to use its graphical web interface as shown in Fig.  7 . Slightly more complicated but faster approaches include using cloud console or Bigquery APIs. From Fig. 7 Bigquery web interface offers you the options to add or select existing datasets, schedule and construct queries or transfer data and display results.

figure 7

BigQuery Interface

Data processing and query construction occurs under the sql workspace section, Bigquery offers a rich sql-like syntax to compute and process large sets of data, it operates on relational datasets with well-defined structure including tables with specified columns and types. Figure  8 shows a simple query construction syntax and highlights its execution details. Data displayed under query results shows main performance components of the executed query starting from elapsed time, consumed slot time, size of data processed, average and maximum wait, write and compute times. Query defined in Fig.  8 combines three datasets which contain information regarding Covid-19 reported cases, deaths and recoveries from more than 190 countries through year 2020 till January 2021. Google BigQuery is flexible in a way that allows you to use and combine various datasets suitable for your task easily and with small delays. It contains an ever growing list of public datasets at your disposal and also offers the options to create, edit and import your own. Figure  9 shows the process of adding a table to the newly created dataset. From the Fig.  9 , we see that for table creation as a source we have used a local csv file, this file will be used to create table schema and populate it with data, aside from local upload option as a source to create the table we can use Google BigTable, Google Cloud Storage or Google Drive. The newly created table with its respective data then is ready to be used to construct queries and obtain new insights as shown in Fig. 8 .

figure 8

BigQuery execution details

figure 9

Adding table to the created dataset

One advantage of using imported data in the cloud is the option to manage its access and visibility in the cloud project and cloud members scope. Depending from the way of use, queried data can be saved directly to the local computer through the use of “save results” option from Fig. 8 which offers a variety of formats and data extensions settings to choose from but can also be explored in different configurations using “explore data” option. You can also save constructed queries for later use or schedule query execution interval for more accurate data transmutation through API endpoints. Figure 10 shows how much the average compute time will change/increase with the increase in the size of the dataset used.

figure 10

Average compute time dependence in dataset size

Experiments with different dataset sizes

Before moving to data exploration lets analyze performance results of BigQuery in simple queries with variable dataset sizes. In Table  1 we have shown the query execution details of five simple select queries done on five different datasets. The results are displayed against six different performance categories, from the data we see a correlation between size of the dataset and its average read, write and compute.

From the graph we see that the dependence between dataset size and average compute size is exponential, meaning that with the increase in data size, average compute time is exponentially increased.

Data returned from constructed queries aside from being displayed in a simple tabular form or as a JSON object can also be transferred to data studio which is an integrated tool to better display and visualize gathered information. One way of displaying queried data from Fig. 8 with data studio tool is shown in Fig.  11 . In this case a bar table chart visualization option is chosen.

figure 11

Using data studio for data visualization

Big Data is not a new term but has gained its spotlight due to the huge amounts of data that are produced daily from different sources. From our analysis we saw that big data is increasing in a fast pace, leading to benefits but also challenges. Cloud Computing is considered to be the best solution for storing, processing and analyzing Big Data. Companies like Amazon, Google and Microsoft offer their public services to facilitate the process of dealing with Big Data. From the analysis we saw that there are multiple benefits that Big Data analytics provides for many different fields and sectors such as healthcare, education and business. We also saw that because of the interaction of Big Data with Cloud Computing there is a shift in the way data is processed and analyzed. In traditional settings, ETL is used whereas in Big Data, ELT is used. We saw that the latter has clear advantages when compared to the former.

From our case study we saw that BigQuery is very good for running complex analytical queries, which means there is no point in running queries that are doing simple aggregation or filtering. BigQuery is suitable for heavy queries, those that operate using a big set of data. The bigger the dataset, the more it is likely to gain in performance. This is when compared to the traditional relational databases,as BigQuery implements different parallel schemas to speed up the execution time.

BigQuery doesn’t like joins and merging data into one table gets a better execution time. It is good for scenarios where data does not change often as it has built-in cache. BigQuery can also be used when one wants to reduce the load on the relational database as it offers different options and configurations to improve query performance. Also pay as you go service can be used where charges are made based on usage or flat rate service which offers a specific slot rate and charges in daily, monthly or yearly plan.

Availability of data and materials

The datasets used during the current study are available from the corresponding author on reasonable request. The authors declare that they have no funder.

Hillbert M, Lopez P (2011) The world’s technological capacity to store, communicate and compute information. Science III:62–65

Google Scholar  

J. Hellerstein,“ Gigaom Blog,”2019. Available: https://gigaom.com/2008/11/09/mapreduce-leads-the-way-for-parallelprogramming/ . Accessed 20 Jan 2021

Statista,“Statista,“2020. Available: https://www.statista.com/statistics/871513/worldwide-data-created/ . Accessed 21 Jan 2021

Reinsel D, Gantz J, Rydning J (2017) Data age 2025: the evolution of data to-life critical. International Data Corporation, Framingham

Forbes, “Forbes”, 2020. Available: https://www.forbes.com/sites/bernardmarr/2018/05/21/how-muchdata-do-we-create-every-day-the-mind-blowing-stats-everyone-shouldread/?sh=5936b00460ba

Kaisler S, Armour F, Espinosa J (2013) Big data: issues and challenges moving forward, Wailea, Maui, HI, s.n, pp 995–1004

Wikipedia,“ Wikipedia,” 2018. Available: https://www.en.wikipedia.org/wiki/Bigdata/ . Accessed 4 Jan 2021

D. Gewirtz,“ ZDNet,” 2018. Available: https://www.zdnet.com/article/volume-velocity-and-varietyunderstanding-the-three-vs-of-big-data/ . Accessed 1 Jan 2021

Weathington J (2012) Big Data Defined. Tech Republic.  https://www.techrepublic.com/article/big-data-defined/

PCMagazine,“ PC Magazine,” 2018. Available: http://www.pcmag.com/encyclopedia/term/62849/big-data . Accessed 9 Jan 2021

Akhtar SMF (2018) Big Data Architect’s Handbook, Packt

WhishWorks, “WhishWorks”, 2019. Available: https://www.whishworks.com/blog/data-analytics/understanding-the3-vs-of-big-data-volume-velocity-and-variety/ . Accessed 23 Jan 2021

Yadav S, Sohal A (2017) Review paper on big data analytics in Cloud computing. Int J Comp Trends Technol (IJCTT) IX. 49(3);156-160

Kimball R, Ross M (2013) The data warehouse toolkit: the definitive guide to dimensional modeling, 3rd edn. John Wiley & Sons

LaprinthX, “LaprinthX,”2018. Available: https://laptrinhx.com/better-faster-smarter-elt-vs-etl-2084402419/ . Accessed 22 Jan 2021

Xplenty, “XPlenty, ”, 2019. Available: https://www.xplenty.com/blog/etl-vs-elt/# . Accessed 20 Jan 2021

Forbes,“Forbes,”,2018. Available: https://www.forbes.com/sites/forbestechcouncil/2019/11/06/fivebenefits-of-big-data-analytics-and-how-companies-can-getstarted/?sh=7e1b901417e4 . Accessed 13 Jan 202

EDHEC, “EDHEC, ”, 2019. Available: https://master.edhec.edu/news/three-ways-educators-are-using-bigdata-analytics-improve-learning-process# . Accessed 6 Jan 2021

Google Cloud, “BigQuery, ”, 2020. Available: https://cloud.google.com/bigquery . Accessed 5 Jan 2021

Download references

Acknowledgements

The authors would like to thank the colleageous and professors from the University of Prishtina for their insightful comments and suggestions that helped in improving the quality of the paper.

The authors declare that they have no funder.

Author information

Authors and affiliations.

Faculty of Electrical and Computer Engineering, Department of Computer Engineering, University of Prishtina, 10000, Prishtina, Kosovo

Blend Berisha, Endrit Mëziu & Isak Shabani

You can also search for this author in PubMed   Google Scholar

Contributions

Blend Berisha wrote the Introduction, Features and characteristics of Big Data and Conclusions. Endrit Meziu wrote Big Data¨ Analytics in Cloud Computing and part of the case study. Isak Shabani has contributed in the methodology, resources and in supervising the work process. All authors prepared the figures and also reviewed the manuscript. The author(s) read and approved the final manuscript.

Corresponding author

Correspondence to Isak Shabani .

Ethics declarations

Ethics approval and consent to participate.

Not applicable.

Consent for publication

Competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Berisha, B., Mëziu, E. & Shabani, I. Big data analytics in Cloud computing: an overview. J Cloud Comp 11 , 24 (2022). https://doi.org/10.1186/s13677-022-00301-w

Download citation

Received : 08 April 2022

Accepted : 24 July 2022

Published : 06 August 2022

DOI : https://doi.org/10.1186/s13677-022-00301-w

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Cloud computing

cloud computing research papers 2023

Cloud Computing

  • First Online: 28 August 2024

Cite this chapter

cloud computing research papers 2023

  • Ali Sunyaev 2  

48 Accesses

Cloud computing is an evolution of information technology and a dominant business model for delivering IT resources. With cloud computing, individuals and organizations can gain on-demand network access to a shared pool of managed and scalable IT resources, such as servers, storage, and applications. Recently, academics as well as practitioners have paid a great deal of attention to cloud computing. Individuals rely heavily on cloud services in their daily lives, e.g., for storing data, writing documents, managing businesses, and playing games online. Cloud computing also provides the infrastructure that has powered key digital trends such as mobile computing, the Internet of Things, big data, and artificial intelligence, thereby accelerating industry dynamics, disrupting existing business models, and fueling digital transformation. Still, cloud computing not only provides a vast number of benefits and opportunities; it also comes with several challenges and concerns, e.g., regarding protecting customers’ data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Ahmed M, Litchfield AT (2018) Taxonomy for identification of security issues in cloud computing environments. J Comput Inf Syst 58(1):79–88

Google Scholar  

Anisetti M, Ardagna C, Damiani E, Gaudenzi F (2017) A semi-automatic and trustworthy scheme for continuous cloud service certification. IEEE Trans Serv Comput 10(1):1–14

Annette JR, Banu WA, Chandran PS (2015) Rendering-as-a-service: taxonomy and comparison. Procedia Comput Sci 50:276–281

Article   Google Scholar  

Apps Run The World (2017) Cloud applications revenue from leading vendors worldwide in 2015 and 2016 (in million U.S. dollars). https://www.statista.com/statistics/475844/cloud-applications-revenues-worldwide-by-vendor/ . Accessed 10 July 2023

Arasaratnam O (2011) Introduction to cloud computing. In: Halpert B (ed) Auditing cloud computing: a security and privacy guide. Wiley, Hoboken, NJ, pp 1–13

Bajaj A (2000) A study of senior information systems managers decision models in adopting new computing architectures. J Assoc Inf Syst 1(1es):4

Baldwin LP, Irani Z, Love PED (2001) Outsourcing information systems: drawing lessons from a banking case study. Eur J Inf Syst 10(1):15–24

Bayramusta M, Nasir VA (2016) A fad or future of IT?: A comprehensive literature review on the cloud computing research. Int J Inf Manag 36(4):635–644

Benlian A, Hess T (2011) Opportunities and risks of software-as-a-service: findings from a survey of IT executives. Decis Support Syst 52(1):232–246

Benlian A, Kettinger WJ, Sunyaev A, Winkler TJ (2018) Special section: the transformative value of cloud computing: a decoupling, platformization, and recombination theoretical framework. J Manag Inf Syst 35(3):719–739

Bennett C, Timbrell GT (2000) Application service providers: will they succeed? Inf Syst Front 2(2):195–211

Berman F, Hey T (2004) The scientific imperative. In: Foster I, Kesselman C (eds) The grid 2: blueprint for a new computing infrastructure, The Morgan Kaufmann series in computer architecture and design. Morgan Kaufman, San Francisco, CA, pp 13–24

Chapter   Google Scholar  

Bharadwaj A, El Sawy OA, Pavlou PA, Venkatraman N (2013) Digital business strategy: toward a next generation of insights. MIS Q 37(2):471–482

Bhattacherjee A, Park SC (2014) Why end-users move to the cloud: a migration-theoretic analysis. Eur J Inf Syst 23(3):357–372

Boag S, Dube P, Maghraoui KE, Herta B, Hummer W, Jayaram K, Khalaf R, Muthusamy V, Kalantar M, Verma A (2018) Dependability in a multi-tenant multi-framework deep learning as-a-service platform. In: Proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops 2018, pp 43–46

Böhm M, Leimeister S, Riedl C, Krcmar H (2011) Cloud computing—outsourcing 2.0 or a new business model for IT provisioning? In: Keuper F, Oecking C, Degenhardt A (eds) Application management: challenges—service creation—strategies. Gabler, Wiesbaden, Germany, pp 31–56

Boiral O (2003) ISO 9000: outside the iron cage. Org Sci 14(6):720–737. https://doi.org/10.1287/orsc.14.6.720.24873

Bunker G, Thomson D (2006) Delivering utility computing: business-driver IT optimization. Wiley, Chichester, UK

Burda D, Teuteberg F (2014) The role of trust and risk perceptions in cloud archiving—results from an empirical study. J High Technol Manag Res 25(2):172–187

Burnham TA, Frels JK, Mahajan V (2003) Consumer switching costs: a typology, antecedents, and consequences. J Acad Market Sci 31(2):109

Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Gener Comput Syst 25(6):599–616

Cafaro M, Aloisio G (2011) Grids, clouds, and virtualization. In: Cafaro M, Aloisio G (eds) Grids, clouds and virtualization, Computer communications and networks. Springer, London, UK, pp 1–21

Carr N (2008) The big switch: rewiring the world, from Edison to Google. W.W. Norton & Company, New York

Chui M, Malhotra S (2018) AI adoption advances, but foundational barriers remain. https://www.mckinsey.com/featured-insights/artificial-intelligence/ai-adoption-advances-but-foundational-barriers-remain . Accessed 10 July 2023

Cloudscene (2023) Germany | Data Center Market Overview. https://cloudscene.com/market/data-centers-in-germany/all . Accessed 5 June 2023

Cusumano M (2010) Cloud computing and SaaS as new computing platforms. Commun ACM 53(4):27–29

Danylak P, Brecker K, Lins S, Sunyaev A (2022) Certifications to safeguard data protection standards? How superficial internalization Thwarts the plan. Forum Privatheit, Berlin, Germany

Dašić P, Dašić J, Crvenković B (2016) Service models for cloud computing: search as a service (SaaS). Int J Eng Technol (IJET) 8(5):2366–2373

Dehling T, Lins S, Sunyaev A (2019) Security of critical information infrastructures. In: Reuter C (ed) Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace. Springer Fachmedien Wiesbaden, Wiesbaden, pp 319–339. https://doi.org/10.1007/978-3-658-25652-4_15

Dillon T, Wu C, Chang E (2010) Cloud computing: issues and challenges. In: Paper presented at the 24th IEEE International Conference on Advanced Information Networking and Applications Perth, WA, Australia, 20–23 April 2010

Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M, Clarke N (2012) Validating cloud infrastructure changes by cloud audits. In: Paper presented at the 8th IEEE World Congress on Services, Honolulu, HI, USA, 24–29 June 2012

Durkee D (2010) Why cloud computing will never be free. Commun ACM 53(5):62–69

ENISA (2012) Cloud computing - benefits, risks and recommendations for information security. European Network and Security Agency. https://resilience.enisa.europa.eu/cloud-security-and-resilience/publications/cloud-computing-benefits-risks-and-recommendations-for-information-security . Accessed 10 July 2023

Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170

Floerecke S, Lehner F, Schweikl S (2021) Cloud computing ecosystem model: evaluation and role clusters. Electron Mark 31(4):923–943

Foster I, Kesselman C (2004) The grid 2: blueprint for a new computing infrastructure, 2nd edn. Elsevier, San Francisco, CA

Foster I, Kesselman C, Tuecke S (2001) The anatomy of the grid: enabling scalable virtual organizations. Int J High Perform Comput Appl 15(3):200–222

Foster I, Zhao Y, Raicu I, Lu S (2008) Cloud computing and grid computing 360-degree compared. In: Paper presented at the Grid Computing Environments Workshop, Austin, TX, 12–16 November 2008

Gao F, Thiebes S, Sunyaev A (2018) Rethinking the meaning of cloud computing for health care: a taxonomic perspective and future research directions. J Med Internet Res 20(7):e10041

Gartner (2018a) Revenue of cloud computing worldwide. https://de.statista.com/statistik/daten/studie/195760/umfrage/umsatz-mit-cloud-computing-weltweit/ . Accessed 10 July 2023

Gartner (2018b) Revenues from public cloud infrastructure as a service (IaaS) market worldwide from 2015 to 2017, by vendor (in million U.S. dollars). https://www.statista.com/statistics/754826/worldwide-public-cloud-infrastructure-services-vendor-revenues/ . Accessed 10 July 2023

Gartner (2022) Public cloud services end-user spending worldwide from 2017 to 2023. https://www.gartner.com/en/newsroom/press-releases/2022-10-31-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-reach-nearly-600-billion-in-2023 . Accessed 5 June 2023

Gefen D, Karahanna E, Straub DW (2003) Trust and TAM in online shopping: an integrated model. MIS Q 27(1):51–90

Gonzalez R, Gasco J, Llop J (2009) Information systems outsourcing reasons and risks: an empirical study. Int J Soc Sci 4(3):180–191

Grover V, Kohli R (2012) Cocreating IT value: new capabilities and metrics for multifirm environments. MIS Q 36(1):225–232

Grozev N, Buyya R (2014) Inter-cloud architectures and application brokering: taxonomy and survey. Softw Pract Exp 44(3):369–390

Hentschel R, Leyh C, Petznick A (2018) Current cloud challenges in Germany: the perspective of cloud service providers. J Cloud Comput 7(1):5

Heras-Saizarbitoria I, Boiral O, Díaz de Junguitu A (2020) Environmental management certification and environmental performance: greening or greenwashing? Bus Strateg Environ 29(6):2829–2841

Hess T, Matt C, Benlian A, Wiesböck F (2016) Options for formulating a digital transformation strategy. MIS Q Exec 15(2):123–139

Höfer CN, Karagiannis G (2011) Cloud computing services: taxonomy and comparison. J Internet Serv Appl 2(2):81–94

Hogendorn C (2011) Excessive(?) entry of national telecom networks, 1990–2001. Telecommun Policy 35(11):920–932

Hussain SA, Fatima M, Saeed A, Raza I, Shahzad RK (2017) Multilevel classification of security concerns in cloud computing. Appl Comput Inform 13(1):57–65

ISO (2004) Conformity assessment—vocabulary and general principles. https://www.iso.org/standard/29316.html . Accessed 10 July 2023

ITCandor (2018) Distribution of cloud platform as a Service (PaaS) market revenues worldwide from 2015 to June 2018, by vendor. https://www.statista.com/statistics/540521/worldwide-cloud-platform-revenue-share-by-vendor/ . Accessed 10 July 2023

Iyer B, Henderson JC (2010) Preparing for the future: understanding the seven capabilities of cloud computing. MIS Q Exec 9(2):117–131

Jones MA, Mothersbaugh DL, Beatty SE (2002) Why customers stay: measuring the underlying dimensions of services switching costs and managing their differential strategic outcomes. J Bus Res 55(6):441–450

Kern T, Lacity MC, Willcocks L (2002) Netsourcing: renting business applications and services over a network. Prentice Hall, New York

Kernahan A, Bernskov U, Beck R (2021) Blockchain out of the box—where is the blockchain in blockchain-as-a-service? In: Proceedings of the Annual Hawaii International Conference on System Sciences, pp 1–10

Khan N, Al-Yasiri A (2016) Identifying cloud security threats to strengthen cloud computing adoption framework. Procedia Comput Sci 94:485–490

Killalea T (2008) Meet the virts. ACM Queue 6(1):14–18

Kleinrock L (2005) A vision for the Internet. ST J Res 2(1):4–5

MathSciNet   Google Scholar  

Kouatli I (2014) A comparative study of the evolution of vulnerabilities in IT systems and its relation to the new concept of cloud computing. J Manag Hist 20(4):409–433

Kroeker KL (2011) Grid computing’s future. Commun ACM 54(3):15–17

Krotsiani M, Spanoudakis G, Kloukinas C (2015) Monitoring-based certification of cloud service security. In: Paper presented at the OTM Confederated International Conferences “On the move to meaningful internet systems”, Rhodes, Greece, 26–30 October 2015

Kumar N, DuPree L (2011) Protection and privacy of information assets in the cloud. In: Halpert B (ed) Auditing cloud computing, a security and privacy guide. Wiley, Hoboken, NJ, pp 97–128

Kunz I, Stephanow P (2017) A process model to support continuous certification of cloud services. In: Paper presented at the 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 27–29 March 2017

Lansing J, Benlian A, Sunyaev A (2018) ‘Unblackboxing’ decision makers’ interpretations of IS certifications in the context of cloud service certifications. J Assoc Inf Syst 19(11):1064–1096

Lee C, Wan G (2010) Including subjective norm and technology trust in the technology acceptance model: a case of e-ticketing in China. SIGMIS Database 41(4):40–51

Leimeister S, Böhm M, Riedl C, Krcmar H (2010) The business perspective of cloud computing: actors, roles and value networks. In: Paper presented at the 18th European Conference on Information Systems, Pretoria, South Africa, 7–9 June 2010

Lins S, Grochol P, Schneider S, Sunyaev A (2016a) Dynamic certification of cloud services: trust, but verify! IEEE Secur Priv 14(2):66–71

Lins S, Teigeler H, Sunyaev A (2016b) Towards a bright future: enhancing diffusion of continuous cloud service auditing by third parties. In: Paper presented at the 24th European Conference on Information Systems, Istanbul, Turkey, 12–15 June 2016

Lins S, Schneider S, Sunyaev A (2018) Trust is good, control is better: creating secure clouds by continuous auditing. IEEE Trans Cloud Comput 6(3):890–903

Lins S, Schneider S, Sunyaev A (2019a) Cloud-service-Zertifizierung: Ein Rahmenwerk und Kriterienkatalog zur Zertifizierung von Cloud-services, 2nd edn. Springer, Berlin

Book   Google Scholar  

Lins S, Schneider S, Szefer J, Ibraheem S, Sunyaev A (2019b) Designing monitoring systems for continuous certification of cloud services: deriving meta-requirements and design guidelines. Commun Assoc Inf Syst 44:460–510

Lins S, Pandl KD, Teigeler H, Thiebes S, Bayer C, Sunyaev A (2021) Artificial intelligence as a service. Bus Inf Syst Eng 63(4):441–456

Linthicum DS (2009) Cloud computing and SOA convergence in your enterprise: a step-by-step guide: how to use SaaS, SOA, mashups, and web 2.0 to break down the IT gates. Addison-Wesley, Boston, MA

Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, Leaf D (2011) NIST cloud computing reference architecture. https://bigdatawg.nist.gov/_uploadfiles/M0008_v1_7256814129.pdf . Accessed 10 July 2023

Löbbers J, Lins S, Kromat T, Benlian A, Sunyaev A (2022) A multi-perspective lens on web assurance seals: contrasting vendors’ intended and consumers’ perceived effects. Electron Commer Res 22(4):1573–1615

Luftman J, Zadeh HS (2011) Key information technology and management issues 2010–11: an international study. J Inf Technol 26(3):193–204

Maier N, Lins S, Teigeler H, Roßnagel A, Sunyaev A (2019) Die Zertifizierung von Cloud-Diensten nach der DSGVO. Datenschutz und Datensicherheit DuD 43(4):225–229

Malluhi Q, Khan KM (2013) Trust in cloud services: providing more controls to clients. Computer 46(7):94–96

Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2011) Cloud computing—the business perspective. Decis Support Syst 51(1):176–189

Mell P, Grance T (2011) The NIST definition of cloud computing. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf . Accessed 10 July 2023

NIST Cloud Computing Security Working Group (2013) NIST cloud computing security reference architecture. https://csrc.nist.gov/publications/detail/sp/500-299/draft . Accessed 10 July 2023

Onik MMH, Miraz MH (2019) Performance analytical comparison of blockchain-as-a-service (BaaS) platforms. In: Second Edition of the International Conference on Emerging Technologies in Computing (iCETiC 2019), London, UK

Pahl C (2015) Containerization and the PaaS cloud. IEEE Cloud Comput 2(3):24–31

Pandl KD, Teigeler H, Lins S, Thiebes S, Sunyaev A (2021) Drivers and inhibitors for organizations’ intention to adopt artificial intelligence as a service. In: Proceedings of the 54th Hawaii International Conference on System Sciences (HICSS), pp 1769–1778

Park S-T, Park E-M, Seo J-H, Li G (2016) Factors affecting the continuous use of cloud service: focused on security risks. Cluster Comput 19(1):485–495

Prajogo DI (2011) The roles of firms’ motives in affecting the outcomes of ISO 9000 adoption. Int J Oper Prod Manag 31(1):78–100

Rai A, Constantinides P, Sarker S (2019) Next-generation digital platforms: toward human-AI hybrids. Manag Inf Syst Q 43:iii–ix

Romero F, Li Q, Yadwadkar N, Kozyrakis C (2019) INFaaS: managed & model-less inference serving

Sarkar P, Young L (2011) Sailing the cloud: a case study of perceptions and changing roles in an Australian university. In: Paper presented at the 19th European Conference on Information Systems, Helsinki, Finland, 9–11 June 2011

Schneider S, Sunyaev A (2016) Determinant factors of cloud-sourcing decisions: reflecting on the IT outsourcing literature in the era of cloud computing. J Inf Technol 31(1):1–31

Schneider S, Lansing J, Gao F, Sunyaev A (2014) A taxonomic perspective on certification schemes: development of a taxonomy for cloud service certification criteria. In: Paper presented at the 47th Hawaii International Conference on System Sciences, Waikoloa, HI, USA, 6–9 January 2014

Schneider S, Wollersheim J, Krcmar H, Sunyaev A (2018) How do requirements evolve over time? A case study investigating the role of context and experiences in the evolution of enterprise software requirements. J Inf Technol 33(2):151–170

Schwarz A, Jayatilaka B, Hirschheim R, Goles T (2009) A conjoint approach to understanding IT application services outsourcing. J Assoc Inf Syst 10(10):1

Schwiegelshohn U, Badia RM, Bubak M, Danelutto M, Dustdar S, Gagliardi F, Geiger A, Hluchy L, Kranzlmüller D, Laure E, Priol T, Reinefeld A, Resch M, Reuter A, Rienhoff O, Rüter T, Sloot P, Talia D, Ullmann K, Yahyapour R (2010) Perspectives on grid computing. Future Gener Comput Syst 26(8):1104–1115

Seethamraju R (2013) Determinants of SaaS ERP systems adoption. In: Paper presented at the 17th Pacific Asia Conference on Information Systems, Jeju Island, South Korea, 18–22 June 2013

Sehgal NK, Sohoni S, Xiong Y, Fritz D, Mulia W, Acken JM (2011) A cross section of the issues and research activities related to both information security and cloud computing. IETE Tech Rev 28(4):279–291

Shafiei H, Khonsari A, Mousavi P (2022) Serverless computing: a survey of opportunities, challenges, and applications. ACM Comput Surv 54(11s):239

Sharma D, Dhote C, Potey M (2016) Identity and access management as security-as-a-service from clouds. Procedia Comput Sci 79:170–174

Singh A, Chatterjee K (2017) Cloud security issues and challenges: a survey. J Netw Comput Appl 79(C):88–115

Singh S, Jeong Y-S, Park JH (2016) A survey on cloud computing security. J Netw Comput Appl 75(C):200–222

Soares J, Carapinha J, Melo M, Monteiro R, Sargento S (2011) Building virtual private clouds with network-aware cloud. In: Paper presented at the 5th International Conference on Advanced Engineering Computing and Applications in Sciences, Lisbon, Portugal, 20–25 November 2011

Song J, Zhang P, Alkubati M, Bao Y, Yu G (2022) Research advances on blockchain-as-a-service: architectures, applications and challenges. Digit Commun Netw 8(4):466–475

Stephanow P, Banse C (2017) Evaluating the performance of continuous test-based cloud service certification. In: Paper presented at the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Madrid, Spain, 14–17 May 2017

Stephanow P, Khajehmoogahi K (2017) towards continuous security certification of software-as-a-service applications using web application testing techniques. In: Paper presented at the 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 27–29 March 2017

Stephanow P, Banse C, Schütte J (2016) Generating threat profiles for cloud service certification systems. In: Paper presented at the 17th IEEE International Symposium on High Assurance Systems Engineering, Orlando, FL, USA, 7–9 January 2016

Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

Sunyaev A, Schneider S (2013) Cloud services certification. Commun ACM 56(2):33–36

Susarla A, Barua A, Whinston AB (2003) Understanding the service component of application service provision: an empirical analysis of satisfaction with ASP services. MIS Q 27(1):91–123

Tan W, Fan Y, Ghoneim A, Hossain MA, Dustdar S (2016) From the service-oriented architecture to the web API economy. IEEE Internet Comput 20(4):64–68

Teigeler H, Lins S, Sunyaev A (2018) Drivers vs. inhibitors—what clinches continuous service certification adoption by cloud service providers? In: Paper presented at the 51th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, HI, USA, 3–6 January 2018

Thiebes S, Kleiber G, Sunyaev A (2017) Cancer genomics research in the cloud: a taxonomy of genome data sets. In: Paper presented at the 4th International Workshop on Genome Privacy and Security, Orlando, FL, USA, 15 October 2017

Thiebes S, Lins S, Sunyaev A (2021) Trustworthy artificial intelligence. Electron Mark 31(2):447–464

Tiwana A, Konsynski B, Bush AA (2010) Research commentary—platform evolution: coevolution of platform architecture, governance, and environmental dynamics. Inf Syst Res 21(4):675–687

Top Threats Working Group (2016) The Treacherous 12. Cloud computing top threats in 2016

Trenz M, Huntgeburth JC, Veit DJ (2013) The role of uncertainty in cloud computing continuance: antecedents, mitigators, and consequences. In: Paper presented at the 21st European Conference on Information Systems, Utrecht, Netherlands, 5–8 June 2013

Trenz M, Huntgeburth J, Veit D (2018) Uncertainty in cloud service relationships: uncovering the differential effect of three social influence processes on potential and current users. Inf Manag 55(8):971–983

Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478

Venters W, Whitley EA (2012) A critical review of cloud computing: researching desires and realities. J Inf Technol 27(3):179–197

Voorsluys W, Broberg J, Buyya R (2011) Introduction to cloud computing. In: Buyya R, Broberg J, Goscinski A (eds) Cloud computing. Wiley, Hoboken, NJ, pp 3–42

Wang B, Li B, Li H (2014) Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans Cloud Comput 2(1):43–56

Weinhardt C, Anandasivam A, Blau B, Borissov N, Meinl T, Michalk W, Stößer J (2009) Cloud computing – a classification, business models, and research directions. Bus Inf Syst Eng 1(5):391–399

Whitman M, Mattord H (2011) Cloud-based IT governance. In: Halpert B (ed) Auditing cloud computing: a security and privacy guide. Wiley, Hoboken, NJ, pp 33–55

Windhorst I, Sunyaev A (2013) Dynamic certification of cloud services. In: Paper presented at the 8th International Conference on Availability, Reliability and Security, Regensburg, Germany, 2–6 September 2013

Wu C, Buyya R, Ramamohanarao K (2019) Cloud pricing models: taxonomy, survey, and interdisciplinary challenges. ACM Comput Surv 52(6):1–36

Yao Y, Xiao Z, Wang B, Viswanath B, Zheng H, Zhao B (2017) Complexity vs. performance: empirical analysis of machine learning as a service. In: Proceedings of the 2017 Internet Measurement Conference, pp 384–397

Yoo Y, Henfridsson O, Lyytinen K (2010) Research commentary—the new organizing logic of digital innovation: an agenda for information systems research. Inf Syst Res 21(4):724–735

Zhang M (2023) Top 250 data center companies in the world as of 2023. https://dgtlinfra.com/top-data-center-companies/ . Accessed 5 June 2023

Further Reading

Lins S, Schneider S, Sunyaev A (2019) Cloud-Service-Zertifizierung: Ein Rahmenwerk und Kriterienkatalog zur Zertifizierung von Cloud-Services, 2nd edn. Springer, Berlin

Download references

Author information

Authors and affiliations.

Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology, Karlsruhe, Germany

Ali Sunyaev

You can also search for this author in PubMed   Google Scholar

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Sunyaev, A. (2024). Cloud Computing. In: Internet Computing. Springer, Cham. https://doi.org/10.1007/978-3-031-61014-1_6

Download citation

DOI : https://doi.org/10.1007/978-3-031-61014-1_6

Published : 28 August 2024

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-61013-4

Online ISBN : 978-3-031-61014-1

eBook Packages : Computer Science Computer Science (R0)

Share this chapter

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

banner-in1

  • Cloud Computing

Top 10 Cloud Computing Research Topics of 2024

Home Blog Cloud Computing Top 10 Cloud Computing Research Topics of 2024

Play icon

Cloud computing is a fast-growing area in the technical landscape due to its recent developments. If we look ahead to 2024, there are new research topics in cloud computing that are getting more traction among researchers and practitioners. Cloud computing has ranged from new evolutions on security and privacy with the use of AI & ML usage in the Cloud computing for the new cloud-based applications for specific domains or industries. In this article, we will investigate some of the top cloud computing research topics for 2024 and explore what we get most out of it for researchers or cloud practitioners. To master a cloud computing field, we need to check these Cloud Computing online courses .

Why Cloud Computing is Important for Data-driven Business?

The Cloud computing is crucial for data-driven businesses because it provides scalable and cost-effective ways to store and process huge amounts of data. Cloud-based storage and analytical platform helps business to easily access their data whenever required irrespective of where it is located physically. This helps businesses to take good decisions about their products and marketing plans. 

Cloud computing could help businesses to improve their security in terms of data, Cloud providers offer various features such as data encryption and access control to their customers so that they can protect the data as well as from unauthorized access. 

Few benefits of Cloud computing are listed below: 

  • Scalability: With Cloud computing we get scalable applications which suits for large scale production systems for Businesses which store and process large sets of data.
  • Cost-effectiveness : It is evident that Cloud computing is cost effective solution compared to the traditional on-premises data storage and analytical solutions due to its scaling capacity which leads to saving more IT costs. 
  • Security : Cloud providers offer various security features which includes data encryption and access control, that can help businesses to protect their data from unauthorized access.
  • Reliability : Cloud providers ensure high reliability to their customers based on their SLA which is useful for the data-driven business to operate 24X7. 

Top 10 Cloud Computing Research Topics

1. neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing.

Cloud computing research topics are getting wider traction in the Cloud Computing field. These topics in the paper suggest a multi-objective evolutionary algorithm (NN-MOEA) based on neural networks for dynamic workflow scheduling in cloud computing. Due to the dynamic nature of cloud resources and the numerous competing objectives that need to be optimized, scheduling workflows in cloud computing is difficult. The NN-MOEA algorithm utilizes neural networks to optimize multiple objectives, such as planning, cost, and resource utilization. This research focuses on cloud computing and its potential to enhance the efficiency and effectiveness of businesses' cloud-based workflows.

The algorithm predicts workflow completion time using a feedforward neural network based on input and output data sizes and cloud resources. It generates a balanced schedule by taking into account conflicting objectives and projected execution time. It also includes an evolutionary algorithm for future improvement.

The proposed NN-MOEA algorithm has several benefits, such as the capacity to manage dynamic changes in cloud resources and the capacity to simultaneously optimize multiple objectives. The algorithm is also capable of handling a variety of workflows and is easily expandable to include additional goals. The algorithm's use of neural networks to forecast task execution times is a crucial component because it enables the algorithm to generate better schedules and more accurate predictions.

The paper concludes by presenting a novel multi-objective evolutionary algorithm-based neural network-based approach to dynamic workflow scheduling in cloud computing. In terms of optimizing multiple objectives, such as make span and cost, and achieving a better balance between them, these cloud computing dissertation topics on the proposed NN-MOEA algorithm exhibit encouraging results.

Key insights and Research Ideas:

Investigate the use of different neural network architectures for predicting the future positions of optimal solutions. Explore the use of different multi-objective evolutionary algorithms for solving dynamic workflow scheduling problems. Develop a cloud-based workflow scheduling platform that implements the proposed algorithm and makes it available to researchers and practitioners.

2. A systematic literature review on cloud computing security: threats and mitigation strategies 

This is one of cloud computing security research topics in the cloud computing paradigm. The authors then provide a systematic literature review of studies that address security threats to cloud computing and mitigation techniques and were published between 2010 and 2020. They list and classify the risks and defense mechanisms covered in the literature, as well as the frequency and distribution of these subjects over time.

The paper suggests the data breaches, Insider threats and DDoS attack are most discussed threats to the security of cloud computing. Identity and access management, encryption, and intrusion detection and prevention systems are the mitigation techniques that are most frequently discussed. Authors depict the future trends of machine learning and artificial intelligence might help cloud computing to mitigate its risks. 

The paper offers a thorough overview of security risks and mitigation techniques in cloud computing, and it emphasizes the need for more research and development in this field to address the constantly changing security issues with cloud computing. This research could help businesses to reduce the amount of spam that they receive in their cloud-based email systems.

Explore the use of blockchain technology to improve the security of cloud computing systems. Investigate the use of machine learning and artificial intelligence to detect and prevent cloud computing attacks. Develop new security tools and technologies for cloud computing environments. 

3. Spam Identification in Cloud Computing Based on Text Filtering System

A text filtering system is suggested in the paper "Spam Identification in Cloud Computing Based on Text Filtering System" to help identify spam emails in cloud computing environments. Spam emails are a significant issue in cloud computing because they can use up computing resources and jeopardize the system's security. 

To detect spam emails, the suggested system combines text filtering methods with machine learning algorithms. The email content is first pre-processed by the system, which eliminates stop words and stems the remaining words. The preprocessed text is then subjected to several filters, including a blacklist filter and a Bayesian filter, to identify spam emails.

In order to categorize emails as spam or non-spam based on their content, the system also employs machine learning algorithms like decision trees and random forests. The authors use a dataset of emails gathered from a cloud computing environment to train and test the system. They then assess its performance using metrics like precision, recall, and F1 score.

The findings demonstrate the effectiveness of the proposed system in detecting spam emails, achieving high precision and recall rates. By contrasting their system with other spam identification systems, the authors also show how accurate and effective it is. 

The method presented in the paper for locating spam emails in cloud computing environments has the potential to improve the overall security and performance of cloud computing systems. This is one of the interesting clouds computing current research topics to explore and innovate. This is one of the good Cloud computing research topics to protect the Mail threats. 

Create a stronger spam filtering system that can recognize spam emails even when they are made to avoid detection by more common spam filters. examine the application of artificial intelligence and machine learning to the evaluation of spam filtering system accuracy. Create a more effective spam filtering system that can handle a lot of emails quickly and accurately.

4. Blockchain data-based cloud data integrity protection mechanism 

The "Blockchain data-based cloud data integrity protection mechanism" paper suggests a method for safeguarding the integrity of cloud data and which is one of the Cloud computing research topics. In order to store and process massive amounts of data, cloud computing has grown in popularity, but issues with data security and integrity still exist. For the proposed mechanism to guarantee the availability and integrity of cloud data, data redundancy and blockchain technology are combined.

A data redundancy layer, a blockchain layer, and a verification and recovery layer make up the mechanism. For availability in the event of server failure, the data redundancy layer replicates the cloud data across multiple cloud servers. The blockchain layer stores the metadata (such as access rights) and hash values of the cloud data and access control information

Using a dataset of cloud data, the authors assess the performance of the suggested mechanism and compare it to other cloud data protection mechanisms. The findings demonstrate that the suggested mechanism offers high levels of data availability and integrity and is superior to other mechanisms in terms of processing speed and storage space.

Overall, the paper offers a promising strategy for using blockchain technology to guarantee the availability and integrity of cloud data. The suggested mechanism may assist in addressing cloud computing's security issues and enhancing the dependability of cloud data processing and storage. This research could help businesses to protect the integrity of their cloud-based data from unauthorized access and manipulation.

Create a data integrity protection system based on blockchain that is capable of detecting and preventing data tampering in cloud computing environments. For enhancing the functionality and scalability of blockchain-based data integrity protection mechanisms, look into the use of various blockchain consensus algorithms. Create a data integrity protection system based on blockchain that is compatible with current cloud computing platforms. Create a safe and private data integrity protection system based on blockchain technology.

5. A survey on internet of things and cloud computing for healthcare

This article suggests how recent tech trends like the Internet of Things (IoT) and cloud computing could transform the healthcare industry. It is one of the Cloud computing research topics. These emerging technologies open exciting possibilities by enabling remote patient monitoring, personalized care, and efficient data management. This topic is one of the IoT and cloud computing research papers which aims to share a wider range of information. 

The authors categorize the research into IoT-based systems, cloud-based systems, and integrated systems using both IoT and the cloud. They discussed the pros of real-time data collection, improved care coordination, automated diagnosis and treatment.

However, the authors also acknowledge concerns around data security, privacy, and the need for standardized protocols and platforms. Widespread adoption of these technologies faces challenges in ensuring they are implemented responsibly and ethically. To begin the journey KnowledgeHut’s Cloud Computing online course s are good starter for beginners so that they can cope with Cloud computing with IOT. 

Overall, the paper provides a comprehensive overview of this rapidly developing field, highlighting opportunities to revolutionize how healthcare is delivered. New devices, systems and data analytics powered by IoT, and cloud computing could enable more proactive, preventative and affordable care in the future. But careful planning and governance will be crucial to maximize the value of these technologies while mitigating risks to patient safety, trust and autonomy. This research could help businesses to explore the potential of IoT and cloud computing to improve healthcare delivery.

Examine how IoT and cloud computing are affecting patient outcomes in various healthcare settings, including hospitals, clinics, and home care. Analyze how well various IoT devices and cloud computing platforms perform in-the-moment patient data collection, archival, and analysis. assessing the security and privacy risks connected to IoT devices and cloud computing in the healthcare industry and developing mitigation strategies.

6. Targeted influence maximization based on cloud computing over big data in social networks

Big data in cloud computing research papers are having huge visibility in the industry. The paper "Targeted Influence Maximization based on Cloud Computing over Big Data in Social Networks" proposes a targeted influence maximization algorithm to identify the most influential users in a social network. Influence maximization is the process of identifying a group of users in a social network who can have a significant impact or spread information. 

A targeted influence maximization algorithm is suggested in the paper "Targeted Influence maximization based on Cloud Computing over Big Data in Social Networks" to find the most influential users in a social network. The process of finding a group of users in a social network who can make a significant impact or spread information is known as influence maximization.

Four steps make up the suggested algorithm: feature extraction, classification, influence maximization, and data preprocessing. The authors gather and preprocess social network data, such as user profiles and interaction data, during the data preprocessing stage. Using machine learning methods like text mining and sentiment analysis, they extract features from the data during the feature extraction stage. Overall, the paper offers a promising strategy for maximizing targeted influence using big data and Cloud computing research topics to look into. The suggested algorithm could assist companies and organizations in pinpointing their marketing or communication strategies to reach the most influential members of a social network.

Key insights and Research Ideas: 

Develop a cloud-based targeted influence maximization algorithm that can effectively identify and influence a small number of users in a social network to achieve a desired outcome. Investigate the use of different cloud computing platforms to improve the performance and scalability of cloud-based targeted influence maximization algorithms. Develop a cloud-based targeted influence maximization algorithm that is compatible with existing social network platforms. Design a cloud-based targeted influence maximization algorithm that is secure and privacy-preserving.

7. Security and privacy protection in cloud computing: Discussions and challenges

Cloud computing current research topics are getting traction, this is of such topic which provides an overview of the challenges and discussions surrounding security and privacy protection in cloud computing. The authors highlight the importance of protecting sensitive data in the cloud, with the potential risks and threats to data privacy and security. The article explores various security and privacy issues that arise in cloud computing, including data breaches, insider threats, and regulatory compliance.

The article explores challenges associated with implementing these security measures and highlights the need for effective risk management strategies. Azure Solution Architect Certification course is suitable for a person who needs to work on Azure cloud as an architect who will do system design with keep security in mind. 

Final take away of cloud computing thesis paper by an author points out by discussing some of the emerging trends in cloud security and privacy, including the use of artificial intelligence and machine learning to enhance security, and the emergence of new regulatory frameworks designed to protect data in the cloud and is one of the Cloud computing research topics to keep an eye in the security domain. 

Develop a more comprehensive security and privacy framework for cloud computing. Explore the options with machine learning and artificial intelligence to enhance the security and privacy of cloud computing. Develop more robust security and privacy mechanisms for cloud computing. Design security and privacy policies for cloud computing that are fair and transparent. Educate cloud users about security and privacy risks and best practices.

8. Intelligent task prediction and computation offloading based on mobile-edge cloud computing

This Cloud Computing thesis paper "Intelligent Task Prediction and Computation Offloading Based on Mobile-Edge Cloud Computing" proposes a task prediction and computation offloading mechanism to improve the performance of mobile applications under the umbrella of cloud computing research ideas.

An algorithm for offloading computations and a task prediction model makes up the two main parts of the suggested mechanism. Based on the mobile application's usage patterns, the task prediction model employs machine learning techniques to forecast its upcoming tasks. This prediction is to decide whether to execute a specific task locally on the mobile device or offload the computation of it to the cloud.

Using a dataset of mobile application usage patterns, the authors assess the performance of the suggested mechanism and compare it to other computation offloading mechanisms. The findings demonstrate that the suggested mechanism performs better in terms of energy usage, response time, and network usage.

The authors also go over the difficulties in putting the suggested mechanism into practice, including the need for real-time task prediction and the trade-off between offloading computation and network usage. Additionally, they outline future research directions for mobile-edge cloud computing applications, including the use of edge caching and the integration of blockchain technology for security and privacy. 

Overall, the paper offers a promising strategy for enhancing mobile application performance through mobile-edge cloud computing. The suggested mechanism might improve the user experience for mobile users while lowering the energy consumption and response time of mobile applications. These Cloud computing dissertation topic leads to many innovation ideas. 

Develop an accurate task prediction model considering mobile device and cloud dynamics. Explore machine learning and AI for efficient computation offloading. Create a robust framework for diverse tasks and scenarios. Design a secure, privacy-preserving computation offloading mechanism. Assess computation offloading effectiveness in real-world mobile apps.

9. Cloud Computing and Security: The Security Mechanism and Pillars of ERPs on Cloud Technology

Enterprise resource planning (ERP) systems are one of the Cloud computing research topics in particular face security challenges with cloud computing, and the paper "Cloud Computing and Security: The Security Mechanism and Pillars of ERPs on Cloud Technology" discusses these challenges and suggests a security mechanism and pillars for protecting ERP systems on cloud technology.

The authors begin by going over the benefits of ERP systems and cloud computing as well as the security issues with cloud computing, like data breaches and insider threats. They then go on to present a security framework for cloud-based ERP systems that is built around four pillars: access control, data encryption, data backup and recovery, and security monitoring. The access control pillar restricts user access, while the data encryption pillar secures sensitive data. Data backup and recovery involve backing up lost or failed data. Security monitoring continuously monitors the ERP system for threats. The authors also discuss interoperability challenges and the need for standardization in securing ERP systems on the cloud. They propose future research directions, such as applying machine learning and artificial intelligence to security analytics.

Overall, the paper outlines a thorough strategy for safeguarding ERP systems using cloud computing and emphasizes the significance of addressing security issues related to this technology. Organizations can protect their ERP systems and make sure the Security as well as privacy of their data by implementing these security pillars and mechanisms. 

Investigate the application of blockchain technology to enhance the security of cloud-based ERP systems. Look into the use of machine learning and artificial intelligence to identify and stop security threats in cloud-based ERP systems. Create fresh security measures that are intended only for cloud-based ERP systems. By more effectively managing access control and data encryption, cloud-based ERP systems can be made more secure. Inform ERP users about the security dangers that come with cloud-based ERP systems and how to avoid them.

10. Optimized data storage algorithm of IoT based on cloud computing in distributed system

The article proposes an optimized data storage algorithm for Internet of Things (IoT) devices which runs on cloud computing in a distributed system. In IoT apps, which normally generate huge amounts of data by various devices, the algorithm tries to increase the data storage and faster retrials of the same. 

The algorithm proposed includes three main components: Data Processing, Data Storage, and Data Retrieval. The Data Processing module preprocesses IoT device data by filtering or compressing it. The Data Storage module distributes the preprocessed data across cloud servers using partitioning and stores it in a distributed database. The Data Retrieval module efficiently retrieves stored data in response to user queries, minimizing data transmission and enhancing query efficiency. The authors evaluated the algorithm's performance using an IoT dataset and compared it to other storage and retrieval algorithms. Results show that the proposed algorithm surpasses others in terms of storage effectiveness, query response time, and network usage. 

They suggest future directions such as leveraging edge computing and blockchain technology for optimizing data storage and retrieval in IoT applications. In conclusion, the paper introduces a promising method to improve data archival and retrieval in distributed cloud based IoT applications, enhancing the effectiveness and scalability of IoT applications.

Create a data storage algorithm capable of storing and managing large amounts of IoT data efficiently. Examine the use of cloud computing to improve the performance and scalability of data storage algorithms for IoT. Create a secure and privacy-preserving data storage algorithm. Assess the performance and effectiveness of data storage algorithms for IoT in real-world applications.

How to Write a Perfect Research Paper?

  • Choose a topic: Select the topic which is interesting to you so that you can share things with the viewer seamlessly with good content. 
  • Do your research: Read books, articles, and websites on your topic. Take notes and gather evidence to support your arguments.
  • Write an outline: This will help you organize your thoughts and make sure your paper flows smoothly.
  • Start your paper: Start with an introduction that grabs the reader's attention. Then, state your thesis statement and support it with evidence from your research. Finally, write a conclusion that summarizes your main points.
  • Edit and proofread your paper. Make sure you check the grammatical errors and spelling mistakes. 

Cloud computing is a rapidly evolving area with more interesting research topics being getting traction by researchers and practitioners. Cloud providers have their research to make sure their customer data is secured and take care of their security which includes encryption algorithms, improved access control and mitigating DDoS – Deniel of Service attack etc., 

With the improvements in AI & ML, a few features developed to improve the performance, efficiency, and security of cloud computing systems. Some of the research topics in this area include developing new algorithms for resource allocation, optimizing cloud workflows, and detecting and mitigating cyberattacks.

Cloud computing is being used in industries such as healthcare, finance, and manufacturing. Some of the research topics in this area include developing new cloud-based medical imaging applications, building cloud-based financial trading platforms, and designing cloud-based manufacturing systems.

Frequently Asked Questions (FAQs)

Data security and privacy problems, vendor lock-in, complex cloud management, a lack of standardization, and the risk of service provider disruptions are all current issues in cloud computing. Because data is housed on third-party servers, data security and privacy are key considerations. Vendor lock-in makes transferring providers harder and increases reliance on a single one. Managing many cloud services complicates things. Lack of standardization causes interoperability problems and restricts workload mobility between providers. 

Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) are the cloud computing scenarios where industries focusing right now. 

The six major components of cloud infrastructure are compute, storage, networking, security, management and monitoring, and database. These components enable cloud-based processing and execution, data storage and retrieval, communication between components, security measures, management and monitoring of the infrastructure, and database services.  

Profile

Vinoth Kumar P

Vinoth Kumar P is a Cloud DevOps Engineer at Amadeus Labs. He has over 7 years of experience in the IT industry, and is specialized in DevOps, GitOps, DevSecOps, MLOps, Chaos Engineering, Cloud and Cloud Native landscapes. He has published articles and blogs on recent tech trends and best practices on GitHub, Medium, and LinkedIn, and has delivered a DevSecOps 101 talk to Developers community , GitOps with Argo CD Webinar for DevOps Community. He has helped multiple enterprises with their cloud migration, cloud native design, CICD pipeline setup, and containerization journey.

Avail your free 1:1 mentorship session.

Something went wrong

Upcoming Cloud Computing Batches & Dates

NameDateFeeKnow more

Course advisor icon

CPR: Computers and People Research

Go to Proceedings of the 2023 Computers and People Research Conference

  • Association for Computing Machinery
  • United States

Save to Binder

ACM Digital Library

No abstract available.

Proceeding Downloads

Digital transformation in the craft sector: identifying digital competencies and attitudes for managers and employees.

  • Seyma Kocak ,
  • Jan Pawlowski

Digital skills and attitudes are increasingly crucial for driving digital transformation forward. On the other hand, craft enterprises are still traditionally positioned and need more concrete digital competencies and attitudes. This study focuses on the ...

  • View online with eReader

Examining Individual Differences in IT Career Choice: Evidence from Across the United States

  • Deborah J. Armstrong ,
  • Yuefei Nancy Deng

A career in information technology (IT) offers not only employment opportunities but also a potential source of economic advancement. To develop a more diverse and inclusive workforce and continue our commitment to diversity, equity, and inclusion (DEI), ...

Diversity, Equity, and Inclusion Perceptions as Drivers of Career Outcomes for IT Professionals

  • Michael A. Erskine ,
  • Elizabeth White Baker

Despite decades of academic discourse and the implementation of various policy and industry interventions, the IT workforce still does not adequately reflect the diversity of the overall working population. In addition to a labor shortage pointing to the ...

Effects of the Digital Mindset on Affordance Perceptions

  • Yannick Hildebrandt

This poster presents an idea for a study to assess the impact of the digital mindset (a central IT-specific trait) on the perception of affordances. We are planning two experiments and a pre-study. The pre-study is conducted to identify different ...

Impact of ICT Permeability on Work and Family Outcomes

  • Rui Sundrup ,
  • Manju Ahuja ,
  • Massimo Magni

This paper presents a framework that investigates the impact of Information and Communication Technology (ICT) permeability on work and family outcomes for dual-career couples in the context of Work-from-home (WFH). The study shows that as couples rely ...

Genie Breaks the Bottle: Ethics in Artificial Intelligence Adoption: ChatGPT; The Beginning and the End of Human Wisdom

  • Shuyuan Mary Ho ,

ChatGPT, developed by OpenAI, has attracted significant attention from early adopters. While this generative artificial intelligence (AI) system can be somewhat intuitive, such technology can also be disruptive in domains that require creativity (e.g., ...

Creating a Sustainable IS Career Ecosystem: Examining the Cross-section of the Diversity Management Approach and the Social Cognitive Career Theory: Research in Progress

  • Pamella Howell ,
  • Crystal Wu ,

To increase the opportunities for diverse students in STEM, universities have augmented their recruitment processes with Diversity, Equity, and Inclusion (DEI) initiatives. However, critics argue that universities must do more than implement tokenized ...

Panel: "Real-world" Projects: Success Factors, Lessons Learned and Best Practices

  • Degan Kettles ,
  • Dan Mazzola ,
  • Mahesh Raisinghani ,
  • Mary Sumner ,

IT Workers' Individual Ambidexterity and Work Exhaustion - Preliminary Insight into the Moderating Role of Person-Job Fit: Research in Progress

  • Kristina Kusanke ,
  • Till J. Winkler

Companies that fail to be efficient and innovative today will be irrelevant tomorrow. Ambidexterity (i.e., simultaneously conducting two contradicting activities, such as exploitation and exploration) helps organizations overcome this challenge. This ...

IT Self-Employment: A Protean Career View

  • Faheem Ahmed Shaikh ,
  • Tenace Kwaku Setor ,
  • Damien Joseph

IT self-employment is a growing trend. IS research however has mostly focused on careers of IT professionals in an organizational context. In this study, we use the Protean Career perspective to investigate reasons for the transition of IT professionals ...

Charting a Course to the Top: Insights from the Fortune 500 CIOs and How They Differ from Other C-Suite Executives

  • Benjamin Richardson ,
  • Daniel Mazzola

The Chief Information Officer (CIO) is a vital leadership role in modern corporations that is responsible for making important decisions about the direction and use of technology within the organization. The CIO works alongside other chief officers, such ...

Who's got the power?: Examining the impact of digital open innovation platforms on social power dynamics in smart municipalities

  • Timon Sengewald ,
  • Tim Posselt ,
  • Manuel Riemer

In the current efforts of many cities, towns, and regions to digitally transform into smart municipalities, there is a paradigm shift from mere resident participation to co-creation. In co-creation, residents and municipal staff form a unified workforce, ...

Teaching Excel Skills to Underserved College Students in an Online Workshop: A Train-the-Trainer Approach

  • Xuefei Nancy Deng

Digital skills such as using Microsoft Excel for data management and analysis have become essential for knowledge workers to improve productivity in organizations. Yet college graduates who enter professional workplaces often do not consider their ...

Understanding Employee Work Exhaustion Through the Lens of Neurodiversity

  • Ronnie Jia ,
  • Heather H. Jia

Work exhaustion has been a focal area of IT personnel research for decades. While some studies have explored factors related to job characteristics (e.g., role ambiguity) as possible predictors, others have examined social demands in the IT workplace (...

The Challenges and Processes of Achieving Optimal Implementation of Zero Trust Architecture in Workplace

  • Chinazunwa Uwaoma

Zero Trust Architecture (ZTA) is one of the newest approaches in tackling cyber threats in organizations. While the goal is to reduce the impact of cyber threats by assuming no implicit trust, as well as constant monitoring, and restricted access to ...

Career Anchor and Information Technology Major Choice of First-Generation College Students

  • Gautham Amarnath

This study looks at the career anchors of first-generation college students (henceforth referred to as FGCSs) and their decision to pursue an information technology (IT) major. FGCSs are defined as college students whose parents did not complete any 4-...

Key Success Factors for "Real World" Projects: A Principal-Agency Theory Perspective: ACM SIGMIS Computers and People Research 2023

  • Mahesh Raisinghani

"Real world" projects are an important component of MIS academic programs. These "real world" projects provide students with problem-based learning opportunities which enable them to address "real world" problems and opportunities. The purpose of this ...

HERStory: Challenges, Success Factors, and Lessons Learned as an Information Systems Academic in the MENA Region

  • Eman Alyami ,
  • Ghadeer R. Alsaeed ,
  • Rana Alabdan ,
  • Deborah Armstrong ,

HERSstory is a term for history written from a feminist perspective and emphasizing the role of women or told from a woman's point of view. Not only do we see women throughout history creating positive change in their roles (Indira Gandhi, Florence ...

Social Software, Collaboration, and Post-Mortem Technologies in the Brazilian cultural context

  • Cristiano Maciel ,
  • Vinicius Carvalho Pereira

Faced with the growing need to model aspects related to user's death in systems that require online collaboration, new demands stand out.

Scientists and society are challenged by technologies that (do not) deal with the death of users, thereby impacting ...

Which IT Investment Profile Earns the Most Revenue?: Uncovering the 7 IT Investment Profile Path Archetypes

  • Gabriel Boon Khee Wong ,
  • Tenace Setor ,

IT investments have been a crucial component for businesses in the last decade. Firms are embracing digital and innovative transformation to survive and compete today. While studies have explored various analyses of IT investment impacts on firms' profit,...

Gender Equality Policies in STEM in Latin America -- The use of Gray and Systematic Literature Searches

  • Indira R. Guzman ,
  • José Viterbo ,
  • Eunice P. dos Santos Nunes ,
  • Franci Suni-Lopez ,
  • Elizabeth Jimenez ,
  • Ana Lara Casagrande

As more actions are needed to reduce the current gap in leadership positions in STEM and IT, it is important to systematically study existing policies and programs that promote gender equality. This research-in-progress (RIP) presents the status of one ...

Index Terms

Computer systems organization

Architectures

Parallel architectures

Serial architectures

General and reference

Document types

Social and professional topics

Professional topics

Computing industry

Computing profession

Computing organizations

History of computing

History of hardware

History of software

Software and its engineering

Software creation and management

Software notations and tools

General programming languages

Recommendations

Ubimob '05: proceedings of the 2nd french-speaking conference on mobility and ubiquity computing, ubimob '08: proceedings of the 4th french-speaking conference on mobility and ubiquity computing, ihm '14: proceedings of the 26th conference on l'interaction homme-machine, acceptance rates.

YearSubmittedAcceptedRate
302067%
472655%
352674%
332988%
321547%
412254%
503264%
604575%
332885%
653655%
542139%
Overall48030063%

Export Citations

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Cloudflare Publishes Top Internet Trends for 2023

New data unveils top generative ai sites, rankings of the most popular social media platforms, and most targeted industries by threat actors.

This Press Release is also available in 日本語 , 한국어 , Deutsch , Français , Español , Nederlands , 简体中文 and 繁體中文 .

San Francisco, CA, December 12, 2023 – Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today published its fourth annual Year in Review , exploring global Internet insights and security trends, accompanied by a deeper dive on the most popular Internet services in 2023.

The Internet is one of, if not, the most ubiquitous aspect of modern life. Cloudflare’s Year in Review revealed that in 2023 alone, there was a 25% increase in global traffic, with no signs of slowing. This growth underscores the dependency on Internet services to facilitate and underpin vital systems and tasks such as supporting global digital economies, enabling the operations of healthcare networks, maintaining business continuity for enterprises , and ultimately connecting people with their communities.

Some of the biggest highlights of 2023 include:

  • Most Popular Internet Service: Google came in first for the second year in a row, followed by Facebook (#2), Apple (#3), and TikTok (#4).
  • Most Popular Social Media Platform: Facebook came in first, beating out 2022 leader TikTok (#2), followed up by Instagram (#3) and Twitter/X (#4).
  • Most Popular Generative AI Service: OpenAI came in first for this emerging category, followed by Character AI (#2), Quillbot (#3), and Hugging Face (#4).
  • Most Targeted Industry: Threat actors most commonly launched attacks on Financial organizations, globally.
  • Most Common Cyberthreats: Deceptive links and extortion attempts found in malicious email messages were the top two most leveraged attack types.
  • Internet Outages Observed: There were more than 180 Internet outages around the world in 2023 – compared to over 150 in 2022 – with many due to government-directed regional and national shutdowns of Internet connectivity.

“We all depend on the Internet, and Cloudflare’s global network – one of the largest in the world – has evolved into a pillar of the critical infrastructure the digital world relies on,” said Matthew Prince, CEO and co-founder at Cloudflare. “Our unique role on the Internet allows us to see the ebbs and flows of online popularity and emerging technology trends in real-time – such as the boom in AI and accelerated global use of Starlink. It is our responsibility to be transparent and share the data and perspectives from reports like our Year in Review to help keep the online world more informed, resilient, and secure.”

This data comes from Cloudflare Radar , a free tool that lets anyone view global trends and insights across the Internet. Radar is powered by data from Cloudflare’s global network (one of the world’s largest, spanning 300+ cities in 100+ countries), and aggregated and anonymized data from Cloudflare’s 1.1.1.1 public DNS Resolver , widely used as a fast and private way to browse the Internet.

To learn more about Cloudflare’s Year in Review, please check out the resources below:

  • Blog: Cloudflare 2023 Year in Review
  • Blog: From Google to Generative AI: Ranking top Internet services in 2023
  • 2023 Year in Review Microsite

About Cloudflare

Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations – from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.

Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud . Learn more about the latest Internet trends and insights at https://radar.cloudflare.com .

Follow us: Blog | X | LinkedIn | Facebook | Instagram

Forward-Looking Statements

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended, which statements involve substantial risks and uncertainties. In some cases, you can identify forward-looking statements because they contain words such as “may,” “will,” “should,” “expect,” “explore,” “plan,” “anticipate,” “could,” “intend,” “target,” “project,” “contemplate,” “believe,” “estimate,” “predict,” “potential,” or “continue,” or the negative of these words, or other similar terms or expressions that concern Cloudflare’s expectations, strategy, plans, or intentions. However, not all forward-looking statements contain these identifying words. Forward-looking statements expressed or implied in this press release include, but are not limited to, statements regarding Cloudflare’s products and technology, Cloudflare’s technological development, future operations, growth, initiatives, or strategies, and comments made by Cloudflare’s CEO. Actual results could differ materially from those stated or implied in forward-looking statements due to a number of factors, including but not limited to, risks detailed in Cloudflare’s filings with the Securities and Exchange Commission (SEC), including Cloudflare’s Quarterly Report on Form 10-Q filed on November 2, 2023, as well as other filings that Cloudflare may make from time to time with the SEC.

The forward-looking statements made in this press release relate only to events as of the date on which the statements are made. Cloudflare undertakes no obligation to update any forward-looking statements made in this press release to reflect events or circumstances after the date of this press release or to reflect new information or the occurrence of unanticipated events, except as required by law. Cloudflare may not actually achieve the plans, intentions, or expectations disclosed in Cloudflare’s forward-looking statements, and you should not place undue reliance on Cloudflare’s forward-looking statements.

© 2023 Cloudflare, Inc. All rights reserved. Cloudflare, the Cloudflare logo, and other Cloudflare marks are trademarks and/or registered trademarks of Cloudflare, Inc. in the U.S. and other jurisdictions. All other marks and names referenced herein may be trademarks of their respective owners.

IMAGES

  1. (PDF) A Review Paper on Cloud Computing

    cloud computing research papers 2023

  2. 15 Cloud Computing White Papers You Need to Read (2023)

    cloud computing research papers 2023

  3. 2023 Trends to Watch: Cloud Computing

    cloud computing research papers 2023

  4. Cloud Computing Trends for 2023. As we move into 2023 and beyond, every

    cloud computing research papers 2023

  5. Big Data in Cloud Computing Research Paper: Unveiling Insights for the

    cloud computing research papers 2023

  6. (PDF) TOP 10 CLOUD COMPUTING PAPERS: RECOMMENDED READING

    cloud computing research papers 2023

VIDEO

  1. Research Domain and Topic: Cloud Computing

  2. Polytechnic 6th Sem Internet of things with cloud computing paper 2023 : RGPV Diploma

  3. Cloud Computing Research paper presentation

  4. OC3 2023

  5. Unveiling the future: OpenText and Google Cloud's synergy at Next 2023

  6. Is Cloud Security Good Research Topic?

COMMENTS

  1. 2023 IEEE 16th International Conference on Cloud Computing (CLOUD

    Profile Information. Communications Preferences. Profession and Education. Technical interests. Need Help? US & Canada: +1 800 678 4333. Worldwide: +1 732 981 0060. Contact & Support.

  2. Articles

    Cloud computing has become integral to modern computing infrastructure, offering scalability, flexibility, and cost-effectiveness. Trust is a critical aspect of cloud computing, influencing user decisions in s... Jomina John and John Singh K. Journal of Cloud Computing 2024 13:134. Research Published on: 21 August 2024.

  3. 2023 ACM Symposium on Cloud Computing

    The annual ACM Symposium on Cloud Computing (SoCC'23) brings together researchers, developers, users, and practitioners interested in cloud computing. ... Research Papers (12 pages + unlimited references): ... Author Response Period: August 14-18, 2023 Author Notification: September 1, 2023 Conference dates: October 30 - Nov 1, 2023 ...

  4. Home page

    The Journal of Cloud Computing: Advances, Systems and Applications (JoCCASA) will publish research articles on all aspects of Cloud Computing. Principally, articles will address topics that are core to Cloud Computing, focusing on the Cloud applications, the Cloud systems, and the advances that will lead to the Clouds of the future.

  5. Proceedings of the 2023 ACM Symposium on Cloud Computing

    New York. NY. United States. Conference: SoCC '23: ACM Symposium on Cloud Computing Santa Cruz CA USA 30 October 2023 - 1 November 2023. ISBN: 979-8-4007-0387-4. Published: 31 October 2023.

  6. Systematic Literature Review of Cloud Computing Research Between 2010

    Abstract. We present a meta-analysis of cloud computing research in information systems. The study includes 152 referenced journal articles published between January 2010 to June 2023. We take stock of the literature and the associated research themes, research frameworks, the employed research methodology, and the geographical distribution of ...

  7. IC2E 2023

    IC2E 2023 invites submissions of high-quality research papers describing fully-developed results and ongoing foundational and applied work related to all aspects of cloud engineering. The IC2E Program Committee will interpret "cloud engineering" very broadly - to include everything from engineering principles to practical experiences, and ...

  8. Current Development, Challenges, and Future Trends in Cloud Computing

    This paper provides a comprehensive survey of cloud computing. It first develops an understanding of cloud computing in general. and discusses its advantages, current development, challenges. and ...

  9. IEEE CLOUD 2023

    The conference is a prime international forum for researchers, academics, businesses, industry, and standard bodies to exchange the latest fundamental advances in the state of the art and practice of cloud computing, identify emerging research topics, and define the future of cloud computing. IEEE CLOUD 2023 invites original papers addressing ...

  10. Cloud Computing

    Adaptive Two-Stage Cloud Resource Scaling via Hierarchical Multi-Indicator Forecasting and Bayesian Decision-Making. floating-ly/harmony1 • • 2 Aug 2024 The surging demand for cloud computing resources, driven by the rapid growth of sophisticated large-scale models and data centers, underscores the critical importance of efficient and adaptive resource allocation.

  11. cloud computing Latest Research Papers

    The paper further compares and reviews different layout model for the discovery of services, selection of services and composition of services in Cloud computing. Recent research trends in service composition are identified and then research about microservices are evaluated and shown in the form of table and graphs. Download Full-text.

  12. Cloud Computing: A Systematic Literature Review and Future Agenda

    review is thought to inspire enterprises and managers that would like to use cloud computing in. terms of the scope, solution methods, factors, dimensions, and the results achieved in a holistic ...

  13. A Systematic Literature Review on Cloud Computing Security: Threats and

    Cloud computing has become a widely exploited research area in academia and industry. Cloud computing benefits both cloud services providers (CSPs) and consumers. The security challenges associated with cloud computing have been widely studied in the literature. This systematic literature review (SLR) is aimed to review the existing research studies on cloud computing security, threats, and ...

  14. CLOUD COMPUTING 2023 Call for Papers

    CLOUD COMPUTING 2023 is intended as an event to prospect the applications supported by the new paradigm and validate the techniques and the mechanisms. A complementary target is to identify the open issues and the challenges to fix them, especially on security, privacy, and inter- and intra-clouds protocols. We solicit both academic, research ...

  15. [2307.12479] Cloud Cost Optimization: A Comprehensive Review of

    Cloud computing has revolutionized the way organizations manage their IT infrastructure, but it has also introduced new challenges, such as managing cloud costs. This paper explores various techniques for cloud cost optimization, including cloud pricing, analysis, and strategies for resource allocation. Real-world case studies of these techniques are presented, along with a discussion of their ...

  16. Cloud Computing: Architecture, Vision, Challenges, Opportunities, and

    Cloud computing stands at the forefront of a technological revolution, fundamentally altering the provisioning, utilization, and administration of computing resources. This paper conducts a comprehensive examination of the visionary aspects, obstacles, and possibilities inherent in cloud computing. It delves deep into the foundational principles and distinguishing features of this technology ...

  17. REVIEW OF CLOUD DATABASE BENEFITS AND CHALLENGES

    Amazon Web Services (AWS), Microsoft. Azure and Google Cloud are the top cloud computing providers (Bajpai, 2023). In Q1 2023. AWS revenue increased b y 20% year to year to 21.4B $, Intelligent ...

  18. Adoption of cloud computing as innovation in the organization

    We also explore the cybersecurity elements associated with cloud computing, focusing on intrusion detection and prevention and understanding how that can be applied in the cloud. Finally, we investigate the future research directions for cloud computing and expand this paper into further articles with experiments and results.

  19. Call for Papers

    The edge/cloud-based digital twin will provide flexibility and will enhance the processing capability. This thematic series' overarching objective is to collect the most pertinent active research initiatives in the field of edge-based digital twin security and privacy. We are looking for papers that propose new research directions, introduce ...

  20. Big data analytics in Cloud computing: an overview

    Big Data and Cloud Computing as two mainstream technologies, are at the center of concern in the IT field. Every day a huge amount of data is produced from different sources. This data is so big in size that traditional processing tools are unable to deal with them. Besides being big, this data moves fast and has a lot of variety. Big Data is a concept that deals with storing, processing and ...

  21. Cloud Computing

    6.1.1 The Emergence of Cloud Computing. Cloud computing is a model for enabling access to computing resources and has become a dominant business model for delivering IT infrastructure, components, and applications (Benlian et al. 2018).With cloud computing, a product-centric model for IT provisioning is transformed into a global, distributed, service-centric model, leading to a disruptive ...

  22. E-Learning-Based Cloud Computing Environment: A Systematic Review

    The research aims to provide insights into how e-learning is incorporated in a cloud computing environment. The motivation behind this study is to investigate the intricate relationship between e-learning and cloud computing. By analyzing 154 scientific papers, the study delves into the specifics of this integration, highlighting trends and ...

  23. Security and privacy protection in cloud computing: Discussions and

    7.1. Challenges. Via analysis and contrast, we observe that cloud computing security protection work has achieved satisfactory research results. However, many problems remain, which prompt the consideration of a variety of security factors and continuous improvements in defense technology and security strategies. 1.

  24. Top 10 Cloud Computing Research Topics of 2024

    22nd Dec, 2023. Views. Read Time Read it in. 9 Mins. ... This topic is one of the IoT and cloud computing research papers which aims to share a wider range of information. The authors categorize the research into IoT-based systems, cloud-based systems, and integrated systems using both IoT and the cloud. They discussed the pros of real-time ...

  25. Proceedings of the 2023 Computers and People Research Conference

    Association for Computing Machinery; New York; NY; United States; ... Proceedings of the 2023 Computers and People Research Conference. 2023. Previous Next. Abstract. No abstract available. ... This paper presents a framework that investigates the impact of Information and Communication Technology (ICT) permeability on work and family outcomes ...

  26. Cloudflare Publishes Top Internet Trends for 2023

    This Press Release is also available in 日本語, 한국어, Deutsch, Français, Español, Nederlands, 简体中文 and 繁體中文.. San Francisco, CA, December 12, 2023 - Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today published its fourth annual Year in Review, exploring global Internet insights and security trends, accompanied by a deeper dive on the most ...