Skip to main content

2018 | Supplement | Buchkapitel

2. Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living

verfasst von : Amin Hosseinian-Far, Muthu Ramachandran, Charlotte Lilly Slack

Erschienen in: Technology for Smart Futures

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has emerged to address the needs of businesses and to improve the quantity and quality of data that we can collect and analyse from multiple sources and devices. Cloud computing has also revolutionised the software paradigm by changing into a service-oriented paradigm where cloud resources and software are offered as a service. This service archetype has changed the way we have been thinking when producing a cloud service. This chapter provides an outline of the underpinning definition, principles and concepts which currently lack in the literature. This chapter will also outline the foundations of cloud computing and then endeavours to draft the emerging trends and evolution of cloud applications. The emerging trends will include new services, federations of cloud paradigm, smart cities, big data, IoT and mobile cloud.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Babcock, C. (2010). Management strategies for the cloud revolution. New York: McGraw Hill. Babcock, C. (2010). Management strategies for the cloud revolution. New York: McGraw Hill.
3.
Zurück zum Zitat Kleinrock, L. (2005). A vision of the internet. ST Journal of Research, 2, 4–5. Kleinrock, L. (2005). A vision of the internet. ST Journal of Research, 2, 4–5.
4.
Zurück zum Zitat Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), 1831–1838.CrossRef Sood, S. K. (2012). A combined approach to ensure data security in cloud computing. Journal of Network and Computer Applications, 35(6), 1831–1838.CrossRef
5.
Zurück zum Zitat Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., & Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing. Berkeley: University of California at Berkeley. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., Lee, G., Patterson, D. A., Rabkin, A., Stoica, I., & Zaharia, M. (2009). Above the clouds: A Berkeley view of cloud computing. Berkeley: University of California at Berkeley.
6.
Zurück zum Zitat Dhar, S. (2012). From outsourcing to cloud computing: Evolution of IT services. Management Research Review, 35(8), 664–675.CrossRef Dhar, S. (2012). From outsourcing to cloud computing: Evolution of IT services. Management Research Review, 35(8), 664–675.CrossRef
7.
Zurück zum Zitat Chang, V. (2015). An overview, examples and impacts offered by emerging services and analytics in cloud computing. International Journal of Information Management, 1–11. Chang, V. (2015). An overview, examples and impacts offered by emerging services and analytics in cloud computing. International Journal of Information Management, 1–11.
9.
Zurück zum Zitat Jahankhani, H., & Hosseinian-Far, A. (2016). Challenges of Cloud Forensics. in Working Paper. Jahankhani, H., & Hosseinian-Far, A. (2016). Challenges of Cloud Forensics. in Working Paper.
10.
Zurück zum Zitat Mell, P., & Grance, T. (2011). The NIST definition of cloud. Gaithersburg: US National Institute of Standards and Technology. Mell, P., & Grance, T. (2011). The NIST definition of cloud. Gaithersburg: US National Institute of Standards and Technology.
11.
Zurück zum Zitat Ros, J. (2012). Security in the cloud: The threat of coexist with an unknown tenant on a public environment. London: Royal Holloway. Ros, J. (2012). Security in the cloud: The threat of coexist with an unknown tenant on a public environment. London: Royal Holloway.
13.
Zurück zum Zitat Joseph, A. O., Kathrine, J. W., & Vijayan, R. (2014). Cloud security mechanisms for data protection: A survey. International Journal of Multimedia and Ubiquitous Engineering, 9(9), 81–90.CrossRef Joseph, A. O., Kathrine, J. W., & Vijayan, R. (2014). Cloud security mechanisms for data protection: A survey. International Journal of Multimedia and Ubiquitous Engineering, 9(9), 81–90.CrossRef
15.
Zurück zum Zitat Lu, Y., Xu, X., & Xu, J. (2014). Development of a hybrid manufacturing cloud. Journal of Manufacturing Systems, 33(4), 551–566.CrossRefMathSciNet Lu, Y., Xu, X., & Xu, J. (2014). Development of a hybrid manufacturing cloud. Journal of Manufacturing Systems, 33(4), 551–566.CrossRefMathSciNet
16.
Zurück zum Zitat Mouratidis, H., Argyropoulos, N., & Shei, S. (2016). Security requirements Engineering for cloud computing: The secure Tropos approach. In D. Karagiannis, H. C. Mayr, & J. Mylopoulos (Eds.), Domain-specific conceptual modeling (pp. 357–380). Cham: Springer International Publishing.CrossRef Mouratidis, H., Argyropoulos, N., & Shei, S. (2016). Security requirements Engineering for cloud computing: The secure Tropos approach. In D. Karagiannis, H. C. Mayr, & J. Mylopoulos (Eds.), Domain-specific conceptual modeling (pp. 357–380). Cham: Springer International Publishing.CrossRef
17.
Zurück zum Zitat Kalloniatis, C., Mouratidis, H., & Islam, S. (2013). Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering, 18(4), 299–319.CrossRef Kalloniatis, C., Mouratidis, H., & Islam, S. (2013). Evaluating cloud deployment scenarios based on security and privacy requirements. Requirements Engineering, 18(4), 299–319.CrossRef
18.
Zurück zum Zitat Cloud Council. (2015). Security for cloud computing; Ten steps to ensure success. Cloud Standards Customer Council. Cloud Council. (2015). Security for cloud computing; Ten steps to ensure success. Cloud Standards Customer Council.
21.
Zurück zum Zitat Chakraborty, N., & Patel, R. S. (2014). Security challenges in cloud computing: A comprehensive study. International Journal of Computer Science Engineering and Technology( IJCSET), 4(1), 1–4. Chakraborty, N., & Patel, R. S. (2014). Security challenges in cloud computing: A comprehensive study. International Journal of Computer Science Engineering and Technology( IJCSET), 4(1), 1–4.
22.
Zurück zum Zitat Park, S. C., & Ryoo, S. Y. (2013). An empirical investigation of end-users’ switching toward cloud computing: A two factor theory perspective. Computers in Human Behavior, 29(1), 160–170.CrossRef Park, S. C., & Ryoo, S. Y. (2013). An empirical investigation of end-users’ switching toward cloud computing: A two factor theory perspective. Computers in Human Behavior, 29(1), 160–170.CrossRef
24.
Zurück zum Zitat Wade, B. W. (2012). IBM relational database systems: The early years. IEEE Annals of the History of Computing, 34(4), 38–48.CrossRefMathSciNet Wade, B. W. (2012). IBM relational database systems: The early years. IEEE Annals of the History of Computing, 34(4), 38–48.CrossRefMathSciNet
26.
Zurück zum Zitat Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM, 13(6), 377–387.CrossRefMATH Codd, E. F. (1970). A relational model of data for large shared data banks. Communications of the ACM, 13(6), 377–387.CrossRefMATH
27.
Zurück zum Zitat Attaran, H., & Hosseinian-Far, A. (2011). A novel technique for object oriented relational database design. IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) (pp. 128–132). IEEE. Attaran, H., & Hosseinian-Far, A. (2011). A novel technique for object oriented relational database design. IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS) (pp. 128–132). IEEE.
29.
Zurück zum Zitat Goes, P. B. (2014). Big data and IS research. MIS Quarterly, 38(3), 3–8. Goes, P. B. (2014). Big data and IS research. MIS Quarterly, 38(3), 3–8.
30.
Zurück zum Zitat Abbasi, A., Sarker, S., & Chiang, R. H. (2016). Big data research in information systems: Toward an inclusive research agenda. Journal of Association for Information Systems, 17(2), 2–31. Abbasi, A., Sarker, S., & Chiang, R. H. (2016). Big data research in information systems: Toward an inclusive research agenda. Journal of Association for Information Systems, 17(2), 2–31.
31.
Zurück zum Zitat Srivastava, U., & Gopalkrishnan, S. (2015). Impact of big data analytics on banking sector: Learning for Indian banks. Procedia Computer Science, 50, 643–652.CrossRef Srivastava, U., & Gopalkrishnan, S. (2015). Impact of big data analytics on banking sector: Learning for Indian banks. Procedia Computer Science, 50, 643–652.CrossRef
32.
Zurück zum Zitat Abbasi, A., & Adjeroh, D. (2014). Social media analytics for smart health. IEEE Intelligent Systems, 29(2), 60–64.CrossRef Abbasi, A., & Adjeroh, D. (2014). Social media analytics for smart health. IEEE Intelligent Systems, 29(2), 60–64.CrossRef
33.
Zurück zum Zitat Chang, V., & Ramachandran, M. (2016). Towards achieving cloud data security with the cloud computing adoption framework. IEEE Transaction on Service Computing, 9(1), 138–151.CrossRef Chang, V., & Ramachandran, M. (2016). Towards achieving cloud data security with the cloud computing adoption framework. IEEE Transaction on Service Computing, 9(1), 138–151.CrossRef
34.
Zurück zum Zitat Jimenez, C. E., Solanas, A., & Falcone, F. (2014). E-government interoperability: Linking open and smart government. IEEE Computer Society, 47(10), 22–24.CrossRef Jimenez, C. E., Solanas, A., & Falcone, F. (2014). E-government interoperability: Linking open and smart government. IEEE Computer Society, 47(10), 22–24.CrossRef
35.
Zurück zum Zitat Hosseinpournajarkolaei, A., Jahankhani, H., & Hosseinian-Far, A. (2014). Vulnerability considerations for power line communication’s supervisory control and data acquisition. International Journal of Electronic Security and Digital Forensics, 6(2), 104–114.CrossRef Hosseinpournajarkolaei, A., Jahankhani, H., & Hosseinian-Far, A. (2014). Vulnerability considerations for power line communication’s supervisory control and data acquisition. International Journal of Electronic Security and Digital Forensics, 6(2), 104–114.CrossRef
36.
Zurück zum Zitat Hosseinian-Far, A., Pimenidis, E., & Jahankhani, H. (2011). Financial assessment of London plan policy 4A. 2 by probabilistic inference and influence diagrams. In Artificial intelligence applications and innovations (Vol. 364, pp. 51–60). Berlin Heidelberg: Springer.CrossRef Hosseinian-Far, A., Pimenidis, E., & Jahankhani, H. (2011). Financial assessment of London plan policy 4A. 2 by probabilistic inference and influence diagrams. In Artificial intelligence applications and innovations (Vol. 364, pp. 51–60). Berlin Heidelberg: Springer.CrossRef
37.
Zurück zum Zitat Hosseinian-Far, A., Jahankhani, H., & Pimenidis, E. (2011). Using probabilistic networks for the London plan knowledge representation. In 10th IEEE International Conference On Cybernetic Intelligent Systems, London. Hosseinian-Far, A., Jahankhani, H., & Pimenidis, E. (2011). Using probabilistic networks for the London plan knowledge representation. In 10th IEEE International Conference On Cybernetic Intelligent Systems, London.
39.
Zurück zum Zitat Rimal, B. P., Van, D. P. & Maier, M. (2016). Mobile-edge computing vs. centralized cloud computing in fiber-wireless access networks. In 2016 IEEE Infocom 5G & Beyond Workshop, San Francisco, USA. Rimal, B. P., Van, D. P. & Maier, M. (2016). Mobile-edge computing vs. centralized cloud computing in fiber-wireless access networks. In 2016 IEEE Infocom 5G & Beyond Workshop, San Francisco, USA.
Metadaten
Titel
Emerging Trends in Cloud Computing, Big Data, Fog Computing, IoT and Smart Living
verfasst von
Amin Hosseinian-Far
Muthu Ramachandran
Charlotte Lilly Slack
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-60137-3_2