Skip to main content
Erschienen in: The Journal of Supercomputing 3/2014

01.06.2014

A systematic review on cloud computing

verfasst von: Frederico Durao, Jose Fernando S. Carvalho, Anderson Fonseka, Vinicius Cardoso Garcia

Erschienen in: The Journal of Supercomputing | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing is an ascending technology that has introduced a new paradigm by rendering a rational computational model possible. It has changed the dynamics of IT consumption by means of a model that provides on-demand services over the Internet. Unlike the traditional hosting service, cloud computing services are paid for per usage and may expand or shrink based on demand. Such services are, in general, fully managed by cloud providers that require users nothing but a personal computer and an Internet access. In recent years, this model has attracted the attention of researchers, investors and practitioners, many of whom have proposed a number of applications, structures and fundamentals of cloud computing, resulting in various definitions, requirements and models. Despite the interest and advances in the field, issues such as security and privacy, service layer agreement, resource sharing, and billing have opened up new questions about the real gains of the model. Although cloud computing is based on a 50-year-old business model, evidence from this study indicates that cloud computing still needs to expand and overcome present limitations that prevent the full use of its potential. In this study, we critically review the state of the art in cloud computing with the aim of identifying advances, gaps and new challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Baliga J, Ayre RWA, Hinton K, Tucker RS (2010) Green cloud computing: balancing energy in processing, storage and transport. J Proc IEEE 99 Baliga J, Ayre RWA, Hinton K, Tucker RS (2010) Green cloud computing: balancing energy in processing, storage and transport. J Proc IEEE 99
4.
Zurück zum Zitat Basili VR, Zelkowitz MV (2007) Empirical studies to build a science of computer science. Commun ACM 50(11):33–37CrossRef Basili VR, Zelkowitz MV (2007) Empirical studies to build a science of computer science. Commun ACM 50(11):33–37CrossRef
6.
Zurück zum Zitat Berners-Lee T (1998) The world wide web: a very short personal history Berners-Lee T (1998) The world wide web: a very short personal history
7.
Zurück zum Zitat Boloor K, Chirkova R, Viniotis Y, Salo T (2010) Dynamic request allocation and scheduling for context aware applications subject to a percentile response time sla in a distributed cloud. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10) Boloor K, Chirkova R, Viniotis Y, Salo T (2010) Dynamic request allocation and scheduling for context aware applications subject to a percentile response time sla in a distributed cloud. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10)
8.
Zurück zum Zitat Bonetta D, Pautasso C (2011) Towards liquid service oriented architectures. In: International conference on World Wide Web, Hyderabad, India Bonetta D, Pautasso C (2011) Towards liquid service oriented architectures. In: International conference on World Wide Web, Hyderabad, India
9.
Zurück zum Zitat Budgen D, Kitchenham BA, Charters SM, Turner M, Brereton P, Linkman SG (2008) Presenting software engineering results using structured abstracts: a randomised experiment. Empirical Softw Eng 13(4):435–468CrossRef Budgen D, Kitchenham BA, Charters SM, Turner M, Brereton P, Linkman SG (2008) Presenting software engineering results using structured abstracts: a randomised experiment. Empirical Softw Eng 13(4):435–468CrossRef
10.
Zurück zum Zitat Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Comput Syst 25(6):599–616CrossRef Buyya R, Yeo CS, Venugopal S, Broberg J, Brandic I (2009) Cloud computing and emerging it platforms: vision, hype, and reality for delivering computing as the 5th utility. Future Comput Syst 25(6):599–616CrossRef
11.
Zurück zum Zitat Cadan KS, Li WS, Phan T, Zhou M (2009) Frontiers in information and software as services. In: International Conference on Data, Engineering (ICDE’09) Cadan KS, Li WS, Phan T, Zhou M (2009) Frontiers in information and software as services. In: International Conference on Data, Engineering (ICDE’09)
12.
Zurück zum Zitat Calero JMA, Edwards N, Kirschnick J, Wilcock L, Wray M (2010) Toward a multi-tenancy authorization system for cloud services. J Secur Priv 8:48–55CrossRef Calero JMA, Edwards N, Kirschnick J, Wilcock L, Wray M (2010) Toward a multi-tenancy authorization system for cloud services. J Secur Priv 8:48–55CrossRef
13.
Zurück zum Zitat Campbell-Kelly M (2009) Historical reflections the rise, fall, and resurrection of software as a service. J CACM 52 Campbell-Kelly M (2009) Historical reflections the rise, fall, and resurrection of software as a service. J CACM 52
14.
Zurück zum Zitat Caron E, Desprez F, Muresan A (2011) Pattern matching based forecast of non-periodic repetitive behavior for cloud clients. J Grid Comput 9:49–64CrossRef Caron E, Desprez F, Muresan A (2011) Pattern matching based forecast of non-periodic repetitive behavior for cloud clients. J Grid Comput 9:49–64CrossRef
15.
Zurück zum Zitat Carr NG (2003) It doesn’t matter. In: Harvard Business School Carr NG (2003) It doesn’t matter. In: Harvard Business School
16.
Zurück zum Zitat Chapman C, Emmerich W, Márquez FG, Clayman S, Galis A (2011) Software architecture definition for on-demand cloud provisioning. J Cluster Comput 14:1–22CrossRef Chapman C, Emmerich W, Márquez FG, Clayman S, Galis A (2011) Software architecture definition for on-demand cloud provisioning. J Cluster Comput 14:1–22CrossRef
17.
Zurück zum Zitat Chaves SA, Westphall CB, Lamin FR (2010) Sla perspective in security management for cloud computing. In: International Conference on Networking and Services (ICNS’10) Chaves SA, Westphall CB, Lamin FR (2010) Sla perspective in security management for cloud computing. In: International Conference on Networking and Services (ICNS’10)
18.
Zurück zum Zitat Chellappa RK (1997) Intermediaries in cloud-computing: A new computing paradigm. In INFORMS Annual Meeting, Dallas Chellappa RK (1997) Intermediaries in cloud-computing: A new computing paradigm. In INFORMS Annual Meeting, Dallas
19.
Zurück zum Zitat Chieu T, Kapoor S, Mohindra A, Shaikh A (2010) Cross enterprise improvements delivered via a cloud platform: a game changer for the consumer product and retail industry. In: International Conference on Services, Computing (SCC’10) Chieu T, Kapoor S, Mohindra A, Shaikh A (2010) Cross enterprise improvements delivered via a cloud platform: a game changer for the consumer product and retail industry. In: International Conference on Services, Computing (SCC’10)
20.
Zurück zum Zitat Cho B, Gupta I (2010) New algorithms for planning bulk transfer via internet and shipping networks. In: International Conference on Distributed, Computing Systems (ICDCS’10) Cho B, Gupta I (2010) New algorithms for planning bulk transfer via internet and shipping networks. In: International Conference on Distributed, Computing Systems (ICDCS’10)
21.
Zurück zum Zitat Chong F, Carraro G (2006) Architecture strategies for catching the long tail. MSDN Library, Microsoft Corporation, pp 9–10 Chong F, Carraro G (2006) Architecture strategies for catching the long tail. MSDN Library, Microsoft Corporation, pp 9–10
23.
Zurück zum Zitat Costa R, Brasileiro F, Filho GL, Souza DM (2009) Oddci: on-demand distributed computing infrastructure. In: Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS’09) Costa R, Brasileiro F, Filho GL, Souza DM (2009) Oddci: on-demand distributed computing infrastructure. In: Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS’09)
24.
Zurück zum Zitat Doelitzscher F, Reich C, Sulistio A (2010) Designing cloud services adhering to government privacy laws. In: Complex, Intelligent and Software Intensive Systems (CIT’10) Doelitzscher F, Reich C, Sulistio A (2010) Designing cloud services adhering to government privacy laws. In: Complex, Intelligent and Software Intensive Systems (CIT’10)
25.
Zurück zum Zitat Dutreilh X, Moreau A, Malenfant J, Rivierre N, Truck I (2010) Data center resource allocation to control theory and back. In: International Conference on Cloud, Computing (CLOUD’10) Dutreilh X, Moreau A, Malenfant J, Rivierre N, Truck I (2010) Data center resource allocation to control theory and back. In: International Conference on Cloud, Computing (CLOUD’10)
26.
Zurück zum Zitat Elmroth E, Larsson L (2009) Interfaces for placement, migration, and monitoring of virtual machines in federated clouds. In: International Conference on Grid and Cooperative, Computing (GCC’09) Elmroth E, Larsson L (2009) Interfaces for placement, migration, and monitoring of virtual machines in federated clouds. In: International Conference on Grid and Cooperative, Computing (GCC’09)
27.
Zurück zum Zitat Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design. Prentice Hall Erl T (2005) Service-oriented architecture (SOA): concepts, technology, and design. Prentice Hall
28.
Zurück zum Zitat Foster I (1998) The grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc, Burlington Foster I (1998) The grid: blueprint for a new computing infrastructure. Morgan Kaufmann Publishers Inc, Burlington
30.
Zurück zum Zitat Guha R, Al-Dabass D (2010) Impact of web 2.0 and cloud computing platform on software engineering. In: Proceedings of the 2010 International Symposium on Electronic System Design (ISED’10), pp 213–218 Guha R, Al-Dabass D (2010) Impact of web 2.0 and cloud computing platform on software engineering. In: Proceedings of the 2010 International Symposium on Electronic System Design (ISED’10), pp 213–218
31.
Zurück zum Zitat Hassan MM, Song B, Huh EN (2009) A framework of sensor, cloud integration opportunities and challenges. In: International Conference on Ubiquitous Information Management and Communication (ICUIMC’09) Hassan MM, Song B, Huh EN (2009) A framework of sensor, cloud integration opportunities and challenges. In: International Conference on Ubiquitous Information Management and Communication (ICUIMC’09)
32.
Zurück zum Zitat Hou Z, Zhou X (2010) Asaas: application software as a service for high performance cloud computing. In: International Conference on High Performance Computing and Communications (HPCC’10) Hou Z, Zhou X (2010) Asaas: application software as a service for high performance cloud computing. In: International Conference on High Performance Computing and Communications (HPCC’10)
33.
Zurück zum Zitat Huang H, Wang L (2010) P&p: a combined push-pull model for resource monitoring in cloud computing environment. In: International Conference on Cloud, Computing (CLOUD’10) Huang H, Wang L (2010) P&p: a combined push-pull model for resource monitoring in cloud computing environment. In: International Conference on Cloud, Computing (CLOUD’10)
34.
Zurück zum Zitat Hutchinson C, Ward J, Castilon K (2009) Navigating the application architecture. J IT Prof 11:18–22CrossRef Hutchinson C, Ward J, Castilon K (2009) Navigating the application architecture. J IT Prof 11:18–22CrossRef
35.
Zurück zum Zitat Ichak A (1996) The pursuit of prime: maximize your company’s success with the Adizes Program. Knowledge Exchange Ichak A (1996) The pursuit of prime: maximize your company’s success with the Adizes Program. Knowledge Exchange
36.
Zurück zum Zitat Jianhong Z, Hua C (2010) Secuirty storage in the cloud computing: a rsa-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology (ICEIT’10) Jianhong Z, Hua C (2010) Secuirty storage in the cloud computing: a rsa-based assumption data integrity check without original data. In: International Conference on Educational and Information Technology (ICEIT’10)
37.
Zurück zum Zitat Jin H, Xiang G, Zou D, Wu S, Zhao F, Li M, Zheng W (2011) A vmm-based intrusion prevention system in cloud computing environment. J Supercomput 66:1133–1151 Jin H, Xiang G, Zou D, Wu S, Zhao F, Li M, Zheng W (2011) A vmm-based intrusion prevention system in cloud computing environment. J Supercomput 66:1133–1151
38.
Zurück zum Zitat Kandukuri BP, Paturi VR (2009) Cloud security issues. In: International Conference on Services, Computing (SCC’09) Kandukuri BP, Paturi VR (2009) Cloud security issues. In: International Conference on Services, Computing (SCC’09)
39.
Zurück zum Zitat Kansal A, Zhao F, Liu J, Kothari N, Bhattacharya AA (2010) Virtual machine power metering and provisioning. In: ACM symposium on Cloud computing (SoCC’10) Kansal A, Zhao F, Liu J, Kothari N, Bhattacharya AA (2010) Virtual machine power metering and provisioning. In: ACM symposium on Cloud computing (SoCC’10)
40.
Zurück zum Zitat Kertész A, Kecskeméti G, Brandic I (2011) Autonomic sla-aware service virtualization for distributed systems. In: Euromicro Conference on Parallel, Distributed and Network-based (PDP’11) Kertész A, Kecskeméti G, Brandic I (2011) Autonomic sla-aware service virtualization for distributed systems. In: Euromicro Conference on Parallel, Distributed and Network-based (PDP’11)
41.
Zurück zum Zitat Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007–001, Keele University and Durham University Joint, Report Kitchenham B, Charters S (2007) Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE 2007–001, Keele University and Durham University Joint, Report
42.
Zurück zum Zitat Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP (2009) Cost-benefit analysis of cloud computing versus desktop grids. In: IEEE International Symposium on Parallel and Distributed Processing with Applications (IPDPS’09) Kondo D, Javadi B, Malecot P, Cappello F, Anderson DP (2009) Cost-benefit analysis of cloud computing versus desktop grids. In: IEEE International Symposium on Parallel and Distributed Processing with Applications (IPDPS’09)
43.
Zurück zum Zitat Kossmann D, Kraska T, Loesing S (2010) An avaluation of alternative architectures for transaction processing in the cloud. In: International conference on Management of data (SIGMOD’10) Kossmann D, Kraska T, Loesing S (2010) An avaluation of alternative architectures for transaction processing in the cloud. In: International conference on Management of data (SIGMOD’10)
44.
Zurück zum Zitat Kozuch MA, Ryan MP, Gass R, Schlosser SW, O’Hallaron, Cipar J, Krevat E, ópez JL, Stroucken M, Ganger GR (2009) Tashi: location-aware cluster management. In: International Conference on AC and DC Power Transmission (ACDC’09) Kozuch MA, Ryan MP, Gass R, Schlosser SW, O’Hallaron, Cipar J, Krevat E, ópez JL, Stroucken M, Ganger GR (2009) Tashi: location-aware cluster management. In: International Conference on AC and DC Power Transmission (ACDC’09)
45.
Zurück zum Zitat Kumar SR, Saxena A (2011) Data integrity proofs in cloud storage. In: International Conference on COMmunication Systems and NETworkS (COMSNETS’11) Kumar SR, Saxena A (2011) Data integrity proofs in cloud storage. In: International Conference on COMmunication Systems and NETworkS (COMSNETS’11)
46.
Zurück zum Zitat Kutare M, Eisenhauer G, Wang C, Schwan K, Talwar V, Wolf M (2010) Monalytics: Online monitoring and analytics for managing large scale data centers. In: International Conference on Autonomic Computing (ICAC’10), Washington Kutare M, Eisenhauer G, Wang C, Schwan K, Talwar V, Wolf M (2010) Monalytics: Online monitoring and analytics for managing large scale data centers. In: International Conference on Autonomic Computing (ICAC’10), Washington
47.
Zurück zum Zitat Lee JH, Park MW, Eom JH, Chung TM (2011) Multi-level intrusion detection system and log management in cloud computing. In: International Conference on Advanced Communication Technology (ICACT’11) Lee JH, Park MW, Eom JH, Chung TM (2011) Multi-level intrusion detection system and log management in cloud computing. In: International Conference on Advanced Communication Technology (ICACT’11)
48.
Zurück zum Zitat Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computin. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10) Li J, Zhao G, Chen X, Xie D, Rong C, Li W, Tang L, Tang Y (2010) Fine-grained data access control systems with user accountability in cloud computin. In: IEEE International Conference and Workshops on Cloud Computing Technology and Science (CLOUDCOM’10)
49.
Zurück zum Zitat Li Q, Hao Q, Xiao L, Li Z (2009) Adaptive management of virtualized resources in cloud computing using feedback control. In: International Conference on Information Science and Engineering (ICISE’09) Li Q, Hao Q, Xiao L, Li Z (2009) Adaptive management of virtualized resources in cloud computing using feedback control. In: International Conference on Information Science and Engineering (ICISE’09)
50.
Zurück zum Zitat Lin FT, Shih TS (2010) Cloud computing: the emerging computing technology. J ICIC Int 1:33–38 Lin FT, Shih TS (2010) Cloud computing: the emerging computing technology. J ICIC Int 1:33–38
51.
Zurück zum Zitat Luo M, Zhang LJ, Lei F (2010) An insuanrance model for guranteeing service assurance, integrity and qos in cloud computing. In: International Conference on Web Services (ICWS’10) Luo M, Zhang LJ, Lei F (2010) An insuanrance model for guranteeing service assurance, integrity and qos in cloud computing. In: International Conference on Web Services (ICWS’10)
52.
Zurück zum Zitat Macías M, Fitó JO, Guitart J (2010) Rule-based sla management for revenue maximisation in cloud computing markets. In: International Conference on network and Service Management (CNSM’10) Macías M, Fitó JO, Guitart J (2010) Rule-based sla management for revenue maximisation in cloud computing markets. In: International Conference on network and Service Management (CNSM’10)
53.
Zurück zum Zitat Madnick S (1969) Time-sharing systems: virtual machine conept vs. conventional approach. J Modern Data Sys 2:34–36 Madnick S (1969) Time-sharing systems: virtual machine conept vs. conventional approach. J Modern Data Sys 2:34–36
54.
Zurück zum Zitat Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2010) Cloud computing-the business perspective. J Decis Support Syst 51:176–189CrossRef Marston S, Li Z, Bandyopadhyay S, Zhang J, Ghalsasi A (2010) Cloud computing-the business perspective. J Decis Support Syst 51:176–189CrossRef
56.
Zurück zum Zitat Mehta HK, Kanungo P, Chandwani M (2011) Performance enhancement of scheduling algorithms in clusters and grids using improved dynamic load balancing techniques. In: International conference on World Wide Web (WWW’11) Mehta HK, Kanungo P, Chandwani M (2011) Performance enhancement of scheduling algorithms in clusters and grids using improved dynamic load balancing techniques. In: International conference on World Wide Web (WWW’11)
57.
Zurück zum Zitat Menzel M, Warschofsky R, Thomas I, Willems C, Meinel C (2010) The service security lab: A model-driven platform to compose and explore service security in the cloud. In: World Congress on Services (SERVICES-I’10) Menzel M, Warschofsky R, Thomas I, Willems C, Meinel C (2010) The service security lab: A model-driven platform to compose and explore service security in the cloud. In: World Congress on Services (SERVICES-I’10)
58.
Zurück zum Zitat Mounzer J, Bambos N (2010) Integrated security risk management for it-intensive organizations. In: International Conference on Information Assurance and Security (IAS’10) Mounzer J, Bambos N (2010) Integrated security risk management for it-intensive organizations. In: International Conference on Information Assurance and Security (IAS’10)
59.
Zurück zum Zitat Nae V, Prodan R, Losup A (2011) A new business model for massively multiplayer online games. In: International conference on Performance, engineering (ICPE’11) Nae V, Prodan R, Losup A (2011) A new business model for massively multiplayer online games. In: International conference on Performance, engineering (ICPE’11)
60.
Zurück zum Zitat Nair SK, Porwal S, Dimitrakos T, Ferrer AJ, Tordsson J, Sharif T, Sheridan C, Rajarajan M, Khan AU (2010) Towards secure cloud bursting, brokerage and aggregation. In: International Conference on Web Services Nair SK, Porwal S, Dimitrakos T, Ferrer AJ, Tordsson J, Sharif T, Sheridan C, Rajarajan M, Khan AU (2010) Towards secure cloud bursting, brokerage and aggregation. In: International Conference on Web Services
61.
Zurück zum Zitat Nicolae B (2010) High throughput data-compression for cloud storage. Lect Notes Comput Sci 6265(2010):1–12 Nicolae B (2010) High throughput data-compression for cloud storage. Lect Notes Comput Sci 6265(2010):1–12
63.
Zurück zum Zitat Parkhill DF (1966) The challenge of the computer utility. Addison-Wesley Publishing Company, Boston Parkhill DF (1966) The challenge of the computer utility. Addison-Wesley Publishing Company, Boston
64.
Zurück zum Zitat Pervez Z, Khattak AM, Lee S, Lee YK (2010) Dual validation framework for multi-tenant saas architecture. In: Future Information Technology (FutureTech’10) Pervez Z, Khattak AM, Lee S, Lee YK (2010) Dual validation framework for multi-tenant saas architecture. In: Future Information Technology (FutureTech’10)
65.
Zurück zum Zitat Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Evaluation and Assessment in Software Engineering (EASE’08), Italy. University of Bari Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. In: Evaluation and Assessment in Software Engineering (EASE’08), Italy. University of Bari
67.
Zurück zum Zitat Ramakrishman L, Jackson KR, Canon S, Cholia S, Shalf J (2010) Defining future platform requirements for e-science clouds. In: ACM symposium on Cloud, computing (SoCC’10) Ramakrishman L, Jackson KR, Canon S, Cholia S, Shalf J (2010) Defining future platform requirements for e-science clouds. In: ACM symposium on Cloud, computing (SoCC’10)
68.
Zurück zum Zitat Rimal BR, Jukan A, Katsaros D, Goeleven Y (2010) Architectural requirements for cloud computing systems: an enterprise cloud approach. J Grid Comput 9:3–26CrossRef Rimal BR, Jukan A, Katsaros D, Goeleven Y (2010) Architectural requirements for cloud computing systems: an enterprise cloud approach. J Grid Comput 9:3–26CrossRef
69.
Zurück zum Zitat Per R, Martin H (2009) Guidelines for conducting and reporting case study research in software engineering. Empirical Softw Engg 14(2):131–164CrossRef Per R, Martin H (2009) Guidelines for conducting and reporting case study research in software engineering. Empirical Softw Engg 14(2):131–164CrossRef
71.
Zurück zum Zitat David S, Farheen A (2010) Taking a flexible approach to asps. J CACM 53:139–143 David S, Farheen A (2010) Taking a flexible approach to asps. J CACM 53:139–143
73.
Zurück zum Zitat Shi A, Xia Y, Zhan H (2010) Applying cloud computing in financial service industry. In: International Conference on Intelligent Control and Information Processing (ICICIP’10) Shi A, Xia Y, Zhan H (2010) Applying cloud computing in financial service industry. In: International Conference on Intelligent Control and Information Processing (ICICIP’10)
75.
Zurück zum Zitat Sigh MD, Krishna PR, Saxena A (2010) A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of the Annual ACM Bangalore Conference (COMPUTE’10) Sigh MD, Krishna PR, Saxena A (2010) A cryptography based privacy preserving solution to mine cloud data. In: Proceedings of the Annual ACM Bangalore Conference (COMPUTE’10)
76.
Zurück zum Zitat Sivathanu S, Liu L, Yiduo M, Pu X (2010) Storage management in virtualized cloud environment. In: International Conference on Cloud, Computing (CLOUD’10) Sivathanu S, Liu L, Yiduo M, Pu X (2010) Storage management in virtualized cloud environment. In: International Conference on Cloud, Computing (CLOUD’10)
77.
Zurück zum Zitat Smarr L (2008) Metacomputer architecture of the global lambdagrid: How personal light paths are transforming e-science. URL: http://goo.gl/ohpfMR, 2008. Retrieved 24 Oct 2013 Smarr L (2008) Metacomputer architecture of the global lambdagrid: How personal light paths are transforming e-science. URL: http://​goo.​gl/​ohpfMR, 2008. Retrieved 24 Oct 2013
78.
Zurück zum Zitat Spring J (2011) Monitoring cloud computing by layer, part 1. J IEEE Secur Priv 9:66–68 Spring J (2011) Monitoring cloud computing by layer, part 1. J IEEE Secur Priv 9:66–68
79.
Zurück zum Zitat Staten J (2009) Hollow out the moose: reducing cost with strategic rightsourcing. Forrester Research Inc, Cambridge Staten J (2009) Hollow out the moose: reducing cost with strategic rightsourcing. Forrester Research Inc, Cambridge
80.
Zurück zum Zitat Tao Q, Chang H, Yi Y, Gu C (2010) A trustworthy management approach for cloud services qos data. In: International Conference on Machine Learning and Cybernetics (ICMLC’10) Tao Q, Chang H, Yi Y, Gu C (2010) A trustworthy management approach for cloud services qos data. In: International Conference on Machine Learning and Cybernetics (ICMLC’10)
81.
Zurück zum Zitat Taylor M, Haggerty J, Gresty D, Hegarty R (2010) Digital evidence in cloud computing systems. J Comput Law Secur Rep Rev 26:204–208 Taylor M, Haggerty J, Gresty D, Hegarty R (2010) Digital evidence in cloud computing systems. J Comput Law Secur Rep Rev 26:204–208
83.
Zurück zum Zitat Udo H (2010) Data protection and legal compliance in cloud computing. J DuD 34:554–556CrossRef Udo H (2010) Data protection and legal compliance in cloud computing. J DuD 34:554–556CrossRef
84.
Zurück zum Zitat Wang J, Varman P (2010) Avoiding performance fluctuation in cloud storage. In: International Conference on High, Performance Computing (HiPC’10) Wang J, Varman P (2010) Avoiding performance fluctuation in cloud storage. In: International Conference on High, Performance Computing (HiPC’10)
85.
Zurück zum Zitat Wang Y, Song A, Luo J (2010) A mapreducemerge-based data cube construction method. In: International Conference on Grid and Cooperative, Computing (GCC’10) Wang Y, Song A, Luo J (2010) A mapreducemerge-based data cube construction method. In: International Conference on Grid and Cooperative, Computing (GCC’10)
86.
Zurück zum Zitat Wayne NIST, Jansen A (2011) Cloud hooks: security and privacy issues in cloud computing. In: Hawaii International Conference on System Sciences (HICSS’11) Wayne NIST, Jansen A (2011) Cloud hooks: security and privacy issues in cloud computing. In: Hawaii International Conference on System Sciences (HICSS’11)
87.
Zurück zum Zitat Christof W, Arun A, Benjamin B, Nikolay B, Thomas M, Wibke M, Jochen S (2009) Cloud computing: a classification, business models, and research directions. J Bus Inform Syst Eng 1:391–399 Christof W, Arun A, Benjamin B, Nikolay B, Thomas M, Wibke M, Jochen S (2009) Cloud computing: a classification, business models, and research directions. J Bus Inform Syst Eng 1:391–399
88.
Zurück zum Zitat Woitaszek M, Tufo HM (2010) Developing a cloud computing charging model for high-performance computing resources. In: CIT, IEEE Computer Society, pp 210–217 Woitaszek M, Tufo HM (2010) Developing a cloud computing charging model for high-performance computing resources. In: CIT, IEEE Computer Society, pp 210–217
89.
Zurück zum Zitat Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: International conference on Management of data (SIGMOD’09) Wong WK, Cheung DW, Kao B, Mamoulis N (2009) Secure knn computation on encrypted databases. In: International conference on Management of data (SIGMOD’09)
90.
Zurück zum Zitat Wu H, Winer C (2009) Network security for virtual machine in cloud computing? In: International Conference on Computer Sciences and Convergence Information Technology (ICCIT’09) Wu H, Winer C (2009) Network security for virtual machine in cloud computing? In: International Conference on Computer Sciences and Convergence Information Technology (ICCIT’09)
91.
Zurück zum Zitat Yigitbasi N, Iosup A, Epema D, Ostermann S (2009) C-meter: a framework for performance analysis of computing clouds. In: IEEE/ACM International Symposium on Cluster, Cloud and Grid, Computing (CCGrid’09) Yigitbasi N, Iosup A, Epema D, Ostermann S (2009) C-meter: a framework for performance analysis of computing clouds. In: IEEE/ACM International Symposium on Cluster, Cloud and Grid, Computing (CCGrid’09)
92.
Zurück zum Zitat Yu X, Wen Q (2010) A view about cloud data security from data life cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE’10) Yu X, Wen Q (2010) A view about cloud data security from data life cycle. In: International Conference on Computational Intelligence and Software Engineering (CiSE’10)
93.
Zurück zum Zitat Yusuke T, Koie H, Tomohiro K, Isao K, Yoshio T (2010) A distributed storage system allowing application users to reserve i/o performance in advance for achieving sla. In: International Workshop on Middleware for Grids, Clouds and e-Science (MGC’10) Yusuke T, Koie H, Tomohiro K, Isao K, Yoshio T (2010) A distributed storage system allowing application users to reserve i/o performance in advance for achieving sla. In: International Workshop on Middleware for Grids, Clouds and e-Science (MGC’10)
94.
Zurück zum Zitat Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRef Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRef
95.
Zurück zum Zitat Zheng Q, Xu S (2010) Fail and dynamic proofs of retrievability. In: ACM Conference on Data and Application Security and Privacy (CODASPY’10) Zheng Q, Xu S (2010) Fail and dynamic proofs of retrievability. In: ACM Conference on Data and Application Security and Privacy (CODASPY’10)
96.
Zurück zum Zitat Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: International Conference on Semantics Knowledge and Grid (SKG’10) Zhou M, Zhang R, Xie W, Qian W, Zhou A (2010) Security and privacy in cloud computing: a survey. In: International Conference on Semantics Knowledge and Grid (SKG’10)
97.
Zurück zum Zitat Zhou W, Ning P, Wang R, Zhang X, Ammons G, Bala V (2010) Always up-to-date -slacalable offline patching of vm images in a compute cloud. In: Annual Computer Security Applications Conference (ACSAC’10) Zhou W, Ning P, Wang R, Zhang X, Ammons G, Bala V (2010) Always up-to-date -slacalable offline patching of vm images in a compute cloud. In: Annual Computer Security Applications Conference (ACSAC’10)
98.
Zurück zum Zitat Zissis D, Lekkas D (2011) Securing e-government and e-voting with an open cloud computing architecture. J Gov Inform Quart 28:239–251 Zissis D, Lekkas D (2011) Securing e-government and e-voting with an open cloud computing architecture. J Gov Inform Quart 28:239–251
Metadaten
Titel
A systematic review on cloud computing
verfasst von
Frederico Durao
Jose Fernando S. Carvalho
Anderson Fonseka
Vinicius Cardoso Garcia
Publikationsdatum
01.06.2014
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 3/2014
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-014-1089-x

Weitere Artikel der Ausgabe 3/2014

The Journal of Supercomputing 3/2014 Zur Ausgabe

Premium Partner