Journal Contents: International Journal of Cloud Applications and Computing (IJCAC)

Volume 14 (2024)
Issue 1
Article 0
Software Engineering for Developing a Cloud Computing Museum-Guide System (pages 1-19)
Hadeel Al-Obaidy (University of Bahrain, Bahrain), Aysha Ebrahim (University of Bahrain, Bahrain), Ali Aljufairi (University of Bahrain, Bahrain), Ahmed Mero (University of Bahrain, Bahrain), Omar Eid (University of Bahrain, Bahrain)
Article 14
Using Supervised Learning to Detect Command and Control Attacks in IoT (pages 1-19)
Muath AlShaikh (Saudi Electronic University, Saudi Arabia), Waleed Alsemaih (Saudi Electronic University, Saudi Arabia), Sultan Alamri (Saudi Electronic University, Saudi Arabia), Qusai Ramadan (University of Koblenz, Germany)
Article 63
Detecting Ambiguities in Requirement Documents Written in Arabic Using Machine Learning Algorithms (pages 1-19)
Ahmad Althunibat (Al-Zaytoonah University of Jordan, Jordan), Bayan Alsawareah (Al-Zaytoonah University of Jordan, Jordan), Siti Sarah Maidin (INTI International University, Malaysia), Belal Hawashin (Al-Zaytoonah University of Jordan, Jordan), Iqbal Jebril (Al-Zaytoonah University of Jordan, Jordan), Belal Zaqaibeh (Jadara University, Jordan), Haneen A. Al-khawaja (Applied Science Research Center, Applied Science Private University, Jordan)
Article 64
Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques (pages 1-30)
Utsav Upadhyay (Sir Padampat Singhania University, India), Alok Kumar (Sir Padampat Singhania University, India), Gajanand Sharma (JECRC University, Sitapura, India), Ashok Kumar Saini (Manipal University Jaipur, India), Varsha Arya (Department of Business Administration, Asia University, Taiwan, & Department of Electrical and Computer Engineering, Lebanese American University, Beirut, Lebanon, & Center for Interdisciplinary Research, University of Petroleum and Energy Studies (UPES), Dehradun, India, & Chandigarh University, Chandigarh, India), Akshat Gaurav (Ronin Institute, USA), Kwok Tai Chui (Hong Kong Metropolitan University, Hong Kong)
Article 91
Custom Network Protocol Stack for Communication Between Nodes in a Cloudlet System (pages 1-24)
Manoj Subhash Kakade (BITS Pilani, India), K.R. Anupama (BITS Pilani, India), Sushil Nayak (BITS Pilani, India), Swarnab Garang (BITS Pilani, India)
Article 92
A Distributed Cloud Architecture Based on General De Bruijn Overlay Network (pages 1-19)
Osama R. S. Ramadan (Al Azhar University, Egypt), Mohamed Yasin I. Afifi (Al Azhar University, Egypt), Ahmed Yahya (Al Azhar University, Egypt)
Volume 13 (2023)
Issue 1
Article 4
Privacy Protection of Cloud Computing Based on Strong Forward Security (pages 1-9)
Fengyin Li (Qufu Normal University, China), Junhui Wang (Qufu Normal University, China), Zhihao Song (Qufu Normal University, China)
Article 8
Enhancing Techno Economic Efficiency of FTC Distillation Using Cloud-Based Stochastic Algorithm (pages 1-16)
Toto Haksoro (Sepuluh Nopember Institute of Technology, Indonesia), Aulia Siti Aisjah (Sepuluh Nopember Institute of Technology, Indonesia), Sreerakuvandana (Jain University, India), Mosiur Rahaman (Asia University, Taiwan), Totok Ruki Biyanto (Sepuluh Nopember Institute of Technology, Indonesia)
Article 9
Adaptive and Convex Optimization-Inspired Workflow Scheduling for Cloud Environment (pages 1-25)
Kamlesh Lakhwani (Department of Computer Science and Engineering, JECRC University, Jaipur, India), Gajanand Sharma (Department of Computer Science and Engineering, JECRC University, Jaipur, India), Ramandeep Sandhu (School of Computer Science Engineering, Lovely Professional University (LPU), Jalandhar, India), Naresh Kumar Nagwani (Department of Computer Science and Engineering, National Institute of Technology, Raipur, India), Sandeep Bhargava (EHR Logic IT Services Pvt. Ltd., India), Varsha Arya (Department of Business Administration, Asia University, Taiwan & Lebanese American University, Beirut, Lebanon & Chandigarh University, Chandigarh, India), Ammar Almomani (School of Computing, Skyline University College, Sharjah, UAE & Al- Balqa Applied University, Jordan)
Article 20
A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks (pages 1-22)
B. V. Subba Rao (PVP Siddhartha Institute of Technology, India), Vivek Sharma (Sharda University, India), Neeraj Rathore (University of Petroleum and Energy Studies, Dehradun, India), Devendra Prasad (Amity University, Patna, India), Harishchander Anandaram (Amrita Vishwa Vidyapeetham, India), Gaurav Soni (VIT Bhopal University, India)
Article 24
Integration of the Internet of Things and Cloud: Security Challenges and Solutions – A Review (pages 1-30)
Chellammal Surianarayanan (Centre for Distance and Online Education, Bharathidasan University, India), Pethuru Raj Chelliah (Reliance Jio Pvt. Ltd., India)
Article 31
A RYU-SDN Controller-Based VM Migration Scheme Using SD-EAW Ranking Methods for Identifying Active Jobs in the 5G Cloud Framework (pages 1-18)
Grace Shalini T. (Velammal College of Engineering and Technology, India), Rathnamala S. (Sethu Institute of Technology, India)
Article 32
An Adaptable Approach to Fault Tolerance in Cloud Computing (pages 1-24)
Priti Kumari (Jaypee Institute of Information Technology, India), Parmeet Kaur (Jaypee Institute of Information Technology, India)
Article 33
An Efficient ECK-Secured FCM-Based Firefly Optimization Algorithm for Dynamic Resource Sharing in Multi-Tenant SaaS Service Clouds (pages 1-14)
Pallavi G. B. (B.M.S. College of Engineering, India & Visvesvaraya Technological University, India)
Article 52
The Meta-Fusion: A Cloud-Integrated Study on Blockchain Technology Enabling Secure and Efficient Virtual Worlds (pages 1-24)
Amjad Aldweesh (College of Computing and IT, Shaqra University, Saudi Arabia), Mohammad Alauthman (Department of Information Security, Faculty of Information Technology, University of Petra, Amman, Jordan), Mohammad Al Khaldy (University of Petra, Amman, Jordan), Abdelraouf Ishtaiwi (Data Science and Artificial Intelligence, University of Petra, Amman, Jordan), Ahmad al-Qerem (Computer Science Department, Faculty of Information Technology, Zarqa University, Jordan), Ammar Almoman (School of Computing, Skyline University College, UAE), Brij B. Gupta (CCRI, Department of Computer Science and Information Engineering, Asia University, Taichung, Taiwan & Symbiosis Centre for Information Technology (SCIT), Symbiosis International University, Pune, India & School of Computing, Skyline University, UAE & Lebanese American University, Beirut, Lebanon & UCRD, Chandigarh University, Chandigarh, India)
Article 58
Performance Evaluation of Hybrid Meta-Heuristics-Based Task Scheduling Algorithm for Energy Efficiency in Fog Computing (pages 1-16)
Ali Garba Jakwa (Abubakar Tafawa Balewa University, Nigeria), Abdulsalam Yau Gital (Abubakar Tafawa Balewa University, Nigeria), Souley Boukari (Abubakar Tafawa Balewa University, Nigeria), Fatima Umar Zambuk (Abubakar Tafawa Balewa University, Nigeria)
Article 65
Comparative Evaluation of Host-Based Translator Mechanisms for IPv4-IPv6 Communication Performance Analysis With Different Routing Protocols (pages 1-26)
Ala Hamarsheh (Computer Systems Engineering, Faculty of Engineering, Arab American University, Jenin, Palestine), Ahmad Alqeerm (Computer Science Department, Faculty of Information Technology, Zarqa University, Zarqa, Jordan), Iman Akour (Information Systems Department, College of Computing and Informatics, University of Sharjah, UAE), Mohammad Alauthman (Department of Information Security, Faculty of Information Technology, University of Petra, Amman, Jordan), Amjad Aldweesh (College of Computing and IT, Shaqra University, Shaqra, Saudi Arabia), Ali Mohd Ali (Communications and Computer Engineering Department, Faculty of Engineering, Al-Ahliyya Amman University, Jordan), Ammar Almomani (School of Computing, Skyline University College, University City of Sharjah, UAE), Someah Alangari (College of Science and Humanities Dawadmi, Shaqra University, Saudi Arabia)
Article 66
Empirical Comparison of Energy Efficiency Between 3-Tier and High-Speed 3-Tier Network Topologies (pages 1-28)
Manal Alkoshman (Al Balqa Applied University, Jordan), Saleh Atiewi (Al-Hussein Bin Talal University, Jordan)
Article 68
Sociocultural Factors in Times of Global Crisis (pages 1-21)
Maximiliano Perez (Universidad Católica de Santiago de Guayaquil, Ecuador), David Coello (Universidad Católica de Santiago de Guayaquil, Ecuador)
Article 79
A Multi-Agent-Based VM Migration for Dynamic Load Balancing in Cloud Computing Cloud Environment (pages 1-14)
Soumen Swarnakar (Netaji Subhash Engineering College, India), Chandan Banerjee (Netaji Subhash Engineering College, India), Joydeep Basu (Netaji Subhash Engineering College, India), Debanjana Saha (Netaji Subhash Engineering College, India)
Article 94
Resource-Aware Least Busy (RALB) Strategy for Load Balancing in Containerized Cloud Systems (pages 1-14)
Zakariyae Bouflous (ENSEM, Hassan 2 University of Casablanca, Morocco), Mohammed Ouzzif (EST, Hassan 2 University of Casablanca, Morocco), Khalid Bouragba (EST, Hassan 2 University of Casablanca, Morocco)
Article 98
A Hybrid Binary Bird Swarm Optimization (BSO) and Dragonfly Algorithm (DA) for VM Allocation and Load Balancing in Cloud (pages 1-21)
Thanwamas Kassanuk (Pibulsongkram Rajabhat University, Thailand), Khongdet Phasinam (Pibulsongkram Rajabhat University, Thailand)
Volume 12 (2022)
Issue 1
Article 0
A Survey on Multi-Objective Tasks and Workflow Scheduling Algorithms in Cloud Computing (pages 1-16)
Rajeshwari Sissodia (H.N.B. Garhwal University, Srinagar, India), Man Mohan Singh Rauthan (H.N.B. Garhwal University, Srinagar, India), Kanchan Naithani (H.N.B. Garhwal University, Srinagar, India)
Article 1
RDF Query Path Optimization Using Hybrid Genetic Algorithms: Semantic Web vs. Data-Intensive Cloud Computing (pages 1-16)
Qazi Mudassar Ilyas (King Faisal University, Saudi Arabia), Muneer Ahmad (School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan), Sonia Rauf (COMSATS University Islamabad, Abbottabad, Pakistan), Danish Irfan (COMSATS University Islamabad, Abbottabad, Pakistan)
Article 1
Encryption and Decryption Cloud Computing Data Based on XOR and Genetic Algorithm (pages 1-10)
Huthaifa A. Al Issa (Al-Balqa Applied University, Jordan), Mustafa Hamzeh Al-Jarah (Al-Balqa Applied University, Jordan), Ammar Almomani (IT Department, Al-Huson University College, AL-Balqa Applied University, Irbid, Jordan & Research and Innovation Department, Skyline University College, Sharjah, UAE), Ahmad Al-Nawasrah (British University of Bahrain, Bahrain)
Article 2
Reservation System for Cloud Computing Resources (RSCC): Immediate Reservation of the Computing Mechanism (pages 1-22)
Ashish Tiwari (National Institute of Technology, Kurukshetra, India), Ritu Garg (National Institute of Technology, Kurukshetra, India)
Article 2
Migration From DevOps to DevSecOps: A Complete Migration Framework, Challenges, and Evaluation (pages 1-15)
Nisha T. N. (Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India), Amit Khandebharad (Ernst and Young LLP, India)
Article 2
An Optimization Model for Task Scheduling in Mobile Cloud Computing (pages 1-17)
Rashid Alakbarov (Institute of Information Technology, Baku, Azerbaijan)
Article 3
Load Balancing Approaches in Cloud and Fog Computing Environments: A Framework, Classification, and Systematic Review (pages 1-24)
Hiba Shakeel (Computer Science and Engineering, Institute of Technology and Management, Aligarh, India), Mahfooz Alam (Department of Computer Science, Aligarh Muslim University, Aligarh, India)
Article 3
SMA-LinR: An Energy and SLA-Aware Autonomous Management of Virtual Machines (pages 1-24)
Varun Barthwal (Hemvati Nandan Bahuguna Garhwal University, India), Manmohan Singh Rauthan (Hemvati Nandan Bahuguna Garhwal University, India), Rohan Varma (Hemvati Nandan Bahuguna Garhwal University, India)
Article 3
Device Access Control and Key Exchange (DACK) Protocol for Internet of Things (pages 1-14)
Nourah Almrezeq (Deanship of Common First Year, Jouf University, Sakaka, Saudi Arabia), Md Alimul Haque (Department of Computer Science, Veer Kunwar Singh University, Ara, India), Shameemul Haque (Al-Hafeez College, Ara, India), A.A. Abd El-Aziz (Department of Computer Science, College of Computer and Information Sciences, Jouf University, Saudi Arabia & Department of Information Systems and Technology, Faculty of Graduate Studies and Statistical Research, Cairo University, Cairo, Egypt)
Article 4
Enhancing QoS with Resource Optimization Technique Based on Harmony Search in Cloud Environment (pages 1-22)
Geeta Singh (Dr. A. P. J. Abdul Kalam Technical University, Lucknow, India), Santosh Kumar (Galgotias University, Greater Noida, India), Shiva Prakash (Madan Mohan Malaviya University of Technology, Gorakhpur, India)
Article 4
Analysis of Security-Based Access Control Models for Cloud Computing (pages 1-19)
Sandeep Choudhary (Ambedkar Institute of Advanced Communication Technologies and Research, India), Nanhay Singh (Ambedkar Institute of Advanced Communication Technologies and Research, India)
Article 4
Efficient Resource Management Using Improved Bio-Inspired Algorithms for the Fog Computing Environment (pages 1-18)
Chetan M. Bulla (K.L.E. College of Engineering and Technology, India), Mahantesh N. Birje (Visvesvaraya Technological University, India)
Article 5
Load and Cost-Aware Min-Min Workflow Scheduling Algorithm for Heterogeneous Resources in Fog, Cloud, and Edge Scenarios (pages 1-20)
Jyoti Bisht (Indira Gandhi National Open University, India), Venkata Subrahmanyam Vampugani (Indira Gandhi National Open University, India)
Article 5
AFTTM: Agent-Based Fault Tolerance Trust Mechanism in Cloud Environment (pages 1-12)
Shivani Jaswal (Chandigarh University, India), Manisha Malhotra (Chandigarh University, India)
Article 6
Review on Mapping of Tasks to Resources in Cloud Computing (pages 1-17)
Vinothina V. (Kristu Jayanti College (Autonomous), India), Jasmine Beulah G. (Kristu Jayanti College (Autonomous), India), Sridaran Rajagopal (Marwadi University, India)
Article 6
Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure (pages 1-20)
Akashdeep Bhardwaj (University of Petroleum and Energy Studies, India), Keshav Kaushik (University of Petroleum and Energy Studies, India)
Article 7
Capability-Based Access Control With Trust for Effective Healthcare Systems (pages 1-28)
Shweta Kaushik (Jaypee Institute of Information Technology, India), Charu Gandhi (Jaypee Institute of Information Technology, India)
Article 7
Integrated Predictive Experience Management Framework (IPEMF) for Improving Customer Experience: In the Era of Digital Transformation (pages 1-13)
Neelesh Ragunath Kumbhojkar (Symbiosis International University (Deemed), India), Arun Balakrishna Menon (Jade Global Software Pvt Ltd, India)
Article 8
Passive-Awake Energy Conscious Power Consumption in Smart Electric Vehicles Using Cluster Type Cloud Communication (pages 1-14)
Pandi Vijayakumar (University College of Engineering, Tindivanam, India), S. C. Rajkumar (Anna University, Madurai, India), L. Jegatha Deborah (University College of Engineering, Tindivanam, India)
Article 8
Enhancing the Security and Performance of Cloud for E-Governance Infrastructure: Secure E-MODI (pages 1-23)
Hemraj Shobharam Lamkuche (Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India), Vijaya Bhaskar Kondaveety (Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India), Vijaya Lakshmi Sapparam (Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India), Shruti Singh (Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India), Raj Deepak Rajpurkar (Symbiosis Centre for Information Technology, Symbiosis International University (Deemed), India)
Article 9
Improving Virtual Machine Migration Effects in Cloud Computing Environments Using Depth First Inspired Opportunity Exploration (pages 1-22)
Kamal Kumar (National Institute of Technology, Uttarakhand, India), Jyoti Thaman (Independent Researcher, India)
Article 9
Efficient Local Cloud-Based Solution for Liver Cancer Detection Using Deep Learning (pages 1-13)
Anil B. C. (JSS Academy of Technical Education, Bengaluru, India & Visvesvaraya Technological University, Belagavi, India), Dayananda P. (JSS Academy of Technical Education, Bengaluru, India & Visvesvaraya Technological University, Belagavi, India), Nethravathi B. (JSS Academy of Technical Education, Bengaluru, India & Visvesvaraya Technological University, Belagavi, India), Mahesh S. Raisinghani (Texas Woman's University, USA)
Article 10
A Metaphoric Design of Electronic Medical Record (EMR) for Periodic Health Examination Reports: An Initiative to Cloud's Medical Data Analysis (pages 1-18)
Sharifah Ahmed Alamer (King Faisal University, Saudi Arabia), Qazi Mudassar Ilyas (College of Computer Sciences and Information Technology, King Faisal University, Saudi Arabia), Muneer Ahmad (School of Electrical Engineering and Computer Science (SEECS), National University of Sciences and Technology (NUST), Islamabad, Pakistan), Danish Irfan (COMSATS University Islamabad, Abbottabad, Pakistan)
Article 11
Catholic Impact Evolution Through Public Twitter Data During COVID-19 (pages 1-17)
Enrique Caño Marín (University of Alcalá, Spain), Cristina Blanco González-Tejero (University of Alcalá, Spain), María Guijarro García (ESIC Business and Marketing School, ESIC University, Spain), F. Javier Sendra García (ESIC Business and Marketing School, ESIC University, Spain)
Article 12
Survey on Service Placement, Provisioning, and Composition for Fog-Based IoT Systems (pages 1-14)
Thiruchadai Pandeeswari Sadatacharapandi (Thiagarajar College of Engineering, India), Padmavathi S. (Thiagarajar College of Engineering, India)
Article 13
MATEM: A Multi-Agent-Based Trust Evaluation Model for Discovery and Delivery of Reliable Cloud Services (pages 1-17)
Shivani Jaswal (Chandigarh University, India), Manisha Malhotra (Chandigarh University, India)
Article 14
A New Fault-Tolerant Algorithm Based on Replication and Preemptive Migration in Cloud Computing (pages 1-14)
Abderraziq Semmoud (Abou Bakr Belkaid University, Algeria), Mourad Hakem (Université de Franche-Comté, France), Badr Benmammar (Abou Bakr Belkaid University, Algeria), Jean-Claude Charr (Université de Franche-Comté, France)
Article 15
A Hybrid Approach for Task Scheduling in the Cloud Environment (pages 1-14)
Krishan Tuli (Chandigarh University, India), Manisha Malhotra (Chandigarh University, India)
Article 16
Efficient Pairing-Free Identity-Based Signcryption Scheme for Cloud-Assisted IoT (pages 1-15)
Medikonda Asha Kiran (National Institute of Technology, India & Institute for Development and Research in Banking Technology, India), Syam Kumar Pasupuleti (Institute for Development and Research in Banking Technology, India), R. Eswari (National Institute of Technology, India)
Article 17
A Multi-Objective Optimization Scheduling Method Based on the Genetic Algorithm in Cloud Computing (pages 1-21)
Rajeshwari Sissodia (Hemvati Nandan Bahuguna Garhwal University, Srinagar, India), ManMohan Singh Rauthan (Hemvati Nandan Bahuguna Garhwal University, Srinagar, India), Varun Barthwal (Hemvati Nandan Bahuguna Garhwal University, Srinagar, India)
Article 18
Density-Based Machine Learning Scheme for Outlier Detection in Smart Forest Fire Monitoring Sensor Cloud (pages 1-16)
Rajendra Kumar Dwivedi (Madan Mohan Malaviya University of Technology, Gorakhpur, India)
Article 19
Trust Evaluation and Prioritization of Cloud Service Providers Using MADM Methods (pages 1-17)
Suruchi Pawar (MKSSS's Cummins College of Engineering for Women, Pune, India), Eunice Grace Paulson (MKSSS's Cummins College of Engineering for Women, Pune, India), Prajakta Sunil Badgujar (MKSSS's Cummins College of Engineering for Women, Pune, India), Shilpa Deshpande (MKSSS's Cummins College of Engineering for Women, Pune, India)
Article 22
Cloudlet and Virtual Machine Performance Enhancement With CLARA and Evolutionary Paradigm (pages 1-16)
Tanvi Gupta (Manav Rachna International Institute of Research and Studies, India), Supriya P. Panda (Manav Rachna International Institute of Research and Studies, India)
Article 32
Performance Optimization of Multi-Hop Routing Protocols With Clustering-Based Hybrid Networking Architecture in Mobile Adhoc Cloud Networks (pages 1-15)
Deepak Srivastava (Swami Rama Himalayan University, India), Ajay Kumar (Institute of Technology and Management, India), Anupama Mishra (Swami Rama Himalayan University, India), Varsa Arya (Insights2Techinfo, India, & Lebanese American University, Lebanon), Ammar Almomani (Skyline University, UAE), Ching Hsien Hsu (Asia University, Taiwan, & National Chung Cheng University, Taiwan, & China Medical University, Taiwan), Domenico Santaniello (University of Salerno, Italy)
Article 33
System Level Benchmarking of Public Clouds (pages 1-17)
Sanjay P. Ahuja (University of North Florida, United States)
Article 33
Digital Watermarking-Based Cryptosystem for Cloud Resource Provisioning (pages 1-20)
Sarvesh Kumar (BBD University, Lucknow, India), Surendra Kumar (Marwadi University, Rajkot, India), Nikhil Ranjan (Galgotias University, Greater Noida, India), Shivam Tiwari (G. L. Bajaj Institute of Technology and Management, Greater Noida, India), T. Rajesh Kumar (Saveetha School of Engineering, SIMATS, India), Dinesh Goyal (PIET, Jaipur, India), Gajanand Sharma (JECRC University, Jaipur, India), Varsha Arya (Insights2Techinfo, India & Lebanese American University, Beirut, Lebanon), Marjan Kuchaki Rafsanjani (Shahid Bahonar University of Kerman, Iran)
Article 34
Quality of Service-Based Resource Management in Fog Computing: A Systematic Review (pages 1-27)
Vibha Jain (Netaji Subhas University of Technology, New Delhi, India), Bijendra Kumar (Netaji Subhas University of Technology, New Delhi, India)
Article 34
Server Consolidation Algorithms for Cloud Computing: Taxonomies and Systematic Analysis of Literature (pages 1-24)
Hind Mikram (Faculty of Sciences and Techniques, IR2M Laboratory, Hassan First University of Settat, Morocco), Said El Kafhali (Faculty of Sciences and Techniques, IR2M Laboratory, Hassan First University of Settat, Morocco), Youssef Saadi (Faculty of Sciences and Techniques, Sultan Moulay Slimane University, Morocco)
Article 35
Multi-Cloud Service Brokers for Selecting the Optimal Data Center in Cloud Environment (pages 1-19)
Mousa Elrotub (École de Technologie Supérieure, Canada), Abdelouahed Gherbi (École de Technologie Supérieure, Canada)
Article 35
Cloud Data Centre Energy Utilization Estimation: Simulation and Modelling With iDR (pages 1-16)
Ravindra Kumar Singh Rajput (College of Basic Sciences and Humanities, India), Dinesh Goyal (PIET, India), Anjali Pant (Government Polytechnic, India), Gajanand Sharma (JECRC University, India), Varsha Arya (Insights2Techinfo, India), Marjan Kuchaki Rafsanjani (University of Kerman, Iran)
Article 36
A Comparative Study of Privacy-Preserving Homomorphic Encryption Techniques in Cloud Computing (pages 1-11)
Bineet Joshi (Swami Rama Himalayan University, India), Bansidhar Joshi (Jaypee Institute of Information Technology, India), Anupama Mishra (Swami Rama Himalayan University, India), Varsha Arya (Insights2Techinfo, India & Lebanese American University, Beirut, Lebanon), Avadhesh Kumar Gupta (Karnavati University, India), Dragan Peraković (University of Zagreb, Croatia)
Article 36
A Review on Detection and Mitigation Analysis of Distributed Denial of Service Attacks and Their Effects on the Cloud (pages 1-21)
Savita Devi (Jamia Millia Islamia University, New Delhi, India), Taran Singh Bharti (Jamia Millia Islamia University, New Delhi, India)
Article 37
Evaluating the Impact of Cryptographic Algorithms on Network Performance (pages 1-15)
Samuel Asare (University of Ghana, Ghana), Winfred Yaokumah (University of Ghana, Ghana), Ernest Barfo Boadi Gyebi (University of Ghana, Ghana), Jamal-Deen Abdulai (University of Ghana, Ghana)
Article 37
A Novel Decentralized Group Key Management Scheme for Cloud-Based Vehicular IoT Networks (pages 1-34)
Rakesh Kumar (CSE Department, CCET, Punjab University, Chandigarh, India), Sunil K. Singh (CSE Department, Chandigarh College of Engineering and Technology, Panjab University, Chandigarh, India), D. K. Lobiyal (Jawaharlal Nehru University, New Delhi, India), Kwok Tai Chui (Hong Kong Metropolitan University, Hong Kong), Domenico Santaniello (University of Salerno, Italy), Marjan Kuchaki Rafsanjani (Shahid Bahonar University of Kerman, Iran)
Article 38
A Multi-Objective Adaptive Upper Threshold Approach for Overloaded Host Detection in Cloud Computing (pages 1-14)
Rajeshwari Sissodia (Hemwati Nandan Bahuguna Garhwal University, India), ManMohan Singh Rauthan (Hemwati Nandan Bahuguna Garhwal University, India), Varun Barthwal (Hemwati Nandan Bahuguna Garhwal University, India)
Article 38
A Heuristic-Based Task Scheduling Policy for QoS Improvement in Cloud (pages 1-22)
Gaurav Tripathi (Madan Mohan Malaviya University of Technology, India), Rakesh Kumar (Madan Mohan Malaviya University of Technology, India)
Article 39
Performance Evaluation of Contiguous and Noncontiguous Processor Allocation Based on Common Communication Patterns for 2D Mesh Interconnection Network (pages 1-21)
Areen Al Abass (Al al-Bayt University, Jordan), Saad Bani-Mohammad (Al al-Bayt University, Jordan), Ismail Ababneh (Al al-Bayt University, Jordan)
Article 40
Reactive Hybrid Model for Fault Mitigation in Real-Time Cloud Computing (pages 1-23)
Festus Adeyinka Osuolale (The Federal University of Technology, Akure, Nigeria)
Article 41
A Cloud-Based Predictive Model for the Detection of Breast Cancer (pages 1-12)
Kuldeep Pathoee (Spanidea Systems, India), Deepesh Rawat (Swami Rama Himalayan University, India), Anupama Mishra (Swami Rama Himalayan University, India), Varsha Arya (Insights2Techinfo, India, & Lebanese American University, Beirut, 1102, Lebanon), Marjan Kuchaki Rafsanjani (Shahid Bahonar University of Kerman, Iran), Avadhesh Kumar Gupta (USCI Karnavati University, Gujarat, India)
Article 41
Modelling of the Cloud Service Quality Factors Using ISM (pages 1-16)
Rajesh Agarwal (Guru Gobind Singh Indraprastha University, Delhi, India), Sanjay Dhingra (Guru Gobind Singh Indraprastha University, Delhi, India)
Article 42
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles (pages 1-21)
Richa Sharma (National Institute of Technology, Hamirpur, India), Teek Parval Sharma (National Institute of Technology, Hamirpur, India), Ajay Kumar Sharma (National Institute of Technology, Delhi, India)
Article 63
Fog Computing for Delay Minimization and Load Balancing (pages 1-16)
Waseem Akram (Jammu University, India), Zahoor Najar (Central University of Kashmir, India), Abid Sarwar (Jammu University, India), Iraq Ahmad Reshi (Islamic University of Science and Technology, India)
Article 64
λHive: Formal Semantics of an Edge Computing Model Based on JavaScript (pages 1-22)
Matias Teragni (Universidad Abierta Interamericana, Argentina), Claudia Pons (Universidad Nacional de La Plata, Argentina)
Article 65
A Cloud-Based Model for Driver Drowsiness Detection and Prediction Based on Facial Expressions and Activities (pages 1-17)
Ankit Kumar Jain (National Institute of Technology, Kurukshetra, India), Aakash Yadav (National Institute of Technology, Kurukshetra, India), Manish Kumar (National Institute of Technology, Kurukshetra, India), Francisco José García-Peñalvo (University of Salamanca, Spain), Kwok Tai Chui (Hong Kong Metropolitan University, Hong Kong), Domenico Santaniello (University of Salerno, Italy)
Article 70
Taxonomical Challenges for Cyber Incident Response Threat Intelligence: A Review (pages 1-14)
Meryem Ammi (Criminal Justice College, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia), Oluwasegun Adedugbe (Cloud Computing and Applications Research Lab, Staffordshire University, Stoke-on-Trent, UK), Fahad Mohamed Alharby (Criminal Justice College, Naif Arab University for Security Sciences, Riyadh, Saudi Arabia), Elhadj Benkhelifa (Smart Systems, AI and Cybersecurity Research Centre, Staffordshire University, Stoke-on-Trent, England)
Article 71
A Review on Integration of Vehicular Ad-Hoc Networks and Cloud Computing (pages 1-23)
Limali Sahoo (ITER, Siksha 'O' Anusandhan (Deemed), India), Sanjaya Kumar Panda (National Institute of Technology, Warangal, India), Kunal Kumar Das (ITER, Siksha 'O' Anusandhan (Deemed), India)
Article 72
Business Process Discovery Using Process Mining Techniques and Distributed Framework (pages 1-17)
Ishak H. A. Meddah (Dr. Moulay Tahar University of Saida, Algeria), Fatiha Guerroudji (University of Sciences and Technology Oran, Algeria)
Article 72
Traffic Accident Prevention in Low Visibility Conditions Using VANETs Cloud Environment (pages 1-21)
Kwok Tai Chui (Hong Kong Metropolitan University, Hong Kong), Tanveer Singh Kochhar (Chandigarh College of Engineering and Technology, India), Amit Chhabra (Chandigarh College of Engineering and Technology, India), Sunil K. Singh (Chandigarh College of Engineering and Technology, India), Deepinder Singh (Chandigarh College of Engineering and Technology, India), Dragan Peraković (University of Zagreb, Croatia), Ammar Almomani (Research and Innovation Department, Skyline University College, Sharjah, UAE & Al- Balqa Applied University, Jordan), Varsha Arya (Insights2Techinfo, India & Lebanese American University, Beirut, Lebanon)
Article 73
The Trusted Hierarchical Access Structure-Based Encryption Scheme for Cloud Computing (pages 1-17)
Tabassum N. Mujawar (Ramrao Adik Institute of Technology, D Y Patil University (Deemed), India), Lokesh B. Bhajantri (Basaveshwar Engineering College, India)
Article 74
An Indicator-Based Algorithm for Task Scheduling in Multi-Cloud Environments (pages 1-19)
Sohan Kumar Pande (Silicon Institute of Technology, Sambalpur, India), Priyanka Swain (Sambalpur University Institute of Information Technology, Burla, India), Sanjib Kumar Nayak (Veer Surendra Sai University of Technology, Burla, India), Sanjaya Kumar Panda (National Institute of Technology, Warangal, India)
Article 75
An Efficient Message Authentication Code Based on Modified MD5-384 Bits Hash Function and Quasigroup (pages 1-27)
Umesh Kumar (University of Hyderabad, India), V. Ch. Venkaiah (University of Hyderabad, India)
Article 76
Cost-Effective Spot Instances Provisioning Using Features of Cloud Markets (pages 1-27)
Abdullah Alourani (University of Illinois at Chicago, Chicago, USA & Department of Computer Science and Information, College of Science in Zulfi, Majmaah University, Al-Majmaah, Saudi Arabia), Ajay D. Kshemkalyani (Department of Computer Science, College of Engineering, University of Illinois at Chicago, Chicago, USA)
Article 77
A Comprehensive Survey on Cloud Computing: Architecture, Tools, Technologies, and Open Issues (pages 1-33)
Md Saquib Jawed (Aligarh Muslim University, India), Mohammad Sajid (Aligarh Muslim University, India)
Article 78
Determinants of Customer Loyalty in a Cloud Computing Environment (pages 1-21)
Tor Guimaraes (Tennessee Technological University, USA), Mike Walton (Google Enterprise, USA), Ketan Paranjape (Roche Diagnostics, USA)
Article 83
Mobile Cloud Computing and Sustainable Development: Opportunities, Challenges, and Future Directions (pages 1-20)
Francisco José García Peñalvo (University of Salamanca, Spain), Akash Sharma (Chandigarh College of Engineering and Technology, India), Anureet Chhabra (Chandigarh College of Engineering and Technology, India), Sunil K. Singh (Chandigarh College of Engineering and Technology, India), Sudhakar Kumar (Chandigarh College of Engineering and Technology, India), Varsha Arya (Independent Researcher, Taiwan), Akshat Gaurav (Ronin Institute, Montclair, USA)
Article 91
A Hybrid Cloud Enterprise Strategic Management System (pages 1-18)
Emmanuel Ramaru (Gauteng Department of Health, South Africa), Lalit Garg (The University of Malta, Malta), Chinmay Chakraborty (Birla Institute of Technology, India)
Article 92
Marketing Analytics for Analyzing Social Media and Branding Efforts of Indian Telecom Operators (pages 1-18)
Sujata Joshi (Symbiosis Institute of Digital and Telecom Management, Symbiosis International University (Deemed), India), Sindhu Koparrati (Symbiosis Institute of Digital and Telecom Management, Symbiosis International University (Deemed), India), Vaishali Singhal (Symbiosis Institute of Digital and Telecom Management, Symbiosis International University (Deemed), India)
Article 93
Tifinagh Handwriting Character Recognition Using a CNN Provided as a Web Service (pages 1-17)
Ouahab Kadri (University of Batna 2, Algeria), Abderrezak Benyahia (University of Batna 2, Algeria), Adel Abdelhadi (University of Khenchela, Algeria)
Article 94
Future of Internet of Things: Enhancing Cloud-Based IoT Using Artificial Intelligence (pages 1-23)
Sana Khanam (Department of Computer Science and Engineering, Jamia Hamdard University, New Delhi, India), Safdar Tanweer (Department of Computer Science and Engineering, Jamia Hamdard University, New Delhi, India), Syed Sibtain Khalid (Department of Computer Science and Engineering, Jamia Hamdard University, New Delhi, India)
Article 95
An Adaptive Mechanism for Virtual Machine Migration in the Cloud Environment (pages 1-10)
Gurpreet Singh (SRM University, India), Manisha Malhotra (Chandigarh University, India), Ajay Sharma (SRM University, India)
Article 96
A Case Study of Cloud Computing Service Models for the General Computing Environment in a University (pages 1-17)
Ho Yeon Kang (Chungbuk National University, South Korea), Jong Yun Lee (Chungbuk National University, South Korea), Seo-Young Noh (Chungbuk National University, South Korea)
Article 97
Advanced Cryptographic Standards-Based Secure Data Protocol for Distributed Data Storage and Communication in the Cloud (pages 1-16)
Ankush Balaram Pawar (Department of Computer Science and Engineering, Visvesvaraya Technological University, India), Shashikant U. Ghumbre (Government College of Engineering, Belgaum, India), Rashmi M. Jogdand (Computer Science and Engineering, Computer Science and Engineering, India)
Article 98
Business Demand for a Cloud Enterprise Data Warehouse in Electronic Healthcare Computing: Issues and Developments in E-Healthcare Cloud Computing (pages 1-22)
Amaonwu Onyebuchi (Hussaini Adamu Federal Polytechnic, Nigeria), Ugochukwu O. Matthew (Hussaini Adamu Federal Polytechnic, Nigeria), Jazuli S. Kazaure (Hussaini Adamu Federal Polytechnic, Nigeria), Nwamaka U. Okafor (University College Dublin, Ireland), Ogobuchi Daniel Okey (Michael Okpara University of Agriculture, Nigeria), Prisca I. Okochi (Michael Okpara University of Agriculture, Nigeria), Janet Folasade Taiwo (Abubakar Tafawa Balewa University, Nigeria), Ani Okechukwu Matthew (University of Nigeria, Nsukka, Nigeria)
Article 99
A Dynamic Weighted Averaging Technique for Trust Assessment in Cloud Computing (pages 1-21)
Saima Mehraj (University of Kashmir, India), M. Tariq Banday (University of Kashmir, India)
Issue 2
Article 55
Resource-Efficient Pareto-Optimal Green Scheduler Architecture (pages 1-14)
Urmila Shrawankar (G. H. Raisoni College of Engineering, Nagpur, India), Chetan Ashokrao Dhule (G. H. Raisoni College of Engineering, Nagpur, India)
Article 56
Resource Optimization in Cloud Data Centers Using Particle Swarm Optimization (pages 1-12)
Madhumala R. B. (Jain University (Deemed), India), Harshvardhan Tiwari (Jyothy Institute of Technology, India), Devaraj Verma C. (Jain University (Deemed), India)
Article 57
A Cost-Optimized Data Parallel Task Scheduling in Multi-Core Resources Under Deadline and Budget Constraints (pages 1-16)
Saravanan Krishnan (Anna University, Tirunelveli, India), Rajalakshmi N. R. (Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India)
Article 58
Stock Market E-Assistance on Platform-as-a-Service (PaaS) (pages 1-11)
Shahul Chettali Hameed (Saveetha School of Engineering, India)
Issue 3
Issue 4
Volume 11 (2021)
Issue 1
Article 1
A Reliable Trust Computing Mechanism in Fog Computing (pages 1-20)
Vijay Lingaraddi Hallappanavar (K. L. E. College of Engineering and Technology, India), Mahantesh N. Birje (Visvesvaraya Technological University, India)
Article 2
A Robust and Efficient MCDM-Based Framework for Cloud Service Selection Using Modified TOPSIS (pages 21-51)
Rohit Kumar Tiwari (Madan Mohan Malaviya University of Technology, India), Rakesh Kumar (Madan Mohan Malaviya University of Technology, India)
Article 3
Gaussian Distribution-Based Machine Learning Scheme for Anomaly Detection in Healthcare Sensor Cloud (pages 52-72)
Rajendra Kumar Dwivedi (Madan Mohan Malaviya University of Technology, India), Rakesh Kumar (Madan Mohan Malaviya University of Technology, India), Rajkumar Buyya (The University of Melbourne, Australia)
Article 4
A Multi-Agent-Based Data Collection and Aggregation Model for Fog-Enabled Cloud Monitoring (pages 73-92)
Chetan M. Bulla (K. L. E. College of Engineering and Technology, India), Mahantesh N. Birje (Visvesvaraya Technological University, India)
Article 5
Issue 2
Article 1
Assisted-Fog-Based Framework for IoT-Based Healthcare Data Preservation (pages 1-16)
Mohamed Sarrab (Sultan Qaboos University, Oman), Fatma Alshohoumi (Sultan Qaboos University, Oman)
Article 2
A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual Verification (pages 17-31)
Lanfang Zhang (College of Information Engineering, Henan University of Science and Technology, China & Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, China), Zhiyong Zhang (College of Information Engineering, Henan University of Science and Technology, China & Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, China), Ting Zhao (College of Information Engineering, Henan University of Science and Technology, China & Henan International Joint Laboratory of Cyberspace Security Applications, Henan University of Science and Technology, China)
Article 3
Using E-Reputation for Sentiment Analysis: Twitter as a Case Study (pages 32-47)
Dhai Eddine Salhi (LIMOSE Laboratory, University of Mhamed Bougara, Boumerdes, Algeria), Abelkamel Tari (LIMED Laboratory, University Abderrahmane Mira, Bejaia, Algeria), Mohand Tahar Kechadi (Insight Centre for Data Analytics, University College Dublin, Dublin, Ireland)
Article 4
Improvement of QoS in an IoT Ecosystem by Integrating Fog Computing and SDN (pages 48-66)
Ishtiaq Ahammad (Noakhali Science and Technology University, Bangladesh), Md. Ashikur Rahman Khan (Noakhali Science and Technology University, Bangladesh), Zayed Us Salehin (Noakhali Science and Technology University, Bangladesh), Main Uddin (Noakhali Science and Technology University, Bangladesh), Sultana Jahan Soheli (Noakhali Science and Technology University, Bangladesh)
Article 5
Multi-Cloud Adoption Challenges for the Cloud-Native Era: Best Practices and Solution Approaches (pages 67-96)
Pethuru Raj Chelliah (Reliance Jio Ltd., Bangalore, India), Chellammal Surianarayanan (Bharathidasan University Constituent Arts and Science College, Bharathidasan University, Tiruchirappalli, India)
Article 6
Detecting Compromised Social Network Accounts Using Deep Learning for Behavior and Text Analyses (pages 1-13)
Steven Yen (San Jose State University, USA), Melody Moh (San Jose State University, USA), Teng-Sheng Moh (San Jose State University, USA)
Issue 3
Article 1
Secure Healthcare Monitoring Sensor Cloud With Attribute-Based Elliptical Curve Cryptography (pages 1-18)
Rajendra Kumar Dwivedi (Madan Mohan Malaviya University of Technology, Gorakhpur, India), Rakesh Kumar (Madan Mohan Malaviya University of Technology, Gorakhpur, India), Rajkumar Buyya (The University of Melbourne, Melbourne, Australia)
Article 2
Quantum Key Distribution Approach for Secure Authentication of Cloud Servers (pages 19-32)
Shahin Fatima (Integral University, India), Shish Ahmad (Integral University, India)
Article 3
Towards an Intelligent Framework for Cloud Service Discovery (pages 33-57)
Abdullah Marish Ali (King Abdulaziz University, Saudi Arabia), Siti Mariyam Shamsuddin (Universiti Teknologi Malaysia, Malaysia), Fathy E. Eassa (King Abdulaziz University, Saudi Arabia), Faisal Saeed (University of Taibah, Saudi Arabia), Madini O. Alassafi (King Abdulaziz University, Saudi Arabia), Tawfik Al-Hadhrami (Nottingham Trent University, UK), Ahmed M. Elmisery (University of South Wales, UK)
Article 4
Analysis of Heterogeneous Data Storage and Access Control Management for Cloud Computing Under M/M/c Queueing Model (pages 58-71)
Divya Sharma (JK Lakshmipat University, India), Gireesh Kumar (JK Lakshmipat University, India), Richa Sharma (JK Lakshmipat University, India)
Article 5
Effective Utilization of Resources Through Optimal Allocation and Opportunistic Migration of Virtual Machines in Cloud Environment (pages 72-91)
Priyanka H. (Dr. Ambedkar Institute of Technology, India), Mary Cherian (Dr. Ambedkar Institute of Technology, India)
Issue 4
Article 1
HSDLM: A Hybrid Sampling With Deep Learning Method for Imbalanced Data Classification (pages 1-13)
Khan Md. Hasib (Ahsanullah University of Science and Engineering, Bangladesh), Nurul Akter Towhid (Jahangirnagar University, Bangladesh), Md Rafiqul Islam (University of Technology Sydney (UTS), Australia)
Article 2
A Review on Cloud, Fog, Roof, and Dew Computing: IoT Perspective (pages 14-41)
Ishtiaq Ahammad (Noakhali Science and Technology University, Bangladesh), Ashikur Rahman Khan (Noakhali Science and Technology University, Bangladesh), Zayed Us Salehin (Noakhali Science and Technology University, Bangladesh)
Article 3
Reliable and Energy-Efficient Routing Scheme for Underwater Wireless Sensor Networks (UWSNs) (pages 42-58)
Semab Iqbal (MNS Univeristy of Agriculture, Multan, Pakistan), Israr Hussain (MNS Univeristy of Agriculture, Multan, Pakistan), Zubair Sharif (Universiti Teknologi PETRONAS, Malaysia), Kamran Hassan Qureshi (MNS Univeristy of Agriculture, Multan, Pakistan), Javeria Jabeen (MNS Univeristy of Agriculture, Multan, Pakistan)
Article 4
A Bio-Inspired and Heuristic-Based Hybrid Algorithm for Effective Performance With Load Balancing in Cloud Environment (pages 59-79)
Soumen Swarnakar (Netaji Subhash Engineering College, India), Souvik Bhattacharya (Netaji Subhash Engineering College, India), Chandan Banerjee (Netaji Subhash Engineering College, India)
Article 5
Current Trends in Cloud Computing for Data Science Experiments (pages 80-99)
Syed Imran Jami (Mohammed Ali Jinnah University, Pakistan), Siraj Munir (Mohammed Ali Jinnah University, Pakistan)
Article 6
Analysis of Different Load Balancing Algorithms in Cloud Computing (pages 100-112)
Poonam Nandal (Manav Rachna International Institute of Research and Studies, India), Deepa Bura (Manav Rachna International Institute of Research and Studies, India), Meeta Singh (Manav Rachna International Institute of Research and Studies, India), Sudeep Kumar (Government Polytechnic for Women, India)
Article 7
Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey (pages 113-135)
Aayush Vishnoi (Graphic Era University (Deemed), Dehradun, India), Preeti Mishra (Dept. of CSE, Graphic Era University (Deemed), India & Dept. of CS, Doon University Dehradun, India), Charu Negi (Graphic Era Hill University, Dehradun, India), Sateesh Kumar Peddoju (Indian Institute of Technology, Roorkee, India)
Article 8
The Impact of Cloud Computing on Organizational Performance (pages 136-151)
Thura Al-Azzawi (Department of Management Information Systems, School of Applied Sciences, Cyprus International University, Cyprus), Tugberk Kaya (Department of Management Information Systems, School of Applied Sciences, Cyprus International University, Cyprus)
Article 9
Robo-Advisory Services in India: A Study to Analyse Awareness and Perception of Millennials (pages 152-173)
Arti Chandani (Symbiosis Institute of Management Studies, Symbiosis International University (Deemed), India), Sriharshitha S. (Symbiosis Institute of Management Studies, Symbiosis International University (Deemed), India), Ankita Bhatia (Symbiosis Institute of Management Studies, Symbiosis International University (Deemed), India), Rizwana Atiq (Integral University Lucknow, India), Mita Mehta (Symbiosis Institute of Management Studies, Symbiosis Institute of Management Studies, Symbiosis International University (Deemed), India)
Article 10
Integrated Fog and Cloud Computing Issues and Challenges (pages 174-193)
Shivom Sharma (Department of Computer Science, Aligarh Muslim University, India), Mohammad Sajid (Department of Computer Science, Aligarh Muslim University, India)
Volume 10 (2020)
Issue 1
Article 1
Architecture of Fog-Enabled and Cloud-Enhanced Internet of Things Applications (pages 1-10)
Sanjay P. Ahuja (University of North Florida, Jacksonville, USA), Nathan Wheeler (University of North Florida, Jacksonville, USA)
Article 2
Strategic Outsourcing to Cloud Computing: A Comprehensive Framework Based on Analytic Hierarchy Process (pages 11-27)
Abdelwahhab SATTA (MISC Laboratory, University of Constantine 2, Constantine, Algeria), Sihem Mostefai (MISC Laboratory, University of Constantine 2, Constantine, Algeria)
Article 3
Efficient Escrow-free CP-ABE with Constant Size Ciphertext and Secret Key for Big Data Storage in Cloud (pages 28-45)
Praveen Kumar Premkamal (National Institute of Technology Tiruchirappalli, Tiruchirappalli, India), Syam Kumar Pasupuleti (Institute for Development and Research in Banking Technology, Hyderabad, India), Alphonse PJA (National Institute of Technology Tiruchirappalli, Tiruchirappalli, India)
Article 4
Performance Enhancement of Cloud Based Storage using Disk Scheduling Technique (pages 46-63)
Saswati Sarkar (Computer Innovative Research Society, West Bengal, India), Anirban Kundu (Information Technology Department, Netaji Subhash Engineering College, Kolkata, India & Innovation Research Lab (IRL), Howrah, India)
Article 5
Capability Based Outsourced Data Access Control with Assured File Deletion and Efficient Revocation with Trust Factor in Cloud Computing (pages 64-84)
Shweta Kaushik (JIIT Sector- 128 Noida, Noida, India), Charu Gandhi (JIIT Sector- 128 Noida, Noida, India)
Issue 2
Article 1
Efficient Metaheuristic Population-Based and Deterministic Algorithm for Resource Provisioning Using Ant Colony Optimization and Spanning Tree (pages 1-21)
Muhammad Aliyu (Abubakar Tafawa Balewa University, Bauchi, Nigeria), Murali M (SRM institute of science and technology, Tamil Nadu, India), Abdulsalam Y. Gital (Abubakar Tafawa Balewa University, Bauchi, Nigeria), Souley Boukari (Abubakar Tafawa Balewa |University, Bauchi, Nigeria)
Article 2
A Conceptual Framework Towards Implementing a Cloud-Based Dynamic Load Balancer Using a Weighted Round-Robin Algorithm (pages 22-35)
Sudipta Sahana (JIS College of Engineering, Kalyani, India), Tanmoy Mukherjee (JIS College of Engineering, Kalyani, India), Debabrata Sarddar (University of Kalyani, India)
Article 3
Offloading as a Service Middleware for Mobile Cloud Apps (pages 36-55)
Hamid A Jadad (SQU, Muscat, Oman), Abderezak Touzene (Sultan Qaboos University, Muscat, Oman), Khaled Day (Sultan Qaboos University, Muscat, Oman)
Article 4
Multi Factor Two-way Hash-Based Authentication in Cloud Computing (pages 56-76)
K. DeviPriya (Aditya Engineering College, Andhra Pradesh, India), Sumalatha Lingamgunta (University College of Engineering, Kakinada, India)
Article 5
Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System (pages 77-92)
M. Sumathi (National Institute of Technology, Tiruchirappalli, India), S. Sangeetha (National Institute of Technology, Tiruchirappalli, India)
Issue 3
Article 1
Multi-Factor Performance Comparison of Amazon Web Services Elastic Compute Cluster and Google Cloud Platform Compute Engine (pages 1-16)
Sanjay P. Ahuja (University of North Florida, USA), Emily Czarnecki (University of North Florida, USA), Sean Willison (University of North Florida, USA)
Article 2
A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing (pages 17-53)
Ahmad Al-Nawasrah (Taibah University, Saudi Arabia), Ammar Ali Almomani (Al-Balqa Applied University, Jordan), Samer Atawneh (College of Computing and Informatics, Saudi Electronic University, Saudi Arabia), Mohammad Alauthman (Department of Computer Science, Faculty of Information Technology, Zarqa University, Jordan)
Article 3
Merkle Tree and Blockchain-Based Cloud Data Auditing (pages 54-66)
Arun Prasad Mohan (Anna University, India), Mohamed Asfak R. (Anna University, India), Angelin Gladston (Anna University, India)
Article 4
SCEF: A Model for Prevention of DDoS Attacks From the Cloud (pages 67-80)
Ganeshayya Ishwarayya Shidaganti (Ramaiah Institute of Technology (Visvesvaraya Technological University), India), Amogh Shreedhar Inamdar (Ramaiah Institute of Technology, India), Sindhuja V. Rai (Ramaiah Institute of Technology, India), Anagha M. Rajeev (Ramaiah Institute of Technology, India)
Article 5
Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds (pages 81-95)
Djouhra Dad (Department of Computer Sciences, Oran 1 University, Algeria), Ghalem Belalem (Department of Computer Sciences, Oran 1 University, Algeria)
Article 6
Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan (pages 96-110)
Khalid Ali Rababah (University of Jeddah, Saudi Arabia), Bilal Ali Al-nassar (The World Islamic Sciences and Education University, Jordan), Sana'a Nawaf Al-Nsour (The World Islamic Sciences and Education University, Jordan)
Issue 4
Article 1
Biometrics-Based Un-Locker to Enhance Cloud Security Systems (pages 1-12)
Ashima Narang (Maharishi Markandeshwar University, Sadopur-Ambala, Haryana, India), Deepali Gupta (Chitkara University Institute of Engineering and Technology, Chitkara University, India), Amandeep Kaur (Maharishi Markandeshwar University, Sadopur-Ambala, Haryana, India)
Article 2
Proposed Technique for Efficient Cloud Computing Model in Effective Digital Training Towards Sustainable Livelihoods for Unemployed Youths (pages 13-27)
Ritu Bansal (Indira Gandhi National Tribal University, Amarkanak, India), Vikash Kumar Singh (Indira Gandhi National Tribal University, Amarkantak, India)
Article 3
Cloud Computing as the Next Utility: Market Strategies for Cloud Service Providers (pages 28-47)
Alexander Bogislav Herzfeldt (Technical University of Munich, Germany), Hans Peter Rauer (Bielefeld University of Applied Sciences, Germany), Reimar Weißbach (Massachusetts Institute of Technology, USA), Christoph Ertl (Technical University of Munich, Germany)
Article 4
Determinants of Cloud Business Intelligence Adoption Among Ghanaian SMEs (pages 48-69)
Acheampong Owusu (Business School, University of Ghana, Ghana)
Article 5
Execution of Long-Duration Multi-Cloud Serverless Functions Using Selective Migration-Based Approach (pages 70-97)
Boubaker Soltani (LIRE Laboratory, Constantine 2 - Abdelhamid Mehri University, El Khroub, Algeria), Afifa Ghenai (LIRE Laboratory, Constantine 2 - Abdelhamid Mehri University, El Khroub, Algeria), Nadia Zeghib (LIRE Laboratory, Constantine 2 - Abdelhamid Mehri University, El Khroub, Algeria)
Volume 9 (2019)
Issue 1
Article 1
U-LITE, a Private Cloud Approach for Particle Physics Computing (pages 1-15)
Barbara Demin (INFN-CNAF, Bologna, Italy), Sandra Parlati (INFN-LNGS, Assergi (AQ), Italy), Pietro Fedele Spinnato (INFN-TIFPA, Trento, Italy), Stefano Stalio (Assergi (AQ), Bologna, Italy)
Article 2
Performance of Memory Virtualization Using Global Memory Resource Balancing (pages 16-32)
Pvss Gangadhar (Gitam University, Visakhapatnam, India), Ashok Kumar Hota (NIC, Bhubaneswar, India), Mandapati Venkateswara Rao (Gitam University, Visakhapatnam, India), Vedula Venkateswara Rao (Sri Vasavi Engineering College, Pedatadepalli, India)
Article 3
Fast and Efficient Multiview Access Control Mechanism for Cloud Based Agriculture Storage Management System (pages 33-49)
Kuldeep Sambrekar (Gogte Institute of Technology, Belgaum, India), Vijay S. Rajpurohit (Gogte Institute of Technology, Belgaum, India)
Article 4
Vulnerability of the Synchronization Process in the Quantum Key Distribution System (pages 50-58)
A. P. Pljonkin (Southern Federal University, Taganrog, Russia)
Article 5
Towards Green Cloud Computing an Algorithmic Approach for Energy Minimization in Cloud Data Centers (pages 59-81)
Jenia Afrin Jeba (Jahangirnagar University, Dhaka, Bangladesh), Shanto Roy (Jahangirnagar University, Dhaka, Bangladesh), Mahbub Or Rashid (Jahangirnagar University, Dhaka, Bangladesh), Syeda Tanjila Atik (Jahangirnagar University, Dhaka, Bangladesh), Md Whaiduzzaman (Jahangirnagar University, Dhaka, Bangladesh)
Issue 2
Article 1
Adoption and Success of e-HRM in a Cloud Computing Environment: A Field Study (pages 1-27)
Robert-Christian Ziebell (Universitat Politècnica de València, Valencia, Spain), Jose Albors-Garrigos (Universitat Politècnica de València, Valencia, Spain), Klaus-Peter Schoeneberg (Beuth University of Applied Sciences, Berlin, Germany), Maria Rosario Perello Marin (Universitat Politècnica de València, Valencia, Spain)
Article 2
Factors Affecting Students' Intention Toward Mobile Cloud Computing: Mobile Cloud Computing (pages 28-42)
Fatheia Hassan Abdulfattah (King Abdulaziz University, Jeddah, Saudi Arabia)
Article 3
IoT Data Compression and Optimization Techniques in Cloud Storage: Current Prospects and Future Directions (pages 43-59)
Kaium Hossain (Department of Computer Science & Engineering, Green University of Bangladesh, Dhaka, Bangladesh), Mizanur Rahman (Department of Computer Science & Engineering, Green University of Bangladesh, Dhaka, Bangladesh), Shanto Roy (Department of Computer Science & Engineering, Green University of Bangladesh, Dhaka, Bangladesh)
Article 4
Distributed Ledger Technology based Property Transaction System with Support for IoT Devices (pages 60-78)
Nikita Singh (National Institute of Technology Raipur, Raipur, India), Manu Vardhan (National Institute of Technology Raipur, Raipur, India)
Article 5
An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms (pages 79-98)
Oladayo Olufemi Olakanmi (University of Ibadan, Ibadan, Nigeria), Adedamola Dada (University of Ibadan, Ibadan, Nigeria)
Issue 3
Article 1
A Novel Meta-Information Management System for SaaS (pages 1-21)
Amit Kr Mandal (BML Munjal University, Gurugram, India), Aniban Sarkar (National Institute of Technology, Durgapur, India)
Article 2
Design of Secure Image Fusion Technique Using Cloud for Privacy-Preserving and Copyright Protection (pages 22-36)
Ashwani Kumar (Department of Computer Science and Engineering, Vardhaman College of Engineering, Shamshabad, Hyderabad, India)
Article 3
Multi-Objective Genetic Algorithm for Tasks Allocation in Cloud Computing (pages 37-57)
Youssef Harrath (University of Bahrain, Kingdom of Bahrain), Rashed Bahlool (University of Bahrain, Kingdom of Bahrain)
Article 4
Context-Aware Prediction Model for Offloading Mobile Application Tasks to Mobile Cloud Environments (pages 58-74)
Hamid A Jadad (SQU, Muscat, Oman), Abederezak Touzene (SQU, Muscat, Oman), Khaled Day (SQU, Muscat, Oman), Nasser Alziedi (SQU, Muscat, Oman), Bassel Arafeh (University of Louisville, Louisville, USA)
Article 5
Dynamic Load Balancing Using Hybrid Approach (pages 75-88)
Sunita Gond (Barkatullah university, Bhopal, India), Shailendra Singh (National Institute of Technical Teachers Training and Research, Bhopal, India)
Article 6
Multiple Perspective of Cloud Computing Adoption Determinants in Higher Education a Systematic Review (pages 89-109)
Mohammed Banu Ali (Alliance Manchester Business School, University of Manchester, Innovation Management and Policy Division, UK)
Issue 4
Article 1
Article 2
Ensure Hierarchal Identity Based Data Security in Cloud Environment (pages 21-36)
Shweta Kaushik (JIIT Noida, Noida, India), Charu Gandhi (JIIT Noida, Noida, India)
Article 3
Examining the Antecedents of Cloud Service Profitability (pages 37-65)
Alexander Herzfeldt (Technical University of Munich, Munich, Germany), Sebastian Floerecke (University of Passau, Passau, Germany), Christoph Ertl (Technical University of Munich, Munich, Germany), Helmut Krcmar (Technical University of Munich, Munich, Germany)
Article 4
On Investigating Energy Stability for Cellular Automata Based PageRank Validation Model in Green Cloud (pages 66-85)
Arnab Mitra (Siksha ‘O' Anusandhan (Deemed to be University), Bhubaneswar, India)
Article 5
Policy-Driven Middleware for Multi-Tenant SaaS Services Configuration (pages 86-106)
Khadija Aouzal (SEEDS Team, STRS Lab, INPT, Rabat, Morocco), Hatim Hafiddi (SEEDS Team, STRS Lab, INPT, Rabat, Morocco & IMS Team, ADMIR Lab, ENSIAS, Rabat, Morocco), Mohamed Dahchour (SEEDS Team, STRS Lab, INPT, Rabat, Morocco)
Volume 8 (2018)
Issue 1
Article 1
Towards a Better Understanding of Ubiquitous Cloud Computing (pages 1-20)
Hamed Vahdat-Nejad (University of Birjand, Birjand, Iran), Shaghayegh Ostadi Eilaki (University of Birjand, Birjand, Iran), Shaghayegh Izadpanah (University of Birjand, Birjand, Iran)
Article 2
Assessment of Honeypots: Issues, Challenges and Future Directions (pages 21-54)
B. B. Gupta (National Institute of Technology Kurukshtra, India), Alisha Gupta (National Institute of Technology Kurukshtra, India)
Article 3
A Novel Security Framework for Managing Android Permissions Using Blockchain Technology (pages 55-79)
Abdellah Ouaguid (RITM Laboratory, ESTC, Hassan II University, Casablanca, Morocco), Noreddine Abghour (LIMSAD, FSAC, Hassan II University, Casablanca, Morocco), Mohammed Ouzzif (RITM Laboratory, ESTC, Hassan II University, Casablanca, Morocco)
Article 4
On the Performance Evaluation of IaaS Cloud Services With System-Level Benchmarks (pages 80-96)
Sanjay P. Ahuja (University of North Florida, Jacksonville, USA), Niharika Deval (University of North Florida, Jacksonville, USA)
Article 5
Cloud Computing Adoption: Scale Development, Measurement and Validation (pages 97-116)
Pragati Priyadarshinee (NITIE, Mumbai, India)
Article 6
Energy-Efficient Task Consolidation for Cloud Data Center (pages 117-142)
Sudhansu Shekhar Patra (School of Computer Application, KIIT University, Bhubaneswar, India)
Article 7
A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing (pages 143-153)
Hoon Ko (Chosun University, Gwangju, South Korea), Libor Mesicek (Jan Evangelista Purkyne University, Czech Republic), Jongsun Choi (School of Computer Science and Engineering, Soongsil University, Seoul, South Korea), Junho Choi (Division of Undeclared Majors, Chosun University, Gwangju, South Korea), Seogchan Hwang (Gensoloft Inc., Seoul, South Korea)
Article 8
Enhancing the Security of Exchanging and Storing DICOM Medical Images on the Cloud (pages 154-172)
O. Dorgham (Prince Abdullah Ben Ghazi Faculty of Information Technology, Al-Balqa Applied University, Al Salt, Jordan), Banan Al-Rahamneh (Prince Abdullah Ben Ghazi Faculty of Information Technology, Al-Balqa Applied University, Al Salt, Jordan), Ammar Almomani (IT-Department, Al-Huson University College, Al-Balqa Applied University, Irbid, Jordan), Moh'd Al-Hadidi (Prince Abdullah Ben Ghazi Faculty of Information Technology, Al-Balqa Applied University, Al Salt, Jordan), Khalaf F. Khatatneh (Prince Abdullah Ben Ghazi Faculty of Information Technology, Al-Balqa Applied University, Al Salt, Jordan)
Issue 2
Article 1
On the Exploration of Equal Length Cellular Automata Rules Targeting a MapReduce Design in Cloud (pages 1-26)
Arnab Mitra (Computer Innovative Research Society (CIRS), Howrah, India), Anirban Kundu (Information Technology Department, Netaji Subhash Engineering College, Kolkata, India & Innovation Research Lab (IRL), Howrah, India), Matangini Chattopadhyay (School of Education Technology, Jadavpur University, Kolkata, India), Samiran Chattopadhyay (Department of Information Technology, Jadavpur University, Kolkata, India)
Article 2
An Affordable Hybrid Cloud Based Cluster for Secure Health Informatics Research (pages 27-46)
Basit Qureshi (Prince Sultan University, Riyadh, Saudi Arabia)
Article 3
Architectural Design of Trusted Platform for IaaS Cloud Computing (pages 47-65)
Ubaidullah Alias Kashif (Shah Abdul Latif University Khairpur - Shikarpur Campus, Sindh, Pakistan), Zulfiqar Ali Memon (National University of Computer and Emerging Sciences (FAST-NUCES), Karachi, Pakistan), Shafaq Siddiqui (Sukkur IBA University, Sukkur, Pakistan), Abdul Rasheed Balouch (Sukkur IBA University, Sukkur, Pakistan), Rakhi Batra (Sukkur IBA University, Sukkur, Pakistan)
Article 4
An Autonomic SLA Monitoring Framework Managed by Trusted Third Party in the Cloud Computing (pages 66-95)
Adil Maarouf (Computer, Networks, Mobility and Modeling Laboratory, FST, Hassan 1st University, Settat, Morocco), Youssef Mifrah (Institut National des Postes et Télécommunications Rabat, Rabat, Morocco), Abderrahim Marzouk (Computer, Networks, Mobility and Modeling Laboratory, FST, Hassan 1st University, Settat, Morocco), Abdelkrim Haqiq (Computer, Networks, Mobility and Modeling Laboratory, FST, Hassan 1st University, Settat, Morocco)
Article 5
An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms (pages 96-112)
Ammar Almomani (IT Department, Al-Huson University College, Al-Balqa Applied University, Irbid, Jordan), Mohammad Alauthman (Department of Computer Science, Faculty of information technology, Zarqa University, Zarqa, Jordan), Firas Albalas (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan), O. Dorgham (Prince Abdullah Ben Ghazi Faculty of Information Technology, Al-Balqa Applied University, Al Salt, Jordan), Atef Obeidat (IT Department, Al-Huson University College, Al-Balqa Applied University, Irbid, Jordan)
Article 6
Secure NoSQL for the Social Networking and E-Commerce Based Bigdata Applications Deployed in Cloud (pages 113-129)
Sangeeta Gupta (JNTU Kakinada, Hyderabad, India), Narsimha Gugulothu (JNTUH, Hyderabad, India)
Issue 3
Article 1
Fault Tolerant and Optimal Task Clustering for Scientific Workflow in Cloud (pages 1-19)
Nagaraj V. Dharwadkar (Rajarambapu Institute of Technology, Uran Islampur, India), Shivananda R. Poojara (Rajarambapu Institute of Technology, Uran Islampur, India), Priyanka M. Kadam (Rajarambapu Institute of Technology, Uran Islampur, India)
Article 2
Efficient Fault Tolerance on Cloud Environments (pages 20-31)
Sam Goundar (CENTRUM Catolica Graduate School of Business, Pontificia Universidad del Peru, Peru), Akashdeep Bhardwaj (University of Petroleum & Energy Studies, Dehradun, India)
Article 3
A Novel Authorization Scheme for Multimedia Social Networks Under Cloud Storage Method by Using MA-CP-ABE (pages 32-47)
Cheng Li (School of Information Engineering, Henan University of Science and Technology, Luoyang, China), Zhiyong Zhang (School of Information Engineering, Henan University of Science and Technology, Luoyang, China), Lanfang Zhang (School of Information Engineering, Henan University of Science and Technology, Luoyang, China)
Article 4
Performance Evaluation of Unstructured PBRA for Bigdata with Cassandra and MongoDB in Cloud (pages 48-59)
Sangeeta Gupta (Vardhaman College of Engineering, Hyderabad, India)
Article 5
An Efficient Data Replication Algorithm for Distributed Systems (pages 60-77)
Sanjaya Kumar Panda (Department of CSE and IT, Veer Surendra Sai University of Technology, Burla, India), Saswati Naik (Sambalpur University Institute of Information Technology, Burla, India)
Article 6
Cost Effective Approaches for Content Placement in Cloud CDN Using Dynamic Content Delivery Model (pages 78-117)
S. Sajitha Banu (National Institute of Technology, Tiruchirappalli, India), S.R. Balasundaram (National Institute of Technology, Tiruchirappalli, India)
Issue 4
Article 1
A Context-Aware Museum-Guide System Based on Cloud Computing (pages 1-19)
Hamed Vahdat-Nejad (University of Birjand, Birjand, Iran), Mohammad Sadeq Navabi (University of Birjand, Birjand, Iran), Hosein Khosravi-Mahmouei (University of Birjand, Birjand, Iran)
Article 2
An Improved Genetic Algorithm for Document Clustering on the Cloud (pages 20-28)
Ruksana Akter (Hankuk University of Foreign Studies, Seoul, Korea), Yoojin Chung (Hankuk University of Foreign Studies, Seoul, Korea)
Article 3
Assignment of Virtual Networks to Substrate Network for Software Defined Networks (pages 29-48)
Ali Akbar Nasiri (University of Tabriz, Tabriz, Iran), Farnaz Derakhshan (University of Tabriz, Tabriz, Iran)
Article 4
An Analysis of the Factors Affecting the Adoption of Cloud Computing in Higher Educational Institutions: A Developing Country Perspective (pages 49-71)
Ali Tarhini (Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Muscat, Oman), Khamis Al-Gharbi (Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Muscat, Oman), Ali Al-Badi (Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Muscat, Oman), Yousuf Salim AlHinai (Department of Information Systems, College of Economics and Political Science, Sultan Qaboos University, Muscat, Oman)
Article 5
KIET Framework for Cloud Adoption: Indian Banking Case Study (pages 72-87)
Lalit Mohan Sanagavarapu (IIIT Hyderabad, Hyderabad, India), Gangadharan G.R. (IDRBT, Hyderabad, India), Raghu Reddy Y. (International Institute of Information Technology, Hyderabad, India)
Article 6
Quantifying the Resilience of Cloud-Based Manufacturing Composite Services (pages 88-117)
Mohammad Reza Namjoo (School of Industrial Engineering, College of Engineering, University of Tehran, Tehran, Iran), Abbas Keramati (School of Industrial Engineering, College of Engineering, University of Tehran, Tehran, Iran & Ted Rogers School of Information Technology Management (TRSITM), Ryerson University, Toronto, Canada), S. Ali Torabi (School of Industrial Engineering, College of Engineering, University of Tehran, Tehran, Iran), Fariborz Jolai (School of Industrial Engineering, College of Engineering, University of Tehran, Tehran, Iran)
Article 7
A New Conception of Load Balancing in Cloud Computing Using Tasks Classification Levels (pages 118-133)
Fahim Youssef (Hassan II University, Casablanca, Morocco), Ben Lahmar El Habib (Hassan II University, Casablanca, Morocco), Rahhali Hamza (Hassan II University, Casablanca, Morocco), Labriji El Houssine (Hassan II University, Casablanca, Morocco), Eddaoui Ahmed (Shaqra University, Shaqraa, Saudi Arabia), Mostafa Hanoune (Hassan II University, Casablanca, Morocco)
Volume 7 (2017)
Issue 1
Special Issue on Big Data and Applications in the Cloud: Part 1
Guest Editorial Preface
Qussai Yaseen (Jordan University of Science and Technology, Department of Computer Information Systems, Irbid, Jordan)
Article 1
Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud (pages 1-31)
B. B. Gupta (National Institute of Technology Kurukshetra, India), Shashank Gupta (National Institute of Technology, Department of Computer Engineering, Kurukshetra, India), Pooja Chaudhary (National Institute of Technology, Department of Computer Engineering, Kurukshetra, India)
Article 2
Pedagogical Indexed Arabic Text in Cloud E-Learning System (pages 32-46)
Nafaa Haffar (University of Monastir, Monastir, Tunisia), Mohsen Maraoui (LaTice Lab, Faculty of Sciences of Monastir, University of Monastir, Monastir, Tunisia), Shadi Aljawarneh (Jordan University of Science and Technology, Faculty of Computer and Information Technology, Irbid, Jordan), Mohammed Bouhorma (Abdelmalek Essaâdi University, Tétouan, Morocco), Abdallah Altahan Alnuaimi (Al-Isra University, Amman, Jordan), Bilal Hawashin (Al-Zaytoonah University, Amman, Jordan)
Article 3
XML OLAP Cube in the Cloud Towards the DWaaS (pages 47-56)
Rihane DKAICH (MISC Laboratory, Faculty of Sciences, Kenitra, Morocco), Ikram EL AZAMI (MISC Laboratory, Faculty of Sciences, Kenitra, Morocco), Abdelaziz MOULOUDI (MISC Laboratory, Faculty of Sciences, Kenitra, Morocco)
Article 4
Parallel and Distributed Population based Feature Selection Framework for Health Monitoring (pages 57-71)
Naoual El Aboudi (Mohammed V University in Rabat, Rabat, Morocco), Laila Benhlima (Mohammed V University in Rabat, Rabat, Morocco)
Article 5
Performance Evaluation of Public IaaS Clouds for Web 2.0 Applications Using CloudStone Benchmark (pages 72-93)
Sanjay P. Ahuja (School of Computing, University of North Florida, Jacksonville, FL, USA), Neha Soni (University of North Florida, Jacksonville, FL, USA)
Issue 2
Special Issue on Big Data and Applications in the Cloud – Part 2
Guest Editorial Preface
Qussai Yaseen (Jordan University of Science and Technology, Department of Computer Information Systems, Irbid, Jordan)
Article 1
User Modeling Approach for Dyslexic Students in Virtual Learning Environments (pages 1-9)
Fatima Ezzahra Benmarrakchi (Chouaib Doukkali University, Department of Computer Science, El Jadida, Morocco), Jamal El Kafi (Chouaib Doukkali University, Department of Computer Science, El Jadida, Morocco), Ali Elhore (Chouaib Doukkali University, Department of Computer Science, El Jadida, Morocco)
Article 2
An Efficient All Shapes Busy List Processor Allocation Algorithm for 3D Mesh Multicomputers (pages 10-26)
Saad Bani-Mohammad (Al al-Bayt University, Department of Computer Science, Mafraq, Jordan)
Article 3
Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing Environment (pages 27-40)
Mouhib Ibtihal (MoulaySmail University, Faculty of Science, Meknes, Morocco), El Ouadghiri Driss (MoulaySmail University, Faculty of Science, Meknes, Morocco), Naanani Hassan (Ben'msik University, Faculty of Science, Casablanca, Morocco)
Article 4
Countering MitM Attacks Using Evolved PathFinder Algorithm (pages 41-61)
Mouhcine Chliah (Mohammed V University in Rabat, Faculty of Sciences, Rabat, Morocco), Ghizlane Orhanou (Mohammed V University in Rabat, Faculty of Sciences, Rabat, Morocco), Said El Hajji (Mohammed V University in Rabat, Faculty of Sciences, Rabat, Morocco)
Article 5
Secure Mobile Multi Cloud Architecture for Authentication and Data Storage (pages 62-76)
Karim Zkik (University of Mohammed V in Rabat, Faculty of Sciences, Rabat, Morocco), Ghizlane Orhanou (University of Mohammed V in Rabat, Faculty of Sciences, Rabat, Morocco), Said El Hajji (University of Mohammed V in Rabat, Faculty of Sciences, Rabat, Morocco)
Issue 3
Article 1
Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges (pages 1-43)
Shashank Gupta (Department of Computer Engineering, National Institute of Technology Kurukshetra, India), B. B. Gupta (Department of Computer Engineering, National Institute of Technology Kurukshetra, India)
Article 2
Attitudes Towards Cloud Computing Adoption in Emerging Economies (pages 44-58)
Mohammad Alsharo (Al Albayt University, School of Information Technology, Mafraq, Jordan)
Article 3
Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks (pages 59-75)
Akashdeep Bhardwaj (University of Petroleum & Energy Studies, Dehradun, India), Sam Goundar (CENTRUM, Graduate Business School, Lima, Peru)
Article 4
Comparative Study for Different Provisioning Policies for Load Balancing in Cloudsim (pages 76-86)
Layla Albdour (University of Jordan, Amman, Jordan)
Issue 4
Article 1
The Impact of Cloud-Based Digital Transformation on IT Service Providers: Evidence From Focus Groups (pages 1-19)
Trevor Clohessy (Business Information Systems Department, National University of Ireland Galway, Galway, Ireland), Thomas Acton (Business Information Systems Department, National University of Ireland Galway, Galway, Ireland), Lorraine Morgan (Business Information Systems Department, National University of Ireland Galway, Galway, Ireland)
Article 2
An Energy-Aware Task Scheduling in the Cloud Computing Using a Hybrid Cultural and Ant Colony Optimization Algorithm (pages 20-40)
Poopak Azad (Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran), Nima Jafari Navimipour (Department of Computer Engineering, Tabriz Branch, Islamic Azad University, Tabriz, Iran)
Article 3
Verification and Identification Approach to Maintain MVCC in Cloud Computing (pages 41-59)
Niharika Singh (National Institute of Technology (NIT), Kurukshetra, India), Upasana Lakhina (Technology Education and Research Integrated Institutions, Kurukshetra, India), Ajay Jangra (University Institute of Engineering and Technology (UIET), Kurukshetra, India), Priyanka Jangra (University Institute of Engineering and Technology (UIET), Kurukshetra, India)
Article 4
A Heuristic Approach for Service Allocation in Cloud Computing (pages 60-74)
Ahmad Sharieh (University of Jordan, Amman, Jordan), Layla Albdour (University of Jordan, Amman, Jordan)
Volume 6 (2016)
Issue 1
Article 1
Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack (pages 1-14)
Nitin Nagar (International Institute of Professional Studies, Devi Ahiliya University, Indore, India), Ugrasen Suman (School of Computer Science and IT, Devi Ahiliya University, Indore, India)
Article 2
A Game Theoretic Method for Resource Allocation in Scientific Cloud (pages 15-41)
Amin Nezarat (Payame Noor University, Yazd, Iran), Gh Dastghaibifard (Shiraz University, Shiraz, Iran)
Article 3
Testing Software Services in Cloud Ecosystems (pages 42-58)
Mariam Kiran (School of Electrical Engineering and Computer Science, University of Bradford, Bradford, UK), Anthony Simons (Department of Computer Science, University of Sheffield, Sheffield, UK)
Article 4
A Survey on MapReduce Implementations (pages 59-87)
Amer Al-Badarneh (Jordan University of Science & Technology, Irbid, Jordan), Amr Mohammad (Jordan University of Science & Technology, Irbid, Jordan), Salah Harb (Jordan University of Science & Technology, Irbid, Jordan)
Issue 2
Special Issue on Open Source Software Computing
Guest Editorial Preface
Ismail Hababeh (German Jordanian University, Amman, Jordan)
Article 1
Detection and Ignoring of Blackhole Attack in Vanets Networks (pages 1-10)
Chaima Bensaid (EEDIS Laboratory Computer Science Department, Djillali Liabes University at Sidi Bel Abbes, Sidi Bel Abbes, Algeria), Sofiane Boukli Hacene (EEDIS Laboratory Computer Science Department, Djillali Liabes University at Sidi Bel Abbes, Sidi Bel Abbes, Algeria), Kamel Mohamed Faraoun (EEDIS Laboratory Computer Science Department, Djillali Liabes University at Sidi Bel Abbes, Sidi Bel Abbes, Algeria)
Article 2
A Based-Rule Method to Transform CIM to PIM into MDA (pages 11-24)
Yassine Rhazali (Ibn Tofail University, Kenitra, Morocco), Youssef Hadi (Ibn Tofail University, Kenitra, Morocco), Abdelaziz Mouloudi (Ibn Tofail University, Kenitra, Morocco)
Article 3
An Improved Secure SIP Registration Mechanism to Avoid VoIP Threats (pages 25-36)
Mohammed Rasol (Saleem Al Saidat, Jordan Telecom Group, Amman, Jordan), Bassam Al Kasasbeh (University of Jordan, Amman, Jordan), Farah Al Adwan (University of Jordan, Amman, Jordan)
Article 4
A Practical Application of TrimCloud: Using TrimCloud as an Educational Technology in Developing Countries (pages 37-48)
Beatriz Adriana Gomez (University of North Texas, Cedar Hill, TX, USA), Kailash Evans (University of Exeter Medical School, Exeter, UK)
Article 5
Applying the Updated Delone and Mclean is Success Model for Enterprise Cloud Computing Readiness (pages 49-54)
Omar Sabri (Management Information System, Al-Isra Private University, Amman, Jordan)
Article 6
A Generic, Multi-Period and Multi-Partner Cost Optimizing Model for Cloud-Based Supply Chain (pages 55-63)
Goknur Arzu Akyuz (University of Turkish Aeronautical Association, Ankara, Turkey), Mohammad Rehan (Department of Information Systems Engineering, Atilim University, Ankara, Turkey)
Article 7
A Satiated Method for Cloud Traffic Classification in Software Defined Network Environment (pages 64-79)
Mohit Mathur (Jagan Institute of Management Studies, Delhi, India), Mamta Madan (Vivekananda Institute of Professional Studies, Delhi, India), Kavita Chaudhary (JaganNath University, Jaipur, India)
Issue 3
Article 1
Healthcare SaaS Based on a Data Model with Built-In Security and Privacy (pages 1-14)
Ruchika Asija (School of Computer and Information Sciences, Indira Gandhi National Open University, New Delhi, India), Rajarathnam Nallusamy (Embnology Solution Private Limited, Bangalore, India)
Article 2
Enhanced Trust Path between Two Entities in Cloud Computing Environment (pages 15-31)
Usha Divakarla (Department of Computer Science, National Institute of Technology Karnataka, Mangalore, India), K. Chandrasekaran (National Institute of Technology Karnataka, Mangalore, India)
Article 3
A Security Framework for Secure Cloud Computing Environments (pages 32-44)
Mouna Jouini (Department of Computer Science, Institut Supérieur De Gestion De Tunis, Tunis, Tunisia), Latifa Ben Arfa Rabai (Department of Computer Science, Institut Supérieur De Gestion De Tunis, Tunis, Tunisia)
Article 4
Investigating the Determinants of IT Professionals' Intention to Use Cloud-Based Applications and Solutions: An Extension of the Technology Acceptance (pages 45-62)
Sabah Al-Somali (Department of Management Information Systems, King Abdulaziz University, Jeddah, Saudi Arabia), Hanan Baghabra (King Abdulaziz University, Jeddah, Saudi Arabia)
Issue 4
Article 1
A Customer-Oriented Task Scheduling for Heterogeneous Multi-Cloud Environment (pages 1-17)
Sohan Kumar Pande (Department of CSE, SUIIT, Burla, India), Sanjaya Kumar Panda (Department of CSE, Indian Institute of Technology (ISM), Dhanbad, India & Department of CSE and IT, VSS University of Technology, Burla, India), Satyabrata Das (Department of CSE and IT, V S S University of Technology, Burla, India)
Article 2
A Cloud Intrusion Detection System Using Novel PRFCM Clustering and KNN Based Dempster-Shafer Rule (pages 18-35)
Partha Ghosh (Netaji Subhash Engineering College, Maulana Abul Kalam Azad University of Technology, Kolkata, India), Shivam Shakti (Netaji Subhash Engineering College, Maulana Abul Kalam Azad University of Technology, Kolkata, India), Santanu Phadikar (Maulana Abul Kalam Azad University of Technology, Kolkata, India)
Article 3
NoSQL Application Redesign may be Unnecessary for Most Corporation Cloud Migration Deployments (pages 36-64)
Curtis J. Muller (MS&T, Rolla, MO, USA), Aaron Christopher Davis (MS&T, Rolla, MO, USA)
Article 4
COBIT Evaluation as a Framework for Cloud Computing Governance (pages 65-82)
Yassine Bounagui (INPT, Rabat, Morocco), Hatim Hafiddi (IMS Team - SIME Lab., ENSIAS, Mohammed V University of Rabat, Morocco & ISL Team - STRS Lab., INPT, Rabat, Morocco), Abdellatif Mezrioui (INPT, Rabat, Morocco)
Article 5
Designing a Framework for Cloud Service Agreement for Cloud Environments (pages 83-96)
Akashdeep Bhardwaj (University of Petroleum and Energy Studies, Dehradun, India), Sam Goundar (CENTRUM, Graduate Business School, Pontificia Universidad Catolica Del Peru, Lima, Peru)
Article 6
A Secured Real Time Scheduling Model for Cloud Hypervisor (pages 97-110)
Rekha Kashyap (Inderprastha Engineering College, Ghaziabad, India), Deo Prakash Vidyarthi (School of Computer and System Sciences, Jawaharlal Nehru University, New Delhi, India)
Volume 5 (2015)
Issue 1
Article 1
Corner-Boundary Processor Allocation for 3D Mesh-Connected Multicomputers (pages 1-13)
Ismail M. Ababneh (Department of Computer Science, Al al-Bayt University, Mafraq, Jordan), Saad Bani-Mohammad (Department of Computer Science, Al al-Bayt University, Mafraq, Jordan), Motasem Al Smadi (Department of Computer Science, Al al-Bayt University, Mafraq, Jordan)
Article 2
HPC in Weather Forecast: Moving to the Cloud (pages 14-31)
André Monteiro (Department of Electronics, Telecommunications and Informatics, University of Aveiro, Aveiro, Portugal), Cláudio Teixeira (Department of Electronics, Telecommunications and Informatics, University of Aveiro, Aveiro, Portugal), Joaquim S. Pinto (Department of Electronics, Telecommunications and Informatics, University of Aveiro, Aveiro, Portugal)
Article 3
A Bounded Health Information Technology System Design Approach to Support Community-Based Care Delivery (pages 32-45)
Liam Peyton (School of Information Technology and Engineering, University of Ottawa, Ottawa, Canada), Jaspreet Bindra (Faculty of Graduate and Post Doctoral Studies, University of Ottawa, Ottawa, Canada), Aladdin Baarah (School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, Canada), Austin Chamney (Department of Computer Science, University of Ottawa, Ottawa, Canada), Craig Kuziemsky (Telfer School of Management, University of Ottawa, Ottawa, Canada)
Article 4
TrimCloud: An Analysis of a SaaS Hypervisor Solution to Traditional VDIs (pages 46-57)
Beatriz Gomez (Department of Computer Science, University of North Texas, Cedar Hill, TX, USA)
Article 5
Cloud Computing for Global Software Development: Opportunities and Challenges (pages 58-68)
Thamer Al-Rousan (Faculty of Science and Information Technology, Isra University, Amman, Jordan)
Article 6
Cloud Computing Technology Innovation Advances: A Set of Research Propositions (pages 69-76)
Vanessa Ratten (Department of Management, La Trobe University, Melbourne, Australia)
Issue 2
Article 1
Cost-Effective Resource Configurations for Multi-Tenant Database Systems in Public Clouds (pages 1-22)
Rizwan Mian (School of Computing, Queen's University, Kingston, Ontario, Canada), Patrick Martin (School of Computing, Queen's University, Kingston, Ontario, Canada), Farhana Zulkernine (School of Computing, Queen's University, Kingston, Ontario, Canada), Jose Luis Vazquez-Poletti (Departamento de Arquitectura de Computadores y Automatica, Universidad Complutense de Madrid, Madrid, Spain)
Article 2
BYOD and Governance of the Personal Cloud (pages 23-35)
Stuart Dillon (University of Waikato Management School, Hamilton, New Zealand), Florian Stahl (European Research Center for Information Systems, University of Münster, Münster, Germany), Gottfried Vossen (University of Waikato Management School, Hamilton, New Zealand & European Research Center for Information Systems, University of Münster, Münster, Germany)
Article 3
Database Sharding: To Provide Fault Tolerance and Scalability of Big Data on the Cloud (pages 36-52)
Sikha Bagui (Department of Computer Science, University of West Florida, Pensacola, FL, USA), Loi Tang Nguyen (Naval Education and Training, Development and Technology Center (NETPDTC), Pensacola, FL, USA)
Article 4
Cloud Computing: The Future of Big Data Management (pages 53-61)
Shimaa Ouf (Faculty of Commerce and Business Administration, Helwan University, Helwan, Egypt), Mona Nasr (Faculty of Computers and Information, Helwan University, Helwan, Egypt)
Article 5
Three Dimensional Hypercube Model and Mechanism: Optimizing the Risk on Real Time Operating System (pages 62-79)
Prashant Kumar Patra (Department of Computer Science and Engineering, Biju Patnaik University of Technology (BPUT), Bhubaneswar, India), Padma Lochan Pradhan (Department of Computer Science and Engineering, Central Institute of Technology, Naya Raipur, India)
Issue 3
Article 1
Page Ranking Validation using Cellular Automata in Cloud (pages 1-19)
Arnab Mitra (Department of Computer Science and Engineering, Adamas Institute of Technology, Kolkata, India & Innovation Research Lab (IRL), Howrah, India), Anirban Kundu (Information Technology Department, Netaji Subhash Engineering College, Kolkata, India & Innovation Research Lab (IRL), Howrah, India)
Article 2
Cloud Computing SaaS Paradigm for Efficient Modelling of Solar Features and Activities (pages 20-34)
Sofyan Mohammad Hayajneh (Electrical and Computer Engineering Department, Isra University, Amman, Jordan)
Article 3
Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes (pages 35-52)
Mohammed A. AlZain (College of Computers and Information Technology, Taif University, Ta'if, Saudi Arabia), Alice S. Li (La Trobe Business School, La Trobe University, Bundoora, Australia), Ben Soh (Department of Computer Science and Information Technology, La Trobe University, Bundoora, Australia), Eric Pardede (Department of Computer Science and Information Technology, La Trobe University, Bundoora, Australia)
Article 4
Agent based Resource Allocation Mechanism Focusing Cost Optimization in Cloud Computing (pages 53-61)
Aarti Singh (Maharishi Markendeshwar Institute of Computer Technology and Business Management, Maharishi Markandeshwar University, Haryana, India), Manisha Malhotra (Maharishi Markendeshwar Institute of Computer Technology and Business Management, Maharishi Markandeshwar University, Haryana, India)
Issue 4
Article 1
The Greening of Data Centers with Cloud Technology (pages 1-23)
Michael J. Pawlish (Department of Earth and Environmental Studies, Montclair State University, Montclair, NJ, USA), Aparna S. Varde (Department of Computer Science, Montclair State University, Montclair, NJ, USA), Stefan A. Robila (Department of Computer Science, Montclair State University, Montclair, NJ, USA)
Article 2
Evolution Impact on Architecture Stability in Open-Source Projects (pages 24-35)
Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia), Fakhry Khellah (Prince Sultan University, Riyadh, Saudi Arabia)
Article 3
CSCLab: A Cloud-Based Platform for Managing Computing Labs (pages 36-55)
Paula Prata (Instituto de Telecomunicações, University of Beira Interior, Covilha, Portugal), Samuel Alves (Instituto de Telecomunicações, University of Beira Interior, Covilha, Portugal)
Volume 4 (2014)
Issue 1
Article 1
Integration between Cloud Computing Benefits and Customer Relationship Management (CRM) Processes to Improve Organization's Performance (pages 1-14)
Sana'a Al-nsour (The World Islamic Sciences and Education University, Amman, Jordan), Haroun Alryalat (The World Islamic Sciences & Education University, Amman, Jordan), Samer Alhawari (The World Islamic Sciences and Education University, Amman, Jordan)
Article 2
Software-as-a-Service using Heterogeneous Distributed System for User Specific Applications (pages 15-32)
Anirban Kundu (Shenzhen Key Laboratory of Data Science and Modeling, Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, State Key Laboratory of Meta-RF Electromagnetic Modulation Technology, Kuang-Chi Institute of Advanced Technology, Shenzhen, China), Chunlin Ji (Shenzhen Key Laboratory of Data Science and Modeling, Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, State Key Laboratory of Meta-RF Electromagnetic Modulation Technology, Kuang-Chi Institute of Advanced Technology, Shenzhen, China), Ruopeng Liu (Shenzhen Key Laboratory of Data Science and Modeling, Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, State Key Laboratory of Meta-RF Electromagnetic Modulation Technology, Kuang-Chi Institute of Advanced Technology, Shenzhen, China)
Article 3
Resource Allocation in Cloud Computing Environment using AHP Technique (pages 33-44)
Anil Singh (National Institute of Technology, Hamirpur, India), Kamlesh Dutta (National Institute of Technology, Hamirpur, India), Avtar Singh (National Institute of Technology, Hamirpur, India)
Article 4
Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS) (pages 45-49)
Abdullah A. Alhaj (Faculty of Information Technology and Systems, The University of Jordan-Aqaba Branch, Aqaba, Jordan)
Article 5
Dynamic Dedicated Server Allocation for Service Oriented Multi-Agent Data Intensive Architecture in Biomedical and Geospatial Cloud (pages 50-62)
Sudhansu Shekhar Patra (KIIT University, Bhubaneswar, India), R. K. Barik (KIIT University, Bhubaneswar, India)
Article 6
Structural Analysis of Cloud Classifier (pages 63-75)
Anirban Kundu (Shenzhen Key Laboratory of Data Science and Modeling, Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, State Key Laboratory of Meta-RF Electromagnetic Modulation Technology, Kuang-Chi Institute of Advanced Technology, Shenzhen, China), Guanxiong Xu (Shenzhen Key Laboratory of Data Science and Modeling, Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, State Key Laboratory of Meta-RF Electromagnetic Modulation Technology, Kuang-Chi Institute of Advanced Technology, Shenzhen, China), Chunlin Ji (Shenzhen Key Laboratory of Data Science and Modeling, Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, State Key Laboratory of Meta-RF Electromagnetic Modulation Technology, Kuang-Chi Institute of Advanced Technology, Shenzhen, China)
Issue 2
Article 1
High-Throughput Encryption for Cloud Computing Storage System (pages 1-14)
Yaser Jararweh (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Ola Al-Sharqawi (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Nawaf Abdulla (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan), Lo'ai Tawalbeh (Computer Engineering Department, Jordan University of Science and Technology, Irbid, Jordan), Mohammad Alhammouri (Computer Science Department, Jordan University of Science and Technology, Irbid, Jordan)
Article 2
A Stable Matching Algorithm for VM Migration to Improve Energy Consumption and QOS in Cloud Infrastructures (pages 15-33)
Abdelaziz Kella (Department of Computer Science, Faculty of Exact and Applied Sciences, University of Oran, Oran, Algeria), Ghalem Belalem (Department of Computer Science, Faculty of Exact and Applied Sciences, University of Oran, Oran, Algeria)
Article 3
Performance Evaluation of Data Intensive Computing In the Cloud (pages 34-47)
Sanjay P. Ahuja (School of Computing, University of North Florida, Jacksonville, FL, USA), Bhagavathi Kaza (School of Computing, University of North Florida, Jacksonville, FL, USA)
Article 4
A Novel QoS-Based Framework for Cloud Computing Service Provider Selection (pages 48-72)
Maria Salama (British University in Egypt, Cairo, Egypt), Amir Zeid (American University of Kuwait, Safat, Kuwait), Ahmed Shawish (Ain Shams University, Cairo, Egypt), Xiaohong Jiang (Future University Hakodate, Hokkaido, Japan)
Article 5
Integration between Cloud Computing Benefits and Customer Relationship Management (CRM) Processes to Improve Organization's Performance (pages 73-86)
Sana'a Al-nsour (The World Islamic Sciences and Education University, Amman, Jordan), Haroun Alryalat (The World Islamic Sciences and Education University, Amman, Jordan), Samer Alhawari (The World Islamic Sciences and Education University, Amman, Jordan)
Issue 3
Article 1
Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage Services (pages 1-19)
Hadj Ahmed Bouarara (GeCoDe Laboratory, Department of Computer Science, University of Saida, Saïda, Algeria), Reda Mohamed Hamou (GeCoDe Laboratory, Department of Computer Science, University of Saida, Saïda, Algeria), Amine Rahmani (GeCoDe Laboratory, Department of Computer Science, University of Saida, Saïda, Algeria), Abdelmalek Amine (GeCoDe Laboratory, Department of Computer Science, University of Saida, Saïda, Algeria)
Article 2
Measures for Cloud Computing Effectiveness Assessment (pages 20-43)
Serdar Yarlikas (Department of Information Systems, Middle East Technical University, Ankara, Turkey), Semih Bilgen (Department of Electrical and Electronics Engineering, Middle East Technical University, Ankara, Turkey)
Article 3
Analysis on Cloud Classification using Accessibility (pages 44-53)
Anirban Kundu (Shenzhen Key Laboratory of Data Science and Modeling, Institute of Advanced Technology, Shenzhen, China), Guanxiong Xu (Guangdong Key Laboratory of Meta-RF Microwave Radio Frequency, Institute of Advanced Technology, Shenzhen, China), Chunlin Ji (State Key Laboratory of Meta-RF Electromagnetic Modulation Technology of Kuang-Chi, Institute of Advanced Technology, Shenzhen, China)
Article 4
A Governance Based Architecture for Enterprise Cloud Computing Adoption (pages 54-67)
Charafeddine El Houssaini (ENSIAS School, SIME Laboratory, IMS Team, Mohammed V University, Rabat, Morocco), Mahmoud Nassar (ENSIAS School, SIME Laboratory, IMS Team,Mohammed V University, Rabat, Morocco), Abdelaziz Kriouile (ENSIAS School, SIME Laboratory, IMS Team, Mohammed V University, Rabat, Morocco)
Article 5
Ranking Model for SLA Resource Provisioning Management (pages 68-80)
C. S. Rajarajeswari (Department of Computer Science, Indira Gandhi College of Arts and Science, Puducherry, India), M. Aramudhan (Department of Information Technology, Perunthalaivar Kamarajar Institute of Engineering and Technology, Karaikal, India)
Issue 4
Article 1
Cloud Adaptive Resource Allocation Mechanism for Efficient Parallel Processing (pages 1-6)
Manisha Malhotra (Chandigarh University, Gharuan, Mohali, India), Rahul Malhotra (Chandigarh University, Gharuan, Mohali, India)
Article 2
A Cloud-Based Environment for Collaborative Resources Management (pages 7-31)
Anna Goy (Department of Computer Science, University of Turin, Turin, Italy), Giovanna Petrone (Department of Computer Science, University of Turn, Turin, Italy), Marino Segnan (Department of Computer Science, University of Turin, Turin, Italy)
Article 3
Data Specific Ranking in Cloud (pages 32-41)
Anirban Kundu (Shenzhen Key Laboratory of Transformation Optics and Spatial Modulation, Kuang-Chi Institute of Advanced Technology, Shenzhen, China), Guanxiong Xu (Shenzhen Key Laboratory of Transformation Optics and Spatial Modulation, Kuang-Chi Institute of Advanced Technology, Shenzhen, China), Chunlin Ji (Shenzhen Key Laboratory of Transformation Optics and Spatial Modulation, Kuang-Chi Institute of Advanced Technology, Shenzhen, China)
Article 4
Two Factor Authentication using M-pin Server for Secure Cloud Computing Environment (pages 42-54)
Nitin Nagar (International Institute of Professional Studies, Devi Ahiliya University, Indore, India), Ugrasen Suman (School of Computer Science and Information Technology, Devi Ahiliya University, Indore, India)
Article 5
Energy Efficient VM Live Migration and Allocation at Cloud Data Centers (pages 55-63)
Djouhra Dad (Department of Computer Science, University of Oran 1, Ahmed Ben Bella, Oran, Algeria), Djamel Eddine Yagoubi (Department of Computer Science, University of Oran 1, Ahmed Ben Bella, Oran, Algeria), Ghalem Belalem (Department of Computer Science, University of Oran 1, Ahmed Ben Bella, Oran, Algeria)
Volume 3 (2013)
Issue 1
Article 1
A Value Based Dynamic Resource Provisioning Model in Cloud (pages 1-12)
Sandeep K. Sood (Department of Computer Science & Engineering, Guru Nanak Dev University, Regional Campus Gurdaspur, Amritsar, Punjab, India)
Article 2
Empirical Performance Analysis of HPC Benchmarks Across Variations in Cloud Computing (pages 13-26)
Sanjay P. Ahuja (School of Computing, University of North Florida, Jacksonville, FL, USA), Sindhu Mani (School of Computing, University of North Florida, Jacksonville, FL, USA)
Article 3
Intelligent Randomize Round Robin for Cloud Computing (pages 27-33)
Muneer O. Bani Yassein (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan), Yaser M. Khamayseh (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan), Ali M. Hatamleh (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan)
Article 4
A Secure Data Transmission Mechanism for Cloud Outsourced Data (pages 34-43)
Abdullah Alhaj (Faculty of Information Technology, University of Jordan/Aqaba, Aqaba, Jordan), Shadi Aljawarneh (Faculty of Information Technology, Isra University, Amman, Jordan), Shadi Masadeh (Department of Computer Science, Al-Hussein Bin Talal University, Ma’an, Jordan), Evon Abu-Taieh (Faculty of Information Technology, University of Jordan/Aqaba, Aqaba, Jordan)
Article 5
Optimal Resource Usage in Multi-Cloud Computing Environment (pages 44-57)
Veena Goswami (School of Computer Applications, KIIT University, Bhuhbaneswar, Odisha, India), Choudhury Nishkanta Sahoo (School of Computer Applications, KIIT University, Bhuhbaneswar, Odisha, India)
Article 6
Developing an Elastic Cloud Computing Application through Multi-Agent Systems (pages 58-64)
Ali Reza Honarvar (Department of Computer Engineering, Islamic Azad University, Safashahr Branch, Safashahr, Fars, Iran)
Issue 2
Article 1
Economy Based Resource Allocation in IaaS Cloud (pages 1-11)
Hemant Kumar Mehta (School of Computer Science and IT, Devi Ahilya University, Indore, Madhya Pradesh, India), Eshan Gupta (Department of Computer Science and Engineering, Institute of Professional Studies College of Technology & Management, Gwalior, Madhya Pradesh, India)
Article 2
A Generic, Cloud-Based Representation for Supply Chains (SC’s) (pages 12-20)
Goknur Arzu Akyuz (Department of Industrial Engineering, Atilim University, Ankara, Turkey), Mohammad Rehan (Department of Information Systems Engineering, Atilim University, Ankara, Turkey)
Article 3
A Comparative Cost Analysis of on Premises IT Infrastructure and Cloud-Based Email Services in an Indian Business School (pages 21-34)
Sumedha Chauhan (Management Development Institute (MDI), Gurgaon, Haryana, India), Aparna Raman (Management Development Institute (MDI), Gurgaon, Haryana, India), N.P. Singh (Management Development Institute (MDI), Gurgaon, Haryana, India)
Article 4
A Value Based Dynamic Resource Provisioning Model in Cloud (pages 35-46)
Sandeep K. Sood (Department of Computer Science & Engineering, Guru Nanak Dev University Regional Campus, Gurdaspur, Punjab, India)
Article 5
Virtual Machine Allocation in Cloud Computing Environment (pages 47-60)
Absalom E. Ezugwu (Department of Computer Science, Faculty of Science, Federal University Lafia, Lafia, Nasarawa State, Nigeria), Seyed M. Buhari (Department of Computer Science, Faculty of Science, Universiti Brunei Darussalam, Gadong, Brunei), Sahalu B. Junaidu (Department of Mathematics, Faculty of Science, Ahmadu Bello University, Zaria, Kaduna State, Nigeria)
Article 6
New Media Cloud Computing: Opportunities and Challenges (pages 61-72)
P. Sasikala (Department of New Media Technology, Makhanlal Chaturvedi National University of Journalism and Communication, Bhopal, Madhya Pradesh, India)
Issue 3
Article 1
The Architecture and Analysis of a New Cloud Collaborative Commerce Model (pages 1-19)
Hussein Al-Bahadili (Faculty of Information Technology, University of Petra, Amman, Jordan), Awad Al-Sabbah (Faculty of Information Technology, Middle-East University, Amman, Jordan), Mohammed Abu Arqoub (Faculty of Information Technology, University of Petra, Amman, Jordan)
Article 2
Performance Evaluation of Online Backup Cloud Storage (pages 20-33)
Xiao Zhang (School of Computer Science, Northwestern Polytechnical University, Xi’an, China), WenXiong Feng (School of Computer Science, Northwestern Polytechnical University, Xi’an, China), Xiao Qin (Department of Computer Science and Software Engineering, Auburn University, Auburn, AL, USA)
Article 3
A Novel Cloud-Based Multi-Tenancy Architecture with Efficient Hybrid Authentication Mechanism for Enhanced Security and Resource Optimization (pages 34-49)
Elhadj Benkhelifa (Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK), Dayan Abishek Fernando (Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK), Thomas Welsh (Faculty of Computing, Engineering and Sciences, Staffordshire University, Stoke-on-Trent, UK)
Article 4
Hybrid Data Security Model for Cloud (pages 50-59)
Sandeep K. Sood (Department of Computer Science & Engineering, Guru Nanak Dev University Regional Campus, Gurdaspur, Punjab, India)
Issue 4
Article 1
Cloud Computing Deployment and Selection Criteria for Organizations (pages 1-12)
Mahsa Paknezhad (Department of Computer Engineering and IT, Shiraz University of Technology, Shiraz, Iran), Manijeh Keshtgary (Department of Computer Engineering and IT, Shiraz University of Technology, Shiraz, Iran)
Article 2
Implementation of User-End Broker Policy to Improve the Reliability of Cloud Services (pages 13-27)
Jitendra Singh (University of Delhi, New Delhi, India), Vikas Kumar (Society for Education & Research Development, Yamunanagar, Haryana, India)
Article 3
Securing Data Storage By Extending Role-Based Access Control (pages 28-37)
Mamoon Rashid (Department of Computer Science Engineering, Ramgharia Institute of Engineering and Technology, Phagwara, Punjab, India), Er. Rishma Chawla (Department of Computer Science Engineering, Ramgharia Institute of Engineering and Technology, Phagwara, Punjab, India)
Article 4
A Context-Based Performance Enhancement Algorithm for Columnar Storage in MapReduce with Hive (pages 38-50)
Yashvardhan Sharma (Department of Computer Science and Information Systems, Birla Institute of Technology and Science, Pilani, India), Saurabh Verma (Department of Computer Science and Information Systems, Birla Institute of Technology and Science, Pilani, India), Sumit Kumar (Department of Computer Science and Information Systems, Birla Institute of Technology and Science, Pilani, India), Shivam U. (Department of Computer Science and Information Systems, Birla Institute of Technology and Science, Pilani, India)
Article 5
A Proposed Model for Using Cloud Computing and Web2.0 in Deploying E-Learning Ecosystem (ELES) (pages 51-80)
Yehia Helmy (Faculty of Commerce & Business Administration, Helwan University, Helwan, Egypt), Mona Nasr (Faculty of Computers & Information, Helwan University, Helwan, Egypt), Shimaa Ouf (Faculty of Computers & Information, Helwan University, Helwan, Egypt)
Article 6
Empirical Performance Assessment of Public Clouds Using System Level Benchmarks (pages 81-91)
Sanjay P. Ahuja (School of Computing, University of North Florida, Jacksonville, FL, USA), Thomas F. Furman (University of North Florida, Jacksonville, FL, USA), Kerwin E. Roslie (University of North Florida, Jacksonville, FL, USA), Jared T. Wheeler (University of North Florida, Jacksonville, FL, USA)
Volume 2 (2012)
Issue 1
Article 1
Model Based Monitoring and Controlling for Platform-as-a-Service (PaaS) (pages 1-15)
Jin Shao (Peking University, China), Qianxiang Wang (Peking University, China), Hong Mei (Peking University, China)
Article 2
Business Integration as a Service (pages 16-40)
Victor Chang (Aston University, UK), Robert John Walters (University of Southampton, UK), Gary Wills (University of Southampton, UK)
Article 3
A Heuristic Meta Scheduler for Optimal Resource Utilization and Improved QoS in Cloud Computing Environment (pages 41-52)
R. Jeyarani (Coimbatore Institute of Technology, India), N. Nagaveni (Coimbatore Institute of Technology, India)
Article 4
MeghaOS: A Framework for Scalable, Interoperable Cloud Based Operating System (pages 53-70)
K. G. Srinivasa (M. S. Ramaiah Institute of Technology, India), Harish RaddiC. S. (M. S. Ramaiah Institute of Technology, India), Mohan KrishnaS. H. (M S. Ramaiah Institute of Technology, India), Nidhi Venkatesh (M. S. Ramaiah Institute of Technology, India)
Article 5
Analysis for REPERA: A Hybrid Data Protection Mechanism in Distributed Environment (pages 71-82)
Longbin Lai (Shanghai Jiao Tong University, China), Linfeng Shen (IBM China Development Lab, China), Yanfei Zheng (Shanghai Jiao Tong University, China), Kefei Chen (Shanghai Jiao Tong University, China), Jing Zhang (Shanghai Jiao Tong University, China)
Issue 2
Article 1
Article 2
Proportional Allocation of Resources on Shared Ring Buffer for Virtualization (pages 12-30)
Wenzhi Cao (Huazhong University of Science and Technology, China), Hai Jin (Huazhong University of Science and Technology, China), Xia Xie (Huazhong University of Science and Technology, China)
Article 3
An Enterprise Mashup Integration Service Framework for Clouds (pages 31-40)
Siddesh G. M. (Jawaharlal Nehru Technological University Hyderabad and M. S. Ramaiah Institute of Technology, India), Srinivasa K. G. (M. S. Ramaiah Institute of Technology, India)
Article 4
Cloud Computing Paradigm for Indian Education Sector (pages 41-47)
Vijayalakshmi Ravi (SIES - Arts, Science & Commerce (Nerul), and Jagdishprasad Jhabarmal Tibrewala University, India)
Article 5
Article 6
A Study of Cloud Computing for Retinal Image Processing Through MATLAB (pages 59-69)
S. K. Maharana (MVJ College of Engineering, India), Ganesh Prabhakar P. (MVJ College of Engineering, India), Amit Bhati (MVJ College of Engineering, India)
Issue 3
Article 1
A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing (pages 1-25)
P. Syam Kumar (Pondicherry University, India), Marie Stanislas Ashok (Pondicherry University, India), R. Subramanian (Pondicherry University, India)
Article 2
Performance Evaluation of Hypervisors for Cloud Computing (pages 26-67)
Sanjay P. Ahuja (University of North Florida, USA), Suganya Sridharan (University of North Florida, USA)
Article 3
Cloud Computing: Locally Sub-Clouds instead of Globally One Cloud (pages 68-85)
Nawsher Khan (Universiti Malaysia Pahang, Malaysia), Noraziah Ahmad (Universiti Malaysia Pahang, Malaysia), Tutut Herawan (University Ahmad Dahlan, Indonesia), Zakira Inayat (University of Engineering & Technology, Peshawar, Pakistan)
Article 4
Optimal Management of Cloud Centers with Different Arrival Modes for Cloud Computing Environment (pages 86-97)
Veena Goswami (KIIT University, India), Sudhansu Shekhar Patra (KIIT University, India), G. B. Mund (KIIT University, India)
Article 5
Neighbor-Replica Distribution Technique Model for Availability Prediction in Distributed Interdependent Environment (pages 98-109)
Ahmad Shukri Mohd Noor (Universiti Malaysia Terengganu, Malaysia), Tutut Herawan (Tutut Herawan, Universitas Ahmad Dahlan, Indonesia), Mustafa Mat Deris (Universiti Tun Hussein Onn, Malaysia)
Issue 4
Article 1
Cloud Computing in Local Government: From the Perspective of Four London Borough Councils (pages 1-15)
Jeffrey Chang (Faculty of Business, London South Bank University, London, UK), Mark Johnston (Metropolitan Police Service, Kent, UK)
Article 2
Power and Performance Management of GPUs Based Cluster (pages 16-31)
Yaser Jararweh (Department of Computer Science, Jordan University of Science and Technology, Irbid, Jordan), Salim Hariri (Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ, USA)
Article 3
Cloud Computing and E-Governance: Advances, Opportunities and Challenges (pages 32-52)
P. Sasikala (Department of New Media Technology, Makhanlal Chaturvedi National University of Journalism and Communication, Bhopal, India)
Article 4
Performance Analysis of Cloud Computing Centers for Bulk Services (pages 53-65)
Veena Goswami (School of Computer Application, KIIT University, Bhubaneswar, India), Sudhansu Shekhar Patra (School of Computer Application, KIIT University, Bhubaneswar, India), G. B. Mund (School of Computer Engineering, KIIT University, Bhubaneswar, India)
Volume 1 (2011)
Issue 1
Article 1
An Abstract Model for Integrated Intrusion Detection and Severity Analysis for Clouds (pages 1-16)
Junaid Arshad (University of Leeds, UK), Paul Townend (University of Leeds, UK), Jie Xu (University of Leeds, UK)
Article 2
Energy-Efficiency in Cloud Computing Environments: Towards Energy Savings without Performance Degradation (pages 17-33)
Ismael Solis Moreno (University of Leeds, UK), Jie Xu (University of Leeds, UK)
Article 3
The Challenge of Service Level Scalability for the Cloud (pages 34-44)
Luis M. Vaquero (Telefónica Investigación y Desarrollo, Spain), Juan Cáceres (Telefónica, Spain), Daniel Morán (Universidad Nacional de Educación a Distancia, Spain)
Article 4
Beyond Hadoop: Recent Directions in Data Computing for Internet Services (pages 45-61)
Zhiwei Xu (Chinese Academy of Sciences, China), Bo Yan (Chinese Academy of Sciences, China), Yongqiang Zou (Tencent Research, China)
Article 5
SaaS Multi-Tenancy: Framework, Technology, and Case Study (pages 62-77)
Hong Cai (IBM China Software Development Lab, China), Berthold Reinwald (IBM Almaden Research Center, USA), Ning Wang (IBM China Software Development Lab, China), Chang Jie Guo (IBM China Research Lab, China)
Issue 2
Article 1
Cloud Computing in Higher Education: Opportunities and Issues (pages 1-13)
P. Sasikala (Makhanlal Chaturvedi National University of Journalism and Communication, India)
Article 2
Using Free Software for Elastic Web Hosting on a Private Cloud (pages 14-28)
Roland Kübert (University of Stuttgart, Germany), Gregory Katsaros (University of Stuttgart, Germany)
Article 3
Applying Security Policies in Small Business Utilizing Cloud Computing Technologies (pages 29-40)
Louay Karadsheh (ECPI University, USA), Samer Alhawari (Applied Science Private University, Jordan)
Article 4
The Financial Clouds Review (pages 41-63)
Victor Chang (Aston University, UK), Chung-Sheng Li (PwC, San Jose, CA), David De Roure (University of Oxford, UK), Gary Wills (University of Southampton, UK), Robert John Walters (University of Southampton, UK), Clinton Chee (Commonwealth Bank, Australia)
Article 5
Cloud Security Engineering: Avoiding Security Threats the Right Way (pages 64-70)
Shadi Aljawarneh (Isra University, Jordan)
Issue 3
Article 1
Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities (pages 1-11)
Kamal Dahbur (New York Institute of Technology, Jordan), Bassil Mohammad (New York Institute of Technology, Jordan), Ahmad Bisher Tarakji (New York Institute of Technology, Jordan)
Article 2
Cloud Computing Applied for Numerical Study of Thermal Characteristics of SIP (pages 12-21)
S. K. Maharana (MVJ College of Engineering, Bangalore, India), Praveen B. Mali (MVJ College of Engineering, Bangalore, India), Ganesh Prabhakar (MVJ College of Engineering, Bangalore, India), Sunil J (MVJ College of Engineering, Bangalore, India), Vignesh Kumar (MVJ College of Engineering, Bangalore, India)
Article 3
Toward Understanding the Challenges and Countermeasures in Computer Anti-Forensics (pages 22-35)
Kamal Dahbur (New York Institute of Technology, Jordan), Bassil Mohammad (New York Institute of Technology, Jordan)
Article 4
Power Aware Meta Scheduler for Adaptive VM Provisioning in IaaS Cloud (pages 36-51)
R. Jeyarani (Coimbatore Institute of Technology, India), N. Nagaveni (Coimbatore Institute of Technology, India), Satish Kumar Sadasivam (IBM Systems and Technology Group, India), Vasanth Ram Rajarathinam (PSG College of Technology, India)
Article 5
Custom-Made Cloud Enterprise Architecture for Small Medium and Micro Enterprises (pages 52-63)
Promise Mvelase (CSIR Meraka Institute, South Africa), Nomusa Dlodlo (CSIR Meraka Institute, South Africa), Quentin Williams (CSIR Meraka Institute, South Africa), Matthew O. Adigun (University of Zululand, South Africa)
Issue 4
Article 1
Architectural Strategies for Green Cloud Computing: Environments, Infrastructure and Resources (pages 1-24)
P. Sasikala (Makhanlal Chaturvedi National University of Journalism and Communication, India)
Article 2
A Framework for Analysing the Impact of Cloud Computing on Local Government in the UK (pages 25-33)
Jeffrey Chang (London South Bank University, UK)
Article 3
Survey of the State-of-the-Art of Cloud Computing (pages 34-43)
Sanjay P. Ahuja (University of North Florida, USA), Alan C. Rolli (University of North Florida, USA)
Article 4
Cloud Computing Towards Technological Convergence (pages 44-59)
P. Sasikala (Makhanlal Chaturvedi National University of Journalism and Communication, India)
Article 5
Fault Tolerant Architecture to Cloud Computing Using Adaptive Checkpoint (pages 60-69)
Ghalem Belalem (University of Oran (Es Senia), Algeria), Said Limam (University of Oran (Es Senia), Algeria)