|
|
|
Vivek Kumar Prasad, Debabrata Dansana, Madhuri D. Bhavsar, Biswaranjan Acharya, Vassilis C. Gerogiannis and Andreas Kanavos
With the proliferation of IoT devices, there has been exponential growth in data generation, placing substantial demands on both cloud computing (CC) and internet infrastructure. CC, renowned for its scalability and virtual resource provisioning, is of p...
ver más
|
|
|
|
|
|
|
Bashar Igried, Atalla Fahed Al-Serhan, Ayoub Alsarhan, Mohammad Aljaidi and Amjad Aldweesh
A successful cloud trading system requires suitable financial incentives for all parties involved. Cloud providers in the cloud market provide computing services to clients in order to perform their tasks and earn extra money. Unfortunately, the applicat...
ver más
|
|
|
|
|
|
|
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it...
ver más
|
|
|
|
|
|
|
Husam Suleiman
Cloud?fog computing is a large-scale service environment developed to deliver fast, scalable services to clients. The fog nodes of such environments are distributed in diverse places and operate independently by deciding on which data to process locally ...
ver más
|
|
|
|
|
|
|
Pejman Goudarzi, Mehdi Hosseinpour, Roham Goudarzi and Jaime Lloret
Cloud computing leads to efficient resource allocation for network users. In order to achieve efficient allocation, many research activities have been conducted so far. Some researchers focus on classical optimisation theory techniques (such as multi-obj...
ver más
|
|
|
|
|
|
|
Moses Moyo and Marianne Loock
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 S...
ver más
|
|
|
|
|
|
|
Parinya Suwansrikham, She Kun, Shaukat Hayat and Jehoiada Jackson
Due to the advancement of technology, devices generate huge working files at a rapid rate. These data, which are of considerable scale and are created very fast, can be called big data. Keeping such files in one storage device is impossible. Therefore, a...
ver más
|
|
|
|
|
|
|
Lisa Muller, Christos Chrysoulas, Nikolaos Pitropakis and Peter J. Barclay
The shift towards microservisation which can be observed in recent developments of the cloud landscape for applications has led towards the emergence of the Function as a Service (FaaS) concept, also called Serverless. This term describes the event-drive...
ver más
|
|
|
|
|
|
|
Altino M. Sampaio and Jorge G. Barbosa
Cloud provider Amazon Elastic Compute Cloud (EC2) gives access to resources in the form of virtual servers, also known as instances. EC2 spot instances (SIs) offer spare computational capacity at steep discounts compared to reliable and fixed price on-de...
ver más
|
|
|
|
|
|
|
Loretta Mastroeni, Alessandro Mazzoccoli and Maurizio Naldi
Service Level Agreements are employed to set availability commitments in cloud services. When a violation occurs as in an outage, cloud providers may be called to compensate customers for the losses incurred. Such compensation may be so large as to erode...
ver más
|
|
|
|