[1]
|
National Institute of Standard and US Department of Commerce Technology, “The NIST Definition of Cloud Computing,” 12 October 2012.
http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
|
[2]
|
B. Kitchenham, “Procedures for Performing Systematic Reviews”, Technical Report TR/SE-0401, Keele University, Lyme, and Technical Report 0400011T.1, NICTA, 2004.
|
[3]
|
A. Greenberg, J. Hamilton, D. A. Maltz and P. Patel, “The Cost of a Cloud: Research Problems in Data Center Networks,” SIGCOMM Computer Communication Review, Vol. 39, No. 1, 2008, pp. 68-73.
doi:10.1145/1496091.1496103
|
[4]
|
H. Lim, S. Babu, J. Chase and S. Parekh, “Automated Control in Cloud Computing: Challenges and Opportunities,” Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds, New York, 19 June 2009, pp. 13-18. doi:10.1145/1555271.1555275
|
[5]
|
A. Khalid and H. Mujtaba, “Data Processing Issues in Cloud Computing,” Proceedings of the 2nd International Conference on Machine Vision (ICMV '09), Dubai, 28-30 December 2009, pp. 301-304.
|
[6]
|
D. Bernstein and E. Ludvigson, “Networking Challenges and Resultant Approaches for Large Scale Cloud Construction,” Proceedings of the 2009 Workshops at the Grid and Pervasive Computing Conference (GPC '09), 4-8 May 2009, Geneva, pp. 136-142.
|
[7]
|
H. J. La, S. W. Choi and S. D. Kim, “Technical Challenges and Solution Space for Developing SaaS and Mash-Up Cloud Services,” Proceedings of the 2009 IEEE International Conference on e-Business Engineering (IC-EBE '09), Macau, 21-23 October 2009, pp. 359-364.
|
[8]
|
R. Buyya, R. Ranjan and R. N. Calheiros, “Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities,” International Conference on High Performance Computing & Simulation, HPCS '09, Leipzig, 21-24 June 2009, pp. 1-11
|
[9]
|
H. Motahari Nezhad, B. Stephenson and S. Singhal, “Outsourcing Business to Cloud Computing Services: Opportunities and Challenges,” IEEE Internet Computing, Special Issue on Cloud Computing, 6 February 2009.
http://www.hpl.hp.com/techreports/2009/HPL-2009-23.html
|
[10]
|
L. Gu and S.-Ch. Cheung, “Constructing and Testing Privacy-Aware Services in a Cloud Computing Environment: Challenges and Opportunities,” Proceedings of the First Asia-Pacific Symposium on Internetware (Internetware '09), Beijing, 15-16 October 2009.
|
[11]
|
M. Jensen, J. Schwenk, N. Gruschka and L. Iacono, “On Technical Security Issues in Cloud Computing,” Proceedings of the 2009 IEEE International Conference on Cloud Computing (CLOUD '09), Bangalore, 21-25 September 2009, pp. 109-116.
|
[12]
|
B. R. Kandukuri, V. R. Paturi and A. Rakshit, “Cloud Security Issues,” IEEE International Conference on Services Computing, Bangalore, 21-25 September 2009, pp. 517-520.
|
[13]
|
W. Kim, S. D. Kim, E. Lee and S. Y. Lee, “Adoption Issues for Cloud Computing,” Proceedings of the 11th International Conference on Information Integration and Web-Based Applications & Services (iiWAS '09), 14-16 December 2009, Kuala, pp. 3-6.
|
[14]
|
L. J. Mei, Z. Y. Zhang and W. K. Chan, “More Tales of Clouds: Software Engineering Research Issues from the Cloud Application Perspective,” Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC '09), Seattle, 20-24 July 2009, pp. 525-530.
|
[15]
|
Q. Zhang, L. Cheng and R. Boutaba, “Cloud Computing: State-of-the-Art and Research Challenges,” Journal of Internet Services and Applications, Vol. 1, No. 1, 2010, pp. 7-18. doi:10.1007/s13174-010-0007-6
|
[16]
|
D. Agrawal, A. El Abbadi, S. Antony and S. Das, “Data Management Challenges in Cloud Computing Infrastructures,” Proceedings of the 6th International Conference on Databases in Networked Information Systems (DNIS' 10), Aizu-Wakamatsu, 29-31 March 2010, pp. 1-10.
|
[17]
|
M. A. Sakka, B. Defude and J. Tellez, “Document Provenance in the Cloud: Constraints and Challenges,” Proceedings of the 16th EUNICE/IFIP WG 6.6 Conference on Networked Services and Applications: Engineering, Control and Management (EUNICE'10), Trondheim, 20-30 June 2010, pp. 107-117.
|
[18]
|
P. Goyal, “Enterprise Usability of Cloud Computing Environments: Issues and Challenges,” Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE '10), Larissa, 28-30 June 2012, pp. 54-59.
|
[19]
|
H. Chang and E. Choi, “Challenges and Security in Cloud Computing,” Communication and Networking, Communications in Computer and Information Science, Vol. 120, 2010, pp. 214-217.
|
[20]
|
G. L. Myoungand N. Crespi, “Shaping Future Service Environments with the Cloud and Internet of Things: Networking Challenges and Service Evolution,” Proceedings of the 4th International Conference on Leveraging Applications of Formal Methods, Verification, and Validation, Amirandes, 18-20 October 2010, pp. 399-410.
|
[21]
|
J. Q. Tan, X. H. Pan, E. Marinelli, S. Kavulya, R. Gandhi and P. Narasimhan, “Kahuna: Problem Diagnosis for Mapreduce-Based Cloud Computing Environments,” IEEE Network Operations and Management Symposium (NOMS), Osaka, 19-23 April 2010, pp. 112-119.
|
[22]
|
Z. Yusoh and M. Tang, “A Penalty-Based Genetic Algorithm for the Composite SaaS Placement Problem in the Cloud,” Proceeding of the 2010 IEEE World Congress on Computational Intelligence, Barcelona, 18 - 23 July 2010, pp. 600-607.
|
[23]
|
Z. I. M. Yusoh and M. L. Tang, “A Cooperative Coevolutionary Algorithm for the Composite SaaS Placement Problem in the Cloud,” Proceedings of the 17th International Conference on Neural Information Processing: Theory and Algorithms (ICONIP'10), Sydney, 9 March 2010, pp. 618-625.
|
[24]
|
Y. Pan, S. Maini and E. Blevis, “Framing the Issues of Cloud Computing & Sustainability: A Design Perspective,” Proceedings of the IEEE 2nd International Conference on Cloud Computing Technology and Science (CLOUDCOM '10), Indianapolis, 30 November -3 December 2010, pp. 603-608.
|
[25]
|
M. Mathur, “Elucidation of Upcoming Traffic Problems in Cloud Computing,” Recent Trends in Networks and Communications, Communications in Computer and Information Science, Vol. 90, 2010, pp. 68-79.
|
[26]
|
A. Khalid, “Cloud Computing: Applying Issues in Small Business,” International Conference on Signal Acquisition and Processing, Bangalore, 9-10 February 2010, pp. 278-281. doi:10.1109/ICSAP.2010.78
|
[27]
|
Y. Wei and M. Blake, “Service-Oriented Computing and Cloud Computing: Challenges and Opportunities,” IEEE Internet Computing, Vol. 14, No. 6, 2012, pp. 72-75.
doi:10.1109/MIC.2010.147
|
[28]
|
P. Mathur and N. Nishchal, “Cloud Computing: New Challenge to the Entire Computer Industry,” 1st International Conference on Parallel Distributed and Grid Computing (PDGC), Solan, 28 - 30 October 2010, pp. 223-228.
|
[29]
|
L. M. Kaufman, “Can Public-Cloud Security Meet Its Unique Challenges?” IEEE Security & Privacy, Vol. 8, No. 4, 2010, pp. 55-57. doi:10.1109/MSP.2010.120
|
[30]
|
C. Tsai, U. Lin, A. Chang and C. Chen, “Information Security Issue of Enterprises Adopting the Application of Cloud Computing,” 6th International Conference on Networked Computing and Advanced Information Management (NCM), Seoul, 16-18 August 2010, pp. 645-649.
|
[31]
|
A. Kim, J. McDermott and M. Kang, “Security and Architectural Issues for National Security Cloud Computing,” Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops, Genova, 21-25 June 2010, pp. 21-25.
|
[32]
|
D. Wyld, “Risk in the Clouds? Security Issues Facing Government Use of Cloud Computing,” Innovations in Computing Sciences and Software Engineering, Cape Town, 5 May 2010, pp. 7-12.
doi:10.1007/978-90-481-9112-3_2
|
[33]
|
S. Ahmed and M. Y. A. Raja, “Tackling Cloud Security Issues and Forensics Model,” High-Capacity Optical Networks and Enabling Technologies (HONET), Cairo, 19- 21 December 2010, pp. 190-195.
|
[34]
|
R. E. Johnson, “Cloud Computing Security Challenges and Methods to Remotely Augment a Cloud’s Security Posture,” 2010 International Conference on Information Society (i-Society), London, 28-30 June 2010, pp. 179-181.
|
[35]
|
P. Kresimir and H. Zeljko, “Cloud Computing Security Issues and Challenges,” MIPRO, Proceedings of the 33rd International Convention, Opatijapp, 24-28 May 2010, pp. 344-349.
|
[36]
|
B. Grobauer and T. Schreck, “Towards Incident Handling in the Cloud: Challenges and Approaches,” Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, Chicago, 4-8 October 2010, pp. 77-86.
doi:10.1145/1866835.1866850
|
[37]
|
H. Takabi, J. Joshi and G. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security and Privacy, Vol. 8, No. 6, 2010, pp. 24-31.
doi:10.1109/MSP.2010.186
|
[38]
|
T. Dillon, C. Wu and E. Chang, “Cloud Computing: Issues and Challenges,” 24th IEEE International Conference on Advanced Information Networking and Applications (AINA), Perth, 20-23 April 2010, pp. 27-33.
|
[39]
|
J. F. Yang and Z. B. Chen, “Cloud Computing Research and Security Issues,” International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan, 10-12 December 2010, pp. 1-3.
|
[40]
|
S. Pearson and A. Benameur, “Privacy, Security and Trust Issues Arising from Cloud Computing,” IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, 30 November - 3 December 2010, pp. 693-702.
doi:10.1109/CloudCom.2010.66
|
[41]
|
L. Riungu, O. Taipale and K. Smolander, “Research Issues for Software Testing in the Cloud,” Proceedings of the 2010 IEEE Second International Conference on Cloud Computing Technology and Science, Indianapolis, 30 November - 3 December 2010, pp. 557-564.
|
[42]
|
T. Forell, D. Milojicic and V. Talwar, “Cloud Management: Challenges and Opportunities,” IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum, Anchorage 16-20 May 2011, pp. 881-889.
|
[43]
|
K. Yang and X. Jia, “Data Storage Auditing Service in Cloud Computing: Challenges, Methods and Opportunities,” World Wide Web, Vol. 15, No. 4, 2012, pp. 409-428.
doi:10.1007/s11280-011-0138-0
|
[44]
|
B. Suleiman, S. Sakr, R. Jeffrey and A. Liu, “On Understanding the Economics and Elasticity Challenges of Deploying Business Applications on Public Cloud Infrastructure,” Internet Services and Applications, 2012, in press.
|
[45]
|
K. Wakunuma, B. Stahl and V. Ikonen, “Cloud Computing as an Emerging Technology and Its Associated Ethical Issues: Experiences That May Be Shared between Europe and Africa,” IST-Africa Conference Proceedings, Botswana, 11-13 May 2011, pp. 1-10.
|
[46]
|
H. Mi, H. Wang, G. Yin, H. Cai, Q. Zhou, T. Sun and Y. Zhou, “Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems,” IEEE International Conference on Services Computing (SCC), Washington DC, 4-9 July 2011, pp. 418-425.
|
[47]
|
H. Mi, H. Wang, G. Yin, H.Cai, Q. Zhou, and T. Sun. 2011. Performance problems online detection in cloud computing systems via analyzing request execution paths. Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshop, Hong Kong, 27-30 June 2011, pp. 135-139.
|
[48]
|
B. Radojevic and M. Zagar, “Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments,” MIPRO, 2011 Proceedings of the 34th International Convention, Opatija, 23-27 May 2011, pp. 416-420.
|
[49]
|
T. Kusaka, T. Okuda, T. Ideguchi and X. Tian, “Queuing Theoretic Approach to Server Allocation Problem in Time-Delay Cloud Computing Systems,” Proceedings of the 23rd International Teletraffic Congress, San Francisco, 6-8 September 2011, pp. 310-311.
|
[50]
|
X. Sun, B. Gao, Y. Zhang, W. An, H. Cao, C. Guo and W. Sun, “Towards Delivering Analytical Solutions in Cloud: Business Models and Technical Challenges,” Proceedings of the 2011 IEEE 8th International Conference on e-Business Engineering (ICEBE '11), Beijing, 19-21 October, 2011, pp. 347-351.
|
[51]
|
S. S. Qureshi, T. Ahmad, K. Rafique and Shuja-ul-islam, “Mobile Cloud Computing as Future for Mobile Applications: Implementation Methods and Challenging Issues,” IEEE International Conference on Cloud Computing and Intelligence Systems, Beijing, 15-17 September 2011, pp. 467-471. doi:10.1109/CCIS.2011.6045111
|
[52]
|
S. Pohorec and M. Zorman, “The Challenges of the Move from the Desktop to the Cloud,” Proceedings of the ITI 33rd International Conference on Information Technology Interfaces (ITI), Cavtat, 27-30 June 2011, pp. 119-124.
|
[53]
|
J. O. Fito and J. Guitart, “Initial Thoughts on Business-Driven IT Management Challenges in Cloud Computing Providers,” IFIP/IEEE International Symposium on Integrated Network Management (IM), Dublin, 23-27 May 2011, pp. 1070-1073
|
[54]
|
R. Buyya, S. Garg and R. Calheiros, “SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions,” Proceedings of the 2011 International Conference on Cloud and Service Computing, Hong Kong, 12-14 December 2011, pp. 1-10.
|
[55]
|
P. T. Endo, A. V. de A. Palhares, N. N. Pereira, G. E. Goncalves, D. Sadok, J. Kelner, B. Melander and J. Mangs, “Resource Allocation for Distributed Cloud: Concepts and Research Challenges,” IEEE Network, Vol. 25, No. 4, 2011, pp. 42-46. doi:10.1109/MNET.2011.5958007
|
[56]
|
A. Waqar, A. Raza and H. Abbas, “User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment,” Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TRUSTCOM '11), 16-18 November 2011, Changsha, pp. 927-932.
|
[57]
|
K. Venugopal and L. Patnaik, “Cloud Computing Privacy Issues and User-Centric Solution,” Communications in Computer and Information Science, Vol. 157, 2011, pp. 448-456.
|
[58]
|
B. Hay, K. Nance and M. Bishop, “Storm Clouds Rising: Security Challenges for IaaS Cloud Computing,” 44th Hawaii International Conference on System Sciences, Koloa, 4-7 January 2011, pp. 1-7.
doi:10.1109/HICSS.2011.386
|
[59]
|
E. Mathisen, “Security Challenges and Solutions in Cloud Computing,” Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference, Daejeon, 31 May - 3 June 2011, pp. 208-212.
|
[60]
|
B. Lagesse, “Challenges in Securing the Interface between the Cloud and Pervasive Systems,” IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM), Seattle, 21-25 March 2011, pp. 106-110.
doi:10.1109/PERCOMW.2011.5766850
|
[61]
|
P. Schoo, V. Fusenig, V. Souza, M. Melo, P. Murray, H. Debar, H. Medhioub and D. Zeghlache, “Challenges for Cloud Networking Security,” Mobile Networks and Management, Social Informatics and Telecommunications Engineering, Springer, New York, 2010.
|
[62]
|
A. Verma and S. Kaushal, “Cloud Computing Security Issues and Challenges: A Survey,” Proceeding of Springer International Conference on Advances in Computing and Communication, Kochi, 22-24 July 2011, pp. 445-454.
|
[63]
|
S. Pardeep, S. Sood, et al., “Security Issues in Cloud Computing,” Communications in Computer and Information Science, Vol. 169, 2011, pp. 36-45.
doi:10.1007/978-3-642-22577-2_5
|
[64]
|
J. Wang and S. Mu, “Security Issues and Countermeasures in Cloud Computing,” IEEE International Conference on Grey Systems and Intelligent Services (GSIS), pp. Nanjing, 15-18 September 2011, pp. 843-846.
doi:10.1109/GSIS.2011.6043978
|
[65]
|
A. Behl, “Emerging Security Challenges in Cloud Computing: An Insight to Cloud Security Challenges and Their Mitigation,” World Congress on Information and Communication Technologies (WICT), Mumbai, 11-14 December 2011, pp. 217-222.
doi:10.1109/WICT.2011.6141247
|
[66]
|
X. Tan and B. Ai, “The Issues of Cloud Computing Security in High-Speed Railway,” International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), Harbin, 12-14 August 2011, pp. 4358-4363. doi:10.1109/EMEIT.2011.6023923
|
[67]
|
J. C. Roberts and W. Al-Hamdani, “Who Can You Trust in the Cloud? A Review of Security Issues within Cloud Computing,” Proceedings of the 2011 Information Security Curriculum Development Conference, Kennesaw, 7-9 October 2011, pp. 15-19. doi:10.1145/2047456.2047458
|
[68]
|
S. Tanimoto, M. Hiramoto, M. Iwashita, H. Sato and A. Kanai, “Risk Management on the Security Problem in Cloud Computing,” First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering (CNSI), Jeju, 23-25 May 2011, pp.147-152.
|
[69]
|
B. Dhinesh, K. Venkata, Z. Mohammed, et al., “An Analysis of Security Related Issues in Cloud Computing,” Communications in Computer and Information Science, Vol. 168, No. 2, 2011, pp. 180-190.
|
[70]
|
W. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing”, 44th Hawaii International Conference on System Sciences, Koloa, 4-7 January 2011.
doi:10.1109/HICSS.2011.103
|
[71]
|
S.-U. Lar, X. F. Liao and S. A. Abbas, “Cloud Computing Privacy & Security Global Issues, Challenges, & Mechanisms,” 6th International ICST Conference on Communications and Networking in China, Harbin, 17-19 August, 2011, pp. 1240-1245.
|
[72]
|
M. Morshed, M. Islam, M. Huq, M. Hossain and M. Basher, “Integration of Wireless Hand-Held Devices with the Cloud Architecture: Security and Privacy Issues,” Proceedings of the 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Barcelona, 26-28 October 2011, pp. 83-88.
|
[73]
|
Z. Wang, “Security and Privacy Issues within the Cloud Computing,” International Conference on Computational and Information Sciences (ICCIS), Chengdu, 21-23, October, 2011, pp. 175-178.
doi:10.1109/ICCIS.2011.247
|
[74]
|
N. Poolsappasit, V. Kumar, S. Madria and S. Chellappan, “Challenges in Secure Sensor-Cloud Computing,” Proceedings of the 8th VLDB International Conference on Secure Data Management (SDM'11), Seattle, 2 September 2011, pp. 70-84.
|
[75]
|
P. Hemant, N. P. Chawande, A. Sonule, H. Wani, “Development of Servers in Cloud Computing to Solve Issues Related to Security and Backup,” IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), Beijing, 15-17 September 2011, pp. 158-163.
doi:10.1109/CCIS.2011.6045052
|
[76]
|
Z. Mahmood, “Data Location and Security Issues in Cloud Computing,” International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), Tirana, 7-9 September 2011, pp. 49-54.
doi:10.1109/EIDWT.2011.16
|
[77]
|
R. Liu and I. Wassell, “Opportunities and Challenges of Wireless Sensor Networks Using Cloud Services,” Proceedings of the Workshop on Internet of Things and Service Platforms, Tokyo, 6-9 December 2011, 7 pages.
|
[78]
|
K. Rafique, A. W. Tareen, M. Saeed, J. Z. Wu and S. S. Qureshi, “Cloud Computing Economics Opportunities and Challenges,” 4th IEEE International Conference on Broadband Network and Multimedia Technology (ICBNMT), Shenzhen, 28-30 October 2011, pp. 401-406.
doi:10.1109/ICBNMT.2011.6155965
|
[79]
|
X.-P. Zheng, “Study on the Opportunities and Challenges of the Cloud Computing for Chinese Medium-Sized and Small Enterprises,” International Conference on E-Business and E-Government (ICEE), Shenzhen, 28-30 October 2011.
|
[80]
|
D. Ardagna, B. Panicucci and M. Passacantando, “A Game Theoretic Formulation of the Service Provisioning Problem in Cloud Systems,” Proceedings of the 20th International Conference on World Wide Web, Hyderabad, 28 March - 1 April 2011, pp. 177-186.
doi:10.1145/1963405.1963433
|
[81]
|
L. Savu, “Cloud Computing: Deployment Models, Delivery Models, Risks and Research Challenges,” International Conference on Computer and Management, Wuhan, 19-21 May 2011, pp. 1-4.
|
[82]
|
J. Araujo, R. Matos, P. Maciel and R. Matias, “Software Aging Issues on the Eucalyptus Cloud Computing Infrastructure,” IEEE International Conference on Systems, Man, and Cybernetics (SMC), Anchorage, 9-12 October 2011, pp. 1411-1416.
|
[83]
|
S. Patidar, D. Rane and P. Jain, “Challenges of Software Development on Cloud Platform,” World Congress on Information and Communication Technologies (WICT), Mumbai, 11-14 December 2011, pp. 1009-1013.
doi:10.1109/WICT.2011.6141386
|
[84]
|
P. Mohagheghi and T. S?ther, “Software Engineering Challenges for Migration to the Service Cloud Paradigm: Ongoing Work in the REMICS Project,” IEEE World Congress on Services (SERVICES), Washington DC, 4-9 July 2011, pp. 507-514. doi:10.1109/SERVICES.2011.26
|
[85]
|
I. Neamtiu and T. Dumitras, “Cloud Software Upgrades: Challenges and Opportunities,” International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, Williamsburg, 26 September 2011, pp. 1-10. doi:10.1109/MESOCA.2011.6049037
|
[86]
|
M. Khorshed, A. Ali and S. Wasimi, “Trust Issues That Create Threats for Cyber Attacks in Cloud Computing,” IEEE 17th International Conference on Parallel and Distributed Systems (ICPADS), Tainan, 7-9 December 2011, pp. 900-905.
|
[87]
|
P. Harsh, Y. Jegou, R. Cascella and C. Morin, “Contrail Virtual Execution Platform Challenges in Being Part of a Cloud Federation,” Proceedings of the 4th European Conference on towards a Service-Based Internet (ServiceWave'11), Poznan, 26-28 October 2011, pp. 50-61.
|
[88]
|
O. Min, C. Park, J. Lee, J. Cho and H. Kim, “Issues on Supporting Public Cloud Virtual Machine Provisioning and Orchestration,” 13th International Conference on Advanced Communication Technology, Phoenix Park, 13-16 February 2011, pp. 270-273.
|
[89]
|
E. Elmroth, J. Tordsson, F. Hernández, A. Ali-Eldin, P. Svard, M. Sedaghat and W. Li, “Self-Management Challenges for Multi-Cloud Architectures,” Proceedings of the 4th European Conference on towards a Service-Based Internet, Poznan, 26-28 October 2011, pp. 8-49.
|
[90]
|
D. Nguyen, F. Lelli, M. Papazoglou and W. van den Heuvel, “Issue in Automatic Combination of Cloud Services,” IEEE 10th International Symposium on Parallel and Distributed Processing with Applications, Leganés, 10-13 July 2012, pp. 487-493.
|
[91]
|
R. Moreno-Vozmediano, R. Montero and I. Llorente, “Key Challenges in Cloud Computing to Enable the Future Internet of Services,” IEEE Internet Computing, 18 May 2012.
http://doi.ieeecomputersociety.org/10.1109/MIC.2012.69
|
[92]
|
C. Pham, P. Cao, Z. Kalbarczyk and R. Iyer, “Toward a High Availability Cloud: Techniques and Challenges,” IEEE/IFIP 42nd International Conference on Dependable Systems and Networks Workshops (DSN-W), Boston, 25- 28 June 2012, pp. 1-6.
|
[93]
|
H. Mi, H. Wang, G. Yin, H. Cai; Q. Zhou and T. Sun, “Performance Problems Diagnosis in Cloud Computing Systems by Mining Request Trace Logs,” IEEE Network Operations and Management Symposium, Maui, 16-20 April 2012, pp. 893-899.
|
[94]
|
M. Tang, M. Yusoh and Z. Izzah, “A Parallel Cooperative Co-Evolutionary Genetic Algorithm for the Composite SaaS Placement Problem in Cloud Computing,” Lecture Notes in Computer Science, Springer, Berilin, 2012, pp. 225-234.
|
[95]
|
B. Kantarci and H. T. Mouftah, “Minimizing the Provisioning Delay in the Cloud Network: Benefits, Overheads and Challenges,” IEEE Symposium on Computers and Communications (ISCC), Cappadocia, 1-4 July 2012, pp. 806-811.
|
[96]
|
R. Patibandla, S. Kurra and N.Mundukur, “A study on Scalability of Services and Privacy Issues in Cloud Computting,” Proceedings of the 8th International Conference on Distributed Computing and Internet Technology (ICDCIT'12), Bhubaneswar, 2-4 February 2012, pp. 212-230.
|
[97]
|
T. Hobfeld, R. Schatz, M. Varela and C. Timmerer, “Challenges of QoE Management for Cloud Applications,” IEEE Communications Magazine, Vol. 50, No. 4, 2012, pp. 28-36. doi:10.1109/MCOM.2012.6178831
|
[98]
|
P. You, Y. Pen, W. Liu and S. Xue, “Security Issues and Solutions in Cloud Computing,” 32nd International Conference on Distributed Computing Systems Workshops, Macau, 18-21 June 2012, pp. 573-577.
|
[99]
|
W. Liu, “Research on Cloud Computing Security Problem and Strategy,” 2nd International Conference on Consumer Electronics, Communications and Networks, Yi-Chang, 21-23 April 2012, pp. 1216-1219.
|
[100]
|
H. Yu, N. Powell, D.Stembridge and X. Yuan, “Cloud Computing and Security Challenges,” Proceedings of the 50th Annual Southeast Regional Conference, Tuscaloosa, 29-31 March 2012, pp. 298-302.
|
[101]
|
M. Srinivasan, K. Sarukesi, P. Rodrigues, M. Manoj and P. Revathy, “State-of-the-Art Cloud Computing Security Taxonomies: A Classification of Security Challenges in the Present Cloud Computing Environment,” Proceedings of the International Conference on Advances in Computing, Communications and Informatics, Chennai, 3-5 August 2012, pp. 470-476.
|
[102]
|
E. Atanassov, T. Gurov and A. Karaivanova, “Security Issues of the Combined Usage of Grid and Cloud Resources,” Proceedings of the 35th International Convention MIPRO, Opatija/Abbazia, 21-25 May 2012, pp. 417-420.
|
[103]
|
K. Ren, C. Wang and Q. Wang, “Security Challenges for the Public Cloud,” IEEE Internet Computing, Vol. 16, No. 1, 2012, pp. 69-73. doi:10.1109/MIC.2012.14
|
[104]
|
Y. D. Zhang and Y. S. Zhang, “Cloud Computing and Cloud Security Challenges,” International Symposium on Information Technology in Medicine and Education (ITME), Hokkaido, 3-5 August 2012, pp. 1084-1088.
|
[105]
|
A. Fauzi, N. Ahmad, T. Herawan and N. Zin, “On Cloud Computing Security Issues,” In: J.-S. Pan, S.-M. Chen and N. T. Nguyen, Eds., ACIIDS, Part II. LNCS, Springer, Heidelberg, 2012, pp. 560-569.
|
[106]
|
T. Takahashi, G. Blanc, Y. Kadobayashi, D. Fall, H. Hazeyama and S. Matsuo, “Enabling Secure Multitenancy in Cloud Computing: Challenges and Approaches,” 2nd Baltic Congress on Future Internet Communications (BCFIC), Vilnius, 25-27 April 2012, pp. 72-79.
doi:10.1109/BCFIC.2012.6217983
|
[107]
|
J. Viega, “Cloud Security: Not a Problem,” IEEE Security & Privacy, Vol. 10, No. 4, 2012, p.3.
doi:10.1109/MSP.2012.93
|
[108]
|
D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” International Conference on Computer Science and Electronics Engineering (ICCSEE), Hangzhou, 23-25 March 2012, pp. 647-651.
doi:10.1109/ICCSEE.2012.193
|
[109]
|
Y. Jadeja and K. Modi, “Cloud Computing-Concepts, Architecture and Challenges,” International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Kanyakumari, 21-22 March 2012, pp. 877-880. doi:10.1109/ICCEET.2012.6203873
|
[110]
|
A. Cardoso and P. Sim?es, “Cloud Computing: Concepts, Technologies and Challenges, Virtual and Networked Organizations, Emergent Technologies and Tools,” Vol. 248, Springer, Berlin, 2012, pp. 127-136.
doi:10.1007/978-3-642-31800-9_14
|
[111]
|
S. Dey, “Cloud Mobile Media: Opportunities, Challenges, and Directions,” International Conference on Computing, Networking and Communications (ICNC), Maui, 30 January - 2 February 2012, pp. 929-933.
doi:10.1109/ICCNC.2012.6167561
|
[112]
|
H. Al-Aqrabi, L. Liu, J. Xu, R. Hill, N. Antonopoulos and Y. Z. Zhan, “Investigation of IT Security and Compliance Challenges in Security-as-a-Service for Cloud Computing,” 15th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing Workshops, Shenzhen, 11-13 April 2012, pp. 124-129.
|
[113]
|
C. Brooks, “Amazon’s Early Efforts at Cloud Computing Partly Accidental,” IT Knowledge Exchange, 17 June 2010.
http://itknowledgeexchange.techtarget.com/cloud-computing/amazons-early-efforts-at-cloud-computing-partly-accidental/
|
[114]
|
D. Farber, “The IBM-Google Connection,” CNET News, 12 October 2012.
http://news.cnet.com/8301-13953_3-9933714-80.html?tag=nefd.top.
|
[115]
|
“The Eucalyptus Story,” 12 October 2012.
http://www.eucalyptus.com/about/story
|
[116]
|
B. Rochwerger, J. Caceres, R. Montero, et al., “The RESERVOIR Model and Architecture for Open Federated Cloud Computing,” IBM Journal of Research & Development, Vol. 53, No. 4, 2009.
doi:10.1147/JRD.2009.5429058
|