Cloud Computing Research Profiling: Mapping Scholarly Community and Identifying Thematic Boundaries of the Field

The aim of the study was to map the scholarly community interested in research on cloud computing and to identify thematic boundaries of the field. The methodology of research profiling, representing bibliometric descriptive studies, was applied to achieve the aim of the study. Using research profiling for mapping the cloud computing field can be considered as an innovation. Although the research profiling methodology has been widely used across various subject areas, including Computer Science, Social Sciences, Engineering, Arts and Humanities, Business, Management and Accounting, and Psychology, thus far neither Scopus nor Web of Science indexed publications including the conjunction of phrases “cloud computing” and “research profiling” in their titles, keywords and abstracts. The previous important scientometric study of the research output in the field was published by Heilig and Vos in 2014. Taking into account a very dynamic growth of the field, all this indicates the research gap to be filled. The research sample is made of 14,158 publications indexed in Scopus database comprising the phrase “cloud computing” in their titles. The study was purposely limited to the title search to concentrate the attention of publications relating directly to the issue of cloud computing. Applying the quantitative approach provides an opportunity for broad scanning of subject-related literature. First, general publication profiling recognized the main contributors (countries, research intuitions, source titles and authors) to the scholarly community interested in cloud computing. Secondly, subject area profiling was applied to find how multidisciplinary is the research in the field and how the research output is distributed across subject areas. Finally, topic profiling unveiled leading topics of studies in the field and their distribution by authors, journal, subject areas and core references.

[1]  Rajkumar Buyya,et al.  InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services , 2010, ICA3PP.

[2]  Ying Guo,et al.  The Research Profiling Method Applied to Nano-Enhanced, Thin-Film Solar Cells , 2010 .

[3]  Xun Xu,et al.  From cloud computing to cloud manufacturing , 2012 .

[4]  Walaa Hamdy,et al.  Impacts of Internet of Things on Supply Chains: A Framework for Warehousing , 2019, Social Sciences.

[5]  Nabil Sultan,et al.  loud computing for education : A new dawn ? , 2009 .

[6]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[7]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[8]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[9]  Ludo Waltman,et al.  Citation-based clustering of publications using CitNetExplorer and VOSviewer , 2017, Scientometrics.

[10]  D. Jelonek,et al.  Efficacy Of The Cloud Computing Technology In The Management Of Communication And Business Processes Of The Companies , 2016 .

[11]  Subhajyoti Bandyopadhyay,et al.  Cloud computing - The business perspective , 2011, Decis. Support Syst..

[12]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[13]  Tiago Oliveira,et al.  Assessing the determinants of cloud computing adoption: An analysis of the manufacturing and services sectors , 2014, Inf. Manag..

[14]  C. Olszak Business Intelligence In Cloud , 2014 .

[15]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[16]  R. Senarathna Cloud computing adoption by SMEs in Australia. , 2016 .

[17]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[18]  Heesang Lee,et al.  Research profiling for ‘standardization and innovation’ , 2011, Scientometrics.

[19]  Richard Wolski,et al.  The Eucalyptus Open-Source Cloud-Computing System , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[20]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[21]  Rajkumar Buyya,et al.  Energy-aware resource allocation heuristics for efficient management of data centers for Cloud computing , 2012, Future Gener. Comput. Syst..

[22]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[23]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[24]  Bu-Sung Lee,et al.  Optimization of Resource Provisioning Cost in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[25]  Cong Wang,et al.  Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[26]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[27]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[28]  Rajkumar Buyya,et al.  CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms , 2011, Softw. Pract. Exp..

[29]  J. Camacho,et al.  Relative absorptive capacity: a research profiling , 2012, Scientometrics.

[30]  Xiaolei Dong,et al.  Security and privacy for storage and computation in cloud computing , 2014, Inf. Sci..

[31]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[32]  Will Venters,et al.  A critical review of cloud computing: researching desires and realities , 2012, J. Inf. Technol..

[33]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[34]  Chinyao Low,et al.  Understanding the determinants of cloud computing adoption , 2011, Ind. Manag. Data Syst..

[35]  Rajkumar Buyya,et al.  Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[36]  Andrzej Lis,et al.  Profiling and Mapping the Contexts of the Case Study Research in Business, Management and Accounting , 2018 .

[37]  Cong Wang,et al.  Toward Secure and Dependable Storage Services in Cloud Computing , 2012, IEEE Transactions on Services Computing.

[38]  Boyoung Kim,et al.  A Decision-Making Model for Adopting a Cloud Computing System , 2018, Sustainability.

[39]  Cong Wang,et al.  Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing , 2009, ESORICS.

[40]  Rajkumar Buyya,et al.  Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .

[41]  Feng Li,et al.  Cloud computing adoption by SMEs in the north east of England: A multi-perspective framework , 2013, J. Enterp. Inf. Manag..

[42]  Naixue Xiong,et al.  A game-theoretic method of fair resource allocation for cloud computing services , 2010, The Journal of Supercomputing.

[43]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[44]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[45]  Stefan Voß,et al.  A Scientometric Analysis of Cloud Computing Literature , 2014, IEEE Transactions on Cloud Computing.

[46]  Rajkumar Buyya,et al.  Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.

[47]  Salasiah Abdullah,et al.  Security and Privacy Challenges in Cloud Computing , 2018, 2018 Cyber Resilience Conference (CRC).

[48]  Rodney S. Tucker,et al.  Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport , 2011, Proceedings of the IEEE.

[49]  Eui-nam Huh,et al.  Fog Computing and Smart Gateway Based Communication for Cloud of Things , 2014, 2014 International Conference on Future Internet of Things and Cloud.

[50]  Han Qi,et al.  Research on mobile cloud computing: Review, trend and perspectives , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[51]  Jyrki Wallenius,et al.  Scholarly Communities of Research in Multiple Criteria Decision Making: a bibliometric Research Profiling Study , 2012, Int. J. Inf. Technol. Decis. Mak..

[52]  Eui-Nam Huh,et al.  Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.

[53]  Arumugam Seetharaman,et al.  The usage and adoption of cloud computing by small and medium businesses , 2013, Int. J. Inf. Manag..

[54]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[55]  Alan L. Porter,et al.  Research profiling: Improving the literature review , 2002, Scientometrics.